myctrl.tools
Compare

AC-8System Use Notification

LOW
MODERATE
HIGH

>Control Description

a

Display organization-defined system use notification message or banner to users before granting access to the system that provides privacy and security notices consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and state that:

1.

Users are accessing a U.S. Government system;

2.

System usage may be monitored, recorded, and subject to audit;

3.

Unauthorized use of the system is prohibited and subject to criminal and civil penalties; and

4.

Use of the system indicates consent to monitoring and recording;

b

Retain the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; and

c

For publicly accessible systems:

1.

Display system use information organization-defined conditions, before granting further access to the publicly accessible system;

2.

Display references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and

3.

Include a description of the authorized uses of the system.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

EC2 User Data
SSM
WorkSpaces

CLI Commands

Check EC2 instance user data for login banners
aws ec2 describe-instance-attribute --instance-id INSTANCE_ID --attribute userData
Get SSM document for login banner
aws ssm get-document --name AWS-ConfigureWindowsUpdate --document-format JSON
List WorkSpaces with custom branding
aws workspaces describe-workspace-directories --query 'Directories[*].{Id:DirectoryId,Name:DirectoryName,CustomSecurity:SelfservicePermissions}'
Check Systems Manager session banner
aws ssm describe-document --name SSM-SessionManagerRunShell

>Supplemental Guidance

System use notifications can be implemented using messages or warning banners displayed before individuals log in to systems. System use notifications are used only for access via logon interfaces with human users. Notifications are not required when human interfaces do not exist.

Based on an assessment of risk, organizations consider whether or not a secondary system use notification is needed to access applications or other system resources after the initial network logon. Organizations consider system use notification messages or banners displayed in multiple languages based on organizational needs and the demographics of system users. Organizations consult with the privacy office for input regarding privacy messaging and the Office of the General Counsel or organizational equivalent for legal review and approval of warning banner content.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AC-8 (System Use Notification)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AC-8?
  • How frequently is the AC-8 policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AC-8?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AC-8 requirements.
  • What automated tools, systems, or technologies are deployed to implement AC-8?
  • How is AC-8 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AC-8 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AC-8?
  • What audit logs, records, reports, or monitoring data validate AC-8 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AC-8 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AC-8 compliance?

Ask AI

Configure your API key to use AI features.