10 Things Most People Don't Know About Recommended Security Controls For Federal Information Systems
REMOTE ACCESS PROTECTION OF CONFIDENTIALITYINTEGRITY USING ENCRYPTION ASSESSMENT OBJECTIVEDetermineif the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.