Part of SRC-NET-030 Remote endpoint device authentication
Associated with IA controls: ECSC-1
Remote access is a significant risk to the Enclave. Attackers can engage in remote exploits without traversing the physical security controls often in place at the site. Thus, stringent logical controls are needed to protect DoD assets. Both the device and the user must be both authenticated and authorized prior to allowing access. Device authentication may be performed in several ways but DoD-approved PKI is preferred.
Work with the system administrator to verify that device authentication is implemented. Also, verify that mutual authentication between the remote access gateway and the endpoint is implemented.
Ensure device authentication and mutual authentication between the remote access gateway and the endpoint is implemented.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer