AC-08 System Use Notification

Access Control

Low Moderate High

Description

The information system displays an approved, system use notification message before granting system access informing potential users: (i) that the user is accessing a U.S. Government information system; (ii) that system usage may be monitored, recorded, and subject to audit; (iii) that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and (iv) that use of the system indicates consent to monitoring and recording. The system use notification message provides appropriate privacy and security notices (based on associated privacy and security policies or summaries) and remains on the screen until the user takes explicit actions to log on to the information system.

Supplemental Guidance

Privacy and security policies are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notification messages can be implemented in the form of warning banners displayed when individuals log in to the information system. For publicly accessible systems: (i) the system use information is available and when appropriate, is displayed before granting access; (ii) any references to monitoring, recording, or auditing are in keeping with privacy accommodations for such systems that generally prohibit those activities; and (iii) the notice given to public users of the information system includes a description of the authorized uses of the system.

Enhancements

(0) None.

MITRE ATT&CK Techniques (1)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Initial Access 1

Compliance Mappings

ISO 27002:2022

5.15

COBIT 2019

DSS05

NIS2 Directive

Art. 21(2)(i)

MAS TRM

9

BSI IT-Grundschutz

ORP.4

ANSSI

SecNumCloud.10.1

FINMA Circular 2023/1

IV.B.d(59)

OSFI B-13

B-13.3.2

EU GDPR

Art.12(1)Art.13(1)

EU DORA

Art.9(4)(c)

BIO2

5.15

RBI CSF

Annex1.8

FISC Security Guidelines

FISC.T2

LGPD + BCB 4893

LGPD.Art.9

SAMA CSF

3.1

NCA ECC

2-2

UAE IA

T9

CBB TM

TM-6

Qatar NIA

AC

CBUAE

CR-4

CBE CSF

CTO-1

BoG CISD

CISD-VIII

POPIA

s18

BoM CTRM

3.3

IOSCO Cyber Resilience

PROT-1

FFIEC IS

II.C.15

BOT Cyber Resilience

Ch2.2

CMMC 2.0

AC

Common Criteria

CC Part 2 — FRU/FTA/FTP

Lloyd's Minimum Standards

MS8.3

HITRUST CSF v11

01.c

ISO 27799

9.5

ISO 17799 (legacy)

11.5.115.1.5

COBIT 4.1 (legacy)

None.