Remote Access Policy
|
|
|
- Chester Heath
- 9 years ago
- Views:
Transcription
1 Document Title: Version: ISP6.0 Approval Dates: This policy was originally approved on: [02 Apr 2009] This version was approved on: [27 January 2016] This version takes effect from: [27 January 2016] This policy will be reviewed by: [15 Mar 2017] Approved By: Prepared By: Nicola Wittman Alan Mose Contact: IT Support Desk (ext.412) Service Delivery Manager (ext 520)
2 Contents Document Control 3 Document Amendment History 3 1 Purpose 4 2 Scope 4 3 Governance factors 4 4 Remote Access Methods 4 5 Use of Remote Access methods 5 6 Usage Restrictions 5 7 Methods of compliance with the controls 6 8 PSN Code of Connection 6 Page 2 of 6
3 Document Control Organisation Title Creator Review date Uttlesford District Council Nicola Wittman Document Amendment History Revision Originator of Date of Change Description No. change change 1 Nicola Wittman 15/4/09 Updates 2 Nicola Wittman 22/3/10 Updates 3 Nicola Wittman 6/9/11 Updates 4 Nicola Wittman 5/11/12 Updates 5 Nicola Wittman 30/11/13 Updates 6 Nicola Wittman 10/3/15 Updates 7 Nicola Wittman 13/1/2016 Updates Page 3 of 6
4 1 Purpose Remote access is connecting to the corporate computer system by Council owned equipment. The provision of Remote Access must be controlled in order to protect Council systems. The controls determine who can access Council systems, how they can access and what can be accessed. 2 Scope Council systems can be accessed remotely by various people: Councillors and Staff whilst out of the office. Staff to provide support for systems Suppliers to provide Remote Administration on systems Third Parties requiring access to Council systems 3 Governance factors Controls on remote connections to the corporate network arise from the rules predefined in the Codes of Connections required to allow Councils to use secure networks. Examples of secure networks include, but are not limited to: Public Sector Network (PSN) Payment Card Industry Data Security Standard (PCI DSS) Remote connections must not be allowed to compromise compliance with a secure network Code of Connection. It is therefore a council requirement that remote access to secure networks such as Government Connect and PCI meet the following: Only officially owned council equipment is used. Only Uttlesford ICT approved software will be installed. Whilst connected access to the internet is restricted to Citrix only and not through the remote users broadband. Commercial anti-virus software will be installed on the council equipment with the virus database updated at least daily. The operating systems (Windows) will be kept patched in accordance with the council s patch management policy. Removable media, such as CD/DVD drives and USB ports will be disabled. 4 Remote Access Methods The following methods provide remote access Virtual private Network (VPN) o This uses an approved client installed on a computer which provides direct encrypted connectivity into the corporate network. Page 4 of 6
5 Aventail o Aventail provides secure remote access and uses Citrix Zenapps to present the applications. Third party remote support tools from the internet (logmein123). 5 Use of Remote Access methods The methods of remote access are only to be used in the following circumstances. VPN o The connections between Great Dunmow, Newport and Saffron Walden offices. Aventail o Staff to provide support for systems. o Access to and files whilst out of the office. o Suppliers to provide remote administration on systems. o Approved third parties requiring access to Council systems. Remote Access web tools o Essential support for systems that cannot be provided by other means. 6 Usage Restrictions VPN o On Council computers, VPN must only be enabled using approved software installed by ICT. o On Suppliers computers, used to provide remote administration on systems, VPN must only be enabled using approved software and must only give access to the system being supported. Remote Access web support o Access to Remote Web support websites must be individually approved. o Remote access sessions initiated by the supplier must have the support session start logged. o Access must only be allowed when all applications apart from the supported application have been closed. o All files transferred to the corporate network in order to facilitate the connection must be removed when the session is finished. o The supplier must inform ICT when the session has finished. Aventail o Each approved user will be given a SMS passcode via a text to their mobile phone. Page 5 of 6
6 o Passcodes are not to be shared. o Once the requirement for Aventail access has finished, the ICT section must be notified. 7 Methods of compliance with the controls Councillors or Staff must initiate a security incident report if there is any actual or attempted remote access to the Council corporate system that has not been approved, or may compromise a code of connection to a secure network. 8 PSN Code of Connection This policy has been prepared in accordance with the new PSN Code of Connection. Page 6 of 6
U09 Remote Access Policy
Plymouth City Council U09 Remote Access Policy December 2008 This document is copyright to Plymouth City Council and should not be used or adapted for any purpose without the agreement of the Council.
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
Remote Access and Home Working Policy London Borough of Barnet
Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
Blacklisting Procedure
Blacklisting Procedure Related Policy ICT Services and Facilities Use Policy Responsible Approved by Approved and commenced August, 2014 Review by August, 2017 Responsible Organisational Unit Information
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
Data Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
RemoteApp Reference Guide. Outline
Outline System Requirements... 1 About RemoteApp... 1 Use of RemoteApp... 2 Launching a program with RemoteApp... 2 Using Multiple RemoteApp Programs... 3 RemoteApp and CDs, DVDs, USB Drives, Portable
Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
DBC 999 Incident Reporting Procedure
DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
REMOTE ACCESS POLICY & PROCEDURE
REMOTE ACCESS POLICY & PROCEDURE JULY 2013 Author: Steve Williams Date: September 2011 Agreed: EIS Management Unison Purpose The purpose of this policy is to define standards and restrictions for connecting
Bucks PSN. Updata Self-Service Portal User Guide. Version 1.0
Bucks PSN Updata Self-Service Portal User Guide Version 1.0 Updata Infrastructure Ltd Page 2 of 4 The Updata Self-Service Portal The Updata Self-service Portal is a web based online portal which enables
VERIFONE ENHANCED ZONE ROUTER
VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Information & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
Data Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
DSS Data Exchange Task Card 1 How to access the DSS Data Exchange
For technical support, contact the DSS Data Exchange helpdesk by email [email protected] or on 1800 020 283 DSS Data Exchange Task Card 1 How to access the DSS Data Exchange This task
Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional
Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05
Publish Date: 19/06/14 Version: 1.2. Internet Connectivity Service Level Agreement. Page: 1. Internet Connectivity Service Level
Publish Date: 19/06/14 Version: 1.2 Page: 1 Contents 1. Scope 3 2. Service Definitions 3 3. Service Provision 3 4. Supported Coverage Window 4 5. Incident and Service Request Targets 5 6. Manufacturer
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
What does it mean to be secure?
