
Facilitating Information Security Compliance ■ 135
T
ABLE 5-5 Minimum Security Control Requirements
(continued)
C
LASS FAMILY S
PECIFIC SECURITY CONTROLS
13. Supervision and Review—
Access Control
14. Permitted Actions Without
Identification or Authentication
15. Automated Marking
16. Automated Labeling
17. Remote Access
18. Wireless Access Restrictions
19. Access Control for Portable and
Mobile Systems
20. Personally Owned Information
Systems
Audit and 1. Audit and Accountability
Accountability Policy and Procedures
2. Auditable Events
3. Content of Audit Records
4. Audit Storage Capacity
5. Audit Processing
6. Audit Monitoring, Analysis,
and Reporting
7. Audit ...