Remote Access | AC-17
Description
- Remote access to an information resource must be approved by the Chief Information & Technology Officer's designee and the Cybersecurity Manager before access is made
- Usage restrictions, configuration/connection requirements and implementation guidance is allowed. At a minimum:
- Remote access to Âé¶¹´«Ã½Ó³»-owned information resources must be conducted using a Âé¶¹´«Ã½Ó³» controlled, encrypted point-to-point tunnel. Examples include the Âé¶¹´«Ã½Ó³» Virtual Private Network (VPN), SSH, Microsoft Remote Desktop Protocol (RDP) over TLS, TN3270 over TLS and HTTPS over TLS.
- RDP must be configured to require appropriate network encryption such as TLS.
- RDP and SSH connections must initiate within the Âé¶¹´«Ã½Ó³» network or through a secure Public access for these services is not allowed.
Last updated: 3/11/2024
Contact Hours
Questions?