Difference between revisions of "Template:LIMSpec for Cannabis Testing/Cybersecurity"
From CannaQAWiki
Jump to navigationJump to searchShawndouglas (talk | contribs) |
Shawndouglas (talk | contribs) m (Renumbered.) |
||
Line 18: | Line 18: | ||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]<br /> | [https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]<br /> | ||
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, AC-17(2)] | [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, AC-17(2)] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.1''' The system should use secure communication protocols like SSL/TLS over Secure Hypertext Transfer Protocol with 256 bit encryption. | ||
|- | |- | ||
| style="padding:5px; width:500px;" | | | style="padding:5px; width:500px;" | | ||
Line 29: | Line 29: | ||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]<br /> | [https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]<br /> | ||
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, SC-13 and SC-28(1)] | [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, SC-13 and SC-28(1)] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.2''' The system should support database encryption and be capable of recording the encryption status of the data contained within. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/42/493.1231 42 CFR Part 493.1231]<br /> | | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/42/493.1231 42 CFR Part 493.1231]<br /> | ||
Line 36: | Line 36: | ||
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, IA-2, IA-2(1–4), and IA-8]<br /> | [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, IA-2, IA-2(1–4), and IA-8]<br /> | ||
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, MA-4] | [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, MA-4] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.3''' The system should be able to support multifactor authentication. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/170.202 45 CFR Part 170.202]<br />[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (h)] | | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/170.202 45 CFR Part 170.202]<br />[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (h)] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.4''' The system should support Office of the National Coordinator for Health Information Technology (ONC) transport standards and protocols for the reception and distribution of personal health information (e.g., medical marijuana user data). | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, IA-7] | | style="padding:5px; width:500px;" |[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, IA-7] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.5''' The system should provide a means for authenticating an individual seeking to access any embedded cryptographic module within the system, as well as the individual's role in performing services within the module. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, SC-15] | | style="padding:5px; width:500px;" |[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST 800-53, Rev. 4, SC-15] | ||
| style="background-color:white;" |''' | | style="background-color:white;" |'''26.6''' The system should prevent connected collaborative computing devices (e.g., cameras, microphones, interactive whiteboards) from being activated without explicit permission from the end user, and it should provide a clear indication of any activation to the end user. | ||
|- | |- | ||
|} | |} | ||
|} | |} |
Revision as of 21:21, 21 January 2021
|