AC-17(4)—Remote Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
REMOTE ACCESS | PRIVILEGED COMMANDS / ACCESS (a) The organization authorizes the execution of privileged commands and access to security-relevant information via remote access only for ⚙organization-defined needs; and (b) The organization documents the rationale for such access in the security plan for the information system.
>Supplemental Guidance
Related control: AC-6.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.