AC-03 Access Enforcement

Access Control

Low Moderate High

Description

The information system enforces assigned authorizations for controlling access to the system in accordance with applicable policy.\n

Supplemental Guidance

Access control policies (e.g., identity-based policies, role-based policies, rule-based policies) and associated access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the information system. In addition to controlling access at the information system level, access enforcement mechanisms are employed at the application level, when necessary, to provide increased information security for the organization. Consideration is given to the implementation of a controlled, audited, and manual override of automated mechanisms in the event of emergencies or other serious events. If encryption of stored information is employed as an access enforcement mechanism, the cryptography used is FIPS 140-2 (as amended) compliant. Related security control: SC-13.\n

Enhancements

\n

Compliance Mappings

ISO 27002:2022

5.18

SOC 2 TSC

CC6.1CC6.6CC6.6-POF2PI1.2-POF1PI1.2-POF2PI1.2-POF3

ISO 17799 (legacy)

11.2.411.4.5

COBIT 4.1 (legacy)

PO2.3AI2.4DS11.6