AC-17(2)
AC-17(2): Protection of Confidentiality and Integrity Using Encryption
Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
Supplemental
Virtual private networks can be used to protect the confidentiality and integrity of remote access sessions. Transport Layer Security (TLS) is an example of a cryptographic protocol that provides end-to-end communications security over networks and is used for Internet communications and online transactions.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| CMMC, DAF Baseline, Privacy (accountability), Privacy (high), Privacy (low), Privacy (moderate) |
| CSF Categories |
|---|
| None |