Skip to main content

💼 AC Access Control

  • ID: /frameworks/nist-sp-800-53-r5/ac

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-9adf8219

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AC-1 Policy and Proceduresno data
💼 AC-2 Account Management132037no data
 💼 AC-2(1) Account Management _ Automated System Account Management418no data
 💼 AC-2(2) Account Management _ Automated Temporary and Emergency Account Managementno data
 💼 AC-2(3) Account Management _ Disable Accounts14no data
 💼 AC-2(4) Account Management _ Automated Audit Actions1416no data
 💼 AC-2(5) Account Management _ Inactivity Logoutno data
 💼 AC-2(6) Account Management _ Dynamic Privilege Managementno data
 💼 AC-2(7) Account Management _ Privileged User Accounts11no data
 💼 AC-2(8) Account Management _ Dynamic Account Managementno data
 💼 AC-2(9) Account Management _ Restrictions on Use of Shared and Group Accountsno data
 💼 AC-2(10) Account Management _ Shared and Group Account Credential Changeno data
 💼 AC-2(11) Account Management _ Usage Conditionsno data
 💼 AC-2(12) Account Management _ Account Monitoring for Atypical Usage1no data
 💼 AC-2(13) Account Management _ Disable Accounts for High-risk Individualsno data
💼 AC-3 Access Enforcement15540no data
 💼 AC-3(1) Access Enforcement _ Restricted Access to Privileged Functionsno data
 💼 AC-3(2) Access Enforcement _ Dual Authorizationno data
 💼 AC-3(3) Access Enforcement _ Mandatory Access Controlno data
 💼 AC-3(4) Access Enforcement _ Discretionary Access Controlno data
 💼 AC-3(5) Access Enforcement _ Security-relevant Informationno data
 💼 AC-3(6) Access Enforcement _ Protection of User and System Informationno data
 💼 AC-3(7) Access Enforcement _ Role-based Access Control14no data
 💼 AC-3(8) Access Enforcement _ Revocation of Access Authorizationsno data
 💼 AC-3(9) Access Enforcement _ Controlled Releaseno data
 💼 AC-3(10) Access Enforcement _ Audited Override of Access Control Mechanismsno data
 💼 AC-3(11) Access Enforcement _ Restrict Access to Specific Information Typesno data
 💼 AC-3(12) Access Enforcement _ Assert and Enforce Application Accessno data
 💼 AC-3(13) Access Enforcement _ Attribute-based Access Controlno data
 💼 AC-3(14) Access Enforcement _ Individual Accessno data
 💼 AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control13no data
💼 AC-4 Information Flow Enforcement326891no data
 💼 AC-4(1) Information Flow Enforcement _ Object Security and Privacy Attributesno data
 💼 AC-4(2) Information Flow Enforcement _ Processing Domains3032no data
 💼 AC-4(3) Information Flow Enforcement _ Dynamic Information Flow Controlno data
 💼 AC-4(4) Information Flow Enforcement _ Flow Control of Encrypted Informationno data
 💼 AC-4(5) Information Flow Enforcement _ Embedded Data Types11no data
 💼 AC-4(6) Information Flow Enforcement _ Metadatano data
 💼 AC-4(7) Information Flow Enforcement _ One-way Flow Mechanismsno data
 💼 AC-4(8) Information Flow Enforcement _ Security and Privacy Policy Filtersno data
 💼 AC-4(9) Information Flow Enforcement _ Human Reviewsno data
 💼 AC-4(10) Information Flow Enforcement _ Enable and Disable Security or Privacy Policy Filtersno data
 💼 AC-4(11) Information Flow Enforcement _ Configuration of Security or Privacy Policy Filtersno data
 💼 AC-4(12) Information Flow Enforcement _ Data Type Identifiersno data
 💼 AC-4(13) Information Flow Enforcement _ Decomposition into Policy-relevant Subcomponentsno data
 💼 AC-4(14) Information Flow Enforcement _ Security or Privacy Policy Filter Constraints22no data
 💼 AC-4(15) Information Flow Enforcement _ Detection of Unsanctioned Information910no data
