Скачать книгу
4.2.2
|
Transmission media
|
11
|
4.2.3
|
Network Access Control (NAC) devices
|
11
|
4.2.4
|
Endpoint security
|
11
|
4.3
|
Implement secure communication channels according to design
|
12
|
4.3.1
|
Voice
|
12
|
4.3.2
|
Multimedia collaboration
|
12
|
4.3.3
|
Remote access
|
12
|
4.3.4
|
Data communications
|
12
|
4.3.5
|
Virtualized networks
|
12
|
4.3.6
|
Third-party connectivity
|
12
|
Domain 5
|
Identity and Access Management (IAM)
|
|
5.1
|
Control physical and logical access to assets
|
13
|
5.1.1
|
Information
|
13
|
5.1.2
|
Systems
|
13
|
5.1.3
|
Devices
|
13
|
5.1.4
|
Facilities
|
13
|
5.1.5
|
Applications
|
13
|
5.2
|
Manage identification and authentication of people, devices, and services
|
13
|
5.2.1
|
Identity Management (IdM) implementation
|
13
|
5.2.2
|
Single/multi-factor authentication (MFA)
|
13
|
5.2.3
|
Accountability
|
13
|
5.2.4
|
Session management
|
13
|
5.2.5
|
Registration, proofing, and establishment of identity
|
13
|
5.2.6
|
Federated Identity Management (FIM)
|
13
|
5.2.7
|
Credential management systems
|
13
|
5.2.8
|
Single Sign On (SSO)
|
13
|
5.2.9
|
Just-In-Time (JIT)
|
13
|
5.3
|
Federated identity with a third-party service
|
13
|
5.3.1
|
On-premise
|
13
|
5.3.2
|
Cloud
|
13
|
5.3.3
|
Hybrid
|
13
|
5.4
|
Implement and manage authorization mechanisms
|
14
|
5.4.1
|
Role Based Access Control (RBAC)
|
14
Скачать книгу
|