STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-23
Access Control
Rev 5
Data Mining Protection
CCI Identifiers (5)
CCI-002343
Defines the data mining prevention techniques to be employed to protect organization-defined data storage objects against data mining.
CCI-002344
Defines the data mining detection techniques to be employed to detect data mining attempts against organization-defined data storage objects.
CCI-002345
Defines the data storage objects that are to be protected against data mining attempts.
CCI-002346
Employ organization-defined data mining prevention techniques for organization-defined data storage objects to protect against unauthorized data mining.
CCI-002347
Employ organization-defined data mining detection techniques for organization-defined data storage objects to detect data mining attempts.
Linked STIG Checks (102)
Across 24 STIGs. Click to expand.
▶
A10 Networks ADC ALG Security Technical Implementation Guide
6 checks
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
6 checks
▶
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
6 checks
▶
Application Security and Development Security Technical Implementation Guide
2 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
6 checks
▶
DBN-6300 IDPS Security Technical Implementation Guide
5 checks
▶
F5 BIG-IP Application Security Manager Security Technical Implementation Guide
6 checks
▶
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
6 checks
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
3 checks
▶
IBM DataPower ALG Security Technical Implementation Guide
6 checks
▶
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
1 check
▶
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
6 checks
▶
Intrusion Detection and Prevention Systems Security Requirements Guide
6 checks
▶
Juniper SRX Services Gateway IDPS Security Technical Implementation Guide
6 checks
▶
Juniper SRX SG IDPS Security Technical Implementation Guide
12 checks
▶
Network Infrastructure Policy Security Technical Implementation Guide
1 check
▶
Palo Alto Networks ALG Security Technical Implementation Guide
2 checks
▶
Palo Alto Networks IDPS Security Technical Implementation Guide
2 checks
▶
Symantec Edge SWG ALG Security Technical Implementation Guide
1 check
▶
Tanium 7.0 Security Technical Implementation Guide
2 checks
▶
Tanium 7.3 Security Technical Implementation Guide
2 checks
▶
Tanium 7.x Security Technical Implementation Guide
2 checks
▶
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
6 checks