295,399 views
28 votes
28 votes
How to design remote access policy using the appropriate access controls for systems,applications, and data access

User Dtg
by
3.0k points

1 Answer

21 votes
21 votes

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Step-by-step explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

User Austin Cummings
by
2.6k points