An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
49/172
)
CCIs
Number
Definition
Status
Related
CCI-001441
Authorize each type of wireless access to the system prior to allowing such connections.
Draft
AC-18
CCI-001442
The organization enforces requirements for wireless connections to the information system.
Draft
CCI-001443
Protect wireless access to the system using authentication of users and/or devices.
Draft
AC-18(1)
CCI-001444
Protect wireless access to the system using encryption.
Draft
AC-18(1)
CCI-001445
The organization monitors for unauthorized wireless connections to the information system on an organization-defined frequency.
Draft
CCI-001446
The organization scans for unauthorized wireless access points on an organization-defined frequency.
Draft
CCI-001447
The organization defines a frequency of monitoring for unauthorized wireless connections to information system, including scans for unauthorized wireless access points.
Draft
CCI-001448
The organization takes appropriate action if an unauthorized wireless connection is discovered.
Draft
CCI-001449
Disable, when not intended for use, wireless networking capabilities internally embedded within system components prior to issuance and deployment.
Draft
AC-18(3)
CCI-001450
The organization does not allow users to independently configure wireless networking capabilities.
Draft
CCI-001451
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.
Draft
AC-18(5)
CCI-001452
The information system enforces the organization-defined time period during which the limit of consecutive invalid access attempts by a user is counted.
Draft
CCI-001453
Implement cryptographic mechanisms to protect the integrity of remote access sessions.
Draft
AC-17(2)
CCI-001454
The organization ensures that remote sessions for accessing an organization-defined list of security functions and security-relevant information are audited.
Draft
CCI-001455
The organization explicitly identifies components needed in support of specific operational requirements.
Draft
CCI-001456
The organization defines locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.
Draft
CCI-001457
The organization defines inspection and preventative measures to be applied on mobile devices returning from locations that the organization deems to be of significant risk in accordance with organizational policies and procedures.
Draft
CCI-001458
If classified information is found on mobile devices, the incident handling policy is to be followed.
Draft
AC-19(4)
CCI-001459
Defines system components that provide audit record generation capability.
Draft
AU-12
CCI-001460
Monitor organization-defined open source information and/or information sites per organization-defined frequency for evidence of unauthorized disclosure of organizational information.
Draft
AU-13
CCI-001461
Defines a frequency for monitoring open source information and/or information sites for evidence of unauthorized exfiltration or disclosure of organizational information.
Draft
AU-13
CCI-001462
The information system provides the capability for authorized users to capture/record and log content related to a user session.
Draft
AU-14(2)
CCI-001463
The information system provides the capability to remotely view/hear all content related to an established user session in real time.
Draft
CCI-001464
Initiates session audits automatically at system start-up.
Draft
AU-14(1)
CCI-001465
The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to store organization-controlled information using the external information systems.
Draft
CCI-001466
The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to transmit organization-controlled information using the external information systems.
Draft
CCI-001467
The organization prohibits authorized individuals from using an external information system to process organization-controlled information except in situations where the organization can verify the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
Draft
CCI-001468
The organization prohibits authorized individuals from using an external information system to store organization-controlled information except in situations where the organization can verify the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
Draft
CCI-001469
The organization prohibits authorized individuals from using an external information system to transmit organization-controlled information except in situations where the organization can verify the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
Draft
CCI-001470
Defines information sharing circumstances where user discretion is required.
Draft
AC-21
Prev
1...
45
46
47
48
49
50
51
52
53
...172
Next