1.2.2—1.2.2
>Control Description
DoD Components utilize the rules from the "Periodic Authentication" activity to build rules enabling and disabling privileges dynamically. IT Privileged user accounts utilize the PAM solution to move to dynamic privileged access using Just-in-Time (JIT) access and Just-Enough- Administration (JEA) methods.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.