AC-17(6)—Remote Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
REMOTE ACCESS | PROTECTION OF INFORMATION The organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
>Supplemental Guidance
Related controls: AT-2, AT-3, PS-6.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. Control enhancement (6) specifies that information about remote access mechanisms be protected.
It is anticipated that this control enhancement could be addressed through a line item in the user training program.
Ask AI
Configure your API key to use AI features.