Under active development Content is continuously updated and improved

AC-17(02)Remote Access | Protection of Confidentiality and Integrity Using Encryption

Moderate
Core Control

>Control Description

Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.

>Discussion

Virtual private networks can be used to protect the confidentiality and integrity of remote access sessions. Transport Layer Security (TLS) is an example of a cryptographic protocol that provides end-to-end communications security over networks and is used for Internet communications and online transactions.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.