- Information Security Handbook
- Darren Death
- 167字
- 2021-07-02 21:55:56
Identification and authentication policy
The identification and authentication policy defines the organization's rules for information system identifiers that are provisioned and managed, as well as the mechanisms allowed for positive authentication of provisioned information system identifiers.
What the identification and authentication policy should address:
- Identifying information system users, processes acting on behalf of users, or devices
- Authenticating (or verifying) the identities of those users, processes, or devices as a prerequisite to allowing access to organizational information systems
- Using multifactor authentication for local and network access to information systems
- Employing replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts
- Preventing reuse of identifiers for a defined period
- Disabling identifiers after a defined period of inactivity
- Enforcing a minimum password complexity and change of characters when new passwords are created
- Prohibiting password reuse for a specified number of generations
- Allowing temporary password use for system logons with an immediate change to a permanent password
- Storing and transmitting only encrypted representation of passwords
- Obscuring feedback of authentication information
推薦閱讀
- Unreal Engine:Game Development from A to Z
- 控制與決策系統(tǒng)仿真
- Visual FoxPro 6.0數(shù)據(jù)庫與程序設計
- Windows XP中文版應用基礎
- 人工智能工程化:應用落地與中臺構建
- Hands-On Machine Learning with TensorFlow.js
- Photoshop CS3圖層、通道、蒙版深度剖析寶典
- 走近大數(shù)據(jù)
- R Machine Learning Projects
- Visual Studio 2010 (C#) Windows數(shù)據(jù)庫項目開發(fā)
- Java組件設計
- 大數(shù)據(jù)時代的調查師
- 系統(tǒng)建模與控制導論
- 設計中的人因:34個設計小故事
- Hands/On Kubernetes on Azure