OmegaSecure.com What does it mean to be secure? Shekar Swamy, President Omega ATC What is Data Security? Data security is the means of ensuring that data is kept safe from corruption and access to it is
Remote Access Service (RAS)
Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority
Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:
PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:
Effective Date: August 2008 Approval: December 17, 2015 PCI General Policy Maintenance of Policy: Office of Student Accounts PURPOSE: To protect against the exposure and possible theft of account and personal
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
Connecting to a Massey Computer using XP s Remote Desktop via VPN
Connecting to a Massey Computer using XP s Remote Desktop via VPN NP 24092009 Contents Introduction... 3 Prerequisites... 3 Minimum Connection Requirements... 3 Related Documents... 3 Help... 3 Step 1
Customer Hosted Service Description and Service Level
Customer Hosted Service Description and Service Level Customer Hosted service description and service level Copyright Egton Medical Information Systems Limited 2014 Controlled Document Version 8: 1 November
Securing the NetSupport Client
Securing the NetSupport Client Environments, Considerations & Requirements. Overview This document is designed to provide an overview of the security features available within NetSupport Manager and NetSupport
Presented By: Daniel Chetty [email protected] 01628 771 811
Candidate Name: Raymond - 145175 Job Applied For: Availability: Key Skills: 1 st /2 nd Line Support Interview: Immediate Start: immediate An experienced IT professional with a proven track record of supporting
Critical Data Guide. A guide to handling critical information at Indiana University
Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.
Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2
Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
SmartImpact MS Dynamics CRM. Support Service Definition
SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: [email protected] http://www.smartimpact.co.uk/
JOB DESCRIPTION. Assistant Director of Technology and Telecommunications
JOB DESCRIPTION Title of Post: ICT Service Desk Officer Grade of Post: Band 3 Reports to: Accountable to: Location ICT Service Desk Manager Assistant Director of Technology and Telecommunications The South
E-mail Policy Of Government of India
E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -
Connecting to the Remote Desktop Service
Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's
Remote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
www.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Network Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
CWSI Service Definition for Server Monitoring
CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.
NHS FORTH VALLEY Information Governance Remote Working Guidance
NHS FORTH VALLEY Information Governance Remote Working Guidance Date of First Issue 09 / 12 / 2011 Approved 12 / 09 / 2013 Current Issue Date 12 / 09 / 2013 Review Date 01 / 12 / 2015 Version V 3.2 EQIA
UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106
UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen
Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS
1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
View condition history for assets.
Comprehensive Asset Management fmxpert allows you to maintain detailed information for each and every asset at any one of facilities, including: asset location serial number, model and expected life in
Using a VPN Connection
Bullis School Using a VPN Connection Access Files and Resources While Off Campus Mark Smith Table of Contents What is a VPN?... 2 Can I set up my home computer to use a VPN connection?... 2 So how do I
Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise
Foregenix Incident Response Handbook A comprehensive guide of what to do in the unfortunate event of a compromise Breadth of Expertise - You re in safe hands Foregenix is a global Information Security
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Use of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
G-Cloud Service Definition. for. Xicon Cloud SCS - SQL Server Managed Services
G-Cloud Service Definition for Xicon Cloud SCS - SQL Server Managed Services XICON-CLOUD-SCS-SQL, 1.0 dated 15/12/2014 Page 1 of 5 CONTENTS 1 XICON CLOUD SCS - SQL SERVER MANAGED SERVICES 3 1.1 SERVICE
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
Downloading the UHVPN Client and setting up Cisco VPN on Windows 7
Downloading the UHVPN Client and setting up Cisco VPN on Windows 7 Part 1: Downloading UHVPN 1. Go to the Software Downloads website: http://www.uh.edu/infotech/downloads/ 2. Select appropriate choice.
JOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER
JOB DESCRIPTION POST TITLE: POST NUMBER: WEB DEVELOPER IT14 GRADE: 9 RESPONSIBLE TO: RESPONSIBLE FOR: LIAISON WITH: BUSINESS DEVELOPMENT & PROJECT MANAGER N/A ICT Team, all users (customers) of MDDC ICT
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
encription IT Security and Forensic Services
PRODUCT DETAILS CONTENTS THE PROBLEM 2 THE Solution 2 THE PRODUCT AND SERVICE 3 THE BENEFITS 4 OPTIONS 5 THE PROBLEM External IT security breaches caused by malicious hackers, and others, can occur at
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
ICT Password Protection Policy
SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
UCSD Credit Card Processing Policy & Procedure
UCSD Credit Card Processing Policy & Procedure The Payment Process UCSD accepts Visa, MasterCard, American Express and Discover credit cards. We perform credit transactions only, no debit sales with cash
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
