STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-4
Access Control
Rev 5
Information Flow Enforcement
CCI Identifiers (6)
CCI-001368
Enforce approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies.
CCI-001414
Enforce approved authorizations for controlling the flow of information between connected systems based on organization-defined information flow control policies.
CCI-001548
Defines the information flow control policies for controlling the flow of information within the system.
CCI-001549
Defines the information flow control policies for controlling the flow of information between interconnected systems.
CCI-001550
The organization defines approved authorizations for controlling the flow of information within the system.
CCI-001551
The organization defines approved authorizations for controlling the flow of information between interconnected systems.
Linked STIG Checks (200)
Across 35 STIGs. Click to expand.
▶
A10 Networks ADC NDM Security Technical Implementation Guide
1 check
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
5 checks
▶
Application Layer Gateway Security Requirements Guide
4 checks
▶
Application Security and Development Security Technical Implementation Guide
2 checks
▶
ArcGIS for Server 10.3 Security Technical Implementation Guide
1 check
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
11 checks
▶
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
19 checks
▶
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
19 checks
▶
Arista Multilayer Switch DCS-7000 Series L2S Security Technical Implementation Guide
2 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
2 checks
▶
Cisco ACI Router Security Technical Implementation Guide
7 checks
▶
Cisco ASA Firewall Security Technical Implementation Guide
2 checks
▶
Cisco ASA NDM Security Technical Implementation Guide
1 check
▶
Cisco ASA VPN Security Technical Implementation Guide
1 check
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Router RTR Security Technical Implementation Guide
21 checks
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
7 checks
▶
Cisco IOS XE Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
21 checks
▶
Cisco IOS XE Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
16 checks
▶
Cisco IOS XR Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
20 checks
▶
Cisco NX OS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
15 checks
▶
Citrix Virtual Apps and Desktop 7.x Delivery Controller Security Technical Implementation Guide
1 check
▶
Citrix Virtual Apps and Desktop 7.x Linux Virtual Delivery Agent Security Technical Implementation Guide
1 check
▶
Citrix Virtual Apps and Desktop 7.x Windows Virtual Delivery Agent Security Technical Implementation Guide
1 check
▶
Citrix XenDesktop 7.x Windows VDA Security Technical Implementation Guide
1 check
▶
Container Platform Security Requirements Guide
2 checks
▶
Dell OS10 Switch NDM Security Technical Implementation Guide
1 check
▶
Dell OS10 Switch Router Security Technical Implementation Guide
8 checks