AC
Access Control
3
3.1.13
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
A remote access session involves logging in to the organization's network from a remote location such as home or an alternate work site. This remote access session must be secured using FIPS-validated cryptography to provide confidentiality and prevent anyone from capturing session information exchanges. Example As the IT administrator for your organization you are responsible for implementing a remote network access capability for users that work offsite. In order to provide session confidentiality, you decide to establish a TLS based Virtual Private Network mechanism. You chose a product that has completed FIPS validation. You require user authentication rather than mutual authentication, but you also set up two factor authentication based on a token passcode and a user PIN before the VPN is established.
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See [NIST CRYPTO]; [NIST CAVP]; [NIST CMVP]; National Security Agency Cryptographic Standards.
N/A
CIS Controls v7.1 15.7, 15.8
NIST SP 800-53 Rev 4 AC-17(2)
NIST SP 800-171 Rev 1 3.1.13
NIST CSF v1.1 PR.AC-3, PR.PT-4
CERT RMM v1.2 KIM:SG4.SP1
AC.3.014.[a] cryptographic mechanisms to protect the confidentiality of remote access sessions are identified; and
AC.3.014.[b] cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented.