💼 AC-17 Remote Access
- ID:
/frameworks/nist-sp-800-53-r5/ac/17
Description
a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and b. Authorize each type of remote access to the system prior to allowing such connections.
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/dms/10
/frameworks/aws-fsbp-v1.0.0/dynamodb/07
- Internal
- ID:
dec-c-42214397
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DMS.10] DMS endpoints for Neptune databases should have IAM authorization enabled | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DynamoDB.7] DynamoDB Accelerator clusters should be encrypted in transit | no data |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 FedRAMP High Security Controls → 💼 AC-17 Remote Access (L)(M)(H) | 4 | 19 | no data | ||
💼 FedRAMP Low Security Controls → 💼 AC-17 Remote Access (L)(M)(H) | 1 | no data | |||
💼 NIST CSF v2.0 → 💼 PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | 91 | no data |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 AC-17(1) Remote Access _ Monitoring and Control | 1 | 1 | no data | ||
💼 AC-17(2) Remote Access _ Protection of Confidentiality and Integrity Using Encryption | 12 | 17 | no data | ||
💼 AC-17(3) Remote Access _ Managed Access Control Points | no data | ||||
💼 AC-17(4) Remote Access _ Privileged Commands and Access | no data | ||||
💼 AC-17(5) Remote Access _ Monitoring for Unauthorized Connections | no data | ||||
💼 AC-17(6) Remote Access _ Protection of Mechanism Information | no data | ||||
💼 AC-17(7) Remote Access _ Additional Protection for Security Function Access | no data | ||||
💼 AC-17(8) Remote Access _ Disable Nonsecure Network Protocols | no data | ||||
💼 AC-17(9) Remote Access _ Disconnect or Disable Access | no data | ||||
💼 AC-17(10) Remote Access _ Authenticate Remote Commands | no data |
Policies (1)
Policy | Logic Count | Flags | Compliance |
---|---|---|---|
🛡️ Google GCE Instance Block Project-Wide SSH Keys is not enabled🟢 | 1 | 🟢 x6 | no data |