Remote-access Guide

controls that protect remote access ieee

by Dr. Gregory Anderson Published 3 years ago Updated 2 years ago
image

What are the disadvantages of remote access client devices?

Remote Access Vulnerabilities Remote access client devices generally have weaker protection than standard client devices Many devices not managed by the enterprise No enterprise firewalls, antivirus, etc. Lack of physical security controls Remote access client devices may be used in hostile environments but not configured for them

How to protect your network from remote access?

So, you have a three-layer line of defense working to protect remote access to your network: anti-virus, firewall, and VPN. The network security team should monitor alerts from these defenses constantly. Adopting two-factor authentication for remote access through VPN further boosts your network security.

What are the best practices for securing remote access?

Best Practices for Securing Remote Access. RAS: The most basic form of VPN remote access is through a RAS. This type of VPN connection is also referred to as a Virtual Private Dial-up Network ... IPSec: IPSec is an IP packet authentication and encryption method. It uses cryptographic keys to protect ...

How to ensure optimum security while working from a remote location?

A mix of strategies is required to achieve optimum security while allowing appropriate, or even maximum, access to your employees while working from a remote location. Let’s dive right in. The first thing that’s required to ensure smooth remote access via a VPN is to plan out a comprehensive network security policy.

image

Logical and Physical Access Control

If access control is the ability to selectively restrict who can access IT assets, then this can be accomplished in two main ways:

Hybrid IT Access Control Challenges

One of the main modern access control challenges is securing resources across a distributed and hybrid IT environment. Organizations use 2.6 public clouds on average for various business use cases, such as to store data, test and develop software, and run cloud-based applications.

Zero Trust Access

Another major challenge for companies trying to protect their IT resources from unauthorized access is the increasingly remote modern workforce. Even before Covid-19, many economists predicted a change to remote work as the next big trend in workforce dynamics.

Wrapping Up

There are numerous challenging aspects of modern access control that require specific strategies to secure your valuable IT resources. Understanding your environment, choosing a suitable access model, and opting for a zero-trust strategy are all useful tools to better control who can access which resources in complex modern IT environments.

1. User Access Controls

As any IT administrator can tell you, managing a complex set of user access controls for business systems can be a challenge, even on a good day. There’s a constant battle between the need to maintain operational and data security and the employee’s desire for convenience and low barriers to the use of company data resources.

2. Endpoint Protection

When employees are working within a company’s network, maintaining up-to-date and active endpoint protection is a must. It provides a critical backstop to protect the network in the event something gets past hardware-level perimeter defenses.

3. BYOD Policy and Management

For several years now, enterprises of all sizes have had to contend with a growing contingent of workers eager to use their personal devices to access company systems and data. The response to that was to implement bring your own device (BYOD) policies that spelled out which devices were acceptable and how they could be used.

4. End-User Training

Since the average business never had to deal with so many employees working off-site, there’s a good chance they also never took the time to provide whole-workforce training on how to do so safely.

Staying Safe and Secure

With plenty of effort and a little bit of good luck, IT admins can help the businesses they serve get through this unprecedented crisis without sacrificing data security or the employees’ ability to be productive. Paying careful attention in reviewing the points set forth here is a good place to start, but it’s not all that has to happen.

What is the line of defense for remote access?

So, you have a three-layer line of defense working to protect remote access to your network: anti-virus, firewall, and VPN. The network security team should monitor alerts from these defenses constantly.

What is the first thing that’s required to ensure smooth remote access via a VPN?

The first thing that’s required to ensure smooth remote access via a VPN is to plan out a comprehensive network security policy.

Why is IPSEC used?

This allows IPSec to protect data transmission in a variety of ways. IPSec is used to connect a remote user to an entire network. This gives the user access to all IP based applications. The VPN gateway is located at the perimeter of the network, and the firewall too is setup right at the gateway.

What are the implications of IPSec connections for corporations?

What are the implications of IPSec connections for corporations, considering the very nature of this connection? Well, your employee will only be able to access the network from a single, authorized device. Security is further boosted by the enforcement of antivirus and firewall policies.

What is IPSEC encryption?

IPSec is an IP packet authentication and encryption method. It uses cryptographic keys to protect data flows between hosts and security gateways.

Why use two factor authentication for VPN?

Adopting two-factor authentication for remote access through VPN further boosts your network security. Now let’s take a look at why you should choose a particular VPN type as a secure connection methodology instead of the alternatives.

What is remote access VPN?

The most basic form of VPN remote access is through a RAS. This type of VPN connection is also referred to as a Virtual Private Dial-up Network (VPDN) due to its early adoption on dial-up internet.

What is PR.AT in cybersecurity?

Awareness and Training (PR.AT): The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements. 800-84.

What is NIST mapping?

These mappings are intended to demonstrate the relationship between existing NIST publications and the Cybersecurity Framework . These preliminary mappings are intended to evolve and progress over time as new publications are created and existing publications are updated. Initially, each publication has been mapped only once to the category considered most applicable. Certain NIST publications that have broad applicability across multiple categories of a function have been included within the General Mappings section.

image

User Access Controls

Endpoint Protection

  • When employees are working within a company’s network, maintaining up-to-date and active endpoint protectionis a must. It provides a critical backstop to protect the network in the event something gets past hardware-level perimeter defenses. Now that users are creating countless openings in those perimeter defenses due to remote access needs, every...
See more on computer.org

BYOD Policy and Management

  • For several years now, enterprises of all sizes have had to contend with a growing contingent of workers eager to use their personal devices to access company systems and data. The response to that was to implement bring your own device (BYOD) policies that spelled out which devices were acceptable and how they could be used. In many cases, businesses turned to BYOD mana…
See more on computer.org

End-User Training

  • Since the average business never had to deal with so many employees working off-site, there’s a good chance they also never took the time to provide whole-workforce training on how to do so safely. Indeed, this is exactly what hackers everywhere seem to be counting on as they launch attacksagainst the scores of inexperienced remote workers around the globe. It’s up to busines…
See more on computer.org

Staying Safe and Secure

  • With plenty of effort and a little bit of good luck, IT admins can help the businesses they serve get through this unprecedented crisis without sacrificing data security or the employees’ ability to be productive. Paying careful attention in reviewing the points set forth here is a good place to start, but it’s not all that has to happen. With the situation still fluid and with so much unknown still ah…
See more on computer.org

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9