Access Control (AC)

Protect wireless access using authentication and encryption.


Login

Access Control (AC)

Control connection of mobile devices.


Login

Access Control (AC)

Encrypt CUI on mobile devices and mobile computing platforms.


Login

Access Control (AC)

Verify and control/limit connections to and use of external systems.


Login

Access Control (AC)

Limit use of portable storage devices on external systems.


Login

Access Control (AC)

Control CUI posted or processed on publicly accessible systems.


Login

Access Control (AC)

Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization.


Login

Access Control (AC)

Employ secure information transfer solutions to control information flows between security domains on connected systems.


Login

Awareness and Training (AT)

Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.


Login

Awareness and Training (AT)

Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.


Login