💼 AC-1 Policy and Procedures | | | | |
💼 AC-2 Account Management | 13 | | 3 | |
💼 AC-2(1) Account Management _ Automated System Account Management | | 4 | 16 | |
💼 AC-2(2) Account Management _ Automated Temporary and Emergency Account Management | | | | |
💼 AC-2(3) Account Management _ Disable Accounts | | 1 | 4 | |
💼 AC-2(4) Account Management _ Automated Audit Actions | | 11 | 13 | |
💼 AC-2(5) Account Management _ Inactivity Logout | | | | |
💼 AC-2(6) Account Management _ Dynamic Privilege Management | | | | |
💼 AC-2(7) Account Management _ Privileged User Accounts | | 1 | 1 | |
💼 AC-2(8) Account Management _ Dynamic Account Management | | | | |
💼 AC-2(9) Account Management _ Restrictions on Use of Shared and Group Accounts | | | | |
💼 AC-2(10) Account Management _ Shared and Group Account Credential Change | | | | |
💼 AC-2(11) Account Management _ Usage Conditions | | | | |
💼 AC-2(12) Account Management _ Account Monitoring for Atypical Usage | | | | |
💼 AC-2(13) Account Management _ Disable Accounts for High-risk Individuals | | | | |
💼 AC-3 Access Enforcement | 15 | 4 | 11 | |
💼 AC-3(1) Access Enforcement _ Restricted Access to Privileged Functions | | | | |
💼 AC-3(2) Access Enforcement _ Dual Authorization | | | | |
💼 AC-3(3) Access Enforcement _ Mandatory Access Control | | | | |
💼 AC-3(4) Access Enforcement _ Discretionary Access Control | | | | |
💼 AC-3(5) Access Enforcement _ Security-relevant Information | | | | |
💼 AC-3(6) Access Enforcement _ Protection of User and System Information | | | | |
💼 AC-3(7) Access Enforcement _ Role-based Access Control | | | 7 | |
💼 AC-3(8) Access Enforcement _ Revocation of Access Authorizations | | | | |
💼 AC-3(9) Access Enforcement _ Controlled Release | | | | |
💼 AC-3(10) Access Enforcement _ Audited Override of Access Control Mechanisms | | | | |
💼 AC-3(11) Access Enforcement _ Restrict Access to Specific Information Types | | | | |
💼 AC-3(12) Access Enforcement _ Assert and Enforce Application Access | | | | |
💼 AC-3(13) Access Enforcement _ Attribute-based Access Control | | | | |
💼 AC-3(14) Access Enforcement _ Individual Access | | | | |
💼 AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control | | | 10 | |
💼 AC-4 Information Flow Enforcement | 32 | 7 | 21 | |
💼 AC-4(1) Information Flow Enforcement _ Object Security and Privacy Attributes | | | | |
💼 AC-4(2) Information Flow Enforcement _ Processing Domains | | 25 | 27 | |
💼 AC-4(3) Information Flow Enforcement _ Dynamic Information Flow Control | | | | |
💼 AC-4(4) Information Flow Enforcement _ Flow Control of Encrypted Information | | | | |
💼 AC-4(5) Information Flow Enforcement _ Embedded Data Types | | 1 | 1 | |
💼 AC-4(6) Information Flow Enforcement _ Metadata | | | | |
💼 AC-4(7) Information Flow Enforcement _ One-way Flow Mechanisms | | | | |
💼 AC-4(8) Information Flow Enforcement _ Security and Privacy Policy Filters | | | | |
💼 AC-4(9) Information Flow Enforcement _ Human Reviews | | | | |
💼 AC-4(10) Information Flow Enforcement _ Enable and Disable Security or Privacy Policy Filters | | | | |
💼 AC-4(11) Information Flow Enforcement _ Configuration of Security or Privacy Policy Filters | | | | |
💼 AC-4(12) Information Flow Enforcement _ Data Type Identifiers | | | | |
💼 AC-4(13) Information Flow Enforcement _ Decomposition into Policy-relevant Subcomponents | | | | |
💼 AC-4(14) Information Flow Enforcement _ Security or Privacy Policy Filter Constraints | | 2 | 2 | |
💼 AC-4(15) Information Flow Enforcement _ Detection of Unsanctioned Information | | 7 | 8 | |
💼 AC-4(16) Information Flow Enforcement _ Information Transfers on Interconnected Systems | | | | |
💼 AC-4(17) Information Flow Enforcement _ Domain Authentication | | | | |
💼 AC-4(18) Information Flow Enforcement _ Security Attribute Binding | | | | |
💼 AC-4(19) Information Flow Enforcement _ Validation of Metadata | | | | |
💼 AC-4(20) Information Flow Enforcement _ Approved Solutions | | | | |
💼 AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows | | 35 | 39 | |
💼 AC-4(22) Information Flow Enforcement _ Access Only | | | | |
💼 AC-4(23) Information Flow Enforcement _ Modify Non-releasable Information | | | | |
💼 AC-4(24) Information Flow Enforcement _ Internal Normalized Format | | | | |
💼 AC-4(25) Information Flow Enforcement _ Data Sanitization | | | | |
💼 AC-4(26) Information Flow Enforcement _ Audit Filtering Actions | | | 7 | |
💼 AC-4(27) Information Flow Enforcement _ Redundant/independent Filtering Mechanisms | | | | |
💼 AC-4(28) Information Flow Enforcement _ Linear Filter Pipelines | | | | |
💼 AC-4(29) Information Flow Enforcement _ Filter Orchestration Engines | | | | |
💼 AC-4(30) Information Flow Enforcement _ Filter Mechanisms Using Multiple Processes | | | | |
💼 AC-4(31) Information Flow Enforcement _ Failed Content Transfer Prevention | | | | |
💼 AC-4(32) Information Flow Enforcement _ Process Requirements for Information Transfer | | | | |
💼 AC-5 Separation of Duties | | | 1 | |
💼 AC-6 Least Privilege | 10 | | 7 | |
|