Under active development Content is continuously updated and improved

6.16.1

>Control Description

DoD organizations initially collect and document all rule based policies to orchestrate across the security stack for effective automation; DAAS access procedures and policies will be defined, implemented, and updated. Organizations mature this capability by establishing PDPs and PEPs (including the Next Generation Firewall) to make DAAS resource determinations and enable, monitor, and terminate connections between a user/device and DAAS resources according to predefined policy.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.