NIST 800-53 makes remote desktops a battlefield. Every connection is a potential breach. Every session can be exploited if the controls are weak. The standard draws hard lines. Follow them, or your remote access environment will fail audit and invite risk.
Remote desktop solutions under NIST 800-53 must implement access control, session management, encryption, auditing, and continuous monitoring. AC-2 demands strict account management—no orphaned accounts, no shared credentials. AC-17 requires secure remote access with multifactor authentication. Connections must be encrypted using strong ciphers that meet federal cryptographic standards.
Audit logging is not optional. AU-2 and AU-12 mandate that every remote desktop session is tracked, timestamped, and stored in a tamper-resistant system. SA-9 warns against using unmanaged remote software. Only approved, tested tools can run in the environment. SC-7 enforces boundary protection—no remote desktop traffic should bypass the prescribed gateways.