STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-3

Access ControlRev 5system

Access Enforcement

Baselines:LowModerateHigh

Control Statement

Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Supplemental Guidance

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains) in organizational systems. In addition to enforcing authorized access at the system level and recognizing that systems can host many applications and services in support of mission and business functions, access enforcement mechanisms can also be employed at the application and service level to provide increased information security and privacy. In contrast to logical access controls that are implemented within the system, physical access controls are addressed by the controls in the Physical and Environmental Protection ( [PE](#pe) ) family.

Related Controls (44)

AC-2AC-4AC-5AC-6AC-16AC-17AC-18AC-19AC-20AC-21AC-22AC-24AC-25AT-2AT-3AU-9CA-9CM-5CM-11IA-2IA-5IA-6IA-7IA-11IA-13MA-3MA-4MA-5MP-4PM-2PS-3PT-2PT-3SA-17SC-2SC-3SC-4SC-12SC-13SC-28SC-31SC-34SI-4SI-8

CCI Identifiers (1)

CCI-000213Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Linked STIG Checks (200)

Across 67 STIGs. Click to expand.