question stringlengths 34 206 | context stringlengths 15 2.29k | answer stringlengths 15 2.29k |
|---|---|---|
Number of sections in Chapter 3 of the NIST SP 800-171 revision 2 document. | There are 14 sections in Chapter 3. | There are 14 subsections in Chapter 3 of the NIST SP 800-171 2nd revision document. |
List all the sections in the Chapter 3 of the 2nd Revision of the NIST SP 800-171 document. | 3.1 Access Control. 3.2 Awareness and Training. 3.3 Audit and Accountability. 3.4 Configuration Management. 3.5 Identification and Authentication. 3.6 Incident Response. 3.7 Maintenance. 3.8 Media Protection. 3.9 Personnel Security. 3.10 Physical Protection. 3.11 Risk Assessment. 3.12 Security Assessment. 3.13 Systems ... | They are the following: 3.1 Access Control. 3.2 Awareness and Training. 3.3 Audit and Accountability. 3.4 Configuration Management. 3.5 Identification and Authentication. 3.6 Incident Response. 3.7 Maintenance. 3.8 Media Protection. 3.9 Personnel Security. 3.10 Physical Protection. 3.11 Risk Assessment. 3.12 Security A... |
The name of section 3.1 in the NIST SP 800-171 revision 2 document. | It's called Access Control. | The name of section 3.1 in the NIST SP 800-171 document revision 2 is Access Control. |
How many requirements are in the Access Control section of the NIST SP 800-171 revision 2 document? | 22 requirements in total. | There are 22 requirements in the Access Control section within the NIST SP 800-171 2nd revision document. |
What section in the NIST SP 800-171 document 2nd revision has requirements related to Access Control? | Requirement 3.1 | The section in the 2nd revision of the NIST SP 800-171 that has requirements related to Access Control is section 3.1. |
How many of the requirements in the Access Control section of the NIST SP 800-171 revision 2 document are basic security requirements? | 2 Basic Security Requirements in the SP 800-171 document for Access Control. | There are 2 basic security requirements in the Access Control section of the 2nd revision of the NIST SP 800-171 document. |
How many of the requirements in the Access Control section of the NIST SP 800-171 document 2nd revision are derived security requirements? | 20 Derived Security Requirements in the SP 800-171 document for Access Control. | There are 20 basic security requirements in the Access Control section of the NIST SP 800-171 revision 2 document. |
List all the requirements in the Access Control section of the 2nd revision of the NIST SP 800-171 document. | 3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute.
3.1.3: Control the flow of CUI in accordance with approved author... | Here are all the security requirements:
3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute.
3.1.3: Control the flow ... |
List all the derived security requirements in the Access Control section of the NIST SP 800-171 revision 2 document. | 3.1.3: Control the flow of CUI in accordance with approved authorizations.
3.1.4: Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
3.1.5: Employ the principle of least privilege, including for specific security functions and privileged accounts.
3.1.6: Use non-privileg... | Here are the derived security requirements:
3.1.3: Control the flow of CUI in accordance with approved authorizations.
