STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-17 (10)

Access ControlRev 5system

Remote Access

Control Statement

Implement [Assignment: mechanisms] to authenticate [Assignment: remote commands].

Supplemental Guidance

Authenticating remote commands protects against unauthorized commands and the replay of authorized commands. The ability to authenticate remote commands is important for remote systems for which loss, malfunction, misdirection, or exploitation would have immediate or serious consequences, such as injury, death, property damage, loss of high value assets, failure of mission or business functions, or compromise of classified or controlled unclassified information. Authentication mechanisms for remote commands ensure that systems accept and execute commands in the order intended, execute only authorized commands, and reject unauthorized commands. Cryptographic mechanisms can be used, for example, to authenticate remote commands.

Related Controls (3)

SC-12SC-13SC-23

CCI Identifiers (3)

CCI-003749Defines the remote commands used for implementing organization-defined mechanisms.CCI-003748Defines the mechanisms used to authenticate organization-defined remote commands.CCI-003747Implement organization-defined mechanisms to authenticate organization-defined remote commands.

Linked STIG Checks (3)

Across 3 STIGs. Click to expand.