manage.get.gov/docs/compliance/dist/system-security-plans/ato/ac-17.1.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

1.2 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

ac-17.1 - [catalog] Monitoring and Control

Control Statement

Employ automated mechanisms to monitor and control remote access methods.

Control guidance

Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2 . Audit events are defined in AU-2a.

Control assessment-objective

automated mechanisms are employed to monitor remote access methods; automated mechanisms are employed to control remote access methods.


What is the solution and how is it implemented?

Add control implementation description here for control ac-17.1