 💼 AC-4(16) Information Flow Enforcement _ Information Transfers on Interconnected Systemsno data
 💼 AC-4(17) Information Flow Enforcement _ Domain Authenticationno data
 💼 AC-4(18) Information Flow Enforcement _ Security Attribute Bindingno data
 💼 AC-4(19) Information Flow Enforcement _ Validation of Metadatano data
 💼 AC-4(20) Information Flow Enforcement _ Approved Solutionsno data
 💼 AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows3748no data
 💼 AC-4(22) Information Flow Enforcement _ Access Onlyno data
 💼 AC-4(23) Information Flow Enforcement _ Modify Non-releasable Informationno data
 💼 AC-4(24) Information Flow Enforcement _ Internal Normalized Formatno data
 💼 AC-4(25) Information Flow Enforcement _ Data Sanitizationno data
 💼 AC-4(26) Information Flow Enforcement _ Audit Filtering Actions9no data
 💼 AC-4(27) Information Flow Enforcement _ Redundant/independent Filtering Mechanismsno data
 💼 AC-4(28) Information Flow Enforcement _ Linear Filter Pipelinesno data
 💼 AC-4(29) Information Flow Enforcement _ Filter Orchestration Enginesno data
 💼 AC-4(30) Information Flow Enforcement _ Filter Mechanisms Using Multiple Processesno data
 💼 AC-4(31) Information Flow Enforcement _ Failed Content Transfer Preventionno data
 💼 AC-4(32) Information Flow Enforcement _ Process Requirements for Information Transferno data
💼 AC-5 Separation of Duties15no data
💼 AC-6 Least Privilege102350no data
 💼 AC-6(1) Least Privilege _ Authorize Access to Security Functions22no data
 💼 AC-6(2) Least Privilege _ Non-privileged Access for Nonsecurity Functions45no data
 💼 AC-6(3) Least Privilege _ Network Access to Privileged Commands2no data
 💼 AC-6(4) Least Privilege _ Separate Processing Domainsno data
 💼 AC-6(5) Least Privilege _ Privileged Accounts33no data
 💼 AC-6(6) Least Privilege _ Privileged Access by Non-organizational Usersno data
 💼 AC-6(7) Least Privilege _ Review of User Privilegesno data
 💼 AC-6(8) Least Privilege _ Privilege Levels for Code Executionno data
 💼 AC-6(9) Least Privilege _ Log Use of Privileged Functions1719no data
 💼 AC-6(10) Least Privilege _ Prohibit Non-privileged Users from Executing Privileged Functions3no data
💼 AC-7 Unsuccessful Logon Attempts4no data
 💼 AC-7(1) Unsuccessful Logon Attempts _ Automatic Account Lockno data
 💼 AC-7(2) Unsuccessful Logon Attempts _ Purge or Wipe Mobile Deviceno data
 💼 AC-7(3) Unsuccessful Logon Attempts _ Biometric Attempt Limitingno data
 💼 AC-7(4) Unsuccessful Logon Attempts _ Use of Alternate Authentication Factorno data
💼 AC-8 System Use Notificationno data
💼 AC-9 Previous Logon Notification4no data
 💼 AC-9(1) Previous Logon Notification _ Unsuccessful Logonsno data
 💼 AC-9(2) Previous Logon Notification _ Successful and Unsuccessful Logonsno data
 💼 AC-9(3) Previous Logon Notification _ Notification of Account Changesno data
 💼 AC-9(4) Previous Logon Notification _ Additional Logon Informationno data
💼 AC-10 Concurrent Session Controlno data
💼 AC-11 Device Lock1no data
 💼 AC-11(1) Device Lock _ Pattern-hiding Displaysno data
💼 AC-12 Session Termination3no data
 💼 AC-12(1) Session Termination _ User-initiated Logoutsno data
 💼 AC-12(2) Session Termination _ Termination Messageno data
 💼 AC-12(3) Session Termination _ Timeout Warning Messageno data
💼 AC-13 Supervision and Review — Access Controlno data
💼 AC-14 Permitted Actions Without Identification or Authentication1no data
 💼 AC-14(1) Permitted Actions Without Identification or Authentication _ Necessary Usesno data
💼 AC-15 Automated Markingno data
💼 AC-16 Security and Privacy Attributes10no data
