{"id":20889,"date":"2023-07-13T08:01:38","date_gmt":"2023-07-13T08:01:38","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=20889"},"modified":"2026-04-13T10:44:26","modified_gmt":"2026-04-13T09:44:26","slug":"binding-operational-directive-23-02","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/","title":{"rendered":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20889\" class=\"elementor elementor-20889\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28744caa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28744caa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29e264da\" data-id=\"29e264da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-120d8ca2 elementor-widget elementor-widget-text-editor\" data-id=\"120d8ca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">In 2023, the Cybersecurity and Infrastructure Security Agency (CISA) released <em>Binding Operational Directive 23-02 (BOD 23-02): Mitigating the Risk from Internet-Exposed Management Interfaces<\/em> \u2013 a <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/binding-operational-directive-23-02\" target=\"_blank\" rel=\"noopener noreferrer\">directive aimed at securing both network management devices<\/a> and device management interfaces (e.g., firewalls, routers, VPNs, etc.) and any device that can be remotely managed using a variety of internal enterprise network protocols including hypertext transfer protocol (HTTP), file transfer protocol (FTP), SSH, SMB, and Remote Desktop Protocol (RDP).<\/p>\n<p>While BOD 23-02 is mandatory for federal civilian agencies, CISA has strongly encouraged private sector organizations to follow the same guidance. The risks created by internet-exposed management interfaces are not unique to government environments, and the directive reflects broader cybersecurity best practices that apply to any enterprise network.<\/p>\n<h2>Understanding CISA BOD 23-02<\/h2>\n<p>The CISA BOD 23-02 directive mandates that federal agencies and sub-agencies make applicable interfaces across federal information systems \u2013 whether internally discovered or \u201cwithin 14 days of notification by CISA\u201d \u2013 only accessible internally or enforce access controls where a policy enforcement point is established from a separate device (a basic tenet of Zero Trust architecture capabilities).<\/p>\n<p>The directive applies specifically to dedicated device interfaces used for administrative access and requires that they be removed from the public facing internet or protected through a policy enforcement point separate from the system being accessed.<\/p>\n<p>CISA, the federal infrastructure security agency, which is part of the Department of Homeland Security, also clarified that they planned to scan for devices and interfaces as part of ongoing asset management efforts to identify devices in scope of the Directive and notify agencies of all findings. This includes identifying newly added devices and devices residing outside expected network boundaries, with agencies expected to maintain visibility through a centralized reporting interface.<\/p>\n<p>Not more than two weeks later, an analysis of more than 50 federal civilian executive branch agencies was <a href=\"https:\/\/censys.com\/blog\/identifying-cisa-bod-23-02-internet-exposed-networked-management-interfaces-with-censys\" target=\"_blank\" rel=\"noopener noreferrer\">conducted by Internet threat-hunting vendor Censys.<\/a> In total, Censys found over <em>250 instances<\/em> of \u201cweb interfaces for hosts exposing network appliances, many of which were running remote protocols.\u201d<\/p>\n<h2>How Exposed Interfaces Expand Your Attack Surface<\/h2>\n<p>The analysis definitely confirms CISA&#8217;s worst fears: that, despite a belief that an agency&#8217;s <a href=\"https:\/\/www.realvnc.com\/en\/connect\/plan\/enterprise\/\" target=\"_blank\" rel=\"noopener noreferrer\">enterprise network is secure<\/a>, there are plenty of exposed ports tied to misconfigured management interfaces, which provide threat actors with management communication protocols used to perform administrative activities that can potentially be misused for malicious purposes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76190c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76190c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d079580\" data-id=\"d079580\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c748442 elementor-widget elementor-widget-image\" data-id=\"c748442\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"680\" height=\"680\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/scope-exposure-analysis.webp\" class=\"attachment-full size-full wp-image-84442\" alt=\"Scope exposure: Analysis of FCEB agencies\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/scope-exposure-analysis.webp 680w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/scope-exposure-analysis-300x300.webp 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/scope-exposure-analysis-150x150.webp 150w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f31c557 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f31c557\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c1b5ab\" data-id=\"4c1b5ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bfd423 elementor-widget elementor-widget-text-editor\" data-id=\"3bfd423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">The attack surface created by these exposures often includes legacy services such as simple network management protocol or trivial file transfer protocol, which were never designed to be safely accessible over modern networks.