AC-17(7): Additional Protection for Security Function Access

AC-17(7) requires you to put extra technical and procedural protections around remote access that reaches security functions (for example, remote admin of IAM, logging/SIEM, endpoint security, firewalls, EDR, or key management). To operationalize it, identify every remote path to security tools, enforce stronger authentication and access controls, lock down admin interfaces, and retain evidence that proves those protections are consistently in place.

Key takeaways:

  • Scope the “security function access” remote pathways first; the control fails when you miss one admin plane.
  • Require higher assurance access for those pathways (strong MFA, hardened jump hosts, restricted management networks, session controls).
  • Evidence matters as much as design: keep configs, access logs, and review records tied to each in-scope security system.

AC-17 covers remote access. Enhancement (7) raises the bar specifically for remote access that can change, disable, or bypass security functions. In practice, this means your “normal” VPN + MFA baseline may be insufficient when the destination is a security control plane, such as the management console for identity, a firewall, your EDR tenant, your SIEM, or cloud security services.

Operators usually stumble on two issues. First, they don’t define “security functions” consistently, so remote administration of security tooling gets treated like any other IT admin. Second, they implement technical controls but can’t produce assessment-ready evidence that remote security admin is restricted, monitored, and reviewed.

This page gives requirement-level implementation guidance for the ac-17(7): additional protection for security function access requirement using NIST SP 800-53 Rev. 5 as the source of truth 1. The goal is quick operationalization: clear scope, concrete control steps, and an evidence package an assessor can test without guesswork.

Regulatory text

The provided excerpt for this requirement is: “NIST SP 800-53 control AC-17.7.” 2. NIST frames AC-17(7) as “Additional Protection for Security Function Access” under the remote access family 3.

What the operator must do: implement additional safeguards for remote access sessions that can administer or materially affect security functions. Treat remote access to security tooling as a higher-risk access tier than general remote access, and implement stronger controls plus auditable monitoring around those sessions 3.

Plain-English interpretation (what AC-17(7) really demands)

If a user can remotely reach something that enforces security, detects attacks, stores security logs, manages identities, controls keys, or gates network access, you must protect that remote path more than “business as usual.”

Common in-scope targets:

  • Identity and access administration (IdP admin portals, PAM admin, directory services)
  • Network security management (firewall/WAF/VPN management planes, router/switch management)
  • Endpoint security consoles (EDR, AV management)
  • Logging and detection (SIEM, centralized logging, SOAR)
  • Vulnerability/security configuration (scanner consoles, CSPM)
  • Cryptographic and secrets control planes (KMS, HSM management, secrets vault)

If remote access can disable logging, weaken policy, remove agents, change firewall rules, or create admin accounts, it is “security function access” in the sense AC-17(7) is trying to protect 3.

Who it applies to

Entity scope

  • Federal information systems and programs implementing NIST SP 800-53 controls 3.
  • Contractor systems handling federal data where NIST SP 800-53 is contractually flowed down or used as the control baseline 3.

Operational scope (where this shows up)

  • Remote administrators (employees and third parties) accessing security consoles from off-network.
  • Cloud-managed security tools where the “remote” path is a web admin portal.
  • Break-glass or emergency admin paths.
  • Managed security service providers (MSSPs) or other third parties administering your security stack.

What you actually need to do (step-by-step)

Use this as an implementation runbook. The objective is simple: enumerate, harden, gate, monitor, and review.

1) Build an inventory of “remote paths to security functions”

Create a list of:

  • Security systems (tool name, tenant, environment, owner)
  • Admin interfaces (URL, management IPs, API endpoints, CLI)
  • Allowed remote entry points (VPN, ZTNA, bastion, PAM, VDI)
  • Admin roles/groups that can change security posture

Practical scoping rule: if a compromise of this remote session would let an attacker reduce detection, bypass controls, or persist, it belongs in the AC-17(7) scope.

Artifact to produce: “Remote Security Administration Access Register” (table format).

2) Define “additional protection” as a measurable standard

Write a short standard that distinguishes:

  • Tier A (Security Function Remote Admin): strongest controls
  • Tier B (Other Remote Admin): baseline controls
  • Tier C (End-user Remote Access): standard user controls

Your AC-17(7) pass/fail depends on Tier A being clearly defined and consistently enforced 3.

Artifact to produce: Remote Access Standard with Tier A requirements.

3) Gate remote security admin through a controlled access path

Preferred patterns (choose one primary, keep exceptions rare):

  • PAM with session brokering to security consoles and privileged shells
  • Hardened jump host/bastion on a restricted management network
  • VDI/admin workstation with strong device controls and no local admin
  • ZTNA with per-app access, device posture checks, and strong auth

Operational rule: avoid direct internet exposure of admin planes. If a tool is SaaS, restrict access by conditional access rules and administrative network/IP allowlists where the provider supports it.

