ARTIFACTS

AC: ACCESS CONTROL

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for Access Control (AC); and documents that are widely used in the assessment of controls and control enhancements in the Access Control (AC) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR ACCESS CONTROL
Access Control POLICY & PROCEDURES (AC)
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of Access Control related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Access control policy AC-9 (4)
Access control POLICY & PROCEDURES AC-1
Discretionary access control policies AC-3 (4)
Incident handling policy AC-19 (4)
Information flow control policies AC-4
AC-4 (1)
AC-4 (2)
AC-4 (3)
AC-4 (4)
AC-4 (5)
AC-4 (6)
AC-4 (7)
AC-4 (8)
AC-4 (9)
AC-4 (10)
AC-4 (11)
AC-4 (12)
AC-4 (13)
AC-4 (14)
AC-4 (15)
AC-4 (17)
AC-4 (18)
AC-4 (19)
AC-4 (20)
AC-4 (21)
AC-4 (22)
AC-16 (7)
Information flow enforcement policy AC-4 (18)
AC-4 (19)
AC-4 (20)
AC-4 (21)
AC-4 (22)
Information flow information policies AC-4 (10)
Mandatory access control policies AC-3 (3)
Privacy and security policies AC-8
Role-based access control policies AC-3 (7)
Procedures addressing access control decisions AC-24
Procedures addressing access control for mobile device usage (including restrictions) AC-19
Procedures addressing access control for mobile devices AC-19 (4)
AC-19 (5)
Procedures addressing access enforcement AC-16 (7)
AC-24 (2)
AC-25
AC-3
AC-3 (10)
AC-3 (3)
AC-3 (4)
AC-3 (5)
AC-3 (7)
AC-3 (8)
AC-3 (9)
Procedures addressing access enforcement and dual authorization AC-3 (2)
Procedures addressing account management AC-2
AC-2 (1)
AC-2 (10)
AC-2 (11)
AC-2 (12)
AC-2 (13)
AC-2 (2)
AC-2 (3)
AC-2 (4)
AC-2 (5)
AC-2 (6)
AC-2 (7)
AC-2 (8)
AC-2 (9)
Procedures addressing association of security attributes to information AC-16 (8)
Procedures addressing association of security attributes with subjects and objects AC-16 (6)
Procedures addressing concurrent session control AC-10
Procedures addressing configuration of security attributes by authorized individuals AC-16 (10)
Procedures addressing consistent interpretation of security attributes transmitted between distributed information system components AC-16 (7)
Procedures addressing data mining techniques AC-23
Procedures addressing disconnecting or disabling remote access to the information system AC-17 (9)
Procedures addressing display of security attributes in human-readable form AC-16 (5)
Procedures addressing divisions of responsibility and separation of duties AC-5
Procedures addressing dynamic association of security attributes to information AC-16 (1)
Procedures addressing IDENTIFICATION & AUTHENTICATION AC-11
Procedures addressing information flow enforcement AC-4 (1)
AC-4 (2)
AC-4 (3)
AC-4 (4)
AC-4 (5)
AC-4 (6)
AC-4 (7)
AC-4 (8)
AC-4 (9)
AC-4 (10)
AC-4 (11)
AC-4 (12)
AC-4 (13)
AC-4 (14)
AC-4 (15)
AC-4 (17)
AC-4 (18)
AC-4 (19)
AC-4 (20)
AC-4 (21)
AC-4 (22)
AC-16 (7)
Procedures addressing least privilege AC-6
AC-6 (1)
AC-6 (10)
AC-6 (2)
AC-6 (3)
AC-6 (4)
AC-6 (5)
AC-6 (6)
AC-6 (7)
AC-6 (8)
AC-6 (9)
Procedures addressing permitted actions without identification or authentication AC-14
Procedures addressing previous logon notification AC-9
AC-9 (1)
AC-9 (2)
AC-9 (3)
AC-9 (4)
Procedures addressing protection of data storage objects against data mining AC-23
Procedures addressing publicly accessible content AC-22
Procedures addressing reassignment of security attributes to information AC-16 (9)
Procedures addressing remote access implementation and usage (including restrictions) AC-17
Procedures addressing remote access to the information system AC-17 (1)
AC-17 (2)
AC-17 (3)
AC-17 (4)
AC-17 (6)
Procedures addressing session lock AC-11
AC-11 (1)
Procedures addressing session termination AC-12
Procedures addressing session termination AC-12 (1)
Procedures addressing source and destination domain IDENTIFICATION & AUTHENTICATION AC-4 (17)
Procedures addressing system use notification AC-8
Procedures addressing the association of security attributes to information AC-16 (3)
AC-16 (4)
Procedures addressing the association of security attributes to information in storage, in process, and in transmission AC-16
Procedures addressing the change of security attribute values AC-16 (2)
Procedures addressing the use of external information systems AC-20
AC-20 (1)
AC-20 (2)
AC-20 (3)
Procedures addressing unsuccessful login attempts on mobile devices AC-7 (2)
Procedures addressing unsuccessful logon attempts AC-7
Procedures addressing use of network accessible storage devices in external information systems AC-20 (4)
Procedures addressing user-based collaboration and information sharing (including restrictions) AC-21
AC-21 (1)
AC-21 (2)
Procedures addressing wireless access implementation and usage (including restrictions) AC-18
Procedures addressing wireless implementation and usage (including restrictions) AC-18 (1)
AC-18 (3)
AC-18 (3)
AC-18 (4)
AC-18 (5)