<\/p>\n<h3>Securing Network Devices and Network Infrastructure<\/h3>\n<p>So, what should organizations in the private sector take away from this directive and subsequent risk analysis? Three things come to mind:<\/p>\n<h4>1. Any Kind of Remote Access Can Be a Risk<\/h4>\n<p>While we spend a lot of time on this blog talking mostly about <a href=\"https:\/\/www.realvnc.com\/en\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access<\/a> from an authorized user \u201cremotely accessing a desktop\u201d perspective, CISA&#8217;s list of protocols in the directive is rather extensive and aligns with the long list of examples found within two Initial Access techniques from the MITRE ATT&amp;CK Framework: <a href=\"https:\/\/attack.mitre.org\/techniques\/T1190\/\" target=\"_blank\" rel=\"noopener noreferrer\">Exploit Public-Facing Application<\/a> and <a href=\"https:\/\/attack.mitre.org\/techniques\/T1133\/\" target=\"_blank\" rel=\"noopener noreferrer\">External Remote Access<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-43161c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43161c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53a5825\" data-id=\"53a5825\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b56853 elementor-widget elementor-widget-image\" data-id=\"9b56853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"680\" height=\"680\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/mitre-attack-initial-access-techniques.webp\" class=\"attachment-full size-full wp-image-84443\" alt=\"MITRA ATT&amp;CK: Initial Access Techniques\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/mitre-attack-initial-access-techniques.webp 680w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/mitre-attack-initial-access-techniques-300x300.webp 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/mitre-attack-initial-access-techniques-150x150.webp 150w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-66b77f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"66b77f0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b85ceee\" data-id=\"b85ceee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eda3201 elementor-widget elementor-widget-text-editor\" data-id=\"eda3201\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Beyond RDP, services such as virtual network computing, remote login, and even legacy teletype network access methods continue to appear in real-world environments, increasing the likelihood of exploitation.<\/p>\n<p>CISA does mention a number of <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote desktop<\/a>-type protocols in their directive as well, furthering the notion that this kind of access remains a risk.<\/p>\n<h4>2. You Have More Present Risk Than You Think<\/h4>\n<p>The Censys analysis found an average of five interfaces per agency that met the Directive&#8217;s criteria. Some of them were even using the Windows SMB protocol (meaning, in theory, an external machine could map a drive to a Windows share at the exposed IP address).<\/p>\n<p>In many environments, exposed access also extends to load balancers, application programming interfaces, and management portals that were never intended to be reachable externally.<\/p>\n<p>Unless your organization does its own threat hunting and port scanning, you should assume you have more exposure than you know about and commission an analysis of your own externally facing risk.<\/p>\n<h4>3. \u201cSecure\u201d is the Goal<\/h4>\n<p>While CISA&#8217;s first mandate is to \u201cremove the interface from the internet,\u201d it&#8217;s only mentioned as an alternative, should an agency not be able to bring the exposed under proper controls. From the directive:<\/p>\n<blockquote>\n<p><em>For the purposes of this Directive, as outlined in the required actions section below, networked management interfaces are allowed to remain accessible from the internet on networks where agencies employ capabilities to mediate all access to the interface in alignment with OMB M-22-09, NIST 800-207, the TIC 3.0 Capability Catalog, and CISA&#8217;s Zero Trust Maturity Model.<\/em><\/p>\n<\/blockquote>\n<p>Zero Trust Architecture is an enterprise approach to designing and implementing access policies that assume no implicit trust and require continuous verification for every access request.<\/p>\n<p>This approach often includes placing management access behind an isolated management network and deploying capabilities that continuously validate identity, device posture, and session context.<\/p>\n<p>The practice minimizes uncertainty by enforcing least-privilege access decisions across information systems and services, ensuring that users and devices receive only the access required for a specific task, session, and duration.<\/p>\n<p>So, CISA is saying that IF you can properly secure your remote access (using Zero Trust as the standard), it&#8217;s acceptable to have it continue to be accessible from the public Internet.