{"id":12615,"date":"2022-06-30T15:09:18","date_gmt":"2022-06-30T15:09:18","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=12615"},"modified":"2022-06-30T15:09:19","modified_gmt":"2022-06-30T15:09:19","slug":"securing-remote-access-nist-cybersecurity-framework","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/","title":{"rendered":"Securing Remote Access Based on the NIST Cybersecurity Framework"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12615\" class=\"elementor elementor-12615\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3adec335 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3adec335\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dd0648b\" data-id=\"dd0648b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7530d229 elementor-widget elementor-widget-text-editor\" data-id=\"7530d229\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At a minimum, an organization\u2019s cyber risk increases when any kind of externally-facing Remote Access exists. And, in a worst-case scenario (that is relatively common across ransomware and data breach-related cyberattacks), the risk proves to be certain, as threat actors leverage unsecured remote access as the initial vector for an attack.<\/p><p>I\u2019ve also discussed some high-level ways to improve the security of remote access but wanted to take a moment and see how some of the industry\u2019s most highly-respected security standards look to address insecurities found within remote access. And, in an effort to look at the problem through a number of lenses simultaneously, I thought it prudent to start with the Cybersecurity Framework (CSF) from the National Institute of Standards and Technology (NIST), or, more commonly referred to as the NIST CSF.<\/p><p>First, an ever-so-brief primer on the NIST CSF. In the current iteration of the <a href=\"https:\/\/www.nist.gov\/cyberframework\/online-learning\/components-framework\">framework core<\/a> (we\u2019re on CSF version 1.1 as of the date of this article) are five Functions representing the major groupings of cybersecurity activities. These are <em>Identify<\/em>, <em>Protect<\/em>, <em>Detect<\/em>, <em>Respond<\/em>, and <em>Recover<\/em>. The Functions are further broken down into <em>Categories<\/em> and <em>Subcategories<\/em> representing more granular specific desired outcomes.\u00a0 And, lastly, there are <em>Informative References<\/em> which are specific standards from industry-recognized regulations, best practices, etc. that can be used as examples of practical guidance on how to address a particular aspect of your cybersecurity strategy.\u00a0 There\u2019s also a maturity aspect NIST refers to as <em>Implementation Tiers<\/em> so you can gauge how well your organization is doing at implementing each required cybersecurity activity.<\/p><p>With the primer out of the way, let\u2019s talk about how the NIST CSF applies to Remote Access. There are two ways to look at how NIST applies \u2013 directly and indirectly.\u00a0 The direct approach is easy; under the <em>Protect<\/em> function, within the <em>Identity Management, Authentication, and Access Control <\/em>category lies a subcategory entitled <em>PR.AC-3: Remote access is managed.<\/em> So, in essence, NIST goes right for the remote access jugular and tells you \u201cthis is something that needs to be secure.<\/p><p>So, what does NIST mean with they say remote access must be <em>managed<\/em>?<\/p><p>The informative references under this subcategory provide us with an idea of how we should be managing remote access. Let\u2019s look at a few relevant examples from within PR.AC-3:<\/p><ul><li><strong>Center for Internet Security (CIS) Critical Security Control (CSC) 12: Network Infrastructure Management<\/strong> \u2013 CIS wants to see any type of remote access (although they focus primarily on VPN-based access) <a href=\"https:\/\/controls-assessment-specification.readthedocs.io\/en\/latest\/control-12\/control-12.7\/\">connected to the organizations \u201cAuthentication, Authorization, and Auditing\u201d services<\/a> (which they refer to as \u201cAAA\u201d). Your takeaway is that credentialed access should involve a central directory service like AD, a cloud SSO, etc. that is being used organization-wide. It also should plug into some form of auditing (in this case, I\u2019d be thinking that the logons are centrally logged at a minimum).<\/li><li><strong>COBIT 2019<\/strong> \u2013 While the current iteration of the CSF mentions COBIT version 5, the most current version (2019) has quite a bit more to say about <a href=\"https:\/\/www.isaca.org\/resources\/news-and-trends\/industry-news\/2020\/managing-remote-work-environments-with-cobit-2019\">remote access to work environments.<\/a> In short, remote access is seen as a critical asset for some employees and it needs to be monitored while maintaining up-to-date access control.<\/li><li><strong>NIST Special Publication 800-53<\/strong> \u2013 This document is all about security controls and has an entire section devoted to remote access. Some of the aspects you should consider having in place are monitoring and control of remote access, centralized management of remote access, limitation of privileged access over a remote session, protection of corporate information via remote access, ability to abruptly disconnect a remote session.<\/li><\/ul><p>While there are other informative references, these provide you with some idea of how NIST sees remote access as SO much more than just opening up RDP to the Internet and allowing users to log in.<\/p><p>But you can\u2019t just stop with the controls that are specific to remote access, as there are other aspects of your cybersecurity stance that should be in place to <em>indirectly <\/em>ensure remote access can <em>only<\/em> be used for legitimate purposes.\u00a0<\/p><p>Some of those CSF controls include:<\/p><ul><li><strong>AC-4: <em>Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties<\/em><\/strong> \u2013 realize that threat actors use exposed remote access sessions to gain a foothold within an organization\u2019s network. And should the credentials they use to gain access be privileged, you\u2019re only helping the bad guy continue their malicious actions. So, limit privileged access over the remotely-accessed host device as much as possible.