CFM-03—Remote Access: Prohibited Protocols and Commands
>Control Description
Organization defines a listing of prohibited user commands and prohibited protocols that can be used in a remote session.
Theme
Process
Type
Preventive
Policy/Standard
Infrastructure Management Policy>Implementation Guidance
1. Prepare and maintain the listing of prohibited user commands and prohibited protocols that can be used in a remote session.
>Testing Procedure
1. Inspect security hardening standard to determine the listing of prohibited user commands and prohibited protocols that can be used in a remote session.
>Audit Artifacts
E-CFM-06
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.