AC - Access Control Control Family
Page last updated:
Number | Control | Pivotal Application Service (PAS) Compliance |
---|---|---|
AC-1 | ACCESS CONTROL POLICY AND PROCEDURES | Inherited and compliant |
AC-2 | ACCOUNT MANAGEMENT | Deployer Responsibility |
AC-3 | ACCESS ENFORCEMENT | Compliant |
AC-4 | INFORMATION FLOW ENFORCEMENT | Compliant |
AC-5 | SEPARATION OF DUTIES | Deployer Responsibility |
AC-6 | LEAST PRIVILEGE | Deployer Responsibility |
AC-7 | UNSUCCESSFUL LOGON ATTEMPTS | Inherited |
AC-8 | SYSTEM USE NOTIFICATION | Compliant |
AC-9 | PREVIOUS LOGON (ACCESS) NOTIFICATION | Inherited |
AC-10 | CONCURRENT SESSION CONTROL | Not required for FISMA moderate |
AC-11 | SESSION LOCK | Inherited |
AC-12 | SESSION TERMINATION | Compliant |
AC-14 | PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION | Compliant |
AC-16 | SECURITY ATTRIBUTES | P0, so not required for FISMA Moderate |
AC-17 | REMOTE ACCESS | Inherited and Compliant |
AC-18 | WIRELESS ACCESS | Compliant |
AC-19 | ACCESS CONTROL FOR MOBILE DEVICES | Not Applicable to PCF |
AC-20 | USE OF EXTERNAL INFORMATION SYSTEMS | Deployer Responsibility |
AC-21 | INFORMATION SHARING | Inherited and Compliant |
AC-22 | PUBLICLY ACCESSIBLE CONTENT | Inherited and Compliant |
AC-23 | DATA MINING PROTECTION | P0, so not required for FISMA Moderate |
AC-24 | ACCESS CONTROL DECISIONS | P0, so not required for FISMA Moderate |
AC-25 | REFERENCE MONITOR | P0, so not required for FISMA Moderate |