Access Control (AC)

(a) Enforce [Assignment: organization-defined mandatory access control policy] over the set of covered subjects and objects specified in the policy; and (b) Enforce [Assignment: organization-defined discretionary access control policy] over the set of covered subjects and objects specified in the policy.


Login

Access Control (AC)

Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on [Assignment: organization-defined information flow control policies].


Login

Access Control (AC)

Use [Assignment: organization-defined security and privacy attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.


Login

Access Control (AC)

Use protected processing domains to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.


Login

Access Control (AC)

Enforce [Assignment: organization-defined information flow control policies].


Login

Access Control (AC)

Prevent encrypted information from bypassing [Assignment: organization-defined information flow control mechanisms] by [Selection (one or more): decrypting the information; blocking the flow of the encrypted information; terminating communications sessions attempting to pass encrypted information; [Assignment: organization-defined procedure or method]].


Login

Access Control (AC)

Enforce [Assignment: organization-defined limitations] on embedding data types within other data types.


Login

Access Control (AC)

Enforce information flow control based on [Assignment: organization-defined metadata].


Login

Access Control (AC)

Enforce one-way information flows through hardware-based flow control mechanisms.


Login

Access Control (AC)

(a) Enforce information flow control using [Assignment: organization-defined security or privacy policy filters] as a basis for flow control decisions for [Assignment: organization-defined information flows]; and (b) [Selection (one or more): Block; Strip; Modify; Quarantine] data after a filter processing failure in accordance with [Assignment: organization-defined security or privacy policy].


Login