Remote Access
Description
Establish and document usage restrictions, configuration requirements, connection requirements, and implementation guidance for each type of remote access allowed.
⚠️ Risk Impact
Remote access expansion since 2020 created vast attack surface. VPN gateways have become primary breach vectors — Pulse Secure, Fortinet, Citrix all suffered mass-exploit campaigns in 2021-2024.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.
🔧 Remediation
Document approved remote access methods. Replace legacy VPN with Zero Trust Network Access (ZTNA): Cloudflare Access, Google IAP, Tailscale, Twingate, AWS Verified Access. Enforce device posture + identity + context per request.
💀 Real-World Attack Scenario
Fortinet FortiOS CVE-2022-42475 (RCE in SSL-VPN, Dec 2022). A federal contractor's FortiGate was unpatched for 28 days. State-actor attackers exploited the vuln, established persistent VPN session, then pivoted to internal Active Directory. Investigation revealed AC-17 deficiency: 'remote access documentation did not require timely patching of VPN gateways'.
💰 Cost of Non-Compliance
VPN-related breaches: 32% of 2023 enterprise breaches involved compromised remote-access infrastructure (Mandiant M-Trends 2024). Average cost: $5.1M. CISA Emergency Directive 23-02 specifically called out exposed VPN gateways as priority.
📋 Audit Questions
- 1.List all approved remote-access methods. Has each been authorized?
- 2.What is the patching SLA for VPN gateways?
- 3.Are device posture and identity checks enforced for remote access?
- 4.Show evidence of ZTNA adoption or VPN gateway hardening.
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Legacy VPN with no MFA on the VPN gateway itself
- ⛔VPN-protected internal services that are also accessible directly from the internet
- ⛔Patching cadence for VPN appliances slower than for application-layer software
📈 Business Value
Modern remote access (ZTNA) eliminates the VPN-gateway-as-perimeter pattern that 2024 adversaries specifically exploit. Reduces breach exposure 60-80% vs traditional VPN.
⏱️ Effort Estimate
40-80 hours for VPN-to-ZTNA migration per environment
EchelonGraph monitors remote-access entry points for misconfigurations + CVE exposure
🔗 Cross-Framework References
Automate NIST 800-53 AC-17 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →