Skip to main content

💼 AC ACCESS CONTROL

  • ID: /frameworks/nist-sp-800-53-r4/ac

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-25f6d183

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AC-1 ACCESS CONTROL POLICY AND PROCEDURESno data
💼 AC-2 ACCOUNT MANAGEMENT1336no data
 💼 AC-2 (1) AUTOMATED SYSTEM ACCOUNT MANAGEMENTno data
 💼 AC-2 (2) REMOVAL OF TEMPORARY _ EMERGENCY ACCOUNTSno data
 💼 AC-2 (3) DISABLE INACTIVE ACCOUNTSno data
 💼 AC-2 (4) AUTOMATED AUDIT ACTIONSno data
 💼 AC-2 (5) INACTIVITY LOGOUTno data
 💼 AC-2 (6) DYNAMIC PRIVILEGE MANAGEMENTno data
 💼 AC-2 (7) ROLE-BASED SCHEMES22no data
 💼 AC-2 (8) DYNAMIC ACCOUNT CREATIONno data
 💼 AC-2 (9) RESTRICTIONS ON USE OF SHARED _ GROUP ACCOUNTSno data
 💼 AC-2 (10) SHARED _ GROUP ACCOUNT CREDENTIAL TERMINATIONno data
 💼 AC-2 (11) USAGE CONDITIONSno data
 💼 AC-2 (12) ACCOUNT MONITORING _ ATYPICAL USAGEno data
 💼 AC-2 (13) DISABLE ACCOUNTS FOR HIGH-RISK INDIVIDUALSno data
💼 AC-3 ACCESS ENFORCEMENT102no data
 💼 AC-3 (1) RESTRICTED ACCESS TO PRIVILEGED FUNCTIONSno data
 💼 AC-3 (2) DUAL AUTHORIZATIONno data
 💼 AC-3 (3) MANDATORY ACCESS CONTROLno data
 💼 AC-3 (4) DISCRETIONARY ACCESS CONTROLno data
 💼 AC-3 (5) SECURITY-RELEVANT INFORMATIONno data
 💼 AC-3 (6) PROTECTION OF USER AND SYSTEM INFORMATIONno data
 💼 AC-3 (7) ROLE-BASED ACCESS CONTROLno data
 💼 AC-3 (8) REVOCATION OF ACCESS AUTHORIZATIONSno data
 💼 AC-3 (9) CONTROLLED RELEASEno data
 💼 AC-3 (10) AUDITED OVERRIDE OF ACCESS CONTROL MECHANISMSno data
💼 AC-4 INFORMATION FLOW ENFORCEMENT2211no data
 💼 AC-4 (1) OBJECT SECURITY ATTRIBUTESno data
 💼 AC-4 (2) PROCESSING DOMAINSno data
 💼 AC-4 (3) DYNAMIC INFORMATION FLOW CONTROLno data
 💼 AC-4 (4) CONTENT CHECK ENCRYPTED INFORMATIONno data
 💼 AC-4 (5) EMBEDDED DATA TYPES11no data
 💼 AC-4 (6) METADATAno data
 💼 AC-4 (7) ONE-WAY FLOW MECHANISMSno data
 💼 AC-4 (8) SECURITY POLICY FILTERSno data
 💼 AC-4 (9) HUMAN REVIEWSno data
 💼 AC-4 (10) ENABLE _ DISABLE SECURITY POLICY FILTERSno data
 💼 AC-4 (11) CONFIGURATION OF SECURITY POLICY FILTERSno data
 💼 AC-4 (12) DATA TYPE IDENTIFIERSno data
 💼 AC-4 (13) DECOMPOSITION INTO POLICY-RELEVANT SUBCOMPONENTSno data
 💼 AC-4 (14) SECURITY POLICY FILTER CONSTRAINTSno data
 💼 AC-4 (15) DETECTION OF UNSANCTIONED INFORMATIONno data
 💼 AC-4 (16) INFORMATION TRANSFERS ON INTERCONNECTED SYSTEMSno data
 💼 AC-4 (17) DOMAIN AUTHENTICATIONno data
 💼 AC-4 (18) SECURITY ATTRIBUTE BINDINGno data
 💼 AC-4 (19) VALIDATION OF METADATAno data
 💼 AC-4 (20) APPROVED SOLUTIONSno data
 💼 AC-4 (21) PHYSICAL _ LOGICAL SEPARATION OF INFORMATION FLOWSno data
 💼 AC-4 (22) ACCESS ONLYno data
💼 AC-5 SEPARATION OF DUTIES34no data
💼 AC-6 LEAST PRIVILEGE1027no data
 💼 AC-6 (1) AUTHORIZE ACCESS TO SECURITY FUNCTIONSno data
 💼 AC-6 (2) NON-PRIVILEGED ACCESS FOR NONSECURITY FUNCTIONSno data
 💼 AC-6 (3) NETWORK ACCESS TO PRIVILEGED COMMANDSno data
 💼 AC-6 (4) SEPARATE PROCESSING DOMAINSno data
 💼 AC-6 (5) PRIVILEGED ACCOUNTSno data
 💼 AC-6 (6) PRIVILEGED ACCESS BY NON-ORGANIZATIONAL USERSno data
 💼 AC-6 (7) REVIEW OF USER PRIVILEGESno data
 💼 AC-6 (8) PRIVILEGE LEVELS FOR CODE EXECUTIONno data
 💼 AC-6 (9) AUDITING USE OF PRIVILEGED FUNCTIONSno data
 💼 AC-6 (10) PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS11no data
💼 AC-7 UNSUCCESSFUL LOGON ATTEMPTS2no data
 💼 AC-7 (1) AUTOMATIC ACCOUNT LOCKno data
