AC-17(2)—Remote Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
REMOTE ACCESS | PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. The cryptography must be compliant with the requirements of SC-13.
>Supplemental Guidance
Guidance on Tthe encryption strength of mechanism can be obtained from CSE upon request.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. This security control/enhancement can be met using readily available Commercial-Off-The-Shelf (COTS) components. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.