AC-17(3)—Remote Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
REMOTE ACCESS | MANAGED ACCESS CONTROL POINTS The information system routes all remote accesses through ⚙organization-defined number managed network access control points.
>Supplemental Guidance
Limiting the number of access control points for remote accesses reduces the attack surface for organizations. Organizations consider the Trusted Internet Connections (TIC) initiative requirements for external network connections. Related control: SC-7.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.