Vigyata.AI
Is this your channel?

Episode 14_REMOTE ACCESS_ (AC-17)

1.4K views· 81 likes· 9:08· Jan 31, 2023

🛍️ Products Mentioned (4)

In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-17 Remote Access Control and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the RMF. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com paypal: https://paypal.me/MZakari Venmo: @kamilsec Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION AS WELL AS ON THE JOB CONSULTATION** *************************************************************** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 Facebook: https://www.facebook.com/kamil.kamilsec E-Mail: Kaamilzak@gmail.com

About This Video

In Episode 14 of my NIST SP 800-53 Rev. 5 Access Control series, I break down AC-17 (Remote Access) and simplify what the control is really asking you to do. Remote access is a huge enabler for off-site workers and travel, but the whole point of AC-17 is making sure only authorized remote connections occur—and only to the authorized organizational network and components. I walk through the exact control requirements: (a) establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each remote access type you allow, and (b) authorize each remote access type before you allow it. I also clear up a common confusion: VPN vs RDP. A VPN is an encrypted tunnel into the network, and once you’re authenticated through the VPN, that access is treated as local—not remote access. RDP, on the other hand, is remote access to a specific device on the network. I talk about security and monitoring tradeoffs too—encrypted VPNs help confidentiality and integrity, but they can impact performance and make monitoring traffic harder. Finally, I cover how I assess/test AC-17 during an SCA or during continuous monitoring/ongoing authorization. I examine the access control policy/procedures (AC-1), the SSP, the authorized user list, usage restrictions, logs, and—when permitted—attempt a remote connection to validate the process. I also emphasize least privilege and the need for documented approval (even a ticket with a signature/authorization) for who can remotely access what.

Frequently Asked Questions

🎬 More from KamilSec