Evidence to retain: network diagrams, PAM/bastion architecture, conditional access policies, allowlist configuration exports.

4) Require stronger authentication and privilege controls for Tier A

Minimum expectations most assessors will look for:

  • Strong MFA for privileged access (prefer phishing-resistant where feasible)
  • Role-based access control with least privilege (no shared admin roles by default)
  • Just-in-time access or time-bound elevation for security admins
  • Dedicated admin accounts separated from daily-use accounts

Tie this to account lifecycle: provisioning, changes, and deprovisioning must be traceable.

Evidence to retain: screenshots/exports of MFA policies, group membership lists for privileged roles, JIT/PAM elevation logs, joiner/mover/leaver tickets.

5) Add session protections that reduce abuse during remote administration

Controls that map cleanly to “additional protection” in audits:

  • Session timeouts and re-auth for sensitive actions
  • Recording of privileged sessions (where supported)
  • Command logging for privileged shells
  • Restrictions on clipboard/file transfer for admin VDI/PAM sessions (where applicable)
  • Break-glass accounts sealed with extra controls and documented use process

Evidence to retain: session recording settings, sample recordings metadata, command audit logs, break-glass runbook and usage log.

6) Monitor and alert on remote security function access

You need monitoring that answers:

  • Who accessed the security admin plane remotely?
  • From where (device, IP, geo, network path)?
  • What privileged actions occurred?
  • Were there failed attempts or anomalous elevation?

Route logs into centralized logging/SIEM, then implement detections for:

  • Privileged role assignment changes
  • MFA factor resets for admins
  • Disabling sensors/log sources
  • Firewall rule changes outside change windows

Evidence to retain: log source onboarding proof, sample SIEM queries, alert definitions, and incident tickets tied to alerts.

7) Prove periodic review and exception handling

AC-17(7) often fails on governance, not tooling. Create a simple cadence:

  • Review Tier A access list (who is in privileged groups)
  • Review remote admin sessions (spot check recordings/logs)
  • Review exceptions (who has direct access, why, and end date)

Evidence to retain: access review sign-offs, exception register, and remediation tickets.

Required evidence and artifacts to retain (assessment-ready)

Use this checklist to build a single “AC-17(7) evidence pack” folder:

  1. Scope and ownership
  • Remote Security Administration Access Register
  • Control owner assignment (RACI or equivalent)
  1. Policies/standards
  • Remote Access Standard defining Tier A protections
  • Privileged Access Management standard (if separate)
  • Break-glass procedure
  1. Technical configurations
  • Conditional access/MFA policy exports for privileged access
  • PAM/bastion configuration exports
  • Network segmentation/management network diagrams
  • Allowlist settings for admin portals (where supported)
  1. Operational records
  • Privileged access requests and approvals
  • JIT elevation logs / PAM checkout logs
  • Session logs and (where applicable) recording evidence
  • Detection rules and alert triage tickets
  1. Review and audit trails
  • Periodic privileged access review sign-offs
  • Exception register with expirations
  • Change management records for security tooling admin access

A common approach is to map each in-scope security tool to: owner, access path, auth policy, logging source, and review cadence. Daydream can hold this mapping as a living control page with recurring evidence tasks so you stop rebuilding the binder every audit.

Common exam/audit questions and hangups

Expect these questions in a NIST-based assessment:

  • “Show me all remote access methods that can administer security tooling. How do you know the list is complete?”
  • “Which accounts can change logging, identity, firewall rules, or endpoint policy? Show least privilege.”
  • “Demonstrate additional protections beyond baseline remote access.”
  • “Prove monitoring: show logs for remote admin sessions and the alerts you trigger.”
  • “How do you control third-party admin access to your security stack?”
  • “How do you handle break-glass, and how do you detect abuse?”

Hangup pattern: teams show a strong VPN control, but the assessor finds direct SaaS admin portal access from any device with basic MFA. That undermines the “additional protection” requirement 3.

Frequent implementation mistakes (and how to avoid them)

  1. Missing systems in scope
  • Fix: define “security function” categories and maintain an inventory of tools plus their admin planes.
  1. Treating “remote” as only VPN
  • Fix: include web consoles, cloud admin portals, and APIs accessed over the internet.
  1. Over-reliance on a policy statement
  • Fix: keep config exports, access logs, and review records. Assessors test reality, not intent.
  1. Shared admin accounts or persistent super-admin
  • Fix: enforce named accounts, role separation, and time-bound elevation.
  1. No exception discipline
  • Fix: maintain an exception register with approvals, compensating controls, and explicit end dates.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions or penalties.

