AC-17(4)—Remote Access (4)
>Control Description
a
Authorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: compelling operational needs; and
b
Document the rationale for remote access in the security plan for the system.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.