Remote Access
To meet the FedRAMP remote access requirement (NIST SP 800-53 Rev 5 AC-17), you must define which remote access methods are allowed, document the restrictions and required secure configurations for each method, and explicitly authorize each remote access type before any connection is permitted (NIST SP 800-53 Rev 5). Operationally, this is a “policy-to-technical-enforcement-to-evidence” control.
Key takeaways:
- Build an approved “remote access methods” inventory (admin, user, third party, vendor support) and tie each to enforceable technical controls.
- Require documented authorization for each remote access type, not just individual users.
- Keep audit-ready evidence: configurations, approvals, logs, and periodic reviews mapped to your SSP and system boundary (FedRAMP Moderate Baseline).
“Remote access” becomes an audit finding when teams treat it as a single setting (“we have VPN”) rather than a set of distinct connection paths with different risks: workforce access to internal apps, administrator access to production, third-party support access, cloud console access, and emergency break-glass access. AC-17 expects you to identify those paths, define exactly how each one must be configured and used, and then authorize each allowed type before it’s enabled (NIST SP 800-53 Rev 5).
For FedRAMP Moderate environments, the practical test is simple: can you show an assessor (1) what remote access is allowed, (2) where it is enforced technically, and (3) who approved it, with evidence that matches the current architecture and the actual configs in production (FedRAMP Moderate Baseline)? If any remote pathway exists that is “real but undocumented” (for example, a vendor’s support tunnel, a cloud admin console reachable from the public internet, or direct SSH/RDP exposure), you’ll struggle to defend AC-17.
This page gives requirement-level implementation guidance you can execute quickly: scope, decisions, step-by-step control build, evidence to retain, and the audit questions that typically stall teams.
Regulatory text
Requirement (excerpt): “Establish and document usage restrictions, configuration and connection requirements, and implementation guidance for each type of remote access allowed; and authorize each type of remote access to the system prior to allowing such connections.” (NIST SP 800-53 Rev 5)
Operator meaning: You must treat “remote access” as a list of types (methods and use-cases), and for each type you must:
- Define restrictions (who, what, when, from where, to what),
- Define configuration and connection requirements (security settings that must be in place),
- Provide implementation guidance (how teams request and use it safely),
- Authorize the type (a documented approval that the type is permitted for the system) before enabling it (NIST SP 800-53 Rev 5).
In FedRAMP context, this must align to your system boundary and be reflected in the SSP and implemented controls for the Moderate baseline (FedRAMP Moderate Baseline).
Plain-English interpretation (what “compliant” looks like)
A compliant remote access program has three properties:
- Nothing remote is accidental. Every remote entry path is either explicitly allowed and controlled, or explicitly prohibited and blocked.
- Each remote access type has a “recipe.” The recipe includes required authentication, device posture expectations, network segmentation, session controls, and logging.
- Authorization is provable. You can show who approved remote admin access versus remote user access versus third-party support access, and you can show the controls that enforce those decisions (NIST SP 800-53 Rev 5).
Who it applies to (entity + operational context)
Applies to:
- Cloud Service Providers and federal agencies implementing FedRAMP Moderate controls for systems that process, store, or transmit federal information (FedRAMP Moderate Baseline).
- Any environment with remote connectivity into the authorization boundary, including: corporate workforce access, contractor access, third-party support, managed service operations, and remote administration of infrastructure (NIST SP 800-53 Rev 5).
Operational contexts you must cover explicitly:
- Workforce remote access to internal applications (browser/SaaS/app gateway paths)
- Privileged remote access to admin interfaces (OS, database, Kubernetes, hypervisor, cloud console)
- Third-party remote access (support engineers, implementation partners, outsourced SOC/NOC)
- Remote access between networks (site-to-site connectivity, private peering, bastion patterns)
- Emergency/break-glass remote access for restoration activities
What you actually need to do (step-by-step)
Step 1: Inventory every remote access “type” that exists or is requested
Create a table that lists each remote access type as a discrete item. Avoid generic labels like “VPN.” Use descriptions tied to pathways.
