This objective confirms that your system settings enforce the remote access conditions defined in your access control policies. It requires technical proof that only authorized users can remotely access systems containing Controlled Unclassified Information (CUI).