Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-17Remote Access

Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and Authorize each type of remote access to the system prior to allowing such connections.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (81)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Mandating authorization prior to allowing remote connections addresses missing authorization for remote access.
CWE-284Improper Access Control4,832Requiring prior authorization for each remote access type prevents improper access control over remote connections.
CWE-863Incorrect Authorization3,234The authorization process and usage restrictions help prevent incorrect authorization for remote access types.
CWE-285Improper Authorization1,230Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.
CWE-288Authentication Bypass Using an Alternate Path or Channel523Authorizing remote access reduces the ability to bypass authentication via unauthorized alternate remote channels.
CWE-420Unprotected Alternate Channel37Usage restrictions and authorization for remote access protect against unprotected alternate channels.
CWE-424Improper Protection of Alternate Path30Documenting requirements and authorizing remote access ensures proper protection of alternate paths.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-652942.09.80.0104good
CVE-2025-08962.09.80.0030good
CVE-2026-258071.88.80.0014good
CVE-2026-402891.89.10.0006good
CVE-2025-301161.57.50.0018good
CVE-2026-338921.47.10.0010good
CVE-2024-53704 KEV9.69.80.9386good
CVE-2026-39987 KEV8.79.80.7871good
CVE-2025-365942.09.80.0042partial
CVE-2025-292661.99.60.0027good
CVE-2024-128021.89.10.0006good
CVE-2022-509751.88.80.0002good
CVE-2026-247901.68.20.0011good
CVE-2026-328381.57.50.0001good
CVE-2026-261511.47.10.0009partial
CVE-2024-579621.26.10.0010partial
CVE-2025-0108 KEV9.59.10.9412partial
CVE-2025-264655.86.80.7360partial
CVE-2025-06802.19.80.0186good
CVE-2026-291192.09.80.0042good
CVE-2026-287772.09.80.0042good
CVE-2025-709982.09.80.0026partial
CVE-2026-239442.09.80.0018partial
CVE-2026-235322.09.80.0014partial
CVE-2020-369252.09.80.0061good

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9