Cryptographic mechanisms exist to protect the confidentiality and integrity of remote access sessions (e.g., VPN).
Control Question
Assessment question for control validation
Are cryptographic mechanisms utilized to protect the confidentiality and integrity of remote access sessions (e.g., VPN)?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Core Control Designations
Special designations and baseline inclusions
MAD: NET-14.2
ESP Level 2: NET-14.2
ESP Level 3: NET-14.2