 💼 AC-7 (2) PURGE _ WIPE MOBILE DEVICEno data
💼 AC-8 SYSTEM USE NOTIFICATIONno data
💼 AC-9 PREVIOUS LOGON (ACCESS) NOTIFICATION4no data
 💼 AC-9 (1) UNSUCCESSFUL LOGONSno data
 💼 AC-9 (2) SUCCESSFUL _ UNSUCCESSFUL LOGONSno data
 💼 AC-9 (3) NOTIFICATION OF ACCOUNT CHANGESno data
 💼 AC-9 (4) ADDITIONAL LOGON INFORMATIONno data
💼 AC-10 CONCURRENT SESSION CONTROLno data
💼 AC-11 SESSION LOCK1no data
 💼 AC-11 (1) PATTERN-HIDING DISPLAYSno data
💼 AC-12 SESSION TERMINATION1no data
 💼 AC-12 (1) USER-INITIATED LOGOUTS _ MESSAGE DISPLAYSno data
💼 AC-13 SUPERVISION AND REVIEW - ACCESS CONTROLno data
💼 AC-14 PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION1no data
 💼 AC-14 (1) NECESSARY USESno data
💼 AC-15 AUTOMATED MARKINGno data
💼 AC-16 SECURITY ATTRIBUTES10no data
 💼 AC-16 (1) DYNAMIC ATTRIBUTE ASSOCIATIONno data
 💼 AC-16 (2) ATTRIBUTE VALUE CHANGES BY AUTHORIZED INDIVIDUALSno data
 💼 AC-16 (3) MAINTENANCE OF ATTRIBUTE ASSOCIATIONS BY INFORMATION SYSTEMno data
 💼 AC-16 (4) ASSOCIATION OF ATTRIBUTES BY AUTHORIZED INDIVIDUALSno data
 💼 AC-16 (5) ATTRIBUTE DISPLAYS FOR OUTPUT DEVICESno data
 💼 AC-16 (6) MAINTENANCE OF ATTRIBUTE ASSOCIATION BY ORGANIZATIONno data
 💼 AC-16 (7) CONSISTENT ATTRIBUTE INTERPRETATIONno data
 💼 AC-16 (8) ASSOCIATION TECHNIQUES _ TECHNOLOGIESno data
 💼 AC-16 (9) ATTRIBUTE REASSIGNMENTno data
 💼 AC-16 (10) ATTRIBUTE CONFIGURATION BY AUTHORIZED INDIVIDUALSno data
💼 AC-17 REMOTE ACCESS9no data
 💼 AC-17 (1) AUTOMATED MONITORING _ CONTROLno data
 💼 AC-17 (2) PROTECTION OF CONFIDENTIALITY _ INTEGRITY USING ENCRYPTIONno data
 💼 AC-17 (3) MANAGED ACCESS CONTROL POINTSno data
 💼 AC-17 (4) PRIVILEGED COMMANDS _ ACCESSno data
 💼 AC-17 (5) MONITORING FOR UNAUTHORIZED CONNECTIONSno data
 💼 AC-17 (6) PROTECTION OF INFORMATIONno data
 💼 AC-17 (7) ADDITIONAL PROTECTION FOR SECURITY FUNCTION ACCESSno data
 💼 AC-17 (8) DISABLE NONSECURE NETWORK PROTOCOLSno data
 💼 AC-17 (9) DISCONNECT _ DISABLE ACCESSno data
💼 AC-18 WIRELESS ACCESS5no data
 💼 AC-18 (1) AUTHENTICATION AND ENCRYPTIONno data
 💼 AC-18 (2) MONITORING UNAUTHORIZED CONNECTIONSno data
 💼 AC-18 (3) DISABLE WIRELESS NETWORKINGno data
 💼 AC-18 (4) RESTRICT CONFIGURATIONS BY USERSno data
 💼 AC-18 (5) ANTENNAS _ TRANSMISSION POWER LEVELSno data
💼 AC-19 ACCESS CONTROL FOR MOBILE DEVICES5no data
 💼 AC-19 (1) USE OF WRITABLE _ PORTABLE STORAGE DEVICESno data
 💼 AC-19 (2) USE OF PERSONALLY OWNED PORTABLE STORAGE DEVICESno data
 💼 AC-19 (3) USE OF PORTABLE STORAGE DEVICES WITH NO IDENTIFIABLE OWNERno data
 💼 AC-19 (4) RESTRICTIONS FOR CLASSIFIED INFORMATIONno data
 💼 AC-19 (5) FULL DEVICE _ CONTAINER-BASED ENCRYPTIONno data
💼 AC-20 USE OF EXTERNAL INFORMATION SYSTEMS4no data
 💼 AC-20 (1) LIMITS ON AUTHORIZED USEno data
 💼 AC-20 (2) PORTABLE STORAGE DEVICESno data
 💼 AC-20 (3) NON-ORGANIZATIONALLY OWNED SYSTEMS _ COMPONENTS _ DEVICESno data
 💼 AC-20 (4) NETWORK ACCESSIBLE STORAGE DEVICESno data
💼 AC-21 INFORMATION SHARING2no data
 💼 AC-21 (1) AUTOMATED DECISION SUPPORTno data
 💼 AC-21 (2) INFORMATION SEARCH AND RETRIEVALno data
💼 AC-22 PUBLICLY ACCESSIBLE CONTENTno data
💼 AC-23 DATA MINING PROTECTIONno data
💼 AC-24 ACCESS CONTROL DECISIONS2no data
 💼 AC-24 (1) TRANSMIT ACCESS AUTHORIZATION INFORMATIONno data
 💼 AC-24 (2) NO USER OR PROCESS IDENTITYno data
💼 AC-25 REFERENCE MONITORno data