Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
|
|
| Control Identifier | AC-17(2) |
| Latest Sync Date | 19/12/24 09:18:14 |
| Discussion | Virtual private networks can be used to protect the confidentiality and integrity of remote access sessions. Transport Layer Security (TLS) is an example of a cryptographic protocol that provides end-to-end communications security over networks and is used for Internet communications and online transactions. |
| Related Controls | SC-8, SC-12, SC-13. |