AC.L2-3.1.2
AC.L2-3.1.2: Transaction & Function Control
Limit user actions to only what their job function requires
AC.L2-3.1.7
AC.L2-3.1.7: Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
AC.L2-3.1.8
AC.L2-3.1.8: Unsuccessful Logon Attempts
Limit unsuccessful logon attempts to protect against brute-force password attacks.
AC.L2-3.1.9
AC.L2-3.1.9: Privacy and Security Notices
Provide privacy and security notices consistent with applicable CUI rules before granting access to the system.
AC.L2-3.1.10
AC.L2-3.1.10: Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
AC.L2-3.1.11
AC.L2-3.1.11: Session Termination
Lock sessions after a defined inactivity period to prevent unattended access to active user accounts.
AC.L2-3.1.13
AC.L2-3.1.13: Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
AC.L2-3.1.14
AC.L2-3.1.14: Remote Access Routing
Route remote access sessions through managed access control points and apply restrictions before reaching CUI systems.
AC.L2-3.1.16
AC.L2-3.1.16: Wireless Access Authorization
Authorize wireless access prior to allowing connections, and explain how you control who gets on your network.
AC.L2-3.1.17
AC.L2-3.1.17: Wireless Access Protection
Protect wireless access using authentication and encryption, and demonstrate that your wireless network actually requires both.
AC.L2-3.1.18
Mobile Device Access to CUI Systems: AC.L2-3.1.18 Guide
Control the connection of mobile devices to your systems, and demonstrate that you know which mobile devices can access what.
AC.L2-3.1.19
AC.L2-3.1.19: Encrypt CUI on Mobile Devices
Encrypt CUI stored on mobile devices and mobile computing platforms, and prove that encryption is actually enforced.
AC.L2-3.1.21
AC.L2-3.1.21: Portable Storage Use
Limit the use of portable storage devices on external systems, and explain how you prevent data leakage via USB, SD cards, and other removable media.
AC.L2-3.1.22
AC.L2-3.1.22: Control Public Information
Control information posted on publicly accessible systems, and explain how you prevent CUI from being exposed.
AT.L2-3.2.1
AT.L2-3.2.1: Security Awareness Training
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
AT.L2-3.2.2
AT.L2-3.2.2: Role-Based Training
Personnel with security duties receive training specific to their assigned information security responsibilities
AU.L2-3.3.2
AU.L2-3.3.2: User Accountability
Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
CM.L2-3.4.1
Baseline Configs and System Inventory: CM.L2-3.4.1 Guide
Document and maintain the approved state of every system and keep an inventory of everything connected to your network
CM.L2-3.4.2
CM.L2-3.4.2: Security Configuration Enforcement
Establish and enforce security configuration settings for information technology products employed in organizational systems.
IA.L2-3.5.2
MFA, Passwords, and Device Auth: IA.L2-3.5.2 Guide
Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
IR.L2-3.6.2
IR.L2-3.6.2: Incident Reporting
Document and report confirmed incidents to internal leadership and external authorities as required
MA.L2-3.7.1
MA.L2-3.7.1: System Maintenance
Perform maintenance on organizational systems.
PE.L2-3.10.1
PE.L2-3.10.1: Limit Physical Access
Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.
PE.L2-3.10.2
PE.L2-3.10.2: Monitor Physical Facility
Maintain surveillance and environmental controls over your physical facility.
RA.L2-3.11.1
RA.L2-3.11.1: Risk Assessments
Periodically assess the risk to organizational operations, assets, and individuals from operating systems that process, store, or transmit CUI.
SC.L2-3.13.2
SC.L2-3.13.2: Security Engineering Principles
Build security into your systems from the start, not as an afterthought
SC.L2-3.13.8
SC.L2-3.13.8: CUI in Transit
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission.
SI.L2-3.14.1
SI.L2-3.14.1: Flaw Remediation
Identify, report, and correct system flaws in a timely manner.
SI.L2-3.14.2
SI.L2-3.14.2: Malicious Code Protection
Provide protection from malicious code at designated locations within organizational systems.