Search


Manage Access to Systems and Data

(Back)

Objective

Protect accounts that are used to access systems and data to limit the ability for malware to spread.

Description

References

TBS

  1. DSD Appendix G - Account Management Configuration Requirements (1, 3, 4, 10 and 12)
  2. DSM Appendix B (B.2.3.2, B.2.3.2.2, B.2.3.2.4 and B.2.3.6), and
  3. GC Password Guidance

CCCS

  1. Managing and Controlling Administrative Privileges (ITSAP.10.094), and
  2. Ransomware Playbook (ITSM.00.099) (2.1.4)
  3. CSE Top 10 (ITSM.10.089) (2.3)

AC‑2, AC‑2(1), AC‑3, AC‑5, AC‑6, AC‑6(5), AC‑6(10), AC‑7, AC‑9, AC‑19, AC‑20(3), IA‑2, IA‑2(1), IA‑2(2), IA‑2(11), IA‑4, IA‑5, IA‑5(1), IA‑5(6), IA‑5(7), IA‑5(13), IA‑6, IA‑8