AC-17 (1)

AC-17 (1) H M

The information system monitors and controls remote access methods.

Supplemental Guidance

Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).

Related Controls