NIST 800-53 defines strict controls for managing who can access what. Ad hoc access control sits at the edge of those controls. It is permission granted outside normal workflows — created on demand, often without full logging or policy oversight. This is dangerous, but sometimes necessary.
Under NIST 800-53, ad hoc access must align with Access Control family requirements, especially AC-2 (Account Management), AC-3 (Access Enforcement), and AC-6 (Least Privilege). These clauses exist to ensure that even temporary or special permissions follow documented rules, require approval, and expire on schedule.
Unmanaged ad hoc access is a security gap. A developer running a one-off query in production. An admin granting a quick exception to bypass a stuck process. A support engineer troubleshooting a live issue. Without controls, these moments create attack surfaces. Threat actors know this, and they exploit it.