๐ผ AC-1 Policy and Procedures (L)(M)(H) | | | | |
๐ผ AC-2 Account Management (L)(M)(H) | 10 | | 3 | |
ย ย ย ย ๐ผ AC-2(1) Automated System Account Management (M)(H) | | | 16 | |
ย ย ย ย ๐ผ AC-2(2) Automated Temporary and Emergency Account Management (M)(H) | | | | |
ย ย ย ย ๐ผ AC-2(3) Disable Accounts (M)(H) | | | 4 | |
ย ย ย ย ๐ผ AC-2(4) Automated Audit Actions (M)(H) | | 1 | 13 | |
ย ย ย ย ๐ผ AC-2(5) Inactivity Logout (M)(H) | | | | |
ย ย ย ย ๐ผ AC-2(7) Privileged User Accounts (M)(H) | | 6 | 7 | |
ย ย ย ย ๐ผ AC-2(9) Restrictions on Use of Shared and Group Accounts (M)(H) | | 2 | 2 | |
ย ย ย ย ๐ผ AC-2(11) Usage Conditions (H) | | | | |
ย ย ย ย ๐ผ AC-2(12) Account Monitoring for Atypical Usage (M)(H) | | 2 | 2 | |
ย ย ย ย ๐ผ AC-2(13) Disable Accounts for High-risk Individuals (M)(H) | | | | |
๐ผ AC-3 Access Enforcement (L)(M)(H) | | 37 | 47 | |
๐ผ AC-4 Information Flow Enforcement (M)(H) | 2 | 6 | 27 | |
ย ย ย ย ๐ผ AC-4(4) Flow Control of Encrypted Information (H) | | 20 | 21 | |
ย ย ย ย ๐ผ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | 11 | 39 | |
๐ผ AC-5 Separation of Duties (M)(H) | | | 1 | |
๐ผ AC-6 Least Privilege (M)(H) | 8 | | 7 | |
ย ย ย ย ๐ผ AC-6(1) Authorize Access to Security Functions (M)(H) | | 4 | 4 | |
ย ย ย ย ๐ผ AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H) | | 1 | 4 | |
ย ย ย ย ๐ผ AC-6(3) Network Access to Privileged Commands (H) | | 1 | 2 | |
ย ย ย ย ๐ผ AC-6(5) Privileged Accounts (M)(H) | | 3 | 5 | |
ย ย ย ย ๐ผ AC-6(7) Review of User Privileges (M)(H) | | 2 | 2 | |
ย ย ย ย ๐ผ AC-6(8) Privilege Levels for Code Execution (H) | | | | |
ย ย ย ย ๐ผ AC-6(9) Log Use of Privileged Functions (M)(H) | | 7 | 23 | |
ย ย ย ย ๐ผ AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H) | | 1 | 3 | |
๐ผ AC-7 Unsuccessful Logon Attempts (L)(M)(H) | | 1 | 1 | |
๐ผ AC-8 System Use Notification (L)(M)(H) | | | | |
๐ผ AC-10 Concurrent Session Control (H) | | | | |
๐ผ AC-11 Device Lock (M)(H) | 1 | | | |
ย ย ย ย ๐ผ AC-11(1) Pattern-hiding Displays (M)(H) | | | | |
๐ผ AC-12 Session Termination (M)(H) | | | | |
๐ผ AC-14 Permitted Actions Without Identification or Authentication (L)(M)(H) | | | | |
๐ผ AC-17 Remote Access (L)(M)(H) | 4 | | | |
ย ย ย ย ๐ผ AC-17(1) Monitoring and Control (M)(H) | | | 1 | |
ย ย ย ย ๐ผ AC-17(2) Protection of Confidentiality and Integrity Using Encryption (M)(H) | | | 13 | |
ย ย ย ย ๐ผ AC-17(3) Managed Access Control Points (M)(H) | | | | |
ย ย ย ย ๐ผ AC-17(4) Privileged Commands and Access (M)(H) | | | | |
๐ผ AC-18 Wireless Access (L)(M)(H) | 4 | | | |
ย ย ย ย ๐ผ AC-18(1) Authentication and Encryption (M)(H) | | | | |
ย ย ย ย ๐ผ AC-18(3) Disable Wireless Networking (M)(H) | | | | |
ย ย ย ย ๐ผ AC-18(4) Restrict Configurations by Users (H) | | | | |
ย ย ย ย ๐ผ AC-18(5) Antennas and Transmission Power Levels (H) | | | | |
๐ผ AC-19 Access Control for Mobile Devices (L)(M)(H) | 1 | | | |
ย ย ย ย ๐ผ AC-19(5) Full Device or Container-based Encryption (M)(H) | | | | |
๐ผ AC-20 Use of External Systems (L)(M)(H) | 2 | | | |
ย ย ย ย ๐ผ AC-20(1) Limits on Authorized Use (M)(H) | | | | |
ย ย ย ย ๐ผ AC-20(2) Portable Storage Devices โ Restricted Use (M)(H) | | | | |
๐ผ AC-21 Information Sharing (M)(H) | | | 2 | |
๐ผ AC-22 Publicly Accessible Content (L)(M)(H) | | | | |