6.6: Establish and Maintain an Inventory of Authentication and Authorization Systems

CSF v1.1 References:

PF v1.0 References:


Previous Version:

Control Statement

Establish and maintain an inventory of the enterprise’s authentication and authorization systems, including those hosted on-site or at a remote service provider. Review and update the inventory, at a minimum, annually, or more frequently.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]