Operationally, weak controls around remote security administration increase the chance that an attacker who gets credentials can disable detection and response, change access rules, or create persistence. AC-17(7) is designed to make that path harder and more observable 3.

Practical 30/60/90-day execution plan

First 30 days (Immediate stabilization)

  • Assign an owner for AC-17(7) and publish a one-page Tier A definition.
  • Inventory security tools and remote admin paths; identify any direct-to-internet admin access.
  • Turn on or confirm MFA for all privileged security admins; remove shared accounts where found.
  • Centralize logs for privileged access to security tools, at least for your highest-risk systems.

By 60 days (Control hardening + evidence)

  • Standardize on a gated admin path (PAM, bastion, or admin VDI) for Tier A systems.
  • Implement conditional access controls for SaaS security consoles (device requirements and location/network restrictions where supported).
  • Create the AC-17(7) evidence pack structure and start capturing exports and logs on a recurring schedule.

By 90 days (Operate + prove)

  • Implement session monitoring controls (recording where supported, command/audit logs, alerting).
  • Establish routine access reviews and document results; close or re-approve exceptions with compensating controls.
  • Run an internal tabletop: simulate stolen admin creds and validate that your controls prevent or detect security function tampering.

Frequently Asked Questions

Does AC-17(7) apply to cloud security tools with web admin consoles?

Yes if administrators can access those consoles remotely and perform security-impacting actions. Treat those portals as remote access to security functions and apply stronger authentication, access restrictions, and monitoring 3.

What counts as a “security function” in practice?

Any system that enforces security policy, controls identity/privilege, manages keys/secrets, or produces detection and audit logs is typically in scope. If remote access can reduce visibility or weaken controls, classify it as security function access 3.

Is a standard VPN with MFA enough to meet AC-17(7)?

Often no, because the requirement is for additional protection for security function access. You usually need extra gating (PAM/bastion), tighter conditional access, and stronger monitoring for privileged security admin sessions 3.

How should we handle third-party administrators (MSSPs, consultants) under AC-17(7)?

Put third parties on the same Tier A remote admin path as employees, with named accounts, strong MFA, and monitored sessions. Document approvals, the access window, and the logs that prove what they did.

What evidence do assessors actually ask for?

They ask for proof of (1) which remote paths exist, (2) which privileged accounts can access security tooling, (3) the technical settings that enforce extra protections, and (4) logs/reviews that show ongoing operation. Build an evidence pack per security tool so testing is straightforward.

We have break-glass accounts. Are they a problem for AC-17(7)?

Break-glass is acceptable if tightly controlled: restricted storage, strong authentication, documented use, and post-use review with logs. The failure mode is unmanaged, always-on super-admin access without auditability.

Footnotes

  1. NIST SP 800-53 Rev. 5; Source: NIST SP 800-53 Rev. 5 OSCAL JSON

  2. NIST SP 800-53 Rev. 5 OSCAL JSON

  3. NIST SP 800-53 Rev. 5

Frequently Asked Questions

Does AC-17(7) apply to cloud security tools with web admin consoles?

Yes if administrators can access those consoles remotely and perform security-impacting actions. Treat those portals as remote access to security functions and apply stronger authentication, access restrictions, and monitoring (Source: NIST SP 800-53 Rev. 5).

What counts as a “security function” in practice?

Any system that enforces security policy, controls identity/privilege, manages keys/secrets, or produces detection and audit logs is typically in scope. If remote access can reduce visibility or weaken controls, classify it as security function access (Source: NIST SP 800-53 Rev. 5).

Is a standard VPN with MFA enough to meet AC-17(7)?

Often no, because the requirement is for *additional protection* for security function access. You usually need extra gating (PAM/bastion), tighter conditional access, and stronger monitoring for privileged security admin sessions (Source: NIST SP 800-53 Rev. 5).

How should we handle third-party administrators (MSSPs, consultants) under AC-17(7)?

Put third parties on the same Tier A remote admin path as employees, with named accounts, strong MFA, and monitored sessions. Document approvals, the access window, and the logs that prove what they did.

What evidence do assessors actually ask for?

They ask for proof of (1) which remote paths exist, (2) which privileged accounts can access security tooling, (3) the technical settings that enforce extra protections, and (4) logs/reviews that show ongoing operation. Build an evidence pack per security tool so testing is straightforward.

We have break-glass accounts. Are they a problem for AC-17(7)?

Break-glass is acceptable if tightly controlled: restricted storage, strong authentication, documented use, and post-use review with logs. The failure mode is unmanaged, always-on super-admin access without auditability.

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream