An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
54/172
)
CCIs
Number
Definition
Status
Related
CCI-001591
The organization develops a list of software programs not authorized to execute on the information system.
Deprecated
CCI-001592
Defines the rules authorizing the terms and conditions of software program usage on the system.
Draft
CM-7(2)
CCI-001593
The organization maintains a list of software programs authorized to execute on the information system.
Deprecated
CCI-001594
The organization maintains a list of software programs not authorized to execute on the information system.
Deprecated
CCI-001595
The organization maintains rules authorizing the terms and conditions of software program usage on the information system.
Draft
CCI-001596
Defines the frequency with which to review and update the current contingency planning procedures.
Draft
CP-1
CCI-001597
Disseminate contingency planning procedures to organization-defined personnel or roles.
Draft
CP-1
CCI-001598
Review and update the current contingency planning procedures in accordance with the organization-defined frequency.
Draft
CP-1
CCI-001599
Sustain operational continuity of essential missions until full system restoration at primary processing and/or storage sites.
Draft
CP-2(5)
CCI-001600
Sustains operational continuity of essential business functions until full system restoration at primary processing and/or storage sites.
Draft
CP-2(5)
CCI-001601
Sustain operational continuity of essential mission functions at alternate processing and/or storage sites until system restoration to primary processing and/or storage sites.
Draft
CP-2(6)
CCI-001602
Sustain operational continuity of essential business functions at alternate processing and/or storage sites until system restoration at primary processing and/or storage sites.
Draft
CP-2(6)
CCI-001603
The contingency plan identifies the primary storage site hazards.
Draft
CCI-001604
Outline explicit mitigation actions for potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster.
Draft
CP-6(3)
CCI-001605
The contingency plan identifies the primary processing site hazards.
Draft
CCI-001606
Identify potential accessibility problems to outline explicit mitigation actions.
Draft
CP-7(2)
CCI-001607
The organization establishes alternate telecommunications services to support the information system.
Draft
CCI-001608
The organization identifies the primary provider's telecommunications service hazards.
Draft
CCI-001609
Activate the redundant secondary system that is not collocated with the primary system without loss of information or disruption to operations.
Draft
CP-9(6)
CCI-001610
Defines the time-period (by authenticator type) for changing/refreshing authenticators.
Draft
IA-5
CCI-001611
The organization defines the minimum number of special characters for password complexity enforcement.
Draft
IA-5(1)
CCI-001612
The organization defines the minimum number of upper case characters for password complexity enforcement.
Draft
IA-5(1)
CCI-001613
The organization defines the minimum number of lower case characters for password complexity enforcement.
Draft
IA-5(1)
CCI-001614
The organization defines the minimum number of numeric characters for password complexity enforcement.
Draft
IA-5(1)
CCI-001615
The organization defines the minimum number of characters that are changed when new passwords are created.
Draft
IA-5(1)
CCI-001616
The organization defines minimum password lifetime restrictions.
Draft
IA-5(1)
CCI-001617
The organization defines maximum password lifetime restrictions.
Draft
IA-5(1)
CCI-001618
The organization defines the number of generations for which password reuse is prohibited.
Draft
IA-5(1)
CCI-001619
The information system enforces password complexity by the minimum number of special characters used.
Draft
IA-5(1)
CCI-001620
The organization defines the types of and/or specific authenticators for which the registration process must be carried out in person before a designated registration authority with authorization by a designated organizational official (e.g., a supervisor).
Draft
Prev
1...
50
51
52
53
54
55
56
57
58
...172
Next