Evidence, Records & Artifacts

Here you'll find a catalog of Access Control related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Access authorization records AC-2
Account access termination records AC-2 (10)
Account management compliance reviews AC-2
Account management documents AC-20 (1)
AC-20 (2)
AC-20 (3)
Approved configuration baselines AC-4 (20)
Audit tracking and monitoring reports AC-2 (7)
AC-2 (12)
Authorizations for mobile device connections to organizational information systems AC-19
Conditions for employing audited override of automated access control mechanisms AC-3 (10)
Configuration management plan AC-17
AC-18
AC-19
Cryptographic mechanisms and associated configuration documentation AC-17 (2)
Display screen with session lock activated AC-11 (1)
Documented approval of information system use notification messages or banners AC-8
Encryption mechanism s and associated configuration documentation AC-19 (5)
Evidentiary documentation for random inspections and reviews of mobile devices AC-19 (4)
External information systems terms and conditions AC-20
Information search and retrieval records AC-21 (2)
Information system access authorizations AC-5
Information system audit logs AC-23
Information system baseline configuration AC-4
Information system configuration settings and associated documentation AC-10
Information system connection or processing agreements AC-20 (1)
AC-20 (2)
AC-20 (3)
AC-20 (4)
Information system hardware mechanisms and associated configurations AC-4 (7)
Information system monitoring records AC-17 (1)
Information system monitoring records AC-2
AC-2 (7)
AC-2 (12)
Information system monitoring records AC-2 (7)
Information system notification messages AC-9
Information system security architecture and associated documentation AC-4 (2)
AC-4 (3)
Information system use notification messages AC-8
Maximum security categorization for information processed, stored, or transmitted on external information systems AC-20
Notifications or records of recently transferred, separated, or terminated employees AC-2
Notifications/alerts of account creation, modification, enabling, disabling, and removal actions AC-2 (4)
Records of actions taken when privileged role assignments are no longer appropriate AC-2 (7)
Records of human reviews regarding information flows AC-4 (9)
Records of privilege removals or reassignments for roles or classes of users AC-6 (7)
Records of publicly accessible information reviews AC-22
Records of response to nonpublic information on public websites AC-22
Remote access authorizations AC-17
Role-based access control policies AC-3 (7)
Rules governing revocation of access authorizations, information system audit records AC-3 (8)
Security awareness training records AC-22
Security violation reports AC-2 (5)
Special dissemination, handling, or distribution instructions AC-16 (5)
System audit logs AC-22
Training materials and/or records AC-22
Types of human-readable, standard naming conventions AC-16 (5)
Types of metadata used to enforce information flow control decisions AC-4 (6)
User acknowledgements of notification message or banner AC-8
User logout messages AC-12 (1)
Validation reviews of privileges assigned to roles or classes or users AC-6 (7)
Wireless access authorizations AC-18

