💼 AC-20(1) Limits on Authorized Use (M)(H)
- Contextual name: 💼 AC-20(1) Limits on Authorized Use (M)(H)
- ID:
/frameworks/fedramp-high-security-controls/ac/20/01
- Located in: 💼 AC-20 Use of External Systems (L)(M)(H)
Description​
Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after:
(a) Verification of the implementation of controls on the external system as specified in the organization's security and privacy policies and security and privacy plans; or
(b) Retention of approved system connection or processing agreements with the organizational entity hosting the external system.
Similar​
- Sections
/frameworks/nist-sp-800-53-r5/ac/20/01
- Internal
- ID:
dec-c-30222834
- ID:
Similar Sections (Take Policies From)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST SP 800-53 Revision 5 → 💼 AC-20(1) Use of External Systems _ Limits on Authorized Use |
Similar Sections (Give Policies To)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 FedRAMP Moderate Security Controls → 💼 AC-20(1) Limits on Authorized Use (M)(H) |
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|