Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

remote access

Definitions:

  Access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet).
Sources:
NIST SP 1800-10B under Remote Access from NIST SP 800-128
NIST SP 800-128 under Remote Access

  Access by users (or information systems) communicating external to an information system security perimeter.
Sources:
NIST SP 800-18 Rev. 1 under Remote Access

  Access to an organizational system by a user (or a process acting on behalf of a user) communicating through an external network.
Sources:
NIST SP 800-128
NIST SP 800-53 Rev. 5
NIST SP 800-82r3 from NIST SP 800-53 Rev. 5
NIST IR 8401 from NIST SP 800-53 Rev. 5

  Access to an organizational information system by a user (or a process acting on behalf of a user) communicating through an external network (e.g., the Internet).
Sources:
CNSSI 4009-2015

  Access to an organizational system by a user (or a process acting on behalf of a user) communicating through an external network (e.g., the Internet).
Sources:
NIST SP 800-172
NIST SP 800-171 Rev. 2

  Access by users (or information systems) communicating external to an information system security perimeter.Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).
Sources:
NISTIR 8183 under Remote Access

  Access by users (or information systems) communicating external to an information system security perimeter. Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).
Sources:
NISTIR 8183 under Remote Access
NISTIR 8183 Rev. 1 under Remote Access
NISTIR 8183A Vol. 1 under Remote Access
NISTIR 8183A Vol. 2 under Remote Access
NISTIR 8183A Vol. 3 under Remote Access