Access Control Related Lists

These are the Access Control (AC) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
Information system-generated list of emergency accounts removed and/or disabled AC-2 (2)
AC-2 (3)
Information system-generated list of privileged user accounts and associated role AC-2 (7)
Information system-generated list of temporary accounts removed and/or disabled AC-2 (2)
AC-2 (3)
List of actions requiring dual authorization AC-3 (2)
List of active system accounts along with the name of the individual associated with each account AC-2
List of all managed network access control points AC-17 (3)
List of approved authorizations (user privileges) AC-3
AC-3 (2)
List of assigned access authorizations (user privileges) AC-6
List of audited events AC-6 (9)
List of binding techniques to bind security attributes to information AC-4 (18)
List of conditions for group and role membership AC-2
List of conditions or trigger events requiring session disconnect AC-12
List of conditions requiring human reviews for information flows AC-4 (9)
List of data content policy filters AC-4 (14)
List of data type identifiers AC-4 (12)
List of divisions of responsibility and separation of duties AC-5
List of individuals authorized to change security attributes AC-16 (2)
List of information flow authorizations AC-4
List of information sharing circumstances requiring user discretion AC-21
List of limitations to be enforced on embedding data types within other data types AC-4 (5)
List of mechanisms and/or techniques used to logically or physically separate information flows AC-4 (21)
List of mobile devices to be purged/wiped after organization-defined consecutive, unsuccessful device logon attempts AC-7 (2)
List of network accessible storage devices prohibited from use in external information systems AC-20 (4)
List of non-organizational users AC-6 (6)
List of operational needs for authorizing network access to privileged commands AC-6 (3)
List of privileged commands requiring dual authorization AC-3 (2)
List of privileged functions and associated user account assignments AC-6 (10)
List of privileged functions to be audited AC-6 (9)
List of purging/wiping requirements or techniques for mobile devices AC-7 (2)
List of recently disabled information system accounts along with the name of the individual associated with each account AC-2
List of required separation of information flows by information types AC-4 (21)
List of roles, users, and associated privileges required to control information system access AC-3 (7)
List of security attributes and associated information, source, and destination objects enforcing information flow control policies AC-4 (1)
List of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized AC-6 (1)
List of security policy filtering criteria applied to metadata and data payloads AC-4 (19)
List of security policy filters AC-4 (11)
AC-4 (14)
List of security policy filters enabled/disabled by privileged administrators AC-4 (10)
List of security policy filters regulating flow control decisions AC-4 (8)
List of security safeguards provided by receiving information system or system components AC-3 (9)
List of security safeguards validating appropriateness of information designated for release AC-3 (9)
List of software that should not execute at higher privilege levels than users executing software AC-6 (8)
List of solutions in approved configurations AC-4 (20)
List of subjects and objects (i.e., users and resources) requiring enforcement of discretionary access control policies AC-3 (4)
List of subjects and objects (i.e., users and resources) requiring enforcement of mandatory access control policies AC-3 (3)
List of system administration personnel AC-6 (5)
List of system-generated privileged accounts AC-6 (5)
AC-6 (6)
List of system-generated roles or classes of users and assigned privileges AC-6 (7)
List of system-generated security functions or security-relevant information assigned to information system accounts or roles AC-6 (2)
List of types of applications accessible from external information systems AC-20
List of unsanctioned information types and associated information AC-4 (15)
List of user actions that can be performed without identification or authentication AC-14
List of user activities posing significant organizational risk AC-2 (13)
List of users authorized to associate security attributes to information AC-16 (4)
List of users authorized to make information sharing/collaboration decisions AC-21
List of users authorized to post publicly accessible content on organizational information systems AC-22
System-generated list of access restrictions regarding information to be shared AC-21 (1)
AC-21 (2)
System-generated list of disabled accounts AC-2 (13)
System-generated list of dynamic privilege management capabilities AC-2 (6)
System-generated list of information system accounts AC-2 (8)
System-generated list of information system accounts and associated assignments of usage circumstances and/or usage conditions AC-2 (11)
System-generated list of shared/group accounts and associated role AC-2 (9)
System-generated list of sharing partners and access authorizations AC-21 (1)
System-generated list of users authorized to make information sharing/collaboration decisions AC-21 (1)
Go to The List of Lists