Access Control (AC)

Employ automated mechanisms to monitor and control remote access methods.


Login

Access Control (AC)

Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.


Login

Access Control (AC)

Route remote accesses through authorized and managed network access control points.


Login

Access Control (AC)

(a) Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: [Assignment: organization-defined needs]; and (b) Document the rationale for remote access in the security plan for the system.


Login

Access Control (AC)

[Withdrawn: Incorporated into MP-7.]


Login

Access Control (AC)

Protect information about remote access mechanisms from unauthorized use and disclosure.


Login

Access Control (AC)

[Withdrawn: Incorporated into AC-2k.]


Login

Access Control (AC)

[Withdrawn: Incorporated into AC-6.]


Login

Access Control (AC)

Provide the capability to disconnect or disable remote access to the system within [Assignment: organization-defined time period].


Login

Access Control (AC)

Implement [Assignment: organization-defined mechanisms] to authenticate [Assignment: organization-defined remote commands].


Login