Skip to main content
NetStable
Level 2 AC.L2-3.1.13

Employ cryptographic mechanisms to protect the confidentiality of remote access sessions

πŸ“– What This Means

This practice requires that organizations use encryption to secure remote access sessions, ensuring that sensitive data transmitted over these sessions cannot be intercepted or read by unauthorized parties. In plain terms, it means that when employees or contractors connect to your systems from outside the office, the connection must be encrypted to protect the information being accessed or transferred. For example, using a Virtual Private Network (VPN) with strong encryption ensures that even if someone intercepts the data, they cannot read it. Another example is using HTTPS for web-based access, which encrypts the data between the user's browser and the server.

🎯 Why It Matters

Remote access sessions are a common target for cyber attackers because they often bypass traditional perimeter defenses. Without encryption, sensitive data such as login credentials, emails, or files can be easily intercepted through techniques like man-in-the-middle attacks. A real-world example is the 2017 Equifax breach, where attackers exploited unencrypted web portals to steal sensitive data of 147 million people. The potential impact includes financial losses, regulatory fines, reputational damage, and loss of trust. The DoD emphasizes this control because protecting Controlled Unclassified Information (CUI) during remote access is critical to national security.

βœ… How to Implement

  1. Enable SSL/TLS for all cloud services (e.g., AWS EC2, Azure Virtual Machines).
  2. Use VPN or Direct Connect (AWS) / ExpressRoute (Azure) for secure remote access.
  3. Configure Identity and Access Management (IAM) to enforce Multi-Factor Authentication (MFA).
  4. Use cloud-native encryption tools like AWS KMS or Azure Key Vault to manage encryption keys.
  5. Ensure all remote desktop protocols (RDP, SSH) are configured to use strong encryption (e.g., AES-256).
  6. Regularly audit and update encryption configurations using cloud monitoring tools.
⏱️
Estimated Effort
Implementation typically takes 10-20 hours, depending on the complexity of the environment. Requires intermediate-level IT expertise.

πŸ“‹ Evidence Examples

Remote Access Policy

Format: PDF/DOC
Frequency: Annual updates.
Contents: Policy detailing encryption requirements for remote access.
Collection: Download from policy repository.

VPN Configuration Screenshot

Format: PNG/JPG
Frequency: After configuration changes.
Contents: Screenshot showing AES-256 encryption settings.
Collection: Capture from VPN admin console.

SSL/TLS Certificate Details

Format: TXT/CSV
Frequency: Quarterly.
Contents: Certificate details including expiration date and encryption strength.
Collection: Export from certificate management tool.

Access Logs

Format: CSV/LOG
Frequency: Monthly.
Contents: Logs showing encrypted remote access sessions.
Collection: Export from logging tool.

Penetration Testing Report

Format: PDF
Frequency: Annual.
Contents: Results of testing remote access encryption.
Collection: Obtain from security team.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AC.L2-3.1.13 ("Employ cryptographic mechanisms to protect the confidentiality of remote access sessions"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how access to CUI systems is controlled, including the specific IAM tools, policies, and processes used. Reference your Access Control Policy and identify the systems in scope. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AC.L2-3.1.13 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to employ cryptographic mechanisms to protect the confidentiality of remote access .... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AC.L2-3.1.13 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to employ cryptographic mechanisms to protect the confidentiality of remote access .... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AC.L2-3.1.13 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all access points to CUI systems (VPN, direct network, cloud portals)
  • β€’ Document which IAM system manages access (Azure AD, AWS IAM, on-prem AD)
  • β€’ Map user roles to system access levels
  • β€’ Ensure this control covers all systems within your defined CUI boundary where employ cryptographic mechanisms to protect the confidentiality of remote access sessions applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Access Control Policy
  • πŸ“„ IAM configuration documentation
  • πŸ“„ Access request and approval records
  • πŸ“„ Evidence artifacts specific to AC.L2-3.1.13
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that access controls are implemented as described, test whether unauthorized users are blocked, and review access logs for evidence of enforcement.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented remote access policy that requires encryption?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Create a remote access policy with encryption requirements. Timeline: 1 week.
Remediation:
Use templates from NIST SP 800-53 or ISO 27001.

Question 2: Are all remote access sessions encrypted using AES-256 or equivalent?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Configure VPN or TLS encryption. Timeline: 2 weeks.
Remediation:
Use OpenVPN or AWS KMS for configuration.

Question 3: Are SSL/TLS certificates up to date and configured for all web-based access?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Renew certificates and enforce TLS 1.2+. Timeline: 1 week.
Remediation:
Use Let’s Encrypt for free certificates.

Question 4: Are access logs regularly reviewed for encrypted sessions?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Implement log monitoring and review process. Timeline: 2 weeks.
Remediation:
Use tools like Splunk or ELK for log analysis.

Question 5: Have you conducted penetration testing to validate encryption effectiveness?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Schedule penetration testing. Timeline: 1 month.
Remediation:
Hire a third-party tester or use tools like Metasploit.

⚠️ Common Mistakes (What Auditors Flag)

1. Using outdated encryption protocols like SSL 3.0 or TLS 1.0.

Why this happens: Lack of awareness or failure to update configurations.
How to avoid: Regularly audit and enforce TLS 1.2 or higher.

2. Failing to encrypt all remote access methods (e.g., RDP without VPN).

Why this happens: Partial implementation or oversight.
How to avoid: Ensure all remote access protocols are encrypted.

3. Not renewing SSL/TLS certificates before expiration.

Why this happens: Poor certificate management practices.
How to avoid: Set up automated renewal alerts.

4. Lack of documentation for encryption configurations.

Why this happens: Focus on implementation over documentation.
How to avoid: Maintain detailed records of all encryption settings.

5. Failing to test encryption effectiveness.

Why this happens: Assumption that encryption is sufficient without validation.
How to avoid: Conduct regular penetration testing.

πŸ“š Parent Policy

This practice is governed by the Access Control Policy

View AC Policy β†’

πŸ“š Related Controls