Recommended remote access type register (minimum columns):
- Remote access type name (e.g., “Privileged admin access to production via bastion”)
- Users (employees, admins, third party)
- Protocol/tool (VPN, ZTNA, SSH, RDP, cloud console, VDI)
- Source constraints (managed device only, IP allowlist, geo rules if applicable)
- Destination/scope (prod/non-prod, specific subnets, specific admin planes)
- Authentication requirements (SSO, MFA, certificate, hardware key where adopted)
- Session controls (timeout, re-auth, clipboard/file transfer controls for VDI where relevant)
- Logging requirements (what logs, where stored, who reviews)
- Authorization status (approved/prohibited) and approver
- Implementation owner (IT, Security, Platform, IAM)
- Evidence pointers (links to configs, tickets, screenshots, runbooks)
This register becomes your backbone artifact for AC-17 (NIST SP 800-53 Rev 5).
Step 2: Define “usage restrictions” per type (policy language that maps to enforcement)
For each type, write restrictions that are enforceable, not aspirational.
Examples of enforceable restrictions:
- “Remote privileged access is permitted only through the bastion service; direct SSH/RDP from the internet is prohibited.”
- “Third-party remote access is time-bound and enabled only for approved tickets.”
- “Remote access to production requires privileged role assignment and is denied from unmanaged devices.”
Document these in a Remote Access Standard (or equivalent) and cross-reference your access control policy and SSP statements (NIST SP 800-53 Rev 5; FedRAMP Moderate Baseline).
Step 3: Define configuration + connection requirements (the technical “musts”)
Translate each type into configuration requirements that your teams can implement and auditors can verify.
A practical per-type checklist:
- Identity: Which IdP/SSO? Which groups? Conditional access rules?
- MFA: Required method and enforcement points (IdP, VPN/ZTNA, PAM).
- Device controls: Managed endpoint requirement, posture checks, certificate-based auth where used.
- Network controls: No public exposure; allowlisting; segmentation; bastion/jump host; private endpoints where available.
- Privileged access controls: PAM integration, just-in-time elevation, approval workflow if used.
- Session controls: Idle timeout, session recording for privileged sessions if adopted, command restrictions where feasible.
- Monitoring/logging: Centralized log capture for remote access events, admin actions, and authentication events.
You don’t need to pick a specific technology to satisfy AC-17, but you do need to document and enforce the chosen configuration per access type (NIST SP 800-53 Rev 5).
Step 4: Publish “implementation guidance” that a human can follow
Assessors often ask for the “how do people do this” layer. Create short runbooks:
- How to request remote access (ticket type, required fields, approvals)
- How to onboard a third party (identity proofing expectations, account type, MFA enrollment)
- How admins connect (bastion steps, required tooling, where credentials live)
- How to revoke access (offboarding, incident response disablement)
- How to handle exceptions (documented risk acceptance path)
Keep it short, current, and tied to the register.
Step 5: Formally authorize each remote access type before enabling it
AC-17 is explicit: authorize each type prior to allowing such connections (NIST SP 800-53 Rev 5). Operationalize this as:
- A governance approval (CCO/GRC + system owner + security) for each remote access type in the register
- A change-management gate: no production enablement without an approved remote access type entry
- Periodic re-authorization as architecture changes (tie to system change reviews)
This prevents the “shadow remote path” problem where engineering adds a method and policy catches up later.
Step 6: Implement technical enforcement and remove nonconforming paths
This is where programs fail: the policy exists, but the internet still reaches RDP, SSH, or admin consoles.
