Collecting Metric 2.18
Data Protection and Remote Access
- Look at the list of FIPS-199 systems from Metric 1.1.
- Work with the ISSO for each system.
- Count the systems that require all users to authenticate using PIV (or other NIST LOA 4 Credentials).
• Different system types may have different configurations or techniques for enforcing PIV authentication.
• Be sure to include all sub-systems.\ - Record this number for Metric 2.18.