13.5
IG2 IG3

Manage Access Control for Remote Assets

Asset Type: Devices
Security Function: Protect

Description

Manage access control for assets remotely connecting to enterprise resources. Determine amount of access to enterprise resources based on: up-to-date anti-malware software installed, configuration compliance with the enterprise’s secure configuration process, and ensuring the operating system and applications are up-to-date.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Draft policy/procedure document
7
Obtain stakeholder review and approval
8
Communicate to affected personnel
9
Schedule periodic review and updates
10
Select hardening benchmark (CIS Benchmarks, DISA STIGs)
11
Create baseline configuration templates
12
Deploy configurations using automation tools
13
Schedule compliance scanning to detect drift
14
Define access control requirements based on least privilege
15
Implement role-based access control (RBAC)
16
Configure access review and recertification process
17
Monitor and audit privileged access usage
18
Deploy anti-malware solution to all applicable endpoints
19
Configure automatic signature updates
20
Enable real-time scanning and scheduled full scans
21
Establish centralized management and alerting

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Compromised Remote Device Introduces Malware to Enterprise Network

Integrity

An employee's unpatched personal laptop with outdated anti-malware connects to the enterprise VPN, introducing malware that spreads to internal systems because remote asset compliance is not verified.

Unauthorized Remote Access from Non-Compliant Device

Confidentiality

A contractor connects to enterprise resources from a jailbroken mobile device with no encryption enabled, bypassing security controls because remote device posture is not assessed before granting access.

Credential Theft via Compromised Home Network

Confidentiality

An attacker compromises a remote worker's insecure home router and intercepts VPN credentials, gaining enterprise access because no compliance check validates the remote device's security posture.

Vulnerabilities (When Safeguard Absent)

No Remote Device Compliance Verification

Without access control for remote assets, devices connecting to enterprise resources are not evaluated for anti-malware status, patch level, or configuration compliance before being granted network access.

Uncontrolled BYOD Access to Enterprise Resources

Personally owned devices with unknown security postures can access sensitive enterprise resources without any conditional access policies enforcing minimum security standards.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical Configuration compliance scan results against approved baseline Scanned monthly
Document Approved baseline configuration documentation Reviewed quarterly
Record Access review/recertification records with sign-off Quarterly
Technical Access control configuration evidence (RBAC settings, group memberships) Reviewed quarterly
Technical Anti-malware deployment status and detection statistics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually