Under active development Content is continuously updated and improved

AC-17(2)Remote Access

PBMM (P2)
Secret (P2)
Technical

>Control Description

REMOTE ACCESS | PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. The cryptography must be compliant with the requirements of SC-13.

>Supplemental Guidance

Guidance on Tthe encryption strength of mechanism can be obtained from CSE upon request.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. This security control/enhancement can be met using readily available Commercial-Off-The-Shelf (COTS) components. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

Ask AI

Configure your API key to use AI features.