NIST 800-53 REV 5 • ACCESS CONTROL

AC-3(6)Protection of User and System Information

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

This is about protecting both user data and system data from unauthorized access. The system should not expose sensitive information like passwords, encryption keys, or personal data to anyone not explicitly authorized.

Example 1: In Windows, configure the registry at HKLM\SYSTEM\CurrentControlSet\Control\Lsa → RestrictAnonymous to value 1 to prevent anonymous enumeration of SAM accounts and shares. This stops attackers from listing user accounts without credentials.

Example 2: In your web applications, ensure API endpoints that return user data apply authorization checks at the controller level. Use middleware like ASP.NET's [Authorize(Roles = "Admin")] attribute or Django's @permission_required decorator. Never rely solely on hiding the URL.