Access Control
22 controls in this family. Select a control for detailed guidance, implementation examples, and assessment questions.
3.1.1
Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
3.1.2
Limit system access to the types of transactions and functions that authorized users are permitted to execute.
3.1.4
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
3.1.5
Employ the principle of least privilege, including for specific security functions and privileged accounts.
3.1.7
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
3.1.10
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity
Need Complete CMMC Guidance?
Get full access to all controls, detailed implementation guidance, and expert support.
Request Full Access