https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-06
NIST resource that defines the requirements for the principle of least privilege
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-05
This publication from NIST provides an overview of the AC-5 Separation of Duties Control.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-17
The special publication provides an overview of the importance and implementation of remote access controls.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.pdf
This NIST Special Publication covers identity proofing and authentication of users interacting with government IT systems over open networks.
https://pages.nist.gov/800-63-FAQ/
This list covers NIST FAQs for Special Publication (SP) 800-63, Digital Identity Guidelines and provides additional clarification to stakeholders.
NIST SP 800-97: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
3.1 3.1.16 3.1.17 Access Control
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf
This NIST Special Publication covers IEEE 802.11i-based wireless LANs only.
https://it.nc.gov/documents/statewide-policies/scio-access-control/download?attachment
The NC policy describes common security controls (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels, web content filters, data loss prevention) and their application in controlling information flows. (See Section AC-4 – Information Flow Enforcement, p. 6)
Northwestern Polytechnic – IT Access Control and User Access Management Policy
3.1 3.1.1 3.1.2 Access Control
https://www.nwpolytech.ca/leadership/policies/display?ID=320
A sample user access management policy for Northwestern Polytechnic
Palantir Blog – Windows Privilege Abuse: Auditing, Detection, and Defense
3.1 3.1.7 Access Control
https://blog.palantir.com/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e
This article provides an in-depth overview of how to audit, detect and defend against specific privilege abuse actions in Windows.