Authorize access for individuals and roles to: individuals and roles; security functions (deployed in hardware); security functions (deployed in software); security functions (deployed in firmware); security-relevant information ; and security-relevant information.
Security functions include establishing system accounts, configuring access authorizations (i.e., permissions, privileges), configuring settings for events to be audited, and establishing intrusion detection parameters. Security-relevant information includes filtering rules for routers or firewalls, configuration parameters for security services, cryptographic key management information, and access control lists. Authorized personnel include security administrators, system administrators, system security officers, system programmers, and other privileged users.
access is authorized for individuals and roles to security functions (deployed in hardware); access is authorized for individuals and roles to security functions (deployed in software); access is authorized for individuals and roles to security functions (deployed in firmware); access is authorized for individuals and roles to security-relevant information.
No cross-framework mappings available