This objective ensures your organization’s remote access connections are not only documented—but actually encrypted and enforced in live operation, especially for systems that process, store, or transmit Controlled Unclassified Information (CUI).
This objective ensures your organization’s remote access connections are not only documented—but actually encrypted and enforced in live operation, especially for systems that process, store, or transmit Controlled Unclassified Information (CUI).