🏛️NIST 800-53 AC-17Rule: NIST-AC-017high

Remote Access

Description

Establish and document usage restrictions, configuration requirements, connection requirements, and implementation guidance for each type of remote access allowed.

⚠️ Risk Impact

Remote access expansion since 2020 created vast attack surface. VPN gateways have become primary breach vectors — Pulse Secure, Fortinet, Citrix all suffered mass-exploit campaigns in 2021-2024.

🔍 How EchelonGraph Detects This

NIST-AC-017Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.

🔧 Remediation

Document approved remote access methods. Replace legacy VPN with Zero Trust Network Access (ZTNA): Cloudflare Access, Google IAP, Tailscale, Twingate, AWS Verified Access. Enforce device posture + identity + context per request.

💀 Real-World Attack Scenario

Fortinet FortiOS CVE-2022-42475 (RCE in SSL-VPN, Dec 2022). A federal contractor's FortiGate was unpatched for 28 days. State-actor attackers exploited the vuln, established persistent VPN session, then pivoted to internal Active Directory. Investigation revealed AC-17 deficiency: 'remote access documentation did not require timely patching of VPN gateways'.

💰 Cost of Non-Compliance

VPN-related breaches: 32% of 2023 enterprise breaches involved compromised remote-access infrastructure (Mandiant M-Trends 2024). Average cost: $5.1M. CISA Emergency Directive 23-02 specifically called out exposed VPN gateways as priority.

📋 Audit Questions

  • 1.List all approved remote-access methods. Has each been authorized?
  • 2.What is the patching SLA for VPN gateways?
  • 3.Are device posture and identity checks enforced for remote access?
  • 4.Show evidence of ZTNA adoption or VPN gateway hardening.

🎯 MITRE ATT&CK Mapping

T1133 — External Remote ServicesT1190 — Exploit Public-Facing Application

⚡ Common Pitfalls

  • Legacy VPN with no MFA on the VPN gateway itself
  • VPN-protected internal services that are also accessible directly from the internet
  • Patching cadence for VPN appliances slower than for application-layer software

📈 Business Value

Modern remote access (ZTNA) eliminates the VPN-gateway-as-perimeter pattern that 2024 adversaries specifically exploit. Reduces breach exposure 60-80% vs traditional VPN.

⏱️ Effort Estimate

Manual

40-80 hours for VPN-to-ZTNA migration per environment

With EchelonGraph

EchelonGraph monitors remote-access entry points for misconfigurations + CVE exposure

🔗 Cross-Framework References

SOC2-CC6.6ISO27001-A.6.7

Automate NIST 800-53 AC-17 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →