Citation Matching

{{ wayPoint.label }}

{{ wayPoint.label }}

Project 35867 – Task 1102765

Instructions: Identify the Control, if it exists, to which the Citation should be mapped. Task Description: Match the "2.1 ¶ 2 5." Citation to a Control Authority Document URL: Website URI Document URI

Citation Reference: 2.1 ¶ 2 5.

Citation Guidance: The enterprise monitors and measures the integrity and security posture of all owned and associated assets. No asset is inherently trusted. The enterprise evaluates the security posture of the asset when evaluating a resource request. An enterprise implementing a ZTA should establish a continuous diagnostics and mitigation (CDM) or similar system to monitor the state of devices and applications and should apply patches/fixes as needed. Assets that are discovered to be subverted, have known vulnerabilities, and/or are not managed by the enterprise may be treated differently (including denial of all connections to enterprise resources) than devices owned by or associated with the enterprise that are deemed to be in their most secure state. This may also apply to associated devices (e.g., personally owned devices) that may be allowed to access some resources but not others. This, too, requires a robust monitoring and reporting system in place to provide actionable data about the current state of enterprise resources.

Compare Guidance Text

The new guidance differs from the current guidance, see below:
The new guidance is identical to the current guidance.

Control Matches

Why are you sending the task back? (optional)