HHS Information Technology Security Program

Security Controls 5. Step 2: Transaction Identification 5. Step 3: Categorize Transaction Information 6. Step 4: Identify Authentication Category (s) and analyze impact 7. Step 5: Generate Assurance Profile 9. Step 6: Technology Recommendations and Validation 10. Step 7: Overall Assessment 10. Appendix A. Secure One HHS e-Authentication ... ................
................