This study source was downloaded by 100000859819779 from CourseHero.com on 02-11-2023 12:06:07 GMT -06:00https://www.coursehero.com/file/57953055/DoD-bullet-listdocx/ List of DoD-compliant policies, standards, and controls that affect theWAN, Remote Access, and System/Application Domains The DoD has policies, procedures, and practices related to logical access controls, including multifactor authentication; software and license inventories; monitoring and threat detection capabilities; and information security requirements for third-party serviceproviders. DoD Instruction 5200.01 -Establishes the basic security policies for the DoD and provides high level framework for DoD implementation of national policy on classified national security information. The DoD issued logical access policies, including policies requiring the use of multifactor authentication. Logical access controls require users to validate their identity through personal identification numbers, Common Access Cards,10biometric data, or security tokens. DoD Instruction 8580.02 : Security of Individually Identifiable Health Information in DoD Health Care Programs, August 12, 2015. The Instruction requires the DoD to grant access to electronic protected health information to personnel only on a need-to -know basis. In addition, it requires personnel to have the appropriate clearance before accessingprotected health information. DoD Instruction 8582.01: Security of Unclassified DoD Information on Non-DoD Information Systems, June 6, 2012. The Instruction requires unclassified DoD information possessed or controlled by non-DoD