Difference between revisions of "Template:LIMSpec/Cybersecurity"
From LIMSWiki
Jump to navigationJump to searchShawndouglas (talk | contribs) (Added 35.5) |
Shawndouglas (talk | contribs) (Added 35.6) |
||
Line 44: | Line 44: | ||
| style="background-color:white;" |'''35.5''' The system should provide a means for authenticating an individual seeking to access any embedded cryptographic module within the system, as well as the individual's role in performing services within the module. | | style="background-color:white;" |'''35.5''' The system should provide a means for authenticating an individual seeking to access any embedded cryptographic module within the system, as well as the individual's role in performing services within the module. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, SC-15] | |||
| style="background-color:white;" |'''35.6''' The system should prevent connected collaborative computing devices (e.g., cameras, microphones, interactive whiteboards) from being activated without explicit permission from the end user, and it should provide a clear indication of any activation to the end user. | |||
|- | |||
|} | |} | ||
|} | |} |
Revision as of 23:40, 20 November 2019
|