Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-2-1
Cybersecurity Requirements For Identity And Access Management Must Be Defined, Documented
And Approved.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-2-2
The Cybersecurity Requirements For Identity And Access Management Must Be Implemented.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-2-3
- The cybersecurity requirements for identity and access management must include at least the following:
- Single-factor authentication based on username and password.
- Multi-factor authentication for remote access, defining suitable authentication factors, number of factors and suitable technique based on the result of impact assessment of authentication failure and bypass for remote access.
- User authorization based on identity and access control principles: Need-to-Know and Need-to-Use, Least Privilege and Segregation of Duties.
- Privileged access management.
- Periodic review of users’ identities and access rights.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 2-2-4
The Implementation Of The Cybersecurity Requirements For Identity And Access Management Must
Be Reviewed Periodically.