3.1.4: Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
3.1.5: Employ the principle of least privilege, including for specific security functions and p... |
List all the basic security requirements in the Access Control section of the 2nd revision NIST SP 800-171 document. | 3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute. | The basic security requirements are as follows:
3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute. |
What is requirement 3.1.1 in the Access Control section of the 2nd revision of the NIST SP 800 171? | This requirement is found in section 3.1 called Access Control. The requirement states: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). |
What requirement in the Access Control section of the NIST SP 800-171 revision 2 document tells a user to limit system access to authorized users? | This requirement is in section 3.1.1 | That requirement is 3.1.1. |
What section of the NIST SP 800-171 2nd revision has the requirement: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). | Found in the Access Control section of the SP 800-171 document. | The section that requirement is located in is the Access Control section. |
Give me more information on requirement 3.1.1 in the NIST SP 800-171 revision 2 document. | Access control policies (e.g., identity- or role-based policies, control matrices, and cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, and domains) in systems. Access enforcement mechani... | Access control policies (e.g., identity- or role-based policies, control matrices, and cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, and domains) in systems. Access enforcement mechani... |
Is requirement 3.1.1 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a basic security requirement. | Requirement 3.1.1 is a basic security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.1 of the NIST SP 800-171 revision 2 document in? | The requirement is located in Chapter 3 subsection 3.1 named Access Control. | Requirement 3.1.1 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.2 in the 2nd revision of the NIST SP 800 171? | This requirement is found in section 3.1 called Access Control. The requirement states: Limit system access to the types of transactions and functions that authorized users are permitted to execute. | Limit system access to the types of transactions and functions that authorized users are permitted to execute. |
What section of the NIST SP 800-171 2nd revision has the requirement: Limit system access to the types of transactions and functions that authorized users are
permitted to execute? | This requirement is found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires limited system access to the types of transactions and functions authorized users a permitted to execute? | That requirement is 3.1.2 and is a part of the Acces Control section of the SP 800-171 document. | That requirement is 3.1.2. |
Give me more information on requirement 3.1.2 in the NIST SP 800-171 revision 2 document. | Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. System account types include individual, shared, group, system, anonymous, guest, emergency, developer, manufacturer, vendor, and temporary. Other attributes required for authorizing access... | Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. System account types include individual, shared, group, system, anonymous, guest, emergency, developer, manufacturer, vendor, and temporary. Other attributes required for authorizing access... |
Is requirement 3.1.2 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | A basic security requirement. | Requirement 3.1.2 is a basic security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.2 of the NIST SP 800-171 revision 2 document in? | It is located in the Access Control section of the SP 800-171 document. | Requirement 3.1.2 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.3 in the 2nd revision of the NIST SP 800 171? | This requirement is found in section 3.1 called Access Control. The requirement states: Control the flow of CUI in accordance with approved authorizations. | Control the flow of CUI in accordance with approved authorizations. |
What section of the NIST SP 800-171 2nd revision has the requirement: Control the flow of CUI in accordance with approved authorizations? | This requirement is found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires controlling the flow of CUI in accordance with approved authorizations? | This requirement is 3.1.3 and is found in the Access Control section of the SP 800-171. | That requirement is 3.1.3. |
Give me more information on requirement 3.1.3 in the NIST SP 800-171 revision 2 document. | Information flow control regulates where information can travel within a system and between systems (versus who can access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include the following: keeping export-controlled information from being transmitte... | Information flow control regulates where information can travel within a system and between systems (versus who can access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include the following: keeping export-controlled information from being transmitte... |
Is requirement 3.1.3 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.3 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.3 of the NIST SP 800-171 revision 2 document in? | The requirement is located in Chapter 3 subsection 3.1 named Access Control. | Requirement 3.1.3 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.4 in the 2nd revision of the NIST SP 800 171? | Separate the duties of individuals to reduce the risk of malevolent activity without collusion. | Separate the duties of individuals to reduce the risk of malevolent activity without collusion. |
What section of the NIST SP 800-171 2nd revision has the requirement: Separate the duties of individuals to reduce the risk of malevolent activity without collusion? | It is found in the Access Control section. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires separating the duties of individuals to reduce the risk of malevolent activity without collusion? | This requirement is 3.1.4 and is found in the Access Control section of the SP 800-171. | That requirement is 3.1.4. |
Give me more information on requirement 3.1.4 in the NIST SP 800-171 revision 2 document. | Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission functions and system support functions among different individuals or roles; conducting system support functions with diff... | Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission functions and system support functions among different individuals or roles; conducting system support functions with diff... |
Is requirement 3.1.4 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.4 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.4 of the NIST SP 800-171 revision 2 document in? | It is in the Access Control section of the SP 800-171 | Requirement 3.1.4 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.5 in the 2nd revision of the NIST SP 800 171? | Employ the principle of least privilege, including for specific security functions and privileged accounts. | Employ the principle of least privilege, including for specific security functions and privileged accounts. |
What section of the NIST SP 800-171 2nd revision has the requirement: Employ the principle of least privilege, including for specific security functions and privileged accounts? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires employing the principle of least privilege? | The requirement is 3.1.5 from the Access Control section of the SP 800-171 | That requirement is 3.1.5. |
Give me more information on requirement 3.1.5 in the NIST SP 800-171 revision 2 document. | Organizations employ the principle of least privilege for specific duties and authorized accesses for users and processes. The principle of least privilege is applied with the goal of authorized privileges no higher than necessary to accomplish required organizational missions or business functions.
