The organization establishes usage restrictions and implementation guidance for each allowed remote access method.
No STIG checks reference this CCI.