STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-3 (7)
Access Control
Rev 5
Access Enforcement
CCI Identifiers (11)
CCI-002166
Defines the role-based access control policies to enforce over all subjects and objects.
CCI-002167
The organization defines the subjects over which the information system will enforce a role-based access control policy.
CCI-002168
The organization defines the objects over which the information system will enforce a role-based access control policy.
CCI-002169
Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles.
CCI-002170
Control access based upon organization-defined roles and users authorized to assume such roles.
CCI-002171
The information system enforces a role-based access control policy over organization-defined subjects.
deprecated
CCI-002172
The information system enforces a role-based access control policy over organization-defined objects.
deprecated
CCI-002173
Defines the roles authorized to control access based upon the role-based access control policy.
CCI-002174
Defines the users authorized to control access based upon the role-based access control policy.
CCI-002175
The information system controls access based upon organization-defined roles authorized to assume such roles, employing the organization-defined role-based access control policy.
deprecated
CCI-002176
The information system controls access based upon organization-defined users authorized to assume such roles, employing the organization-defined role-based access control policy.
deprecated
Linked STIG Checks (24)
Across 24 STIGs. Click to expand.
▶
Application Server Security Requirements Guide
1 check
▶
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
1 check
▶
Cisco ACI NDM Security Technical Implementation Guide
1 check
▶
Dell OS10 Switch NDM Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Device Management Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
1 check
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
HP FlexFabric Switch NDM Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
1 check
▶
HYCU Protege Security Technical Implementation Guide
1 check
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
Ivanti Connect Secure NDM Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
1 check
▶
Riverbed NetProfiler Security Technical Implementation Guide
1 check
▶
Soaring Software Solutions TCMax 9.x Security Technical Implementation Guide
1 check
▶
Symantec Edge SWG NDM Security Technical Implementation Guide
1 check
▶
Symantec ProxySG NDM Security Technical Implementation Guide
1 check
▶
Trend Micro TippingPoint NDM Security Technical Implementation Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
1 check
▶
VMware NSX 4.x Manager NDM Security Technical Implementation Guide
1 check
▶
VMware NSX Manager Security Technical Implementation Guide
1 check
▶
VMware NSX-T Manager NDM Security Technical Implementation Guide
1 check