Organizations cons... | Organizations employ the principle of least privilege for specific duties and authorized accesses for users and processes. The principle of least privilege is applied with the goal of authorized privileges no higher than necessary to accomplish required organizational missions or business functions.
Organizations cons... |
Is requirement 3.1.5 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.5 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.5 of the NIST SP 800-171 revision 2 document in? | In the Access Control section of the SP 800-171. | Requirement 3.1.5 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.6 in the 2nd revision of the NIST SP 800 171? | This requirement is found in section 3.1 called Access Control. The requirement states: Use non-privileged accounts or roles when accessing nonsecurity functions. | Use non-privileged accounts or roles when accessing nonsecurity functions. |
What section of the NIST SP 800-171 2nd revision has the requirement: Use non-privileged accounts or roles when accessing nonsecurity functions? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires the use of non-privileged accounts or roles when accessing nonsecurity functions? | The requirement is 3.1.6 from the Access Control section of the SP 800-171 | That requirement is 3.1.6 and is found in the Access Control section. |
Give me more information on requirement 3.1.6 in the NIST SP 800-171 revision 2 document. | This requirement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authoriza... | This requirement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authoriza... |
Is requirement 3.1.6 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.6 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.6 of the NIST SP 800-171 revision 2 document in? | Found in the Access Control section of the SP 800-171 document. | Requirement 3.1.6 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.7 in the 2nd revision of the NIST SP 800 171? | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. |
What section of the NIST SP 800-171 2nd revision has the requirement: Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires preventing non-privileged users from executing privileged functions and capturing that execution in audit logs? | The requirement is 3.1.7. | That requirement is 3.1.7 and is found in the Access Control section. |
Give me more information on requirement 3.1.7 in the NIST SP 800-171 revision 2 document. | Privileged functions include establishing system accounts, performing system integrity checks, conducting patching operations, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing
intrusion detection and prevention ... | Privileged functions include establishing system accounts, performing system integrity checks, conducting patching operations, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing
intrusion detection and prevention ... |
Is requirement 3.1.7 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.7 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.7 of the NIST SP 800-171 revision 2 document in? | Located in the Access Control section of the SP 800-171. | Requirement 3.1.7 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What requirement does 3.1.7 reference in the 2nd revision of the NIST SP 800-171 document? | References requirement 3.1.2 | Requirement 3.1.7 references requirement 3.1.2. |
What is requirement 3.1.2 in the NIST SP 800-171 2nd revision document? | Requirement 3.1.2 states: Limit system access to the types of transactions and functions that authorized users are permitted to execute. | Limit system access to the types of transactions and functions that authorized users are permitted to execute. |
In what way does requirement 3.1.7 depend on requirement 3.1.2 in the Access Control section of the NIST SP 800-171 revision 2 document? | Requirement 3.1.7 requires the authorized privileges to be defined for the transactions and functions that authorized users are permitted to execute. This will give information on what actions are for privileged users and which are not. | Requirement 3.1.7 requires the authorized privileges to be defined for the transactions and functions that authorized users are permitted to execute. This will give information on what actions are for privileged users and which are not. |
What is requirement 3.1.8 in the 2nd revision of the NIST SP 800 171? | Limit unsuccessful logon attempts. | Limit unsuccessful logon attempts. |
What section of the NIST SP 800-171 2nd revision has the requirement: Limit unsuccessful logon attempts? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires limiting unsuccessful logon attempts? | The requirement is 3.1.8 from the Access Control section of the SP 800-171 | That requirement is 3.1.8. |
Give me more information on requirement 3.1.8 in the NIST SP 800-171 revision 2 document. | This requirement applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are, in most cases, temporary and automatically release after a predetermined period established by the organization (i.e., a delay algor... | This requirement applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are, in most cases, temporary and automatically release after a predetermined period established by the organization (i.e., a delay algor... |
