Logo
Services
Features
Dark Web MonitoringExclusion ChecksLearning Management SystemPhishing SimulationsPOA&M ManagementRisk ManagementThird-Party Risk Management
Offerings
K2 AkademyK2 CMMCK2 CyberK2 ExcludeK2 HIPAAK2 PharmacyK2 Risk Management
Courses
Bloodborne PathogensCEU LibraryCybersecurity AwarenessHIPAA Privacy RuleHIPAA Security RuleView All>
PartnersAboutBlogResourcesPricingContact

Your Cart

$ 0.00 USD
  • :
Remove
Subtotal
Pay with browser.
Continue to Checkout
No items found.
Product is not available in this quantity.
Meet with Us

Implementing 3.1.2 from NIST SP 800-171 Rev 2

Author
By
Todd Stanton
Mar 11, 2026
If 3.1.1 authorizes access to the system, 3.1.2 authorizes permissions within the system. The rules of chess, for example, limit the types of functions allowed for each piece...
Read More
10 min read

Implementing 3.1.22 from NIST SP 800-171 Rev 2

Author
By
Todd Stanton
Mar 11, 2026
Organizations should prevent the release of nonpublic information on systems accessible to the public. Systems accessible to the public include websites and social media...
Read More
10 min read

Implementing 3.5.1 from NIST SP 800-171 Rev 2

Author
By
Todd Stanton
Mar 11, 2026
Identifying accounts and devices is foundational to creating a secure and accountable system. Accounts may have assignments to people and non-person entities...
Read More
10 min read

Footer Logo
Elevate your oversight.
 sales@etactics.com
  300 Executive Pkwy W
Hudson, OH 44236
(330) 342-0568 Opt 3
Quick Links
HomeAboutPartnersContact Us
Offerings
K2 AkademyK2 CMMCK2 ExcludeK2 HIPAAK2 PharmacyK2 Risk Management
Social Links
 Linkedin
Copyright © 2024 by K2 GRC Powered By Etactics