AC-4—Information Flow Enforcement
>Control Description
Enforce approved authorizations for controlling the flow of information within the system and between connected systems by preventing CJI from being transmitted unencrypted across the public network, blocking outside traffic that claims to be from within the agency, and not passing any web requests to the public network that are not from the agency-controlled or internal boundary protection devices (e.g., proxies, gateways, firewalls, or routers).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.