Is requirement 3.1.8 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.8 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.8 of the NIST SP 800-171 revision 2 document in? | Found in the Access Control section of the SP 800-171 document. | Requirement 3.1.8 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.9 in the 2nd revision of the NIST SP 800 171? | This requirement is found in section 3.1 called Access Control. The requirement states: Provide privacy and security notices consistent with applicable CUI rules. | Provide privacy and security notices consistent with applicable CUI rules. |
What section of the NIST SP 800-171 2nd revision has the requirement: Provide privacy and security notices consistent with applicable CUI rules? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires providing privacy and security notices consistent with applicable CUI rules? | The requirement is 3.1.9 from the Access Control section of the SP 800-171 | That requirement is 3.1.9. |
Give me more information on requirement 3.1.9 in the NIST SP 800-171 revision 2 document. | System use notifications can be implemented using messages or warning banners displayed before individuals log in to organizational systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Based on a risk assessment, o... | System use notifications can be implemented using messages or warning banners displayed before individuals log in to organizational systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Based on a risk assessment, o... |
Is requirement 3.1.9 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.9 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.9 of the NIST SP 800-171 revision 2 document in? | Located in the Access Control section of the SP 800-171. | Requirement 3.1.9 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.10 in the 2nd revision of the NIST SP 800 171? | Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity. | Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity. |
What section of the NIST SP 800-171 2nd revision has the requirement: Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires using session lock with pattern-hiding displays? | That requirement is 3.1.10. | That requirement is 3.1.10. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires using session lock with pattern-hiding displays to prevent access and viewing of data afer a period of inactivity? | That requirement is 3.1.10. | That requirement is 3.1.10. |
Give me more information on requirement 3.1.10 in the NIST SP 800-171 revision 2 document. | Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the system but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined, typically at the operating system level (but can ... | Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the system but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined, typically at the operating system level (but can ... |
Is requirement 3.1.10 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | A derived security requirement. | Requirement 3.1.10 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.10 of the NIST SP 800-171 revision 2 document in? | Located in the Access Control section of the SP 800-171. | Requirement 3.1.10 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.11 in the 2nd revision of the NIST SP 800 171? | Terminate (automatically) a user session after a defined condition. | Terminate (automatically) a user session after a defined condition. |
What section of the NIST SP 800-171 2nd revision has the requirement: Terminate (automatically) a user session after a defined condition? | The requirement is found in the Access Control section of the SP 800-171. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires terminating a user session after a defined condition? | That requirement is 3.1.11. | That requirement is 3.1.11. |
Give me more information on requirement 3.1.11 in the NIST SP 800-171 revision 2 document. | This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., disconnecting from the network). A logical session (for local, network, and remote access) is initiated whenever a user (or process ... | This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., disconnecting from the network). A logical session (for local, network, and remote access) is initiated whenever a user (or process ... |
Is requirement 3.1.11 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | A derived security requirement. | Requirement 3.1.11 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.11 of the NIST SP 800-171 revision 2 document in? | Found in the Access Control section of the SP 800-171 document. | Requirement 3.1.11 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.12 in the 2nd revision of the NIST SP 800 171? | Monitor and control remote access sessions. | Monitor and control remote access sessions. |
What section of the NIST SP 800-171 2nd revision has the requirement: Monitor and control remote access sessions? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires monitoring and controlling remote access sessions? | That requirement is 3.1.12. | That requirement is 3.1.12. |
