Course Overview
Understand and implement essential access control measures to protect sensitive information, focusing on user permissions, authentication, and monitoring in compliance with CMMC.
Inside the Course
45 Lessons
Access Control (AC)
AC.L1-b.1.i Authorized Access Control - Why Behind
AC.L1-b.1.i Authorized Access Control - Evidence
AC.L1-b.1.ii Transaction & Function Control -Why Behind
AC.L1-b.1.ii Transaction & Function Control - Evidence
AC.L1-b.1.iii External Connections - Why Behind
AC.L1-b.1.iii External Connections - Evidence
AC.L1-b.1.iv Control Public Information - Why Behind
AC.L1-b.1.iv Control Public Information - Evidence
AC.L2-3.1.3 Control CUI Flow - Why Behind
AC.L2-3.1.3 Control CUI Flow - Evidence
AC.L2-3.1.4 Separation of Duties - Why Behind
AC.L2-3.1.4 Separation of Duties - Evidence
AC.L2-3.1.5 Least Privilege - Why Behind
AC.L2-3.1.5 Least Privilege - Evidence
AC.L2-3.1.6 Non-Privileged Account Use - Why Behind
AC.L2-3.1.6 Non-Privileged Account Use - Evidence
AC.L2-3.1.7 Privileged Functions - Why Behind
AC.L2-3.1.7 Privileged Functions-Evidence
AC.L2-3.1.8 Unsuccessful Logon Attempts - Why Behind
AC.L2-3.1.8 Unsuccessful Logon Attempts-Evidence
AC.L2-3.1.9 Privacy & Security Notices - Why Behind
AC.L2-3.1.9 Privacy & Security Notices - Evidence
AC.L2-3.1.10 Session Lock - Why Behind
AC.L2-3.1.10 Session Lock - Evidence
AC.L2-3.1.11-Session Termination - Why Behind
AC.L2-3.1.11-Session Termination - Evidence
AC.L2-3.1.12- Control Remote Access -Why Behind
AC.L2-3.1.12 Control Remote Access - Evidence
AC.L2-3.1.13 Remote Access Confidentiality - Why Behind
AC.L2-3.1.13 Remote Access Confidentiality - Evidence
AC.L2-3.1.14 Remote Access Routing - Why Behind
AC.L2-3.1.14 Remote Access Routing - Evidence
AC.L2-3.1.15 Privileged Remote Access - Why Behind
AC.L2-3.1.15 Privileged Remote Access - Evidence
AC.L2-3.1.16 Wireless Access Authorization - Why Behind
AC.L2-3.1.16 Wireless Access Authorization - Evidence
AC.L2-3.1.17 Wireless Access Protection - Why Behind
AC.L2-3.1.17 Wireless Access Protection - Evidence
AC.L2-3.1.18 Mobile Device Connection -Why Behind
AC.L2-3.1.18 Mobile Device Connection - Evidence
AC.L2-3.1.19 Encrypt CUI on Mobile - Why Behind
AC.L2-3.1.19 Encrypt CUI on Mobile - Evidence
AC.L2-3.1.21 Portable Storage Use - Why Behind
AC.L2-3.1.21 Portable Storage Use - Evidence