STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-17 (1)

Access ControlRev 5organization

Remote Access

Baselines:ModerateHigh

Control Statement

Employ automated mechanisms to monitor and control remote access methods.

Supplemental Guidance

Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by [AU-2](#au-2) . Audit events are defined in [AU-2a](#au-2_smt.a).

Related Controls (4)

AU-2AU-6AU-12AU-14

CCI Identifiers (3)

CCI-000067Employ automated mechanisms to monitor remote access methods.CCI-002313The information system controls remote access methods.deprecatedCCI-002314Employ automated mechanisms to control remote access methods.

Linked STIG Checks (200)

Across 90 STIGs. Click to expand.