Give me more information on requirement 3.1.12 in the NIST SP 800-171 revision 2 document. | Remote access is access to organizational systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks
(VPNs) to enhance confidentiali... | Remote access is access to organizational systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks
(VPNs) to enhance confidentiali... |
Is requirement 3.1.12 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.12 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.12 of the NIST SP 800-171 revision 2 document in? | Located in the Access Control section of the SP 800-171. | Requirement 3.1.12 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What SP documents does requirement 3.1.12 reference on providing guidance for secure remote access and virtual private networks? | It references the SP 800-46 document (Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security), the SP 800-77 document (Guide to IPsec VPNs), and the SP 800-113 document (Guide to SSL VPNs) | Access Control requirement 3.1.12 references the SP 800-46 document (Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security), the SP 800-77 document (Guide to IPsec VPNs), and the SP 800-113 document (Guide to SSL VPNs) |
What is SP 800-46 document titled? | SP 800-46 is titled Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security | Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security |
What is the SP 800-77 document titled? | The SP 800-77 is titled Guide to IPsec VPNs | Guide to IPsec VPNs |
What is the SP 800-113 document titled? | The SP 800-113 is titled Guide to SSL VPNs | Guide to SSL VPNs |
What is requirement 3.1.13 in the 2nd revision of the NIST SP 800 171? | Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. | Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. |
What section of the NIST SP 800-171 2nd revision has the requirement: Employ cryptographic mechanisms to protect the confidentiality of remote access sessions? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires employing cryptographic mechanisms to protect confidentiality of remote access sessions? | The requirement is 3.1.13 from the Access Control section of the SP 800-171 | That requirement is 3.1.13. |
Give me more information on requirement 3.1.13 in the NIST SP 800-171 revision 2 document. | Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See the Cryptographic Standards and Guidelines; Cryptographic Algorithm Validation Program; Cryptographic Module Validation Program; National Security Agency Cryptographic Standards. | Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See the Cryptographic Standards and Guidelines; Cryptographic Algorithm Validation Program; Cryptographic Module Validation Program; National Security Agency Cryptographic Standards. |
Is requirement 3.1.13 in the 2nd Revision of NIST SP 800-171 a basic security requirement or a derived security requirement? | It is a derived security requirement. | Requirement 3.1.13 is a derived security requirement in the Access Control section of the NIST SP 800-171 2nd Revision document. |
What section is requirement 3.1.13 of the NIST SP 800-171 revision 2 document in? | It is located in the Access Control section of the SP 800-171 document. | Requirement 3.1.13 is located in the Access Control section of the NIST SP 800-171 2nd revision document. |
What is requirement 3.1.14 in the 2nd revision of the NIST SP 800 171? | The requirement is found in the Access Control section of the SP 800-171. The requirement states: Route remote access via managed access control points. | Route remote access via managed access control points. |
What section of the NIST SP 800-171 2nd revision has the requirement: Route remote access via managed access control points? | Found in the Access Control section of the SP 800-171 document. | That requirement is found in the Access Control section. |
What requirement in the Access Control section of the NIST SP 800-171 2nd revision requires route remote access via managed access control points? | The requirement is 3.1.14 from the Access Control section of the SP 800-171 | That requirement is 3.1.14. |
Give me more information on requirement 3.1.14 in the NIST SP 800-171 revision 2 document. | Routing remote access through managed access control points enhances explicit, organizational control over such connections, reducing the susceptibility to unauthorized access to organizational systems resulting in the unauthorized disclosure of CUI. | Routing remote access through managed access control points enhances explicit, organizational control over such connections, reducing the susceptibility to unauthorized access to organizational systems resulting in the unauthorized disclosure of CUI. |
End of preview. Expand in Data Studio
This dataset contains the requirements found in Chapter 3 of the NIST SP 800-171 document titled Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The context of each row has information related to the expected response.
- Downloads last month
- 8