Show: AC.L2-3.1.15 – Authorize remote execution of privileged commands and remote access to security-relevant information.
This control comes from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2.
This control requires you to explicitly decide which privileged actions and security-relevant data can be accessed remotely, and only allow that access for authorized people under defined conditions. By limiting who can perform admin tasks over remote connections (such as VPN) and what security data can be reached remotely, you lower the chance that a compromised account or device can be used to take over systems or harvest sensitive logs and alerts. Practically, you must identify permitted remote admin commands, identify which security data can be accessed remotely, and formally authorize both before enabling them.
Establish a Remote Administration Policy that defines when remote privileged activity is allowed, how it is approved, and which tools and networks are permitted. Complement it with procedures for VPN and remote access, privileged account management (including split admin accounts), service account handling, device authorization (trusted/managed devices only), change and ticket-based approvals, emergency “break-glass” use, logging and monitoring, and periodic access reviews and recertifications. Include onboarding/offboarding steps that add/remove users from remote-admin groups and define an exceptions process with time-bound approvals.
A 120-person manufacturer decides that admin activity should occur onsite, except for limited help desk support. They create split accounts for IT staff and configure VPN policies so only standard user accounts can connect; admin accounts are denied VPN access. The help desk is granted remote support rights through an RMM tool to user endpoints, but firewall rules block the VPN subnet from reaching domain controllers, hypervisors, firewall management, and the syslog/SIEM network. A “Remote-Admin-Approved” group provides time-bound access to the jump host for rare after-hours changes, granted via a ticket and auto-expiring in two hours. MFA is required for VPN and the jump host, and only managed, encrypted laptops with EDR can connect. All remote sessions through the jump host are logged and session-recorded to the SIEM, and access to the SIEM itself is internal-only, with no VPN routing to that VLAN. Quarterly, the IT manager reviews group memberships and session logs, removing any stale access and documenting the review.
To meet AC.L2-3.1.15, SMBs should make remote privileged activity the exception, not the norm: define what is permitted, who can do it, from which devices, and through which tightly controlled paths. A clear Remote Administration Policy, split accounts, MFA, managed devices, jump hosts, and network segmentation prevent routine VPN users from reaching privileged systems or security data. Approvals, time-bound access, and comprehensive logging provide assurance and auditability. Together, these policy and technical controls materially reduce the risk that a compromised remote user can execute privileged commands or exfiltrate security-relevant information.
Quick & Simple
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you
We typically reply within minutes