NIST SP 800-53: AC–17 Remote Access 3.1 3.1.12 Access Control
The special publication provides an overview of the importance and implementation of remote access controls.
The special publication provides an overview of the importance and implementation of remote access controls.
This NIST Special Publication covers identity proofing and authentication of users interacting with government IT systems over open networks.
This list covers NIST FAQs for Special Publication (SP) 800-63, Digital Identity Guidelines and provides additional clarification to stakeholders.
This NIST Special Publication offers recommendations for designing, configuring, and managing IPSec VPN solutions.
This NIST Special Publication covers IEEE 802.11i-based wireless LANs only.
This is a sample policy from Norfolk State University. This practice is intended to address policy and procedures for the use of external information systems in regard to access and information handling.
The NC policy describes common security controls (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels, web content filters, data loss prevention) and their application in controlling information flows. (See Section AC-4 – Information Flow Enforcement, p. 6)
A sample user access management policy for Northwestern Polytechnic
This article provides an in-depth overview of how to audit, detect and defend against specific privilege abuse actions in Windows.
In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience.