authentication
authentication Controls
8 controls across 5 frameworks.
CISA CPG
CMMC L1
HIPAA
hipaa-ts-1
Implement technical policies and procedures to allow access to ePHI only to authorized persons or software programs
Technical Safeguards / Access Control
critical 8h
hipaa-ts-4
Implement procedures to verify that a person or entity seeking access to ePHI is who they claim to be
Technical Safeguards / Person or Entity Authentication
critical 6h
NIST CSF
pr-aa-2
Identities are proofed and bound to credentials based on the context of interactions
Protect / Identity Management, Authentication, and Access Control
critical 3h
pr-aa-3
Users, services, and hardware are authenticated
Protect / Identity Management, Authentication, and Access Control
critical 4h