AC — Access Control
50 controls in the Access Control family
AC-1Policy and Procedures
LI-SaaS
LOW
MODERATE
HIGH
AC-2Account Management
LI-SaaS
LOW
MODERATE
HIGH
AC-2 (01)Account Management | Automated System Account Management
MODERATE
HIGH
AC-2 (02)Account Management | Automated Temporary and Emergency Account Management
MODERATE
HIGH
AC-2 (03)Account Management | Disable Accounts
MODERATE
HIGH
AC-2 (04)Account Management | Automated Audit Actions
MODERATE
HIGH
AC-2 (05)Account Management | Inactivity Logout
MODERATE
HIGH
AC-2 (07)Account Management | Privileged User Accounts
MODERATE
HIGH
AC-2 (09)Account Management | Restrictions on Use of Shared and Group Accounts
MODERATE
HIGH
AC-2 (11)Account Management | Usage Conditions
HIGH
AC-2 (12)Account Management | Account Monitoring for Atypical Usage
MODERATE
HIGH
AC-2 (13)Account Management | Disable Accounts for High-risk Individuals
MODERATE
HIGH
AC-3Access Enforcement
LI-SaaS
LOW
MODERATE
HIGH
AC-4Information Flow Enforcement
MODERATE
HIGH
AC-4 (04)Information Flow Enforcement | Flow Control of Encrypted Information
HIGH
AC-4 (21)Information Flow Enforcement | Physical or Logical Separation of Information Flows
MODERATE
HIGH
AC-5Separation of Duties
MODERATE
HIGH
AC-6Least Privilege
MODERATE
HIGH
AC-6 (01)Least Privilege | Authorize Access to Security Functions
MODERATE
HIGH
AC-6 (02)Least Privilege | Non-privileged Access for Nonsecurity Functions
MODERATE
HIGH
AC-6 (03)Least Privilege | Network Access to Privileged Commands
HIGH
AC-6 (05)Least Privilege | Privileged Accounts
MODERATE
HIGH
AC-6 (07)Least Privilege | Review of User Privileges
MODERATE
HIGH
AC-6 (08)Least Privilege | Privilege Levels for Code Execution
HIGH
AC-6 (09)Least Privilege | Log Use of Privileged Functions
MODERATE
HIGH
AC-6 (10)Least Privilege | Prohibit Non-privileged Users from Executing Privileged Functions
MODERATE
HIGH
AC-7Unsuccessful Logon Attempts
LI-SaaS
LOW
MODERATE
HIGH
AC-8System Use Notification
LI-SaaS
LOW
MODERATE
HIGH
AC-10Concurrent Session Control
HIGH
AC-11Device Lock
MODERATE
HIGH
AC-11 (01)Device Lock | Pattern-hiding Displays
MODERATE
HIGH
AC-12Session Termination
MODERATE
HIGH
AC-14Permitted Actions Without Identification or Authentication
LI-SaaS
LOW
MODERATE
HIGH
AC-17Remote Access
LI-SaaS
LOW
MODERATE
HIGH
AC-17 (01)Remote Access | Monitoring and Control
MODERATE
HIGH
AC-17 (02)Remote Access | Protection of Confidentiality and Integrity Using Encryption
MODERATE
HIGH
AC-17 (03)Remote Access | Managed Access Control Points
MODERATE
HIGH
AC-17 (04)Remote Access | Privileged Commands and Access
MODERATE
HIGH
AC-18Wireless Access
LI-SaaS
LOW
MODERATE
HIGH
AC-18 (01)Wireless Access | Authentication and Encryption
MODERATE
HIGH
AC-18 (03)Wireless Access | Disable Wireless Networking
MODERATE
HIGH
AC-18 (04)Wireless Access | Restrict Configurations by Users
HIGH
AC-18 (05)Wireless Access | Antennas and Transmission Power Levels
HIGH
AC-19Access Control for Mobile Devices
LI-SaaS
LOW
MODERATE
HIGH
AC-19 (05)Access Control for Mobile Devices | Full Device or Container-based Encryption
MODERATE
HIGH
AC-20Use of External Systems
LI-SaaS
LOW
MODERATE
HIGH
AC-20 (01)Use of External Systems | Limits on Authorized Use
MODERATE
HIGH
AC-20 (02)Use of External Systems | Portable Storage Devices -- Restricted Use
MODERATE
HIGH
AC-21Information Sharing
MODERATE
HIGH
AC-22Publicly Accessible Content
LI-SaaS
LOW
MODERATE
HIGH