data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_PR_AA_05_3

http://cyfun.data.gift/data/requirement_PR_AA_05_3
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_BASIC

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_KeyMeasures

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_PR.AA-05

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

PR.AA-05.3: A ccess rights, privileges and authorisations shall be restricted to the systems and specific information needed to perform the tasks (the principle of Least Privilege).

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

PR.AA-05.3

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p94

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p29

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p67

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.AA-05

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that access rights, privileges, and authorisations are restricted to only the systems and specific information needed to perform assigned tasks, following the principle of least privilege. To achieve this goal, the following should be considered: - Apply Least Privilege - Access rights should be limited to the minimum necessary for users, systems, and services. - Accounts should start with low privileges, and be elevated only when justified. - Just-in-time access should be used to limit the duration of elevated privileges. - Define and Manage Permissions - Access rights should be clearly defined based on roles and responsibilities. - An inventory of accounts and their permissions should be maintained and kept up to date. - Separate accounts should be used for contractors and third parties to ensure traceability. - Enforce Access Controls - Role-based or attribute-based access control models should be implemented where feasible. - Internet access points and external connections should be limited to what is strictly necessary. - Harden Systems - Systems should be hardened to support access control by: - Disabling unused ports and services - Restricting Bluetooth where not needed - Limiting legacy protocols such as FTP unless securely configured - Review and Adapt Access - Access rights should be reviewed regularly and adjusted based on role changes, project completion, or security assessments. - Access should be revoked immediately when no longer needed. - OT-Specific Considerations In OT environments, access control should still follow the principle of least privilege. Where technical limita- tions exist, previously defined OT access control measures (see PR.AA-01.1 and PR.AA-05.1) should be applied to ensure secure and traceable access.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that access rights, privileges, and authorisations are restricted to only the systems and specific information needed to perform assigned tasks, following the principle of least privilege. To achieve this goal, the following should be considered: • Apply Least Privilege o Access rights should be limited to the minimum necessary for users, systems, and services. o Accounts should start with low privileges, and be elevated only when justified. o Just-in-time access should be used to limit the duration of elevated privileges. • Define and Manage Permissions o Access rights should be clearly defined based on roles and responsibilities. o An inventory of accounts and their permissions should be maintained and kept up to date. o Separate accounts should be used for contractors and third parties to ensure traceability. • Enforce Access Controls o Role-based or attribute-based access control models should be implemented where feasible. o Internet access points and external connections should be limited to what is strictly necessary. • Harden Systems o Systems should be hardened to support access control by: - Disabling unused ports and services - Restricting Bluetooth where not needed - Limiting legacy protocols such as FTP unless securely configured • Review and Adapt Access o Access rights should be reviewed regularly and adjusted based on role changes, project completion, or security assessments. o Access should be revoked immediately when no longer needed. • OT-Specific Considerations In OT environments, access control should still follow the principle of least privilege. Where technical limita- tions exist, previously defined OT access control measures (see PR.AA-01.1 and PR.AA-05.1) should be applied to ensure secure and traceable access.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to ensure that access rights, privileges, and authorisations are restricted to only the systems and specific information needed to perform assigned tasks, following the principle of least privilege. To achieve this goal, the following should be considered:</p><ul><li>Apply Least Privilege<ul><li>Access rights should be limited to the minimum necessary for users, systems, and services.</li><li>Accounts should start with low privileges, and be elevated only when justified.</li><li>Just-in-time access should be used to limit the duration of elevated privileges.</li></ul></li><li>Define and Manage Permissions<ul><li>Access rights should be clearly defined based on roles and responsibilities.</li><li>An inventory of accounts and their permissions should be maintained and kept up to date.</li><li>Separate accounts should be used for contractors and third parties to ensure traceability.</li></ul></li><li>Enforce Access Controls<ul><li>Role-based or attribute-based access control models should be implemented where feasible.</li><li>Internet access points and external connections should be limited to what is strictly necessary.</li></ul></li><li>Harden Systems<ul><li>Systems should be hardened to support access control by:<ul><li>Disabling unused ports and services</li><li>Restricting Bluetooth where not needed</li><li>Limiting legacy protocols such as FTP unless securely configured</li></ul></li></ul></li><li>Review and Adapt Access<ul><li>Access rights should be reviewed regularly and adjusted based on role changes, project completion, or security assessments.</li><li>Access should be revoked immediately when no longer needed.</li></ul></li><li>OT-Specific Considerations In OT environments, access control should still follow the principle of least privilege. Where technical limita- tions exist, previously defined OT access control measures (see PR.AA-01.1 and PR.AA-05.1) should be applied to ensure secure and traceable access.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure that access rights, privileges, and authorisations are restricted to only the systems and specific information needed to perform assigned tasks, following the principle of least privilege. To achieve this goal, the following should be considered: - Apply Least Privilege - Access rights should be limited to the minimum necessary for users, systems, and services. - Accounts should start with low privileges, and be elevated only when justified. - Just-in-time access should be used to limit the duration of elevated privileges. - Define and Manage Permissions - Access rights should be clearly defined based on roles and responsibilities. - An inventory of accounts and their permissions should be maintained and kept up to date. - Separate accounts should be used for contractors and third parties to ensure traceability. - Enforce Access Controls - Role-based or attribute-based access control models should be implemented where feasible. - Internet access points and external connections should be limited to what is strictly necessary. - Harden Systems - Systems should be hardened to support access control by: - Disabling unused ports and services - Restricting Bluetooth where not needed - Limiting legacy protocols such as FTP unless securely configured - Review and Adapt Access - Access rights should be reviewed regularly and adjusted based on role changes, project completion, or security assessments. - Access should be revoked immediately when no longer needed. - OT-Specific Considerations In OT environments, access control should still follow the principle of least privilege. Where technical limita- tions exist, previously defined OT access control measures (see PR.AA-01.1 and PR.AA-05.1) should be applied to ensure secure and traceable access.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

PR.AA-05.3

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Least privilege enforcement

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

A ccess rights, privileges and authorisations shall be restricted to the systems and specific information needed to perform the tasks (the principle of Least Privilege).

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_BASIC

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_KeyMeasures

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_BASIC

  • External link
  • Internal link

http://cyfun.data.gift/ontology#isKeyMeasure

  • External link
  • Internal link

1

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

23

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 25 of 25

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.AA-05

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.AA-05

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.