Remote Access Good Practice Guideline

Size: px
Start display at page:

Download "Remote Access Good Practice Guideline"

Transcription

1 Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Mike Farrell Version Date 01/07/2009 Remote Access Good Practice Guideline Crown Copyright 2009

2 Amendment History: Version Date Amendment History 0.1 First draft for comment /10/2006 Second draft including comments from IG Security Team /03/2007 Third draft to place document in new template, update glossary and text /08/2007 Draft for approval /11/2007 Final draft for approval /12/2007 Approved for release /04/2009 Document refreshed. Appendix B & C added /05/2009 Incorporating changes suggested by CfH Infrastructure Security Team /05/2009 Incorporating further changes suggested by CfH IST /07/2009 Incorporating minor changes suggested by Head of IT Security Forecast Changes: Anticipated Change When Annual Review June 2010 Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Infrastructure Security Team Matt Ballinger Deployment Support Officer - Technology Office Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version James Wood Head of IT Security 2.0 Distribution: NHS Connecting for Health Infrastructure Security Website Crown Copyright 2009 Page 2 of 22

3 Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc 13 2 NPFIT-FNT-TO-INFR-SEC-0001 Glossary of Security Terms 1 Glossary of Terms: List any new terms created in this document. Mail the NPO Quality Manager to have these included in the master glossary above [1]. Term Acronym Definition Crown Copyright 2009 Page 3 of 22

4 Contents 1 About this Document Purpose Audience Content Disclaimer Introduction Background Overview of Virtual Private Networks Secure VPN Internet Protocol Security (IPSec) Transport Layer Security (TLS) / Secure Sockets Layer (SSL) Trusted VPN Benefits of Virtual Private Networks Security Controls for Remote Access Authentication Factors of Authentication Common Methods of Authentication Security Tokens Digital Signatures Single Sign-on Software One-Time Passwords Time-Synchronised One-Time Passwords Smartcards Endpoint Security Personal Firewalls Appendix A. Guidance on VPN Technologies Appendix B. Gateway Brokered Remote Access B.1 Operation B.2 Security Considerations B.3 Risk Assessment Appendix C. Other Remote Desktop Solutions C.1 Security Considerations C.2 Risk Assessment Crown Copyright 2009 Page 4 of 22

5 1 About this Document 1.1 Purpose The purpose of this document is to address the major issues associated with creating and maintaining secure remote access networks connected to the New NHS Network (N3) or other network infrastructures, such as Community of Interest Networks (CoIN) partner networks, or the Internet. It is recommended that a full assessment of both threat and impact levels of potential security breaches, afforded by the provision of remote access to an organisation s networks and systems, be performed. This should incorporate partnering networks, including N3, in line with the electronic Government Interoperability Framework (e- GIF) recommendations. 1 The information contained in this document should be used as an informed assessment of technologies that support secure remote access. However it is the sole responsibility of network owners to ensure that any remote access solutions that they deploy are sufficiently secure to fully satisfy their own risk assessment. 1.2 Audience This document has been written for readers who have a good level of experience and familiarity with firewalls, switches, routers and secure networking practices. 1.3 Content This document comprises this following sections / topics: - Introduction Overview of Virtual Private Networks Secure VPN Benefits of Virtual Private Networks Security Controls for Remote Access Endpoint Security Guidance on VPN Technologies Gateway Brokered Remote Access Other Remote Desktop Solutions 1 See the GovTalk Schemas and Standards Website: Crown Copyright 2009 Page 5 of 22

6 1.4 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by National Health Service Connecting for Health (NHS CFH). The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. Crown Copyright 2009 Page 6 of 22

