access-control Controls
20 controls across 4 frameworks.
CMMC L1
Limit system access to authorized users, processes, and devices
Access Control / Authorized Access
Limit system access to permitted transactions and functions
Access Control / Authorized Access
Verify and control connections to external information systems
Access Control / External Connections
Control FCI posted or processed on publicly accessible systems
Access Control / Public Systems
Identify all users, processes, and devices that access systems
Identification & Authentication / Identification
Authenticate users, processes, and devices before granting access
Identification & Authentication / Authentication
Limit physical access to systems and facilities to authorized individuals
Physical Protection / Physical Access
Control and manage physical access devices
Physical Protection / Physical Access
HIPAA
Implement procedures to ensure workforce members have appropriate access to ePHI and prevent unauthorized access
Administrative Safeguards / Workforce Security
Implement policies and procedures for authorizing access to ePHI
Administrative Safeguards / Information Access Management
Implement policies and procedures to limit physical access to electronic information systems and the facilities where they are housed
Physical Safeguards / Facility Access Controls
Implement technical policies and procedures to allow access to ePHI only to authorized persons or software programs
Technical Safeguards / Access Control
Implement policies and procedures to protect ePHI from improper alteration or destruction
Technical Safeguards / Integrity
NIST CSF
The physical environment is monitored to detect potential cybersecurity events
Detect / Continuous Monitoring
Identities and credentials are managed for authorized users and devices
Protect / Identity Management, Authentication, and Access Control
Identities are proofed and bound to credentials based on the context of interactions
Protect / Identity Management, Authentication, and Access Control
SOC2
Logical access security measures restrict access to assets
Security / Logical and Physical Access
Access credentials are issued with appropriate authorization
Security / Logical and Physical Access
Role-based access is used and reviewed periodically
Security / Logical and Physical Access
Physical access to facilities and systems is restricted
Security / Logical and Physical Access