The DoD information system security design incorporates best security practices such as single sign-on, PKE, smart card, and biometrics.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACI MACII MACIII | Medium | Security Design and Configuration |
Threat |
---|
Organizations not leveraging best practices for security are not utilizing lessons learned from previous security efforts. These organizations run the risk of repeating historical errors and wasting money on duplication of efforts while needlessly introducing preventable vulnerabilities into the IS. Utilizing best security practices ensures information systems within the DoD are aligned with tested and validated practices. |
Guidance |
---|
1. The DoD information system security design shall incorporate best security practices such as single sign-on, PKE, smart card, and biometrics. 2. Best Security Practices are compiled by government, industry, academia, (or collaborations between all three) to document those security practices that have a proven record of success when applied to appropriate technologies or situations. These Practices should be used in as many cases as practical. |