Skip to content

Access Control

Access Control is the largest family — 22 requirements. It’s also where the most gaps are found during assessments.

Who and What (3.1.1–3.1.7) — Who has access, what they can do, least privilege, separation of duties, and logging admin work.

Session Controls (3.1.8–3.1.11) — Locking out failed logins, login banners, auto-lock, and session termination.

Remote Access (3.1.12–3.1.15) — Monitoring remote connections, encrypting them, routing through managed gateways, controlling remote admin.

Wireless & Mobile (3.1.16–3.1.19) — Authorizing wireless, encrypting it, managing mobile devices, encrypting CUI on portable devices.

External & Media (3.1.20–3.1.22) — Controlling connections to outside systems, USB drives, and keeping CUI off public systems.


RefShort NameWhat It Covers
3.1.1Who Gets InOnly approved users, processes, and devices access systems
3.1.2What They Can DoUsers only do what their role allows
3.1.3Where CUI Can FlowCUI only moves between approved locations
3.1.4No One Person Runs the ShowSplit critical duties between people
3.1.5Minimum NecessaryLeast access needed for the job
3.1.6Two Hats, Two AccountsAdmins use regular accounts for everyday tasks
3.1.7Log the Admin WorkBlock standard users from admin; log all admin actions
3.1.8Lock After Failed LoginsAccount lockout after failed attempts
3.1.9The Warning BannerLegal notice at every login screen
3.1.10Lock the ScreenAuto-lock after inactivity, hide data
3.1.11End the SessionSessions terminate automatically
3.1.12Eyes on Remote AccessMonitor and control every remote connection
3.1.13Encrypt Remote SessionsFIPS-validated encryption on all remote access
3.1.14One Front DoorAll remote access through a managed gateway
3.1.15Admin Commands Over the WireLimit which admin tasks can happen remotely
3.1.16Wi-Fi Approval FirstDevices approved before wireless connection
3.1.17Lock Down the Wi-FiEnterprise authentication and FIPS encryption
3.1.18Mobile Device ControlEvery phone and tablet registered and managed
3.1.19Encrypt CUI on MobileFull disk encryption on every portable device
3.1.20Control Outside ConnectionsMap and control every external connection
3.1.21USB Drives Under ControlCompany-owned encrypted drives only
3.1.22Keep CUI Off Public SystemsReview process before publishing anything