Skip to content

Commit d344a0f

Browse files
committed
fix: ac-17(10)
1 parent 0c42013 commit d344a0f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

valentine/priv/repo/seed_data/cccs-cloud-medium-profile.csv

+1-1
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ AC-17(4) ,Remote Access ,Technical,Remote Access | Privileged Commands / Access,
9595
(b) The organization documents the rationale for such access in the security plan for the information system.",Related control: AC-6.,X,X,X,X,X,X
9696
AC-17(9) ,Remote Access ,Technical,Remote Access | Disconnect / Disable Access," REMOTE ACCESS | DISCONNECT / DISABLE ACCESS
9797
The organization provides the capability to expeditiously disconnect or disable remote access to the information system within a period no greater than 15 minutes.",This control enhancement requires organizations to have the capability to rapidly disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of missions/business functions and the need to eliminate immediate or future remote access to organizational information systems.,X,X,X,X,X,X
98-
AC-17(100) ,Remote Access ,Technical,Remote Access | Remote Access to Privileged Accounts using Dedicated Management Console, Remote access to privileged accounts is performed on dedicated management consoles governed entirely by the system’s security policies and used exclusively for this purpose (e.g. Internet access not allowed).,,X,X,X,X,X,X
98+
AC-17(10) ,Remote Access ,Technical,Remote Access | Remote Access to Privileged Accounts using Dedicated Management Console, Remote access to privileged accounts is performed on dedicated management consoles governed entirely by the system’s security policies and used exclusively for this purpose (e.g. Internet access not allowed).,,X,X,X,X,X,X
9999
AC-18,Wireless Access,Technical,Wireless Access,"(A) The organization establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access.
100100
(B) The organization authorizes wireless access to the information system prior to allowing such connections.","Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11, and Bluetooth. Wireless networks use authentication protocols (e.g., Extensible Authentication Protocol (EAP) / Transport Layer Security (TLS), Protected EAP (PEAP)), which provide credential protection and mutual authentication. Related controls: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4, SC-9",X,X,X,,X,X
101101
AC-18(1) ,Wireless Access,Technical,Wireless Access | Authentication and Encryption," WIRELESS ACCESS | AUTHENTICATION AND ENCRYPTION

0 commit comments

Comments
 (0)