Preview

remote access policy

Good Essays
Open Document
Open Document
464 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
remote access policy
Remote access policy

Purpose
The purpose of this policy will provide the standards for connecting to any DoD networks from any host. These standards are created and designed to minimize any potential exposure to DoD network (s) from damage which may result from unauthorized user or access of DoD networks. Damages include loss of confidential or sensitive data, intellectual data, and damage to critical DoD internal systems.
Scope
This policy will apply to all DoD employees, contractors, vendors, and agents that have a DoD owned, or personal computer or workstation that is or may be used to connect to any DoD network. This policy also applies to remote access connections that may be used to do work on behalf of DoD, including the reading or sending of email, as well as viewing intranet web resources
Remote access techniques covered by this policy include, but are not limited to dial-in modem, frame relay, ISDN, DSL, VPN, SSH, and cable modems
Policy
It will be the responsibility of all DoD employee’s, contractors, vendors, and agents that have remote access privileges to any DoD network to ensure that their remote access connection is given the same considerations as DoD on site users.
All DoD remote users are responsible to ensure that any family member does not violate any DoD policy, does not perform illegal activities, and does not use the access for outside business activities
Responsibilities
All employees will be responsible for understanding and following all security related policies and procedures.
Managers are responsible for ensuring that all employees under their supervision complete all mandatory security training.
The security officer will be responsible for, but not limited to:
Ensuring all employees understand and follow security related policies and procedures.
Maintain ongoing security awareness programs
Security reminders
Log-in monitoring
Password management
Requirements
A secure remote access must be strictly

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Contracts, policies and procedures will be put in place to ensure the safety of both the employees and the clients.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The policies at the home I work in are the same as those above, and to ensure all employees are up to date with these policies and legislations, we are required to complete an e-learning program every 12 months…

    • 1049 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Army Regulation 600-20

    • 5627 Words
    • 23 Pages

    This regulation prescribes the policies and responsibilities of command. It provides guidance covering military discipline and conduct, precedence of rank, and the military Equal Opportunity (EO) Program.…

    • 5627 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    All the staff needs to be sure that they do all they can to keep the workplace safe and follow the given rules and procedures.…

    • 1179 Words
    • 5 Pages
    Good Essays