CCP Lesson 9 Flashcards
AC.L2-3.1.3
Control the flow of CUI in accordance with approved authorizations.
AC.L2-3.1.4
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
AC.L2-3.1.5
Employ the principle of least privilege, including for specific security functions and privileged accounts.
AC.L2-3.1.6
Use non-privileged accounts or roles when accessing nonsecurity functions.
AC.L2-3.1.7
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
AC.L2-3.1.8
Limit unsuccessful logon attempts.
AC.L2-3.1.9
Provide privacy and security notices consistent with applicable CUI rules.
AC.L2-3.1.10
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
AC.L2-3.1.11
Terminate (automatically) a user session after a defined condition.
AC.L2-3.1.12
Monitor and control remote access sessions.
AC.L2-3.1.13
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
AC.L2-3.1.14
Route remote access via managed access control points.
AC.L2-3.1.15
Authorize remote execution of privileged commands and remote access to security-relevant information.
AC.L2-3.1.16
Authorize wireless access prior to allowing such connections.
AC.L2-3.1.17
Protect wireless access using authentication and encryption.
AC.L2-3.1.18
Control connection of mobile devices.
AC.L2-3.1.19
Encrypt CUI on mobile devices and mobile computing platforms.
AC.L2-3.1.21
Limit use of portable storage devices on external systems.
AU.L2-3.3.1
Create and retain system audit logs and records to the extent needed to enable the monitoring analysis, investigation, and reporting of unlawful or unauthorized system activity.
AU.L2-3.3.2
Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
AU.L2-3.3.3
Review and update logged events.
AU.L2-3.3.4
Alert in the event of an audit logging process failure.
AU.L2-3.3.5
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
AU.L2-3.3.6
Provide audit record reduction and report generation to support on-demand analysis and reporting.