// Level 3 · Controls

Access Control

NIST SP 800-53 Rev 5 Access Control controls.

AC-01Medium

Policy and Procedures

Develop, document, and disseminate to [parameter]:

AC-02Medium

Account Management

Define and document the types of accounts allowed and specifically prohibited for use within the system;

AC-03Medium

Access Enforcement

Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

AC-04Medium

Information Flow Enforcement

Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on [parameter].

AC-05Medium

Separation of Duties

Identify and document [parameter] ; and

AC-06Medium

Least Privilege

Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.

AC-07Medium

Unsuccessful Logon Attempts

Enforce a limit of [parameter] consecutive invalid logon attempts by a user during a [parameter] ; and

AC-08Medium

System Use Notification

Display [parameter] to users before granting access to the system that provides privacy and security notices consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and state that:

AC-09Medium

Previous Logon Notification

Notify the user, upon successful logon to the system, of the date and time of the last logon.

AC-10Medium

Concurrent Session Control

Limit the number of concurrent sessions for each [parameter] to [parameter].

AC-11Medium

Device Lock

Prevent further access to the system by [parameter] ; and

AC-12Medium

Session Termination

Automatically terminate a user session after [parameter].

AC-13Medium

Supervision and Review — Access Control

Supervision and Review — Access Control

AC-14Medium

Permitted Actions Without Identification or Authentication

Identify [parameter] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and

AC-15Medium

Automated Marking

Automated Marking

AC-16Medium

Security and Privacy Attributes

Provide the means to associate [parameter] with [parameter] for information in storage, in process, and/or in transmission;

AC-17Medium

Remote Access

Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and

AC-18Medium

Wireless Access

Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and

AC-19Medium

Access Control for Mobile Devices

Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and

AC-20Medium

Use of External Systems

[parameter] , consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to:

AC-21Medium

Information Sharing

Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for [parameter] ; and

AC-22Medium

Publicly Accessible Content

Designate individuals authorized to make information publicly accessible;

AC-23Medium

Data Mining Protection

Employ [parameter] for [parameter] to detect and protect against unauthorized data mining.

AC-24Medium

Access Control Decisions

[parameter] to ensure [parameter] are applied to each access request prior to access enforcement.

AC-25Medium

Reference Monitor

Implement a reference monitor for [parameter] that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.