<\/li><li><strong>AC-7: <em>Users, devices, and other assets are authenticated (e.g., single-factor, multifactor) commensurate with the risk of the transaction (e.g., individuals\u2019 security and privacy risks and other organizational risks)<\/em><\/strong> \u2013 I\u2019m going to interpret this the only way you should: put MFA in place, period. For every user, regardless of what their role is, whether they are the CEO or the mailroom clerk, etc.\u00a0 Now, what that MFA looks like is entirely up to you (and NIST has a whole other standard around <a href=\"https:\/\/pages.nist.gov\/800-63-3\/\">authentication and digital identities<\/a> to help establish how many factors, what kinds of factors should be acceptable, etc.), but what\u2019s at least initially important is that you have MFA of some form in place with all remote access.<\/li><\/ul><h2>Aligning Remote Access Security with NIST<\/h2><p>One of the challenges of aligning practical implementation with standards and best practices is that they often are written in such generic terms.\u00a0 In reality, they need to be, as the authors of the guidance need to put something out there that can provide value to every organization, regardless of what their network environment looks like.<\/p><p>But in the case of the NIST CSF, the informative references help provide context around specifically what you should be doing to improve security. And, in the case of remote access, it\u2019s pretty clear that remote access cannot just be about blindly providing access but needs to be implemented in a way that takes the potential risks it creates seriously, and compensates with security controls that make remote access at least as secure \u2013 if not more \u2013 than its in-office equivalent.<\/p><p>By putting the suggested management, monitoring, privileged access, and authentication guidance into place over either your existing remote access solution or by implementing a new one that can meet the desired outcomes, you will create a flexible means of providing remote users with access to corporate resources \u2013 but do so in a way that has the necessary levels of visibility and control needed to actually improve your organization\u2019s cybersecurity stance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>I\u2019ve covered in previous articles how remote access can be used by threat actors as a means of gaining entrance, persistence, stealth, and more as part of a cyberattack. And this potential misusing of remote access brings with it some hefty repercussions.<\/p>\n","protected":false},"author":20,"featured_media":12616,"template":"","blog_category":[280,281,257],"class_list":["post-12615","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Remote Access Based on the NIST Cybersecurity Framework<\/title>\n<meta name=\"description\" content=\"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Remote Access Based on the NIST Cybersecurity Framework\" \/>\n<meta property=\"og:description\" content=\"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-30T15:09:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1254\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"Securing Remote Access Based on the NIST Cybersecurity Framework\",\"datePublished\":\"2022-06-30T15:09:18+00:00\",\"dateModified\":\"2022-06-30T15:09:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/\"},\"wordCount\":1100,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Securing-remote-access-VNC-Connect.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/\",\"name\":\"Securing Remote Access Based on the NIST Cybersecurity Framework\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Securing-remote-access-VNC-Connect.jpg\",\"datePublished\":\"2022-06-30T15:09:18+00:00\",\"dateModified\":\"2022-06-30T15:09:19+00:00\",\"description\":\"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Securing-remote-access-VNC-Connect.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Securing-remote-access-VNC-Connect.jpg\",\"width\":1254,\"height\":836,\"caption\":\"Securing remote access VNC Connect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/securing-remote-access-nist-cybersecurity-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing Remote Access Based on the NIST Cybersecurity Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Remote Access Based on the NIST Cybersecurity Framework","description":"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/","og_locale":"en_US","og_type":"article","og_title":"Securing Remote Access Based on the NIST Cybersecurity Framework","og_description":"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-06-30T15:09:19+00:00","og_image":[{"width":1254,"height":836,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"Securing Remote Access Based on the NIST Cybersecurity Framework","datePublished":"2022-06-30T15:09:18+00:00","dateModified":"2022-06-30T15:09:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/"},"wordCount":1100,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/","url":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/","name":"Securing Remote Access Based on the NIST Cybersecurity Framework","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg","datePublished":"2022-06-30T15:09:18+00:00","dateModified":"2022-06-30T15:09:19+00:00","description":"In this article, we see how some of the industry\u2019s highly-respected security standards help with securing remote access insecurities.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/06\/Securing-remote-access-VNC-Connect.jpg","width":1254,"height":836,"caption":"Securing remote access VNC Connect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/securing-remote-access-nist-cybersecurity-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Securing Remote Access Based on the NIST Cybersecurity Framework"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/12615\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/12616"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=12615"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=12615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}