AC.L2-3.1.1
Who Has Access to CUI? How to Pass AC.L2-3.1.1
Limit system access to authorized users, processes acting on behalf of authorized users, and devices, and explain how you prove it.
AC.L2-3.1.2
AC.L2-3.1.2: Transaction & Function Control
Limit user actions to only what their job function requires
AC.L2-3.1.3
AC.L2-3.1.3: Control CUI Flow
Prevent CUI from moving to unauthorized systems, users, or locations
AC.L2-3.1.4
Separation of Duties for Small Contractors: AC.L2-3.1.4 Guide
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
AC.L2-3.1.5
AC.L2-3.1.5: Least Privilege
Employ the principle of least privilege, including for specific security functions and privileged accounts.
AC.L2-3.1.6
AC.L2-3.1.6: Non-Privileged Account Use
Require privileged users to use non-privileged accounts or roles when accessing nonsecurity functions.
AC.L2-3.1.7
AC.L2-3.1.7: Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
AC.L2-3.1.8
AC.L2-3.1.8: Unsuccessful Logon Attempts
Limit unsuccessful logon attempts to protect against brute-force password attacks.
AC.L2-3.1.9
AC.L2-3.1.9: Privacy and Security Notices
Provide privacy and security notices consistent with applicable CUI rules before granting access to the system.
AC.L2-3.1.10
AC.L2-3.1.10: Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
AC.L2-3.1.11
AC.L2-3.1.11: Session Termination
Lock sessions after a defined inactivity period to prevent unattended access to active user accounts.
AC.L2-3.1.12
AC.L2-3.1.12: Control Remote Access
Monitor and control all remote access sessions to systems handling CUI with an auditable log trail.
AC.L2-3.1.13
AC.L2-3.1.13: Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
AC.L2-3.1.14
AC.L2-3.1.14: Remote Access Routing
Route remote access sessions through managed access control points and apply restrictions before reaching CUI systems.
AC.L2-3.1.15
AC.L2-3.1.15: Privileged Remote Access
Authorize remote execution of privileged commands through defined approval processes and maintain detailed audit trails.
AC.L2-3.1.16
AC.L2-3.1.16: Wireless Access Authorization
Authorize wireless access prior to allowing connections, and explain how you control who gets on your network.
AC.L2-3.1.17
AC.L2-3.1.17: Wireless Access Protection
Protect wireless access using authentication and encryption, and demonstrate that your wireless network actually requires both.
AC.L2-3.1.18
Mobile Device Access to CUI Systems: AC.L2-3.1.18 Guide
Control the connection of mobile devices to your systems, and demonstrate that you know which mobile devices can access what.
AC.L2-3.1.19
AC.L2-3.1.19: Encrypt CUI on Mobile Devices
Encrypt CUI stored on mobile devices and mobile computing platforms, and prove that encryption is actually enforced.
AC.L2-3.1.20
AC.L2-3.1.20: External Connections
Verify and control connections to external information systems, and explain how you prevent unauthorized data flow.
AC.L2-3.1.21
AC.L2-3.1.21: Portable Storage Use
Limit the use of portable storage devices on external systems, and explain how you prevent data leakage via USB, SD cards, and other removable media.
AC.L2-3.1.22
AC.L2-3.1.22: Control Public Information
Control information posted on publicly accessible systems, and explain how you prevent CUI from being exposed.