You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The organization provides the capability to expeditiously disconnect or disable remote access to the information system within a period no greater than 15 minutes.",This control enhancement requires organizations to have the capability to rapidly disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of missions/business functions and the need to eliminate immediate or future remote access to organizational information systems.,X,X,X,X,X,X
98
-
AC-17(100) ,Remote Access ,Technical,Remote Access | Remote Access to Privileged Accounts using Dedicated Management Console, Remote access to privileged accounts is performed on dedicated management consoles governed entirely by the system’s security policies and used exclusively for this purpose (e.g. Internet access not allowed).,,X,X,X,X,X,X
98
+
AC-17(10) ,Remote Access ,Technical,Remote Access | Remote Access to Privileged Accounts using Dedicated Management Console, Remote access to privileged accounts is performed on dedicated management consoles governed entirely by the system’s security policies and used exclusively for this purpose (e.g. Internet access not allowed).,,X,X,X,X,X,X
99
99
AC-18,Wireless Access,Technical,Wireless Access,"(A) The organization establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access.
100
100
(B) The organization authorizes wireless access to the information system prior to allowing such connections.","Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11, and Bluetooth. Wireless networks use authentication protocols (e.g., Extensible Authentication Protocol (EAP) / Transport Layer Security (TLS), Protected EAP (PEAP)), which provide credential protection and mutual authentication. Related controls: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4, SC-9",X,X,X,,X,X
101
101
AC-18(1) ,Wireless Access,Technical,Wireless Access | Authentication and Encryption," WIRELESS ACCESS | AUTHENTICATION AND ENCRYPTION
0 commit comments