7 2 Introduction The information in this document covers all environments required to interact with the NHS Care Records Service (NCRS), including: - 1. Information on suitable measures and controls for the most secure solutions that are in conformance with the Information Governance Statement of Compliance (IGSoC) Good practice guidance for the design and use of remote access networks within a network infrastructure, including: - The minimum standards for remote access security. The methods by which remote access authentication can be achieved AND The procedures and mechanisms for the control of remote access to other networks or Local Area Networks (LANs) in an NHS or other healthcare environment. 2.1 Background N3 is a private Wide Area Network (WAN) and access is therefore strictly limited to authorised endpoints. Any organisation wishing to connect to N3 is responsible for ensuring that their N3 connection does not compromise the security measures already in place within the WAN. N3 is a private network accommodating thousands of Personal Computers (PCs), servers, printers and other items of equipment, all acting as nodes or endpoints within the network. The confidentiality of sensitive information transmitted unencrypted within N3 is not assured. However all National Applications encrypt data using Transport Layer Security (TLS) or an equivalent security standard. It is therefore advisable that the appropriate measures are taken with Existing Systems to ensure that sensitive data is secure before connecting to N3. N3 faces numerous potential threats to security, possibly from inadequately protected partner networks, or connections to uncontrolled external networks such as the Internet. These threats are continually evolving in both strength and frequency. Therefore ongoing vigilance against these threats, and the maintenance of strict security standards, are essential to the continuing success of N Crown Copyright 2009 Page 7 of 22

8 3 Overview of Virtual Private Networks A Virtual Private Network (VPN) is a logically private communications network often used within an organisation, or by several organisations to communicate confidentially over a publicly accessible physical network. VPN traffic can be carried over a public network infrastructure, such as the Internet, using standard protocols. Or over a service provider's private network, with a defined Service Level Agreement (SLA) between the VPN customer and the VPN service provider. Many implementations of VPN technology exist with varying levels of security, integrity and performance. The selection of appropriate products and techniques are directly related to the overall security and applicability required of the VPN. 3.1 Secure VPN A Secure VPN (SVPN) uses cryptographic tunnelling protocols to provide the necessary confidentiality, sender authentication and message integrity to achieve the intended level of privacy. The selection of suitable confidentiality and integrity techniques for the VPN ensures secure communications over unsecured networks. Secure VPN technologies may also be used to enhance security by acting as a security overlay within dedicated networking infrastructures. Such as management networks, or enterprise Wireless Local Area Networks (WLANs), which aim to provide a higher level of security than is currently available within WLAN protocols. The following protocols are used to operate Secure VPNs: Internet Protocol Security (IPSec) This protocol provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithm(s) to use for the service(s) and put in place any cryptographic keys required to provide the requested services. IPSec is commonly used with IPv4 and is an integral part of the base protocol suite in IPv6. Suitable encryption and hashing algorithms for use with IPSec VPNs are detailed in the Approved Cryptographic Algorithms Good Practice Guideline (GPG) Transport Layer Security (TLS) / Secure Sockets Layer (SSL) Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications over the Internet for such things as web browsing, , Internet faxing, instant messaging and other data transfers. There are slight differences between SSL and TLS, but the protocols remain substantially the same. 3 Crown Copyright 2009 Page 8 of 22

9 These protocols can be used either for tunnelling the entire network stack, such as in the OpenVPN software product, 4 or for securing what is essentially a web proxy to provide an application portal. Some vendors offer a TLS/SSL VPN solution which also incorporates the ability to tunnel any host network traffic in a similar manner to IPSec. Solutions that provide an application portal via TLS/SSL are not capable of providing a VPN in the strict sense of the term, as they provide a virtual network interface rather than tunnelling traffic from the standard network interface. Suitable encryption and hashing algorithms for use with TLS/SSL VPNs are detailed in the Approved Cryptographic Algorithms GPG. 5 Point-to-Point Tunnelling Protocol (PPTP) this protocol was developed jointly by a number of companies, including Microsoft. It utilises the Rivest Cipher 4 (RC4) stream cipher to provide encryption services, and, whilst providing a basic level of security, the protocol is not cryptographically strong and should be avoided. Some Internet Service Providers (ISPs) offer managed Secure VPN services for business customers, who require the security and flexibility of a VPN, but prefer not to undertake the administration and support of their own VPN infrastructure. The N3 Service Provider (N3SP) currently offers a managed VPN service for NHS organisations Trusted VPN Trusted VPNs do not use cryptographic tunnelling, and instead rely on the security of a single service provider network to protect traffic. The Multi-Protocol Label Switching (MPLS) protocol is commonly used to build trusted VPNs. Other protocols for trusted VPNs include: Layer 2 Forwarding (L2F), developed by Cisco. Layer 2 Tunnelling Protocol (L2TP) Layer 2 Tunneling Protocol version 3 (L2TPv3). This document focuses mainly on techniques for providing Remote Access using Secure VPN technology. Other types of VPN are covered in the Site to Site VPN 5 GPG Crown Copyright 2009 Page 9 of 22

