NIST 800-171 Control 3.13.7 requires organizations to ensure only authorized users—using verified credentials and approved methods—can remotely access organizational systems.
What NIST 800-171 Control 3.13.7 Requires
Control 3.13.7 applies to common remote access scenarios such as remote desktop tools, VPN connections, cloud-based access to on-premises systems, and third-party maintenance sessions.
Remote access attempts from unauthorized users, IP addresses, or devices must be blocked.
Why Blocking Unauthorized Remote Access Matters
Remote access is a frequently exploited attack vector. When it isn’t secured properly, attackers may brute-force credentials, exploit misconfigured VPNs or remote desktop services, and move laterally within internal networks after initial access.
Preventing unauthorized remote access helps stop breaches before they begin.
How to Implement Control 3.13.7
Allow remote access only through secure, approved channels such as a VPN protected with multi-factor authentication (MFA).
Restrict remote access to specific users, devices, and networks based on policy.
Use firewalls, access control lists, and intrusion prevention to monitor and block unauthorized attempts.
Log all remote access attempts and set real-time alerts for unauthorized activity.
Regularly audit remote access policies and review logs to confirm controls remain effective.
Common Mistakes to Avoid
Avoid leaving RDP or SSH ports exposed to the public internet.
Do not allow remote access without MFA.
Prevent “temporary” exceptions from becoming permanent access paths.
How Cuick Trac Supports Secure Remote Access
Cuick Trac helps secure remote access by enforcing MFA and access control for remote users.
It blocks unauthorized access attempts using a default-deny approach and provides a hardened enclave environment with restricted entry points.
Cuick Trac also offers advisory support to help design compliant, secure remote access workflows.
Next Steps
Remote access is a privilege—not a vulnerability. Lock it down.
Schedule a Cuick Trac demo to help keep unauthorized users out.
FAQ
What does NIST 800-171 Control 3.13.7 require?
It requires that only authorized users with verified credentials and approved methods can remotely access organizational systems.
What types of remote access does Control 3.13.7 cover?
It covers remote desktop access, VPN connections, cloud access to on-prem systems, and third-party maintenance sessions.
What are common mistakes that weaken remote access security?
Common issues include exposing RDP/SSH to the internet, skipping MFA, and allowing temporary exceptions to persist.