Skip to main content
Updates
from Policy

Access Control at CMS: Protecting information through smart, secure access

CMS’s Access Control (AC) program helps protect sensitive systems and information by managing how access is requested, approved, granted, monitored, and removed

Published on: 2/2/2026

2 minute read

What is Access Control (AC)?

At the Centers for Medicare & Medicaid Services (CMS), cybersecurity isn’t just about blocking threats—it’s also about ensuring that only the right people can access the right resources at the right time. CMS’s Access Control (AC) program helps protect sensitive systems and information by managing how access is requested, approved, granted, monitored, and removed.

Why AC matters

Access control is foundational to protecting the confidentiality, integrity, and availability of CMS systems and data. Strong access control helps CMS:

  • Prevent unauthorized access and misuse
  • Limit access based on job responsibilities (least privilege)
  • Support secure remote and mobile work
  • Detect unusual activity through logging and monitoring
  • Meet federal security requirements (including FISMA and NIST SP 800-53) and HHS/CMS policy

How CMS implements access control

CMS access control practices are aligned with federal and departmental policy, including HHS IS2P and CMS’s IS2P2, and implemented in accordance with CMS security requirements such as the Acceptable Risk Safeguards (ARS). CMS security leadership—including the CISO and ISSOs—supports consistent implementation across CMS environments.

Key features of the CMS Access Control program

Account management

  • Access is granted based on verified identity, role, and valid business need
  • Access requests require appropriate approvals and user readiness (e.g., required training and Rules of Behavior)
  • Accounts and privileges are reviewed regularly and updated or removed when no longer needed
  • Temporary, emergency, or guest access is time-limited and monitored

Strong authentication

  • CMS uses multi-factor authentication (MFA) and secure session controls
  • Timeouts and session protections reduce the risk of unauthorized use

Remote and mobile access

  • Remote access is provided through CMS-approved secure solutions (e.g., VPN or virtual desktop services)
  • Remote connections use FIPS-validated encryption and must meet CMS security requirements
  • Mobile and portable devices must follow strict access and encryption standards

Privileged access and separation of duties

  • Privileged accounts are restricted to authorized personnel and managed carefully
  • Administrative actions are logged and subject to oversight
  • Separation of duties reduces the risk of misuse and improves accountability

Monitoring and anomaly detection

  • Account activity is logged to support auditing and investigations
  • Suspicious activity can be flagged and escalated through CMS cybersecurity monitoring and incident response channels

Controlled information sharing

  • Access controls help manage how information flows within and between systems
  • External sharing is governed through approved agreements and secure transfer methods

Conclusion

CMS’s Access Control program helps protect systems and sensitive information by enforcing least privilege, strong authentication, secure remote access, and continuous oversight. Whether working onsite or remotely, following access control requirements is essential to maintaining trust and supporting CMS’s mission.


See all blog posts

About the publisher

The Information Security and Privacy Policy Team (also known as CMS CISO Team) manages the policies, standards, and guidance that keep information and systems safe at CMS. Our goal is to help you understand requirements and apply them effectively in your project environments – so you can focus on delivering value to CMS beneficiaries and customers.

View all posts by Policy