Separate user functionality from system management functionality.
Separate user functionality from system management functionality.
Prevent unauthorized and unintended information transfer via shared system resources.
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
Establish and manage cryptographic keys for cryptography employed in organizational systems.
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.