AC.L2-3.1.1
Who Has Access to CUI? How to Pass AC.L2-3.1.1
Limit system access to authorized users, processes acting on behalf of authorized users, and devices, and explain how you prove it.
AC.L2-3.1.3
AC.L2-3.1.3: Control CUI Flow
Prevent CUI from moving to unauthorized systems, users, or locations
AC.L2-3.1.4
Separation of Duties for Small Contractors: AC.L2-3.1.4 Guide
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
AC.L2-3.1.5
AC.L2-3.1.5: Least Privilege
Employ the principle of least privilege, including for specific security functions and privileged accounts.
AC.L2-3.1.6
AC.L2-3.1.6: Non-Privileged Account Use
Require privileged users to use non-privileged accounts or roles when accessing nonsecurity functions.
AC.L2-3.1.12
AC.L2-3.1.12: Control Remote Access
Monitor and control all remote access sessions to systems handling CUI with an auditable log trail.
AC.L2-3.1.15
AC.L2-3.1.15: Privileged Remote Access
Authorize remote execution of privileged commands through defined approval processes and maintain detailed audit trails.
AC.L2-3.1.20
AC.L2-3.1.20: External Connections
Verify and control connections to external information systems, and explain how you prevent unauthorized data flow.
AU.L2-3.3.1
AU.L2-3.3.1: System Auditing
Create and retain system audit logs and records to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
IR.L2-3.6.1
IR.L2-3.6.1: Incident Handling
Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
CA.L2-3.12.4
Writing Your SSP: System Security Plan Guide (CA.L2-3.12.4)
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.
SC.L2-3.13.1
SC.L2-3.13.1: Boundary Protection
Monitor, control, and protect communications at the external boundaries and key internal boundaries of organizational systems.