Under active development Content is continuously updated and improved

AC-17(1)Remote Access

PBMM (P2)
Secret (P2)
Technical

>Control Description

REMOTE ACCESS | AUTOMATED MONITORING / CONTROL The information system monitors and controls remote access methods.

>Supplemental Guidance

Automated monitoring and control of remote access sessions allows organizations to detect cyber-attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets). Related controls: AU-2, AU-12.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

Ask AI

Configure your API key to use AI features.