πΌ PR.AC-3: Remote access is managed
- Contextual name: πΌ PR.AC-3: Remote access is managed
- ID:
/frameworks/nist-csf-v1.1/pr-ac/03
- Located in: πΌ Identity Management, Authentication and Access Control (PR.AC)
Descriptionβ
Empty...
Similarβ
- Sections
/frameworks/iso-iec-27001-2013/06/02/01
/frameworks/iso-iec-27001-2013/06/02/02
/frameworks/iso-iec-27001-2013/11/02/06
/frameworks/iso-iec-27001-2013/13/01/01
/frameworks/iso-iec-27001-2013/13/02/01
/frameworks/nist-sp-800-53-r4/ac/01
/frameworks/nist-sp-800-53-r4/ac/17
/frameworks/nist-sp-800-53-r4/ac/19
/frameworks/nist-sp-800-53-r4/ac/20
/frameworks/nist-sp-800-53-r4/sc/15
- Internal
- ID:
dec-c-45e2b455
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ ISO/IEC 27001:2013 β πΌ A.6.2.1 Mobile device policy | ||||
πΌ ISO/IEC 27001:2013 β πΌ A.6.2.2 Teleworking | ||||
πΌ ISO/IEC 27001:2013 β πΌ A.11.2.6 Security of equipment and assets off-premises | ||||
πΌ ISO/IEC 27001:2013 β πΌ A.13.1.1 Network controls | ||||
πΌ ISO/IEC 27001:2013 β πΌ A.13.2.1 Information transfer policies and procedures | ||||
πΌ NIST SP 800-53 Revision 4 β πΌ AC-1 ACCESS CONTROL POLICY AND PROCEDURES | ||||
πΌ NIST SP 800-53 Revision 4 β πΌ AC-17 REMOTE ACCESS | 9 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ AC-19 ACCESS CONTROL FOR MOBILE DEVICES | 5 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ AC-20 USE OF EXTERNAL INFORMATION SYSTEMS | 4 | |||
πΌ NIST SP 800-53 Revision 4 β πΌ SC-15 COLLABORATIVE COMPUTING DEVICES | 4 |
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST CSF v2.0 β πΌ PR.AA-03: Users, services, and hardware are authenticated | 22 | |||
πΌ NIST CSF v2.0 β πΌ PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | 58 | |||
πΌ NIST CSF v2.0 β πΌ PR.IR-01: Networks and environments are protected from unauthorized logical access and usage | 40 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|