Under active development Content is continuously updated and improved

AC-17(01)Remote Access | Monitoring and Control

Moderate

>Control Description

Employ automated mechanisms to monitor and control remote access methods.

>Discussion

Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2. Audit events are defined in AU-2a.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.