These pages are classified as INTERNAL. All information contained herein is confidential to 38North Security. Do NOT share this information or any subset of it outside of 38North Security without the permission of the 38North Security President and confirmation that a valid NDA is in place.
AC-1 ACCESS CONTROL POLICY AND PROCEDURES
AC-2 (1) ACCOUNT MANAGEMENT | AUTOMATED SYSTEM ACCOUNT MANAGEMENT
AC-2 (2) ACCOUNT MANAGEMENT | REMOVAL OF TEMPORARY / EMERGENCY ACCOUNTS
AC-2 (3) ACCOUNT MANAGEMENT | DISABLE INACTIVE ACCOUNTS
AC-2 (4) ACCOUNT MANAGEMENT | AUTOMATED AUDIT ACTIONS
AC-2 (5) ACCOUNT MANAGEMENT | INACTIVITY LOGOUT
AC-2 (7) ACCOUNT MANAGEMENT | ROLE-BASED SCHEMES
AC-2 (9) ACCOUNT MANAGEMENT | RESTRICTIONS ON USE OF SHARED GROUPS / ACCOUNTS
AC-2 (10) ACCOUNT MANAGEMENT | SHARED / GROUP ACCOUNT CREDENTIAL TERMINATION
AC-2 (11) ACCOUNT MANAGEMENT | USAGE CONDITIONS
AC-2 (12) ACCOUNT MANAGEMENT | ACCOUNT MONITORING / ATYPICAL USAGE
AC-2 (13) ACCOUNT MANAGEMENT | DISABLE ACCOUNTS FOR HIGH-RISK INDIVIDUALS
AC-4 INFORMATION FLOW ENFORCEMENT
AC-4 (8) INFORMATION FLOW ENFORCEMENT | SECURITY POLICY FILTERS
AC-4 (21) INFORMATION FLOW ENFORCEMENT | PHYSICAL / LOGICAL SEPARATION OF INFORMATION FLOWS
AC-6 (1) LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS
AC-6 (2) LEAST PRIVILEGE | NON-PRIVILEGED ACCESS FOR NONSECURITY FUNCTIONS
AC-6 (3) LEAST PRIVILEGE | NETWORK ACCESS TO PRIVILEGED COMMANDS
AC-6 (5) LEAST PRIVILEGE | PRIVILEGED ACCOUNTS
AC-6 (7) LEAST PRIVILEGE | REVIEW OF USER PRIVILEGES
AC-6 (8) LEAST PRIVILEGE | PRIVILEGE LEVELS FOR CODE EXECUTION
AC-6 (9) LEAST PRIVILEGE | AUDITING USE OF PRIVILEGED FUNCTIONS
AC-6 (10) LEAST PRIVILEGE | PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS
AC-7 UNSUCCESSFUL LOGON ATTEMPTS
AC-7 (2) UNSUCCESSFUL LOGON ATTEMPTS | PURGE / WIPE MOBILE DEVICE
AC-10 CONCURRENT SESSION CONTROL
AC-11 (1) SESSION LOCK | PATTERN-HIDING DISPLAYS
AC-12 (1) SESSION TERMINATION | USER-INITIATED LOGOUTS / MESSAGE DISPLAYS
AC-14 PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
AC-17 (1) REMOTE ACCESS | AUTOMATED MONITORING / CONTROL
AC-17 (2) REMOTE ACCESS | PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION
AC-17 (3) REMOTE ACCESS | MANAGED ACCESS CONTROL POINTS
AC-17 (4) REMOTE ACCESS | PRIVILEGED COMMANDS / ACCESS
AC-17 (9) REMOTE ACCESS | DISCONNECT / DISABLE ACCESS
AC-18 (1) WIRELESS ACCESS | AUTHENTICATION AND ENCRYPTION
AC-18 (3) WIRELESS ACCESS | DISABLE WIRELESS NETWORKING
AC-18 (4) WIRELESS ACCESS | RESTRICT CONFIGURATIONS BY USERS
AC-18 (5) WIRELESS ACCESS | ANTENNAS / TRANSMISSION POWER LEVELS
AC-19 ACCESS CONTROL FOR MOBILE DEVICES
AC-19 (5) ACCESS CONTROL FOR MOBILE DEVICES | FULL DEVICE / CONTAINER-BASED ENCRYPTION
AC-20 USE OF EXTERNAL INFORMATION SYSTEMS
AC-20 (1) USE OF EXTERNAL INFORMATION SYSTEMS | LIMITS ON AUTHORIZED USE
AC-20 (2) USE OF EXTERNAL INFORMATION SYSTEMS | PORTABLE STORAGE DEVICES