<\/p>\n<h2>&#8220;Zero Trust Remote Access&#8221;?<\/h2>\n<p>All four of the referenced documents help to define Zero Trust principles and Zero Trust capabilities.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4270e5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4270e5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-babb2c2\" data-id=\"babb2c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f24194 elementor-widget elementor-widget-image\" data-id=\"3f24194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"680\" height=\"340\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/zero-trust-remote-access.webp\" class=\"attachment-full size-full wp-image-84444\" alt=\"Zero Trust Remote Access\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/zero-trust-remote-access.webp 680w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/zero-trust-remote-access-300x150.webp 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0333520 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0333520\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b76128\" data-id=\"4b76128\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cde2b02 elementor-widget elementor-widget-text-editor\" data-id=\"cde2b02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">It&#8217;s important to keep in mind that there are only Zero Trust principles and solutions that adhere to them. There are no actual &#8220;Zero Trust solutions&#8221; (i.e., solutions that have somehow received a nonexistent Zero Trust certification, etc.).<\/p>\n<p>According to CISA, what&#8217;s important when applying this to your organization&#8217;s secure remote desktop access is:<\/p>\n<ol>\n<li>\n<p>that the remote access is secured by policy<\/p>\n<\/li>\n<li>\n<p>that the policy engine (the system that establishes and pushes out security policies) be separate from the system providing the remote access.<\/p>\n<\/li>\n<\/ol>\n<p>So, to bring any remote access under \u201ccompliance\u201d (if you will) with CISA&#8217;s directive for Zero Trust principles to be in place, there are a few things you can initially do:<\/p>\n<h3>1. Use a Centrally Managed Remote Access Solution<\/h3>\n<p>If you are using, say, a single endpoint providing RDP access externally, you&#8217;re definitely not secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ca41f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ca41f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e32407\" data-id=\"6e32407\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e39957 elementor-widget elementor-widget-image\" data-id=\"2e39957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1360\" height=\"1360\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access.webp\" class=\"attachment-full size-full wp-image-84445\" alt=\"Legacy vs Zero Trust Remove Access Setup\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access.webp 1360w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access-300x300.webp 300w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access-1024x1024.webp 1024w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access-150x150.webp 150w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/legacy-vs-zero-trust-remote-access-768x768.webp 768w\" sizes=\"(max-width: 1360px) 100vw, 1360px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d38f21e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d38f21e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11e658e\" data-id=\"11e658e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7989685 elementor-widget elementor-widget-text-editor\" data-id=\"7989685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">You need to use a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-desktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access solution<\/a> that centrally establishes who can access which systems remotely, from where, and when, etc.<\/p>\n<h3>2. Use Multi-Factor Authentication (MFA)<\/h3>\n<p>Nestled somewhat within the NIST 800-207 document that describes Zero Trust as a core tenet that states that MFA should be used. While not stated as required at all times, we&#8217;re talking about providing access to an endpoint within organizational information systems; it potentially could also be a persistent foothold for threat actors. So, <a href=\"https:\/\/www.realvnc.com\/en\/blog\/3-reasons-why-mfa-remote-access-strategy\/\" target=\"_blank\" rel=\"noopener noreferrer\">MFA is needed<\/a> here <em>always<\/em>.<\/p>\n<h3>3. Determine if Secure Remote Management and Access is All You Need<\/h3>\n<p>The state of organizational cybersecurity, in general, is moving towards Zero Trust, albeit slowly; fully implementing Zero Trust can take <em>years<\/em>. It&#8217;s why I emphasize the immediate need to embrace Zero Trust <em>principles<\/em> and not be concerned so much with needing to be \u201ccompliant\u201d with Zero Trust (as if it&#8217;s a standard with specific implementation requirements\u2026 which it&#8217;s not).<\/p>\n<p>But for those of you thinking that you want to better understand what differentiates solutions like Zero Trust Network Access and a Secure Remote Access solution, <a href=\"https:\/\/www.realvnc.com\/en\/blog\/zero-trust-network-access-vs-remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">read about which solution is right for your organization<\/a>.