DIB SCC CyberAssist
  • Getting Started
    • Cybersecurity Fundamentals
    • Vulnerability and Threat Information
    • Cybersecurity Regulations and Standards
  • CMMC
    • CMMC Home
    • CMMC Training
    • By Level
    • By Domain
  • CCRA
  • About CyberAssist
    • Contact Us
    • DIB SCC
  • Search
Select Page

Microsoft – Security Identifiers

ISACA Journal Article – Data Loss Prevention: Next Steps

Infosecurity Magazine – Inactive Accounts: The Key to Your Company’s Sensitive Data

Microsoft – Regularly check for and remove inactive user accounts in the Active Directory

Microsoft – Configure CMMC Level 2 Identification and Authentication (IA) controls

Identity Automation – Definitive Guide to Account Username Conventions

Open Web Application Security Project (OWASP) – Testing for Default Credentials

NIST SP 800-53: IA-2 Identification and Authentication (Organization Users)

CyberSheath- How Multi-Factor Authentication Protects Your Business

NordLayer – The importance of multi-factor authentication for remote access