AC-17(01)—Remote Access | Monitoring and Control
Moderate
>Control Description
Employ automated mechanisms to monitor and control remote access methods.
>Discussion
Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2. Audit events are defined in AU-2a.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.