<\/p>\n<h2>Mitigating the Risk: Secure Your Remote Access\u2026 And Fast!<\/h2>\n<p>If nothing else, the directive from CISA makes the case that the risk created by exposed remote access is something that needs to be addressed quickly. Their 14-day required response time indicates how big a problem this is, and how fast your organization should address the risk, regardless of whether you are in the public or private sector.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In 2023, the Cybersecurity and Infrastructure Security Agency (CISA) released Binding Operational Directive 23-02 (BOD 23-02): Mitigating the Risk from Internet-Exposed Management Interfaces \u2013 a directive aimed at securing both network management devices and device management interfaces (e.g., firewalls, routers, VPNs, etc.) and any device that can be remotely managed using a variety of internal &#8230; <a title=\"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/\" aria-label=\"Read more about How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\">Read more<\/a><\/p>\n","protected":false},"author":16,"featured_media":20892,"template":"","blog_category":[280,281,257],"class_list":["post-20889","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-remote-access","blog_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access<\/title>\n<meta name=\"description\" content=\"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\" \/>\n<meta property=\"og:description\" content=\"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"999\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/\"},\"author\":{\"name\":\"Bogdan Bele\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\"},\"headline\":\"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\",\"datePublished\":\"2023-07-13T08:01:38+00:00\",\"dateModified\":\"2026-04-13T09:44:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/\"},\"wordCount\":1335,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/secure-remote-access-operational-directive.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/\",\"name\":\"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/secure-remote-access-operational-directive.jpg\",\"datePublished\":\"2023-07-13T08:01:38+00:00\",\"dateModified\":\"2026-04-13T09:44:26+00:00\",\"description\":\"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/secure-remote-access-operational-directive.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/secure-remote-access-operational-directive.jpg\",\"width\":1500,\"height\":999,\"caption\":\"Featured image for binding operational directive 23-02\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/binding-operational-directive-23-02\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\",\"name\":\"Bogdan Bele\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"caption\":\"Bogdan Bele\"},\"description\":\"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bogdanbele\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access","description":"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/","og_locale":"en_US","og_type":"article","og_title":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access","og_description":"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:26+00:00","og_image":[{"width":1500,"height":999,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/"},"author":{"name":"Bogdan Bele","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987"},"headline":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access","datePublished":"2023-07-13T08:01:38+00:00","dateModified":"2026-04-13T09:44:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/"},"wordCount":1335,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/","url":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/","name":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg","datePublished":"2023-07-13T08:01:38+00:00","dateModified":"2026-04-13T09:44:26+00:00","description":"Discover how the Binding Operational Directive 23-02 (BOD 23-02) makes a case (and mandate) for secure remote access.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/07\/secure-remote-access-operational-directive.jpg","width":1500,"height":999,"caption":"Featured image for binding operational directive 23-02"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/binding-operational-directive-23-02\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"How Binding Operational Directive 23-02 Makes the Case (and Mandate) for Secure Remote Access"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987","name":"Bogdan Bele","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","caption":"Bogdan Bele"},"description":"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.","sameAs":["https:\/\/www.linkedin.com\/in\/bogdanbele\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20889\/revisions"}],"predecessor-version":[{"id":89929,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20889\/revisions\/89929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/20892"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=20889"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=20889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}