Skip to main content

💼 AC-3 ACCESS ENFORCEMENT

  • ID: /frameworks/nist-sp-800-53-r4/ac/03

Description

The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Similar

  • Internal
    • ID: dec-c-442f5fa0

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v1.1 → 💼 PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties1756no data
💼 NIST CSF v1.1 → 💼 PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions413no data
💼 NIST CSF v1.1 → 💼 PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities2130no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AC-3 (1) RESTRICTED ACCESS TO PRIVILEGED FUNCTIONSno data
💼 AC-3 (2) DUAL AUTHORIZATIONno data
💼 AC-3 (3) MANDATORY ACCESS CONTROLno data
💼 AC-3 (4) DISCRETIONARY ACCESS CONTROLno data
💼 AC-3 (5) SECURITY-RELEVANT INFORMATIONno data
💼 AC-3 (6) PROTECTION OF USER AND SYSTEM INFORMATIONno data
💼 AC-3 (7) ROLE-BASED ACCESS CONTROLno data
💼 AC-3 (8) REVOCATION OF ACCESS AUTHORIZATIONSno data
💼 AC-3 (9) CONTROLLED RELEASEno data
💼 AC-3 (10) AUDITED OVERRIDE OF ACCESS CONTROL MECHANISMSno data

Policies (2)

PolicyLogic CountFlagsCompliance
🛡️ Consumer Google Accounts are used🟢⚪🟢 x2, ⚪ x1no data
🛡️ Google Cloud MySQL Instance allows anyone to connect with administrative privileges🟢⚪🟢 x2, ⚪ x1no data