Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-17Remote Access

Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and Authorize each type of remote access to the system prior to allowing such connections.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (81)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,796Mandating authorization prior to allowing remote connections addresses missing authorization for remote access.
CWE-284Improper Access Control4,905Requiring prior authorization for each remote access type prevents improper access control over remote connections.
CWE-863Incorrect Authorization3,303The authorization process and usage restrictions help prevent incorrect authorization for remote access types.
CWE-285Improper Authorization1,252Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.
CWE-288Authentication Bypass Using an Alternate Path or Channel534Authorizing remote access reduces the ability to bypass authentication via unauthorized alternate remote channels.
CWE-420Unprotected Alternate Channel38Usage restrictions and authorization for remote access protect against unprotected alternate channels.
CWE-424Improper Protection of Alternate Path31Documenting requirements and authorizing remote access ensures proper protection of alternate paths.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-652942.09.80.0100good
CVE-2025-08962.09.80.0030good
CVE-2026-258071.88.80.0014good
CVE-2026-402891.89.10.0005good
CVE-2025-330541.78.10.0102good
CVE-2025-301161.57.50.0018good
CVE-2026-338921.47.10.0008good
CVE-2024-53704 KEV9.69.80.9386good
CVE-2026-39987 KEV UPD8.99.80.8184good
CVE-2025-292662.09.60.0109good
CVE-2025-365942.09.80.0042partial
CVE-2024-128021.89.10.0006good
CVE-2022-509751.88.80.0002good
CVE-2026-247901.68.20.0011good
CVE-2026-328381.57.50.0001good
CVE-2020-369171.57.50.0009good
CVE-2026-26151 UPD1.47.10.0010partial
CVE-2024-579621.26.10.0010partial
CVE-2025-0108 KEV9.59.10.9412partial
CVE-2025-26465 UPD5.06.80.6122partial
CVE-2026-291192.09.80.0043good
CVE-2026-287772.09.80.0043good
CVE-2025-709982.09.80.0026partial
CVE-2026-239442.09.80.0018partial
CVE-2026-235322.09.80.0014partial

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-18 AC-19 AC-2 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9