Practice Definitions Flashcards
(110 cards)
AC.L1-3.1.1 - AUTHORIZED ACCESS CONTROL [5]
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
AC.L1-3.1.2 - TRANSACTION & FUNCTION CONTROL [5]
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
AC.L1-3.1.20 - EXTERNAL CONNECTIONS [1]
Verify and control/limit connections to and use of external information systems.
AC.L1-3.1.22 - CONTROL PUBLIC INFORMATION [1]
Control information posted or processed on publicly accessible information systems.
AC.L2-3.1.3 - CONTROL CUI FLOW [1]
Control the flow of CUI in accordance with approved authorizations.
AC.L2-3.1.4 - SEPARATION OF DUTIES [1]
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
AC.L2-3.1.5 - LEAST PRIVILEGE [3]
Employ the principle of least privilege, including for specific security functions and privileged accounts.
AC.L2-3.1.6 - NON-PRIVILEGED ACCOUNT USE [1]
Use non-privileged accounts or roles when accessing nonsecurity functions.
AC.L2-3.1.7 - PRIVILEGED FUNCTIONS [1]
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
AC.L2-3.1.8 - UNSUCCESSFUL LOGON ATTEMPTS [1]
Limit unsuccessful logon attempts.
AC.L2-3.1.9 - PRIVACY & SECURITY NOTICES [1]
Provide privacy and security notices consistent with applicable CUI rules.
AC.L2-3.1.10 - SESSION LOCK [1]
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
AC.L2-3.1.11 - SESSION TERMINATION [1]
Terminate (automatically) a user session after a defined condition.
AC.L2-3.1.12 - CONTROL REMOTE ACCESS [5]
Monitor and control remote access sessions.
AC.L2-3.1.13 - REMOTE ACCESS CONFIDENTIALITY [5]
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
AC.L2-3.1.14 - REMOTE ACCESS ROUTING [1]
Route remote access via managed access control points.
AC.L2-3.1.15 - PRIVILEGED REMOTE ACCESS [1]
Authorize remote execution of privileged commands and remote access to security-relevant information.
AC.L2-3.1.16 - WIRELESS ACCESS AUTHORIZATION [5]
Authorize wireless access prior to allowing such connections.
AC.L2-3.1.17 - WIRELESS ACCESS PROTECTION [5]
Protect wireless access using authentication and encryption.
AC.L2-3.1.18 - MOBILE DEVICE CONNECTION [5]
Control connection of mobile devices.
AC.L2-3.1.19 - ENCRYPT CUI ON MOBILE [3]
Encrypt CUI on mobile devices and mobile computing platforms.
AC.L2-3.1.21 - PORTABLE STORAGE USE [1]
Limit use of portable storage devices on external systems.
AT.L2-3.2.1 - ROLE-BASED RISK AWARENESS [5]
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
AT.L2-3.2.2 - ROLE-BASED TRAINING [5]
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.