Unsuccessful Logon Attempts | AC-7
Permitted Actions without Identification or Authentication | AC-14
The purpose of the Information Security Controls Catalog is to provide Texas state agencies and institutions of higher education with specific guidance for implementing security controls in a format to easily align with the .
Last updated: 9/10/2025