STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-17

Access ControlRev 5organization

Remote Access

Baselines:LowModerateHigh

Control Statement

a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and b. Authorize each type of remote access to the system prior to allowing such connections.

Supplemental Guidance

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broadband, and wireless. Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections. The use of encrypted VPNs provides sufficient assurance to the organization that it can effectively treat such connections as internal networks if the cryptographic mechanisms used are implemented in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. VPNs with encrypted tunnels can also affect the ability to adequately monitor network communications traffic for malicious code. Remote access controls apply to systems other than public web servers or systems designed for public access. Authorization of each remote access type addresses authorization prior to allowing remote access without specifying the specific formats for such authorization. While organizations may use information exchange and system connection security agreements to manage remote access connections to other systems, such agreements are addressed as part of [CA-3](#ca-3) . Enforcing access restrictions for remote access is addressed via [AC-3](#ac-3).

Related Controls (19)

AC-2AC-3AC-4AC-18AC-19AC-20CA-3CM-10IA-2IA-3IA-8MA-4PE-17PL-2PL-4SC-10SC-12SC-13SI-4

CCI Identifiers (8)

CCI-000066The organization enforces requirements for remote connections to the information system.CCI-000063The organization defines allowed methods of remote access to the information system.CCI-000064The organization establishes usage restrictions and implementation guidance for each allowed remote access method.CCI-000065Authorize remote access to the system prior to allowing such connections.CCI-002310Establish and document usage restrictions for each type of remote access allowed.CCI-002311Establish and document configuration/connection requirements for each type of remote access allowed.CCI-002312Establish and document implementation guidance for each type of remote access allowed.CCI-001402The organization monitors for unauthorized remote access to the information system.

Linked STIG Checks (10)

Across 6 STIGs. Click to expand.