CMMC Practice AC3014; Requirements and Documentation | ChatFortress


Posted on June 19, 2021 by Benjamin Bressington


CMMC Practice AC3014; Requirements and Documentation | ChatFortress
Back to Full CMMC & NIST800-171 Requirements List

CMMC Practice Requirement:

Access Control - AC.3.014

Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.

Access Control - AC.3.014 Clarification Statement

A remote access session involves logging in to the organization’s network from a remote location such as home or an alternate work site. This remote access session must be secured using FIPS-validated cryptography to provide confidentiality and prevent anyone from capturing session information exchanges.

Got CMMC and NIST800-171 Questions?

Let us help you get your CMMC and NIST800-171 questions answer by our security experts. Schedule a time to speak with one of our team members here.

Need more help understanding this CMMC & NIST800-171 requirement?

ChatFortress has made available a series of tools to help you implement CMMC & NIST800-171 into your company. Here are some of the resources you might want to review.


Search
Cybersecurity Resources

Talk to Us

Reduce your cybersecurity risk and exposure. Schedule time with your ChatFortress Specialist now
or Call 307-999-7755

commoncybersecuritymistakes
Cybersecurity Education Links

Common Cybersecurity Mistakes and how you can protect yourself and your business from liability and financial loss! Instant Webinar Access!

Schedule Your Free Cybersecurity Risk Assessment Click Here to Schedule Call

Discover current hacker trends to steal your data and how you can protect yourself in 7 day FREE Email Cybersecurity crash course

Here are the 8 common types of email phishing attacks that hackers use to steal your identity. Are you protected?

Protect your business from hackersCrash Coursesmall business cybersecurity protectionHackerssmall business cybersecurity protection8typesofemailphishingscamssmall business cybersecurity protectionCMMC Compliance Check ListCybersecurity For Business