§ Category
Category

AC

AC

AC-18: Wireless Access

RMF Control AC-18: Wireless Access is a cybersecurity control that helps to protect information systems by controlling access to information systems over wireless networks. This control is important because it can help to prevent unauthorized access to information systems and data. Wireless Access Requirements The RMF Control AC-18: Wireless Access requirements are specified in NIST …

·
AC

AC-17: Remote Access

RMF Control AC-17: Remote Access is a cybersecurity control that helps to protect information systems by controlling access to information systems from remote locations. This control is important because it can help to prevent unauthorized access to information systems and data. Remote Access Requirements The RMF Control AC-17: Remote Access requirements are specified in NIST …

·
AC

AC-16: Security and Privacy Attributes

RMF Control AC-16: Security and Privacy Attributes is a cybersecurity control that helps to protect information systems by associating security and privacy attributes with data and objects. This control is important because it can help to ensure that data and objects are handled appropriately and that they are not accessed by unauthorized users or disclosed …

·
AC

AC-15: Automated Marking

RMF Control AC-15: Automated Marking is a cybersecurity control that helps to protect information systems by automatically marking sensitive data. This control is important because it can help to prevent unauthorized access to sensitive data and ensure that sensitive data is handled appropriately. Automated Marking Requirements The RMF Control AC-15: Automated Marking requirements are specified …

·
AC

AC-14: Permitted Actions Without Identification Or Authentication

RMF Control AC-14: PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION is a cybersecurity control that helps to protect information systems by limiting the actions that can be performed without identification or authentication. This control is important because it can help to prevent unauthorized access to information systems and data. Permitted Actions Without Identification or Authentication Requirements …

·
AC

AC-13: Supervision And Review – Access Control

RMF Control AC-13: SUPERVISION AND REVIEW — ACCESS CONTROL is a cybersecurity control that helps to ensure that access control activities are regularly supervised and reviewed to ensure their effectiveness and compliance with organizational security policies and procedures. This control is important because it can help to identify and address weaknesses in the organization’s access …

·
AC

AC-12: Session Termination

RMF Control AC-12: Session Termination is a cybersecurity control that helps to protect information systems by terminating user sessions when they are no longer needed. This control is important because it can help to prevent unauthorized access to information systems and data. Session Termination Requirements The RMF Control AC-12: Session Termination requirements are specified in …

·
AC

AC-11: Device Lock

RMF Control AC-11: Device Lock is a cybersecurity control that helps to protect information systems by locking devices when they are not in use. This control is important because it can help to prevent unauthorized access to information systems and data. Device Lock Requirements The RMF Control AC-11: Device Lock requirements are specified in NIST …

·
AC

AC-10: Concurrent Session Control

RMF Control AC-10: Concurrent Session Control is a cybersecurity control that helps to protect information systems by limiting the number of concurrent sessions that a user can have. This control is important because it can help to prevent unauthorized access to information systems and data. Concurrent Session Control Requirements The RMF Control AC-10: Concurrent Session …

·
AC

AC-9: Previous Logon Notification

RMF Control AC-9: Previous Logon Notification is a cybersecurity control that helps to protect information systems by notifying users when their accounts were last used. This control is important because it can help users to identify and respond to unauthorized access to their accounts. Previous Logon Notification Requirements The RMF Control AC-9: Previous Logon Notification …

·