Under active development Content is continuously updated and improved

AC-17(6)Remote Access

PBMM (P2)
Secret (P2)
Technical

>Control Description

REMOTE ACCESS | PROTECTION OF INFORMATION The organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.

>Supplemental Guidance

Related controls: AT-2, AT-3, PS-6.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. Control enhancement (6) specifies that information about remote access mechanisms be protected.

It is anticipated that this control enhancement could be addressed through a line item in the user training program.

Ask AI

Configure your API key to use AI features.