Employ automated mechanisms to monitor and control remote access methods.
|
|
| Control Identifier | AC-17(1) |
| Latest Sync Date | 19/12/24 09:18:14 |
| Discussion | Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2. Audit events are defined in AU-2a. |
| Related Controls | AU-2, AU-6, AU-12, AU-14. |