Remote access policy

Remote access policy

Remote access policy is a document which outlines and defines acceptable methods of remotely connecting to the internal network. It is essential in large organization where networks are geographically dispersed and extend into insecure network locations such as public networks or unmanaged home networks. It should cover all available methods to remotely access internal resources:
* dial-in (SLIP, PPP)
* ISDN/Frame Relay
* telnet access from Internet
* Cable modem

Content

* Should define who is allowed to have remote access capabilities.
* Should define what methods are allowed for remote access.
* Should discuss if dial-out modems are allowed.
* Should discuss who is allowed to have high-speed remote access such as ISDN, Frame Relay or cable modem.
* Should discuss any restrictions on data that can be accessed remotely.
* If partners connections are commonplace, should discuss requirements and methods.

ee also

*Network security policy
*Computer security policy
*User account policy
*Internet security
*Computer security
*Network security
*Industrial espionage
*Information security

External links

* [http://csrc.nist.gov/ National Institute for Standards and Technology]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Broadband Remote Access Server — A broadband remote access server (BRAS or BBRAS) routes traffic to and from the digital subscriber line access multiplexers (DSLAM) on an Internet service provider s (ISP) network.The BRAS sits at the core of an ISP s network, and aggregates user …   Wikipedia

  • Remote Desktop Services — Developer(s) Microsoft Stable release 7.0 (6.1.7600) / October 27, 2009 …   Wikipedia

  • Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… …   Wikipedia

  • Information protection policy — is a document which provides guidelines to users on the processing, storage and transmission of sensitive information. Main goal is to ensure information is appropriately protected from modification or disclosure. It may be appropriate to have… …   Wikipedia

  • Information security policy documents — An information security policy document contains the written statements for how an organization intends to protect information. Written information security policy documents are required for compliance with various security and privacy… …   Wikipedia

  • Remote backup service — Types of Internet hosting service Full featured hosting Virtual private server · Dedicated hosting · …   Wikipedia

  • Microsoft Forefront Unified Access Gateway — Unified Access Gateway Original author(s) Microsoft corporation …   Wikipedia

  • Broadband Internet access — Broadband Internet access, often shortened to just broadband, is high speed Internet access typically contrasted with dial up access over a modem.Dial up modems are generally only capable of a maximum bitrate of 56 kbit/s (kilobits per second)… …   Wikipedia

  • Group Policy — Local Security Policy editor in Windows 7 Group Policy is a feature of the Microsoft Windows NT family of operating systems. Group Policy is a set of rules that control the working environment of user accounts and computer accounts. Group Policy… …   Wikipedia

  • Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”