10 4 Benefits of Virtual Private Networks The use of a VPN can offer many benefits to an organisation, including: - Extension of connectivity over a larger geographic area. Reduced travel costs and transit time for remote users. Support for telecommuting and teleworkers. Provision of global networking opportunities. Improved security for standard point-to-point links which do not offer native encryption. Reduced operational costs when compared with a traditional WAN architecture. Simplified network topology in certain scenarios. Compatibility between broadband and enterprise networks through use of a common transport. Faster return on investment than traditional carrier leased or owned WAN connections. Scalability. Particularly when used with a Public Key Infrastructure (PKI). Whilst a VPN can securely connect remote endpoints, it introduces additional security risks that should be considered. Crown Copyright 2009 Page 10 of 22

11 5 Security Controls for Remote Access In order to maintain the security and integrity of sensitive data, e.g. Patient Identifiable Data, it is necessary to employ a defence-in-depth approach. This is particularly important when enabling remote access to clinical systems. Controls should be applied at each point where data interacts with the network. It is important that additional controls are applied to remote access clients in order to ensure they are adequately protected. Such clients may be installed on either organisation-owned equipment or the user s personal computer. The decision about which client to use is determined by the security policy of the organisation. It is acknowledged that further risks are introduced by allowing users to connect their own equipment to a remote access VPN. Some organisations may choose to arrange for an employee's home to have two separate WAN connections. One for working on the employer's sensitive data, and the other for all other uses. Access-Control Lists (ACLs) should be in place to restrict access to the target network by remote VPN users. The access privileges should only allow the user to perform the tasks necessary for their role. The rule of least privilege 7 should be applied to ensure that only the required permissions are granted to remote users. The logging and auditing services of all systems within the network should be evaluated. These functions may require modification to ensure that the level of auditing and logging reflects the increased threat level presented by the provision of remote access into the private network. Organisations shall be mindful that any single breach or failure of security could result in the overall compromise of the privacy and security of the network. 5.1 Authentication It is considered best practice for strong authentication to be used when controlling access to a Remote Access VPN. Single factor mechanisms such as usernames and passwords are weak and should not be used for remote access authentication. All Remote Access VPNs should utilise two-factor authentication as a minimum standard. 7 The rule of Least Privilege requires that access is provided only to the people who need it, and under the appropriate context. Crown Copyright 2009 Page 11 of 22

12 5.2 Factors of Authentication The three most commonly recognised factors are: - 'Something you know', such as a password or Personal Identification Number (PIN). 'Something you have', such as a Smartcard or hardware token. 'Something you are', such as a fingerprint, a retinal pattern or other biometric identifier. In addition, there are a number of other factors that can be used: - Cyber-metric authentication, such as only allowing access from a computer that meets a particular set of criteria. The authentication factor is often derived from the combination of unique hardware and/or software and certificates installed Location-based authentication, such as only allowing a particular system to connect from a specific network or campus or only allowing privileged access from specific terminals. This practice has been common for some time in the maintenance of Firewalls and other network infrastructure Time-based authentication, such as only allowing access from certain accounts, or to specific services, during normal working hours Read only access Size-based authorisation, such as only allowing a specific financial transaction to be for a specified exact amount. This could apply to the provision of contract cleaning or contract meals services Pre-authorised transactions. For example, where an NHS Organisation is ordering pharmaceutical supplies, and the pharmaceutical company would reject orders for any stock items not pre-agreed with the organisation. The cyber-metric, location-based and time-based authentication methods are often utilised to complement existing two-factor security controls for Remote Access VPNs. Many network vendors offer support for time, location and system state parameters within the VPN device configurations. Systems that support Network Admission Control (NAC) or Network Access Protection (NAP) can use a number of criteria to measure compliance with a set of rules or policies before granting access to a remote access VPN. Crown Copyright 2009 Page 12 of 22

