AC-17 Remote Access

Access Control

Low Moderate High

Description

The organization authorizes, monitors, and controls all methods of remote access to the information system.

Supplemental Guidance

Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Remote access controls are applicable to information systems other than public web servers or systems specifically designed for public access. The organization restricts access achieved through dial-up connections (e.g., limiting dial-up access based upon source of request) or protects against unauthorized connections or subversion of authorized connections (e.g., using virtual private network technology). NIST Special Publication 800-63 provides guidance on remote electronic authentication. If the federal Personal Identity Verification (PIV) credential is used as an identification token where cryptographic token-based access control is employed, the access control system conforms to the requirements of FIPS 201 and NIST Special Publications 800-73 and 800-78. NIST Special Publication 800-77 provides guidance on IPsec-based virtual private networks. Related security control: IA-02.

Changes from Rev 4

Changes control text from 'remote access' to 'each type of remote access' Adds 'information exchange' and other minor wording in discussion

MITRE ATT&CK Techniques (81)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Initial Access 2 Execution 13 Persistence 13 Privilege Escalation 8 Defense Evasion 9 Credential Access 12 Discovery 3 Lateral Movement 12 Collection 15 Command & Control 2 Exfiltration 4 Impact 3
Show all 81 techniques grouped by tactic

Compliance Mappings

ISO 27001:2022

A.5.15A.6.7A.7.9

ISO 27002:2022

5.145.156.77.9

COBIT 2019

DSS05

CIS Controls v8

CIS 12.3CIS 12.6CIS 12.7CIS 13.5CIS 14.8CIS 4.6CIS 6CIS 6.4

NIST CSF 2.0

PR.DS-02PR.IR-01

SOC 2 TSC

CC6.6CC6.6-POF3

PCI DSS v4.0.1

2.2.7

CSA CCM v4

HRS-04

CSA AICM v1

HRS-04

FINOS CCC

CCC-C05

NIS2 Directive

Art. 21(2)(i)

MAS TRM

149

APRA CPS 234

Para 22-23

ASD Essential Eight

E8-7 ML2

BSI IT-Grundschutz

CON.7OPS.1.2.4ORP.4

ANSSI

Hygiene.24Hygiene.28SecNumCloud.10.7SecNumCloud.14.2

FINMA Circular 2023/1

IV.B.d(59)IV.C(62)IV.C(63)

OSFI B-13

B-13.3.2

EU GDPR

Art.32(1)(a)Art.32(1)(b)Art.44

EU DORA

Art.9(4)(a)Art.9(4)(c)

BIO2

5.145.156.77.9

RBI CSF

Annex1.8ITGRCA.20

FISC Security Guidelines

FISC.T10FISC.T3FISC.T8

LGPD + BCB 4893

BCB.PIXLGPD.Art.33-36

HKMA TM-E-1

TME1.10.1TME1.8.5

MLPS 2.0

8.1.3.1

DNB Good Practice

DNB.18.4

EU CRA

CRA.I.2d

SWIFT CSCF

SWIFT.2.6

SAMA CSF

3.13.33.8

NCA ECC

2-2

UAE IA

T8T9

CBB TM

TM-6TM-8

Qatar NIA

ACCS

CBUAE

CR-4

CBE CSF

CTO-1CTO-5CTO-6

SA JS2

JS2-7.1JS2-8.1

CBN CSF

Part3.2

BoG CISD

CISD-IXCISD-VIIICISD-XI

BoM CTRM

3.133.2

IOSCO Cyber Resilience

PROT-1

CPMI-IOSCO PFMI

CG.PRPFMI.P22

FFIEC IS

II.C.13(b)II.C.15(c)II.C.16II.C.9

NYDFS 500

500.12500.6500.7

HIPAA Security Rule

§164.310(b)§164.312(a)(1)§164.312(e)(1)

ECB CROE

CROE.2.3.5

EBA ICT Guidelines

3.4.2

SEBI CSCRF

PR.AA

BOT Cyber Resilience

Ch2.2Ch2.4Ch9.1

CMMC 2.0

AC

NERC CIP

CIP-005-7

10 CFR 73.54

RG5.71-A-AC

TSA Pipeline SD

SD-2 Sec B

DOE C2M2 v2.1

ACCESS

API 1164

Sec 6

AWIA

AWWA Sec 3

IAEA NSS 17-T

Sec 5.3

PCI PTS v6

EI

PCI HSM

3

Common Criteria

CC Part 2 — FRU/FTA/FTP

ISAE 3402

Clause 4

Solvency II

EIOPA-ICT-4.4EIOPA-ICT-4.6

Lloyd's Minimum Standards

MS8.3MS8.9

NAIC Insurance Data Security

4-access4-audit

PRA SS1/23

P-IT.1

FCA SYSC 13

SYSC 13.7.3

HITRUST CSF v11

01.b01.d05.c

FDA 21 CFR Part 11

§11.30§11.300(d)

ISO 27799

6.39.5H.5

NHS DSPT

NDG-9.7

OWASP MASVS v2.1

MASVS-NETWORK-1

CCSS v9.0

1.03.5

Basel SCO60

SCO60.62

BSSC Standards

NOS-05

SEC Custody (Digital Assets)

SEC-CD-05

ISO 17799 (legacy)

11.4.211.4.311.4.4

COBIT 4.1 (legacy)

None.