Difference between revisions of "User:Shawndouglas/sandbox/sublevel21"
Shawndouglas (talk | contribs)  | 
				Shawndouglas (talk | contribs)   | 
				||
| Line 106: | Line 106: | ||
[https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br />  | [https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br />  | ||
[https://www.ams.usda.gov/datasets/pdp/pdp-standard-operating-procedures USDA Administrative Procedures for the PDP 5.2.4]<br />  | [https://www.ams.usda.gov/datasets/pdp/pdp-standard-operating-procedures USDA Administrative Procedures for the PDP 5.2.4]<br />  | ||
https://extranet.who.int/prequal/content/who-technical-report-seriesWHO Technical Report Series, #986, Annex 2, 15.9]  | [https://extranet.who.int/prequal/content/who-technical-report-seriesWHO Technical Report Series, #986, Annex 2, 15.9]  | ||
   | style="background-color:white;" |'''31.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions.  |    | style="background-color:white;" |'''31.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions.  | ||
  |-    |   |-    | ||
| Line 130: | Line 130: | ||
[https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9]  | [https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9]  | ||
   | style="background-color:white;" |'''31.25''' The system shall provide initial login access using at least two unique identification components, e.g., a user identifier and password, or biometric information linked to and used by the genuine user.  |    | style="background-color:white;" |'''31.25''' The system shall provide initial login access using at least two unique identification components, e.g., a user identifier and password, or biometric information linked to and used by the genuine user.  | ||
 |-   | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (a)]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br />  | |||
[https://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=30006MXP.PDF EPA 815-R-05-004 Chap. IV, Sec. 8.6]<br />  | |||
[https://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=30006MXP.PDF EPA 815-R-05-004 Chap. VI, Sec. 8.6]<br />  | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3]  | |||
  | style="background-color:white;" |'''31.26''' The system shall prevent the same combination of identification components from being used across more than one account.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (b)]<br />[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br />[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3]  | |||
  | style="background-color:white;" |'''31.27''' The system shall allow the administrator to define a time period in days after which a user will be prompted to change their password.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.3.1]  | |||
  | style="background-color:white;" |'''31.28''' The system shall allow the administrator to define a time period of inactivity for a user identifier, after which it will be disabled and archived.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.2.2]  | |||
  | style="background-color:white;" |'''31.29''' The system shall allow the administrator or authorized personnel to configure the allowance or prevention of multiple concurrent active sessions for one unique user.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.4]  | |||
  | style="background-color:white;" |'''31.30''' The system shall allow the administrator or authorized personnel to configure approved system use (e.g., "you are accessing a restricted information system," "system use indicates consent to being monitored, recorded, and audited") and other types of notifications to appear before or after a user logs in to the system. These notifications should remain on the screen until acknowledged by the user.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (d)]<br />  | |||
[https://www.law.cornell.edu/cfr/text/21/211.68 21 CFR Part 211.68]<br />  | |||
[https://www.law.cornell.edu/cfr/text/21/211.100 21 CFR Part 211.100]<br />  | |||
[https://www.law.cornell.edu/cfr/text/21/211.160 21 CFR Part 211.160 (a)]<br />  | |||
[https://www.law.cornell.edu/cfr/text/21/211.188 21 CFR Part 211.188]<br />  | |||
[https://www.law.cornell.edu/cfr/text/21/211.194 21 CFR Part 211.194]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.4.1.1]<br />  | |||
[https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-1/dir_2003_94/dir_2003_94_en.pdf E.U. Commission Directive 2003/94/EC Article 9.2]<br />  | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3]<br />  | |||
[https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.9]  | |||
  | style="background-color:white;" |'''31.31''' The system shall keep an accurate audit trail of login activities, including failed login attempts and electronic signings.  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/21/11.300 21 CFR Part 11.300 (d)]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E17-5 and S-3-1]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.3]<br />  | |||
[https://www.iso.org/standard/56115.html ISO 15189:2012 5.10.3]  | |||
  | style="background-color:white;" |'''31.32''' The system shall allow the administrator or authorized personnel to define the number of failed login attempts before the system locks the user out.  | |||
  |-    |   |-    | ||
|}  | |}  | ||
|}  | |}  | ||
Revision as of 15:59, 19 September 2019
| 
   | 
This is sublevel21 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. | 
Sandbox begins below
31. Configuration Management
  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||