13 5.3 Common Methods of Authentication Security Tokens A security token may be a physical device that an authorised user of computer services is given to aid in authentication. A security token can take the form of a hardware token, authentication token, cryptographic token or a software token. Hardware tokens are typically small enough to be carried in a pocket and are often designed to attach to the user's keychain. Some may store cryptographic keys, such as a digital signature, or biometric data (such as a fingerprint). Some designs feature tamper resistant packaging, others may include a small keypad to allow the entry of a PIN Digital Signatures For a digital signature to be as trusted like a regular hand-written signature, the digital signature must be made with a private key known only to the person authorised to make the signature. Tokens that allow secure on-board generation and storage of private keys enable secure digital signatures, and can also be used for user authentication, as the private key also serves as a proof of the user s identity. Where tokens are used to identify the user, all tokens must have some kind of number that is unique. Tokens with no on-board keyboard or another user interface cannot be used in some signing scenarios. The Electronic Signatures Regulations and the EU Digital Signature Directive 9 documentation should be consulted to determine the definition of a digital or electronic signature Single Sign-on Software Some types of single sign-on solutions, such as Enterprise Single Sign-On (E-SSO), use the token to store software that allows for seamless authentication and password filling. If the passwords are stored on the token, users need not remember them, and therefore can select more secure passwords, or have more secure passwords assigned. Other methods allow the creation of a session token, which demonstrates a user s right to access a service or application based on their initial authentication, rather than storing a series of passwords and credentials One-Time Passwords One-Time Passwords (OTPs) change after each login, or change in accordance with a pre-set time interval. In their simplest form OTPs may be generated by an authentication system and distributed to users as a list of passwords, which may be used in the given order to access resources along with other credentials Crown Copyright 2009 Page 13 of 22

14 5.3.5 Time-Synchronised One-Time Passwords A time-synchronised one-time password continuously changes at a set time interval, e.g. once per minute. A method of synchronisation must exist between a client token and the authentication server. For disconnected tokens this time-synchronisation is performed before the token is distributed to the client, whereas other token types perform the synchronisation when the token is inserted into an input device. Some vendor specific time-synchronised OTP solutions require the use of a PIN that is known to the user, and is entered with the password at the time of authentication. This allows the system to offer two factors of authentication something you have and something you know. Other systems, as offered by RSA 10 and other vendors, support software tokens. Software tokens can be installed on any machine and are protected by the user s password. The security level of software tokens is less than that of hardware ones, as various attacks focus on the user, such as installation of key logging software that can record the user s password. However the attacker must have access to the exact software token that is installed on the users' machine. Only the authentic token has the correct seed which enables it to generate valid OTPs. In cases where this risk is acceptable, software tokens can be a cost effective and simple method of improving security Smartcards Smart cards are relatively inexpensive in comparison to other tokens. In addition to authentication mechanisms and PKI functions, smartcards may also be used to store physical access credentials, electronic currency, and can include branding or photographs to act as a company pass or ID. 10 RSA algorithm invented by Ronald L. Rivest, Adi Shamir, and Leonard Adleman in 1977 and released into the public domain in See Crown Copyright 2009 Page 14 of 22

