Edit this page

Collecting Metric 2.18

Data Protection and Remote Access

Calculator logo

  1. Look at the list of FIPS-199 systems from Metric 1.1.
  2. Work with the ISSO for each system.
  3. Count the systems that require all users to authenticate using PIV (or other NIST LOA 4 Credentials).

    • Different system types may have different configurations or techniques for enforcing PIV authentication.
    • Be sure to include all sub-systems.\

  4. Record this number for Metric 2.18.

What information was in Metric 1.1?

For each FIPS 199 impact level, what is the number of operational unclassified information systems by organization (i.e. Bureau or Sub-Department Operating Element) categorized at that level? (Organizations with fewer than 5,000 users may report as one unit.).