Employ automated mechanisms to monitor and control remote access methods.
Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2 . Audit events are defined in AU-2a.
automated mechanisms are employed to monitor remote access methods; automated mechanisms are employed to control remote access methods.
No cross-framework mappings available