15 5.4 Endpoint Security Endpoint security is an important component of any remote access solution. The network is effectively extended out to each endpoint. Therefore the security measures implemented at each endpoint should be aligned with those of other corporate systems. It is recommended that all endpoints utilise up-to-date Anti-Virus and firewall software as a baseline, with additional services, such as Intrusion Prevention Systems (IPSs) and Anti-Malware/Spyware 11 software Personal Firewalls A personal firewall will provide local machine protection against inbound malicious code that uses the network to enter the machine. Once malicious software has penetrated a machine, a common mechanism for propagation is to use outbound network traffic to other machines on the same network. Personal firewalls can help block some non-standard network port access, and can be configured so that only specific applications can use specific network ports. This helps to prevent the spread of malicious code. Best practice requires the use of centralised enterprise firewall management and administration, therefore requiring minimal user interaction or technical knowledge. Microsoft provides a basic personal firewall with Windows XP, and a more comprehensive implementation with Vista. Microsoft's personal firewall provides protection for inbound traffic only (in the case of XP), and protection for both inbound and outbound traffic (in the case of Vista). In both cases it can be centrally managed using granular group policies. For laptops or other mobile systems that are frequently outside the corporate firewall, the use of a bidirectional personal firewall is good practice. Note that although some personal firewalls are free, they normally require a subscription following a trial period. Note also that, depending on local security policies, personal firewalls may need to be installed and configured by the organisation s local IT department. 11 See Crown Copyright 2009 Page 15 of 22

16 Appendix A. Guidance on VPN Technologies VPN type Proponents Constraints Remarks IPSec All IP types and services are supported. E.g. ICMP, VoIP, Net8 (called SQL*Net prior to Oracle8), Citrix ICA Same technology base works in client-to-site, site-to-site, and client-to-client IPSec client provides an opportunity to embed other security features (e.g. personal firewall, configuration verification, etc.) VPN gateways are typically integrated with firewall functions for access control, content screening, attack protection, and other security controls. Typically requires a client software installation. Not all required client operating systems may be supported Connectivity can be adversely affected by firewalls or other devices between the client and gateway (e.g. firewall or NAT devices). Interoperability between one vendor s IPSec clients and another vendor s IPSec servers/gateways is typically difficult. Recommended Non-trivial to implement and maintain Crown Copyright 2009 Page 16 of 22

17 VPN type Proponents Constraints Remarks TLS/ SSL SSL integrated with all leading Web browsers. Popular applications such as mail clients/servers (e.g. Microsoft Outlook and Eudora ) support SSL. Operates transparently across NAT, proxy, and most firewalls. Web plug-in may provide network-level connectivity over SSL for client/server applications Only supports TCP services natively over SSL. Typically only web (HTTP) or (POP3, IMAP, SMTP) over SSL. SSL typically requires more processing resources from the gateway than IPSec No native software installed in clientless scenarios. Limited ability to push security software to the endpoint (e.g., personal firewall, integrity checking, etc.). Web plug-ins may have limited application support, or require administrator privileges on the PC to operate. Not normally used for site-tosite VPNs, because of their temporary nature. So if IPSec is used for site-to-site, then different technologies must be used for a remote access VPN, versus site-to-site VPNs. Recommended Crown Copyright 2009 Page 17 of 22

18 Appendix B. Gateway Brokered Remote Access NHS CFH does not endorse any security product or service. The Communications- Electronics Security Group (CESG) scheme, known as the 'CESG Claims Tested Mark' (CCTM), 12 is endorsed however. Because of the interest within the NHS around gateway brokered remote access products, this appendix has been added to this document. Examples of this type of remote access are the LogMeIn 13 and GoToMyPC 14 families of products. Both provide remote access to computers over the Internet, and are sold in a number of different product types that have differing features and prices, depending on the number of features and the type of access desired. Unlike other remote access solutions, products such as LogMeIn and GoToMyPC do not require local firewall modifications, as there are no incoming ports to be opened. Instead each product works through SSL tunnelling. B.1 Operation For a typical application, where a user wishes to access a host machine (within the N3 network) from home over the Internet, this type of remote access solution operates as follows: - The user initiates a persistent Transmission Control Protocol (TCP) connection over SSL from the host machine, through the N3 National Gateway over the Internet to the solution provider s broker. With the first half of the SSL tunnel locked in place, the user then goes home and completes the second half of the tunnel by connecting from his/her home (client) PC to the same broker. The complete tunnel is then re-negotiated between the client and the host, providing a secure end-to-end connection via the solution provider s gateway communications device. 12 More information on this scheme, and a list of the vendors and products awarded the CCT Mark can be found at: Crown Copyright 2009 Page 18 of 22

