NIST 800-171_3.1.12

NIST 800-171

3.1 ACCESS CONTROL

3.1.12

Monitor and control remote access sessions

Remote access is access to organizational systems by users (or processes acting on behalf of users) communicating through external networks (e.g. the Internet). Remote access methods includedial-up broadband and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality over remote connections. The use of encrypted VPNs does not make the access non-remote; however the use of VPNs when adequately provisioned with appropriate control (e.g. employing encryption techniques for confidentiality protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. VPNs with encrypted tunnels can affect the capability to adequately monitor network communications traffic for malicious code.Automated monitoring and control of remote access sessions allows organizations to detect cyber-attacks and help to ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of system components (e.g. servers workstations notebook computers smart phones and tablets).[SP 800-46] [SP 800-77] and [SP 800-113] provide guidance on secure remote access and virtual private networks.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video