Implement [Assignment: organization-defined techniques and technologies] in associating security and privacy attributes to information.
Change security and privacy attributes associated with information only via regrading mechanisms validated using [Assignment: organization-defined techniques or procedures].
Provide authorized individuals the capability to define or change the type and value of security and privacy attributes available for association with subjects and objects.
a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and b. Authorize each type of remote access to the system prior to allowing such connections.
Employ automated mechanisms to monitor and control remote access methods.
Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
Route remote accesses through authorized and managed network access control points.
(a) Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: [Assignment: organization-defined needs]; and (b) Document the rationale for remote access in the security plan for the system.
[Withdrawn: Incorporated into MP-7.]
Protect information about remote access mechanisms from unauthorized use and disclosure.