19 B.2 Security Considerations By default, access to clients and hosts can be gained via username/ and password combination, and no form of password strength is enforced by the solution provider. There is therefore a reliance on the user choosing 'good passwords' 15 for use with the system. LogMeIn Free for instance does not contain the additional authentication controls available with LogMeIn Pro, such as One-Time Passwords (OTPs) 16 and the ability to link into RSA SecurID for two-factor authentication. As with all public facing implementations of SSL, the user is required to make good security decisions about the validity of a presented certificate. If a selfsigned certificate is presented (as may be the case with a Man-In-The-Middle attack) the user has to understand the warnings presented and therefore to choose whether to accept the certificate or not. Of course if not accepting the certificate means 'no access to the system', it is highly likely that the user will choose to accept the certificate. Because to date these products have not been submitted for CCT Mark testing, there is no obvious means of independently verifying vendor claims or understanding security mechanisms such as: - o When connecting from the client to the host machine, the Windows username and password of that machine are requested. This request is not made by the Windows authentication system but by the solution provider s software on the host system. It is not clear how these credentials are stored by the client software and what happens to them once they are no longer needed. o The vendor claims that once the client has completed the connection to the broker, the complete tunnel is re-negotiated between the client and the host, albeit via the solution provider s gateway, thus providing a completely secure connection. For a typical application as described in section B.1 above, where an NHS organisation user wishes to access a host machine for the purpose of accessing local services, the host machine must be left switched on. This in itself may contravene local security policy if the machine is left on overnight. For a typical application as described in section B.1 above, where an NHS organisation user wishes to access a host machine for the purpose of accessing services on N3, it should be noted that this will contravene the NHS CFH requirement that only an approved service (such as an N3 catalogue service) can be used for a connection originated from an external network (such as the Internet) that is onwardly linked to N3. 15 See Password Policy for Non-Spine Connected Applications GPG, at Crown Copyright 2009 Page 19 of 22

20 Furthermore if the accessed services in question require Smartcard authentication, and the user s smartcard is left unattended in a Smartcard reader connected to the host machine, this will contravene the Registration Authority (RA) form RA01 Part A. 17 The applicable section entitled... By signing the declaration set out in the RA01 Short Form, I, the applicant:... Because of the likelihood that the solution provider s gateway is outside the United Kingdom (UK), it opens up the possibility that data protection may be subject to another country s laws (not the Data Protection Act 1998). B.3 Risk Assessment Approval of security products and services for local use is the responsibility of the relevant NHS organisation, and any risk assessment should take note of the security concerns in section B.2 above. Each NHS organisation is likely to have different IT infrastructure and business needs. For this reason each business owner should perform their own risk management regarding the use of specific security products or services, including that of remote access. NHS CFH National Applications and the N3 network must not be impacted or put at risk as a result of any local IT solutions. Because of the risk of unauthorised disclosure of sensitive data from a security solution that has been implemented locally, each business owner should perform a Business Impact Assessment (BIA), to balance the risk and impact of such an occurrence against the cost of any appropriate technological controls required to enhance security. It is always wise to back up such BIAs with a good threat/vulnerability risk assessment. A risk assessment is a prerequisite for the design of effective security countermeasures, and when completed correctly enables the NHS organisation to demonstrate that a methodical process has been undertaken, as well as describe the rationale behind any decisions made Crown Copyright 2009 Page 20 of 22

