AC: Access Control
Controls
AC-1: Policy and Procedures
Baseline(s):
- Low
- Moderate
- High
- Privacy
Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: [Assignment (one or more): organization-level, mission/business process-level, system-level] access control policy that: Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and Procedures to facilitate the implementation…
AC-2: Account Management
Baseline(s):
- Low
- Moderate
- High
Define and document the types of accounts allowed and specifically prohibited for use within the system; Assign account managers; Require [Assignment: organization-defined prerequisites and criteria] for group and role membership; Specify: Authorized users of the system; Group and role membership; and Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each account; Require…
AC-3: Access Enforcement
Baseline(s):
- Low
- Moderate
- High
Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
AC-4: Information Flow Enforcement
Baseline(s):
- Moderate
- High
Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on [Assignment: organization-defined information flow control policies].
AC-5: Separation of Duties
Baseline(s):
- Moderate
- High
Identify and document [Assignment: organization-defined duties of individuals requiring separation]; and Define system access authorizations to support separation of duties.
AC-6: Least Privilege
Baseline(s):
- Moderate
- High
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
AC-7: Unsuccessful Logon Attempts
Baseline(s):
- Low
- Moderate
- High
Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and Automatically [Assignment (one or more): lock the account or node for an [Assignment: organization-defined time period] , lock the account or node until released by an administrator, delay next logon prompt per [Assignment: organization-defined…
AC-8: System Use Notification
Baseline(s):
- Low
- Moderate
- High
Display [Assignment: organization-defined system use notification message or banner] to users before granting access to the system that provides privacy and security notices consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and state that: Users are accessing a U.S. Government system; System usage may be monitored, recorded, and subject to audit;…
AC-9: Previous Logon Notification
Baseline(s):
Notify the user, upon successful logon to the system, of the date and time of the last logon.
AC-10: Concurrent Session Control
Baseline(s):
- High
Limit the number of concurrent sessions for each [Assignment: organization-defined account and/or account type] to [Assignment: organization-defined number].
AC-11: Device Lock
Baseline(s):
- Moderate
- High
Prevent further access to the system by [Assignment (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity, requiring the user to initiate a device lock before leaving the system unattended]; and Retain the device lock until the user reestablishes access using established identification and authentication procedures.
AC-12: Session Termination
Baseline(s):
- Moderate
- High
Automatically terminate a user session after [Assignment: organization-defined conditions, or trigger events requiring session disconnect].
AC-14: Permitted Actions Without Identification or Authentication
Baseline(s):
- Low
- Moderate
- High
Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
AC-16: Security and Privacy Attributes
Baseline(s):
Provide the means to associate [Assignment: organization-defined types of security and privacy attributes] with [Assignment: organization-defined security and privacy attribute values] for information in storage, in process, and/or in transmission; Ensure that the attribute associations are made and retained with the information; Establish the following permitted security and privacy attributes from the attributes defined in…
AC-17: Remote Access
Baseline(s):
- Low
- Moderate
- High
Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and Authorize each type of remote access to the system prior to allowing such connections.
AC-18: Wireless Access
Baseline(s):
- Low
- Moderate
- High
Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and Authorize each type of wireless access to the system prior to allowing such connections.
AC-19: Access Control for Mobile Devices
Baseline(s):
- Low
- Moderate
- High
Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and Authorize the connection of mobile devices to organizational systems.
AC-20: Use of External Systems
Baseline(s):
- Low
- Moderate
- High
[Assignment (one or more): Establish [Assignment: organization-defined terms and conditions] , Identify [Assignment: organization-defined controls asserted to be implemented on external systems] ], consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to: Access the system from external systems; and Process, store, or transmit organization-controlled information…
AC-21: Information Sharing
Baseline(s):
- Moderate
- High
Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and Employ [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing and collaboration decisions.
AC-22: Publicly Accessible Content
Baseline(s):
- Low
- Moderate
- High
Designate individuals authorized to make information publicly accessible; Train authorized individuals to ensure that publicly accessible information does not contain nonpublic information; Review the proposed content of information prior to posting onto the publicly accessible system to ensure that nonpublic information is not included; and Review the content on the publicly accessible system for nonpublic…
AC-23: Data Mining Protection
Baseline(s):
Employ [Assignment: organization-defined data mining prevention and detection techniques] for [Assignment: organization-defined data storage objects] to detect and protect against unauthorized data mining.
AC-24: Access Control Decisions
Baseline(s):
[Assignment: Establish procedures, Implement mechanisms] to ensure [Assignment: organization-defined access control decisions] are applied to each access request prior to access enforcement.
AC-25: Reference Monitor
Baseline(s):
Implement a reference monitor for [Assignment: organization-defined access control policies] that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.