 💼 AC-16(1) Security and Privacy Attributes _ Dynamic Attribute Associationno data
 💼 AC-16(2) Security and Privacy Attributes _ Attribute Value Changes by Authorized Individualsno data
 💼 AC-16(3) Security and Privacy Attributes _ Maintenance of Attribute Associations by Systemno data
 💼 AC-16(4) Security and Privacy Attributes _ Association of Attributes by Authorized Individualsno data
 💼 AC-16(5) Security and Privacy Attributes _ Attribute Displays on Objects to Be Outputno data
 💼 AC-16(6) Security and Privacy Attributes _ Maintenance of Attribute Associationno data
 💼 AC-16(7) Security and Privacy Attributes _ Consistent Attribute Interpretationno data
 💼 AC-16(8) Security and Privacy Attributes _ Association Techniques and Technologiesno data
 💼 AC-16(9) Security and Privacy Attributes _ Attribute Reassignment — Regrading Mechanismsno data
 💼 AC-16(10) Security and Privacy Attributes _ Attribute Configuration by Authorized Individualsno data
💼 AC-17 Remote Access101319no data
 💼 AC-17(1) Remote Access _ Monitoring and Control11no data
 💼 AC-17(2) Remote Access _ Protection of Confidentiality and Integrity Using Encryption1217no data
 💼 AC-17(3) Remote Access _ Managed Access Control Pointsno data
 💼 AC-17(4) Remote Access _ Privileged Commands and Accessno data
 💼 AC-17(5) Remote Access _ Monitoring for Unauthorized Connectionsno data
 💼 AC-17(6) Remote Access _ Protection of Mechanism Informationno data
 💼 AC-17(7) Remote Access _ Additional Protection for Security Function Accessno data
 💼 AC-17(8) Remote Access _ Disable Nonsecure Network Protocolsno data
 💼 AC-17(9) Remote Access _ Disconnect or Disable Accessno data
 💼 AC-17(10) Remote Access _ Authenticate Remote Commandsno data
💼 AC-18 Wireless Access55no data
 💼 AC-18(1) Wireless Access _ Authentication and Encryptionno data
 💼 AC-18(2) Wireless Access _ Monitoring Unauthorized Connectionsno data
 💼 AC-18(3) Wireless Access _ Disable Wireless Networkingno data
 💼 AC-18(4) Wireless Access _ Restrict Configurations by Usersno data
 💼 AC-18(5) Wireless Access _ Antennas and Transmission Power Levelsno data
💼 AC-19 Access Control for Mobile Devices5no data
 💼 AC-19(1) Access Control for Mobile Devices _ Use of Writable and Portable Storage Devicesno data
 💼 AC-19(2) Access Control for Mobile Devices _ Use of Personally Owned Portable Storage Devicesno data
 💼 AC-19(3) Access Control for Mobile Devices _ Use of Portable Storage Devices with No Identifiable Ownerno data
 💼 AC-19(4) Access Control for Mobile Devices _ Restrictions for Classified Informationno data
 💼 AC-19(5) Access Control for Mobile Devices _ Full Device or Container-based Encryptionno data
💼 AC-20 Use of External Systems5no data
 💼 AC-20(1) Use of External Systems _ Limits on Authorized Useno data
 💼 AC-20(2) Use of External Systems _ Portable Storage Devices — Restricted Useno data
 💼 AC-20(3) Use of External Systems _ Non-organizationally Owned Systems — Restricted Useno data
 💼 AC-20(4) Use of External Systems _ Network Accessible Storage Devices — Prohibited Useno data
 💼 AC-20(5) Use of External Systems _ Portable Storage Devices — Prohibited Useno data
💼 AC-21 Information Sharing28no data
 💼 AC-21(1) Information Sharing _ Automated Decision Supportno data
 💼 AC-21(2) Information Sharing _ Information Search and Retrievalno data
💼 AC-22 Publicly Accessible Contentno data
💼 AC-23 Data Mining Protectionno data
💼 AC-24 Access Control Decisions2no data
 💼 AC-24(1) Access Control Decisions _ Transmit Access Authorization Informationno data
 💼 AC-24(2) Access Control Decisions _ No User or Process Identityno data
💼 AC-25 Reference Monitorno data