2 hours 23 minutes
Hello and welcome back to I t. Security policy here on Cyber Eri.
This is Model three, the remote access policy with myself. Troy Lemaire
When this learning objective will have two things that we're gonna focus on the responsibility and then the requirements,
let's get into the policy itself. It's another Sands template policy
in the overview we're gonna look at remote access is for our corporate network, and it's essentially maintain our team's productivity. But in many cases, remote access originate from networks that may already be a compromise. Are at a significantly lower security posture than our corporate network.
The purpose of the policies to define rules and requirements for connecting to the network from any hosts. The rules. A requirement designed to minimize potential exposure
damages, which may result from unauthorized use of companies. Resource is,
if we go ahead and look at the scope of the policy, is gonna apply to all employees, contractors of injures and agents
with own or personally owned computers or workstations that connect to the company's network.
The policy applies to remote access connections used to do work on behalf of the company,
So if we look at the policy itself
basically remote access policy. If you boil it down, is gonna give the information that's needed for anybody that wants to connect in remotely
from outside into the company's network. To use any of the company's resource is to do their work.
This is tricky because a lot of times, if you have personal equipment, that personal equipment might not have the same standards as company own equipment. And so they might be more susceptible to things like viruses or malware. Things like that that once you remotely access something on the network could spread that into your own company's network. So you want to be very
in what is allowed in what is not allowed within the remote access policy.
So in the policy is the responsibility of all these people that work for the company to ensure the remote connection is giving the same consideration as on site connections.
General access to the Internet for recreational use. The company network is limited,
and when you access the company's network from a personal computer, authorized users are responsible preventing
access to any computer resource. Our data by non authorized users
doing anything illegal through the company's network is prohibited
and the user bears responsibility for, and the consequences of any of the
misuse of the authorized access
is authorized access. Excuse me. Authorized users will not use the networks to access the Internet for outside business interests.
So now that we get into the requirements of the actual policy,
this is gonna be the section that you're going to look at to modify to fit whatever is going on within your organization and the standards that you want the staff to comply with
some of the requirements that you can use here. Secure remote access must be strictly controlled with encryption,
such as a VPN.
Authorized users shall protect their log in and password even from family members.
And while using company owned computer remotely connected a network,
the user shall ensure the remote host is not connected to any other network at the same time,
the exception of personal networks that are under the complete control or under complete control of an authorized user. Our third party,
basically what that piece is saying, is that they're not gonna go down to their local Starbucks, get on the Starbucks WiFi and then try to connect into the company's
all host. They're connected. The company's internal network via remote access technologies must use the most up to date antivirus software.
If you're gonna have that, you're gonna need a way to enforce it.
A lot of times you can use certain tools, and we'll get into that in the next section. But those tools will be able to control what type of
and I virus are. Other mechanisms for security or used on their personal equipment
and the personal equipment used to connect to the network must meet the requirements
of the hardware and software configuration standards.
We look at what we tried, including every policies, compliance of the policy and just says that we're gonna be able to verify through various methods that this policy is being enforced.
In the end, noncompliance, any employee found that violate the policy subject to display an action up to and including termination of employment.
So in this lecture today, we cover remote access policy,
cover the responsibility as well as the requirements
recap question the authorized users bear responsibility for and the consequences of blank of the authorized users access
that is the misuse of the access
Second recap question authorized users shall protect their log in and password even from,
and that would be family members. You have to be very Larry, because if these people are doing things at home,
they're gonna have to be able to make sure that their family can't see what they're doing on their computers as well as not knowing their log in and password information.
We're looking forward. Our next lecture is gonna be on actual remote access tools policy that goes along with this remote access policy
sessions or clarification.
Message me on the side. Very message. My user name is that Troy Lemaire
and thank you for attending this training on Cyber Eri.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered