Skip to main content

πŸ’Ό PR.AC-3: Remote access is managed

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/06/02/01
    • /frameworks/iso-iec-27001-2013/06/02/02
    • /frameworks/iso-iec-27001-2013/11/02/06
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/nist-sp-800-53-r4/ac/01
    • /frameworks/nist-sp-800-53-r4/ac/17
    • /frameworks/nist-sp-800-53-r4/ac/19
    • /frameworks/nist-sp-800-53-r4/ac/20
    • /frameworks/nist-sp-800-53-r4/sc/15
  • Internal
    • ID: dec-c-45e2b455

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.6.2.1 Mobile device policy
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.6.2.2 Teleworking
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.11.2.6 Security of equipment and assets off-premises
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.1.1 Network controls
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.2.1 Information transfer policies and procedures
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-1 ACCESS CONTROL POLICY AND PROCEDURES
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-17 REMOTE ACCESS9
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-19 ACCESS CONTROL FOR MOBILE DEVICES5
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-20 USE OF EXTERNAL INFORMATION SYSTEMS4
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-15 COLLABORATIVE COMPUTING DEVICES4

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-03: Users, services, and hardware are authenticated22
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties58
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-01: Networks and environments are protected from unauthorized logical access and usage40

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags