AC-17 (1)
AC-17 (1): Automated Monitoring / Control
The information system monitors and controls remote access methods.
Supplemental
Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
Privacy (High), Privacy (Low), Privacy (Mod), Privacy (PHI) |