AC.L2-3.1.2
AC.L2-3.1.2: Transaction & Function Control
Limit user actions to only what their job function requires
moderate
AC.L2-3.1.7
AC.L2-3.1.7: Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
moderate
AC.L2-3.1.8
AC.L2-3.1.8: Unsuccessful Logon Attempts
Limit unsuccessful logon attempts to protect against brute-force password attacks.
moderate
AC.L2-3.1.9
AC.L2-3.1.9: Privacy and Security Notices
Provide privacy and security notices consistent with applicable CUI rules before granting access to the system.
moderate
AC.L2-3.1.10
AC.L2-3.1.10: Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
moderate
AC.L2-3.1.11
AC.L2-3.1.11: Session Termination
Lock sessions after a defined inactivity period to prevent unattended access to active user accounts.
moderate
AC.L2-3.1.13
AC.L2-3.1.13: Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
moderate
AC.L2-3.1.14
AC.L2-3.1.14: Remote Access Routing
Route remote access sessions through managed access control points and apply restrictions before reaching CUI systems.
moderate
AC.L2-3.1.16
AC.L2-3.1.16: Wireless Access Authorization
Authorize wireless access prior to allowing connections, and explain how you control who gets on your network.
moderate
AC.L2-3.1.17
AC.L2-3.1.17: Wireless Access Protection
Protect wireless access using authentication and encryption, and demonstrate that your wireless network actually requires both.
moderate
AC.L2-3.1.18
Mobile Device Access to CUI Systems: AC.L2-3.1.18 Guide
Control the connection of mobile devices to your systems, and demonstrate that you know which mobile devices can access what.
moderate
AC.L2-3.1.19
AC.L2-3.1.19: Encrypt CUI on Mobile Devices
Encrypt CUI stored on mobile devices and mobile computing platforms, and prove that encryption is actually enforced.
moderate
AC.L2-3.1.21
AC.L2-3.1.21: Portable Storage Use
Limit the use of portable storage devices on external systems, and explain how you prevent data leakage via USB, SD cards, and other removable media.
moderate
AC.L2-3.1.22
AC.L2-3.1.22: Control Public Information
Control information posted on publicly accessible systems, and explain how you prevent CUI from being exposed.
moderate
AT.L2-3.2.1
AT.L2-3.2.1: Security Awareness Training
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
moderate
AT.L2-3.2.2
AT.L2-3.2.2: Role-Based Training
Personnel with security duties receive training specific to their assigned information security responsibilities
moderate
AU.L2-3.3.2
AU.L2-3.3.2: User Accountability
Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
moderate
CM.L2-3.4.1
Baseline Configs and System Inventory: CM.L2-3.4.1 Guide
Document and maintain the approved state of every system and keep an inventory of everything connected to your network
moderate
CM.L2-3.4.2
CM.L2-3.4.2: Security Configuration Enforcement
Establish and enforce security configuration settings for information technology products employed in organizational systems.
moderate
IA.L2-3.5.2
MFA, Passwords, and Device Auth: IA.L2-3.5.2 Guide
Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
moderate
IR.L2-3.6.2
IR.L2-3.6.2: Incident Reporting
Document and report confirmed incidents to internal leadership and external authorities as required
moderate
MA.L2-3.7.1
MA.L2-3.7.1: System Maintenance
Perform maintenance on organizational systems.
moderate
PE.L2-3.10.1
PE.L2-3.10.1: Limit Physical Access
Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.
moderate
PE.L2-3.10.2
PE.L2-3.10.2: Monitor Physical Facility
Maintain surveillance and environmental controls over your physical facility.
moderate
RA.L2-3.11.1
RA.L2-3.11.1: Risk Assessments
Periodically assess the risk to organizational operations, assets, and individuals from operating systems that process, store, or transmit CUI.
moderate
SC.L2-3.13.2
SC.L2-3.13.2: Security Engineering Principles
Build security into your systems from the start, not as an afterthought
moderate
SC.L2-3.13.8
SC.L2-3.13.8: CUI in Transit
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission.
moderate
SI.L2-3.14.1
SI.L2-3.14.1: Flaw Remediation
Identify, report, and correct system flaws in a timely manner.
moderate
SI.L2-3.14.2
SI.L2-3.14.2: Malicious Code Protection
Provide protection from malicious code at designated locations within organizational systems.
moderate