AC-17(1)—Remote Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
REMOTE ACCESS | AUTOMATED MONITORING / CONTROL The information system monitors and controls remote access methods.
>Supplemental Guidance
Automated monitoring and control of remote access sessions allows organizations to detect cyber-attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets). Related controls: AU-2, AU-12.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.