Execution actions:
- Identify public exposure (security group rules, firewall rules, inbound NAT, cloud console exposure patterns)
- Replace direct admin paths with controlled pathways (bastion, PAM, ZTNA gateways)
- Enforce conditional access for console access and remote tools
- Disable legacy protocols or enforce hardened configs if you must keep them
Step 7: Instrument logging + review
AC-17 expects remote access to be controlled; auditors will test by asking for logs and evidence that remote connections are monitored (NIST SP 800-53 Rev 5). Define:
- What constitutes a remote access event per type
- Log sources (IdP, VPN/ZWNA, bastion, PAM, cloud audit logs)
- Retention location and access controls
- Review triggers (privileged session, third-party session, failed MFA bursts)
Required evidence and artifacts to retain (audit-ready)
Keep evidence aligned to “type-based” remote access:
Core documents
- Remote Access Policy/Standard with type-based restrictions (NIST SP 800-53 Rev 5)
- Remote Access Type Register (the inventory table)
- Implementation runbooks (admin access, third-party access, emergency access)
- SSP/control narrative references for AC-17 within the FedRAMP boundary (FedRAMP Moderate Baseline)
Authorization evidence
- Signed approvals or tickets showing each remote access type was authorized before enablement
- Change records tying enablement to approved type entries
Configuration evidence
- IdP conditional access policy exports/screenshots
- VPN/ZTNA configuration exports
- Bastion/PAM configuration evidence where used
- Firewall/security group rules demonstrating prohibited paths are blocked
Operational evidence
- Access request and approval tickets for remote access users (especially third parties and privileged users)
- Remote access logs (auth events, connection events, admin activity) with retrieval instructions
- Periodic review records (access reviews, third-party access recertifications)
A simple rule: if you cannot hand it to an assessor in a single folder (or GRC system) within a short time, you do not have “documented” remote access.
Common exam/audit questions and hangups
Expect these lines of questioning for the remote access requirement (NIST SP 800-53 Rev 5; FedRAMP Moderate Baseline):
- “List all remote access methods into the boundary.” Teams often miss third-party support paths and cloud admin consoles.
- “Show me the authorization for remote admin access as a type.” Auditors may reject user-level approvals if the method itself was never authorized.
- “Demonstrate enforcement.” They will compare your written restrictions to real firewall rules, conditional access policies, and exposed ports.
- “How do you control third-party remote access?” Time-bounding, ticket linkage, MFA, and rapid revocation are typical hangup areas.
- “Show logs for a sample period.” If logs exist but are hard to retrieve, the control often gets marked weak.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails AC-17 | Fix |
|---|---|---|
| “Remote access = VPN” | AC-17 is type-based; VPN is one type, not the program (NIST SP 800-53 Rev 5). | Build a type register that includes admin, third party, console, emergency, and inter-network access. |
| Documented restrictions without technical enforcement | Auditors test configs, not intent. | Map each restriction to a specific enforcement point (IdP policy, firewall rule, bastion). |
| Third-party access handled informally | Third parties often bypass normal controls. | Create a third-party remote access type with explicit onboarding, MFA, time-bound enablement, and logging. |
| Authorization done after go-live | AC-17 requires authorization prior to allowing the connection (NIST SP 800-53 Rev 5). | Add a change gate: no remote method enabled without recorded authorization. |
| Evidence scattered across tools | You lose time in audits and miss inconsistencies. | Centralize artifacts in your GRC repository; Daydream can help track the register, approvals, and evidence pointers across systems. |
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so treat “enforcement” here as authorization and assessment risk under FedRAMP. The common consequence is a control deficiency during a FedRAMP assessment: remote paths that are undocumented, not authorized as a type, or not configured per stated requirements (FedRAMP Moderate Baseline). Operationally, weak remote access controls raise the likelihood of unauthorized entry via exposed admin services, stolen credentials, or uncontrolled third-party connectivity (NIST SP 800-53 Rev 5).
Practical 30/60/90-day execution plan
Timeboxing helps, but exact durations are guidance, not a guarantee. Use these phases as an execution pattern.
First 30 days (stabilize and stop surprises)
- Assign an owner for the remote access requirement (Security/IAM + GRC + system owner).
