Difference between revisions of "User:Shawndouglas/sandbox/sublevel21"
Shawndouglas (talk | contribs) |
Shawndouglas (talk | contribs) |
||
Line 106: | Line 106: | ||
[https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br /> | [https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br /> | ||
[https://www.ams.usda.gov/datasets/pdp/pdp-standard-operating-procedures USDA Administrative Procedures for the PDP 5.2.4]<br /> | [https://www.ams.usda.gov/datasets/pdp/pdp-standard-operating-procedures USDA Administrative Procedures for the PDP 5.2.4]<br /> | ||
https://extranet.who.int/prequal/content/who-technical-report-seriesWHO Technical Report Series, #986, Annex 2, 15.9] | [https://extranet.who.int/prequal/content/who-technical-report-seriesWHO Technical Report Series, #986, Annex 2, 15.9] | ||
| style="background-color:white;" |'''31.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions. | | style="background-color:white;" |'''31.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions. | ||
|- | |- | ||
Line 130: | Line 130: | ||
[https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9] | [https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9] | ||
| style="background-color:white;" |'''31.25''' The system shall provide initial login access using at least two unique identification components, e.g., a user identifier and password, or biometric information linked to and used by the genuine user. | | style="background-color:white;" |'''31.25''' The system shall provide initial login access using at least two unique identification components, e.g., a user identifier and password, or biometric information linked to and used by the genuine user. | ||
|- | |||
| style="padding:5px; width:500px;" | | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (a)]<br /> | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br /> | |||
[https://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=30006MXP.PDF EPA 815-R-05-004 Chap. IV, Sec. 8.6]<br /> | |||
[https://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=30006MXP.PDF EPA 815-R-05-004 Chap. VI, Sec. 8.6]<br /> | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3] | |||
| style="background-color:white;" |'''31.26''' The system shall prevent the same combination of identification components from being used across more than one account. | |||
|- | |||
| style="padding:5px; width:500px;" | | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (b)]<br />[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br />[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3] | |||
| style="background-color:white;" |'''31.27''' The system shall allow the administrator to define a time period in days after which a user will be prompted to change their password. | |||
|- | |||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.3.1] | |||
| style="background-color:white;" |'''31.28''' The system shall allow the administrator to define a time period of inactivity for a user identifier, after which it will be disabled and archived. | |||
|- | |||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.2.2] | |||
| style="background-color:white;" |'''31.29''' The system shall allow the administrator or authorized personnel to configure the allowance or prevention of multiple concurrent active sessions for one unique user. | |||
|- | |||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.4] | |||
| style="background-color:white;" |'''31.30''' The system shall allow the administrator or authorized personnel to configure approved system use (e.g., "you are accessing a restricted information system," "system use indicates consent to being monitored, recorded, and audited") and other types of notifications to appear before or after a user logs in to the system. These notifications should remain on the screen until acknowledged by the user. | |||
|- | |||
| style="padding:5px; width:500px;" | | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (d)]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/211.68 21 CFR Part 211.68]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/211.100 21 CFR Part 211.100]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/211.160 21 CFR Part 211.160 (a)]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/211.188 21 CFR Part 211.188]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/211.194 21 CFR Part 211.194]<br /> | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br /> | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.4.1.1]<br /> | |||
[https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-1/dir_2003_94/dir_2003_94_en.pdf E.U. Commission Directive 2003/94/EC Article 9.2]<br /> | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3]<br /> | |||
[https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9] | |||
| style="background-color:white;" |'''31.31''' The system shall keep an accurate audit trail of login activities, including failed login attempts and electronic signings. | |||
|- | |||
| style="padding:5px; width:500px;" | | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (d)]<br /> | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br /> | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.3]<br /> | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3] | |||
| style="background-color:white;" |'''31.32''' The system shall allow the administrator or authorized personnel to define the number of failed login attempts before the system locks the user out. | |||
|- | |- | ||
|} | |} | ||
|} | |} |
Revision as of 15:59, 19 September 2019
This is sublevel21 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. |
Sandbox begins below
31. Configuration Management
|