Preview

Remote Access Control Policies

Satisfactory Essays
Open Document
Open Document
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Remote Access Control Policies
Chris Stewart
4/6/2014
NT2580 Mon AM

Policy General
1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments' networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to the company.
2. General access to the Internet for recreational use by employees is discouraged through the Richman Investments Network. Employees of Richman Investments are responsible to ensure they do not violate any policies or perform illegal activities. All employees are accountable of their actions.
3. Access to Richman Investments Trusted Network will only be allowed to Trusted Users and special IT administrators.
4. Remote or outside Trusted Users (defined below) may gain access to Trusted hosts in one of two ways:
5. Please review the following policies for details of protecting information when accessing the administrative network via remote access methods, and acceptable use of Richman Investments’ network:
a. Acceptable Use Policy (Policy on the Use of Computers and Data Communications)
b. Virtual Private Network (VPN) Policy
c. Trusted Access Policy
Requirements
1. Secure remote access must be strictly controlled. Control will be enforced via password authentication.
2. At no time should any Richman Investments employee provide his or her login or email password to anyone, not even family members.
3. Where possible use secure methods for remote access. I.E. Use SSH in place of Telnet, secure web servers, SCP in place of FTP.
Enforcement
Anyone found to have violated these Policies may have their network access privileges temporarily or permanently revoked.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    It is the responsibility of Remote Users to make sure that reasonable measures have been taken to secure the Remote Host used to access Richman IT Resources. This standard applies to all Remote Users of Richman IT Resources including staff, outside contractors, vendors, and other agents. Remote Access Security Standards All Remote Users must follow the security requirements set forth in this standard for any Remote Host accessing IT Resources prior to such access, as well as any guidelines, procedures, or other requirements issued by their departmental IT units and the owners of the IT Resource which are to be remotely accessed. Remote User responsibilities are described below: Remote User Requirements: Remote Users must make sure that their Remote Hosts used to access Richman IT Resources meet all security expectations specified in the End User Guidelines Security prior to accessing any Richman IT…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The following are Acceptable Use Policy or AUP for rolling Network Access and Internet Usage for Richman Investments. The qualification for the usage of the company network composed of filtering policies for traffic in the network and the usage of the internet are spelled out in this AUP. The use of the Internet is a privilege, not a right and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees of the company for the performance of their job related functions and not for personal use. Each employee that is given these privileges will have to comply with the company’s policy.…

    • 882 Words
    • 3 Pages
    Good Essays
  • Good Essays

    remote access policy

    • 464 Words
    • 2 Pages

    It will be the responsibility of all DoD employee’s, contractors, vendors, and agents that have remote access privileges to any DoD network to ensure that their remote access connection is given the same considerations as DoD on site users.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    network and denying services to legitimate users. This paper first presents a brief discussion on some of…

    • 9594 Words
    • 39 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 14

    • 750 Words
    • 4 Pages

    2. You should set a time limit on the remote assistance to limit the time someone has access to your PC and to prevent attack through the open port.…

    • 750 Words
    • 4 Pages
    Satisfactory Essays