PR.PT-2: Removable media is protected and its use restricted according to policy
PR.AC-P1: Identities and credentials are issued, managed, verified,...
PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
IA-5(1): Password-based Authentication
PR.IP-4: Backups of information are conducted, maintained, and tested
PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy
PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations
DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed
SC-7(14): Protect Against Unauthorized Physical Connections
SI-2(4): Automated Patch Management Tools
CM-8(8): Automated Location Tracking