- Build the first version of the Remote Access Type Register (include third party and privileged access).
- Identify and document prohibited remote paths, then confirm blocks in firewall/security groups.
- Draft the Remote Access Standard with per-type restrictions and required configurations (NIST SP 800-53 Rev 5).
- Create an approval workflow for authorizing each remote access type before enablement.
Days 31–60 (enforce and evidence)
- Implement or tighten conditional access and MFA enforcement for each remote access type.
- Implement controlled admin access paths (bastion/PAM patterns) where gaps exist.
- Stand up logging for remote connection events and privileged access events; document how to retrieve evidence.
- Publish short runbooks for workforce, admin, and third-party remote access.
Days 61–90 (operationalize and audit-proof)
- Run a tabletop audit: pick a remote access type and produce the full evidence chain (authorization → config → logs → review).
- Add remote access type authorization as a required step in change management.
- Conduct a focused access review on third-party and privileged remote access.
- Move all artifacts into a single system of record; Daydream is a practical fit if you need a clean evidence index tied to AC-17 and your SSP narrative.
Frequently Asked Questions
Does AC-17 require us to ban all remote access?
No. It requires you to define which remote access types are allowed, document restrictions and configuration requirements for each, and authorize each allowed type before enabling it (NIST SP 800-53 Rev 5).
What counts as a “type” of remote access?
A “type” is a distinct method/use-case that needs its own restrictions and configuration, such as workforce access, privileged admin access, third-party support access, or cloud console access (NIST SP 800-53 Rev 5).
Is approving individual users enough to satisfy “authorize each type”?
Usually not. You need evidence that the remote access method itself (the type) was approved for the system boundary before it was enabled, then user approvals operate within that authorized type (NIST SP 800-53 Rev 5).
How do we handle third-party remote access for support?
Define a dedicated third-party remote access type with explicit onboarding, MFA, ticket linkage, time-bounded enablement, and logging requirements, then retain approvals and connection logs as evidence (NIST SP 800-53 Rev 5).
What evidence do auditors ask for most often?
They ask for the list of allowed remote access types, proof each type was authorized, configuration evidence showing enforcement, and logs showing remote connections and administrative activity can be reviewed (NIST SP 800-53 Rev 5; FedRAMP Moderate Baseline).
Where does this belong in FedRAMP documentation?
Your SSP should describe the authorized remote access types, restrictions, and enforcement mechanisms within the system boundary, and your evidence package should support those statements (FedRAMP Moderate Baseline).
Frequently Asked Questions
Does AC-17 require us to ban all remote access?
No. It requires you to define which remote access types are allowed, document restrictions and configuration requirements for each, and authorize each allowed type before enabling it (NIST SP 800-53 Rev 5).
What counts as a “type” of remote access?
A “type” is a distinct method/use-case that needs its own restrictions and configuration, such as workforce access, privileged admin access, third-party support access, or cloud console access (NIST SP 800-53 Rev 5).
Is approving individual users enough to satisfy “authorize each type”?
Usually not. You need evidence that the remote access method itself (the type) was approved for the system boundary before it was enabled, then user approvals operate within that authorized type (NIST SP 800-53 Rev 5).
How do we handle third-party remote access for support?
Define a dedicated third-party remote access type with explicit onboarding, MFA, ticket linkage, time-bounded enablement, and logging requirements, then retain approvals and connection logs as evidence (NIST SP 800-53 Rev 5).
What evidence do auditors ask for most often?
They ask for the list of allowed remote access types, proof each type was authorized, configuration evidence showing enforcement, and logs showing remote connections and administrative activity can be reviewed (NIST SP 800-53 Rev 5; FedRAMP Moderate Baseline).
Where does this belong in FedRAMP documentation?
Your SSP should describe the authorized remote access types, restrictions, and enforcement mechanisms within the system boundary, and your evidence package should support those statements (FedRAMP Moderate Baseline).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream