AC-17(01) Monitoring and Control
Employ automated mechanisms to monitor and control remote access methods.
Baselines
- L Not selected
- M Selected
- H Selected
- P Not selected
Guidance
Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2 . Audit events are defined in [AU-2a](#au-2_smt.a).
Related controls 4
- AU-02 Event Logging L M H P
- AU-06 Audit Record Review, Analysis, and Reporting L M H P
- AU-12 Audit Record Generation L M H P
- AU-14 Session Audit L M H P