AC-17(01) Monitoring and Control
Employ automated mechanisms to monitor and control remote access methods.
Baselines
- L
- M
- H
- P
Guidance
Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2 . Audit events are defined in [AU-2a](#au-2_smt.a).
Related controls 4
- AU-02 Event Logging L M H P
- AU-06 Audit Record Review, Analysis, and Reporting L M H P
- AU-12 Audit Record Generation L M H P
- AU-14 Session Audit L M H P