NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY

SI-3(9)Authenticate Remote Commands

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Authenticate remote commands before executing them to prevent attackers from sending unauthorized instructions to your systems.

Example 1: Configure Windows Remote Management (WinRM) to require Kerberos authentication. Remote PowerShell sessions must authenticate with valid domain credentials before any commands are accepted. Do not allow basic authentication or unencrypted connections.

Example 2: For SSH access to Linux servers, disable password authentication and require SSH key-based authentication with a passphrase. This ensures only users with the correct private key can issue remote commands.