21 Appendix C. Other Remote Desktop Solutions There are a number of remote desktop solutions that operate similarly, from a networking point of view. E.g. pcanywhere, 18 Microsoft s Remote Desktop (Terminal Services). 19 They work differently to gateway brokered remote access products, in that the remote connection is direct between the client and host, with no intermediate gateway. If used within the same local network, security concerns can be minimised. However if used for remote connections over N3 or the Internet, the security concerns detailed in section C.1 below should be noted. C.1 Security Considerations Invariably username and password only are used for authentication, rather than two-factor authentication as required by approved NHS VPN services. For a typical application, where an NHS organisation user wishes to remotely access a host machine for the purpose of accessing local services, the host machine must be left switched on. As in the case of gateway brokered remote access, this in itself may contravene local security policy if the machine is left on overnight. Like LogMeIn, for a typical application where an NHS organisation user wishes to access a host machine for the purpose of accessing services on N3, it should be noted that this will contravene the NHS CFH requirement that only an approved service (such as an N3 catalogue service) can be used for a connection originated from an external network (such as the Internet) that is onwardly linked to N3. If the accessed services in question require Smartcard authentication, and the user s smartcard is left unattended in a Smartcard reader connected to the host machine, this will contravene the Registration Authority (RA) form RA01 Part A. 20 The applicable section entitled... By signing the declaration set out in the RA01 Short Form, I, the applicant: Crown Copyright 2009 Page 21 of 22

22 C.2 Risk Assessment Approval of security products and services for local use is the responsibility of the relevant NHS organisation, and any risk assessment should take note of the security concerns in section C.1 above. Each NHS organisation is likely to have different IT infrastructure and business needs. For this reason each business owner should perform their own risk management regarding the use of specific security products or services, including that of remote access. NHS CFH National Applications and the N3 network must not be impacted or put at risk as a result of any local IT solutions. Because of the risk of unauthorised disclosure of sensitive data from a security solution that has been implemented locally, each business owner should perform a Business Impact Assessment (BIA), to balance the risk and impact of such an occurrence against the cost of any appropriate technological controls required to enhance security. It is always wise to back up such BIAs with a good threat/vulnerability risk assessment. A risk assessment is a prerequisite for the design of effective security countermeasures, and when completed correctly enables the NHS organisation to demonstrate that a methodical process has been undertaken, as well as describe the rationale behind any decisions made. Crown Copyright 2009 Page 22 of 22

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Windows Web Based VPN Connectivity Details & Instructions

Windows Web Based VPN Connectivity Details & Instructions VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft

More information

How To Build A Network Security Network

How To Build A Network Security Network Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0031.06 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 1.0 Author Mike Farrell

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Best Practices for Secure Remote Access. Aventail Technical White Paper

Best Practices for Secure Remote Access. Aventail Technical White Paper Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Internet Security Good Practice Guide. August 2009

Internet Security Good Practice Guide. August 2009 Internet Security Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Internet Security Overview 3 3 Internet Security Good Practice Guidelines 4 4 Appendix A: Definitions

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0 Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate. www.gotomypc.

WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate. www.gotomypc. Citrix Corporate Security FAQs Common security questions about Citrix Corporate www.gotomypc.com Q: What are the Corporate software components that I need to install on the host and client computers? A:

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Cisco Secure Access Control Server 4.2 for Windows

Cisco Secure Access Control Server 4.2 for Windows Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

MAC Web Based VPN Connectivity Details and Instructions

MAC Web Based VPN Connectivity Details and Instructions MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

Understanding VPN Technology Choices

Understanding VPN Technology Choices Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Virtual Private Networks: IPSec vs. SSL

Virtual Private Networks: IPSec vs. SSL Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet

More information

Remote Vendor Monitoring

Remote Vendor Monitoring ` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...

More information

IPSec vs. SSL: Why Choose?

IPSec vs. SSL: Why Choose? Remote VPN Access from Anywhere An OpenReach Backgrounder Comparing VPN Technologies 660 Main Street Woburn, MA 01801 888.783.0383 www.openreach.com Copyright 2002,, which is solely responsible for its

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Using a Firewall General Configuration Guide

Using a Firewall General Configuration Guide Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

2003, Rainbow Technologies, Inc.

2003, Rainbow Technologies, Inc. Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR-0068.01 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Jason Alexander

More information

ICANWK602A Plan, configure and test advanced server based security

ICANWK602A Plan, configure and test advanced server based security ICANWK602A Plan, configure and test advanced server based security Release: 1 ICANWK602A Plan, configure and test advanced server based security Modification History Release Release 1 Comments This Unit

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

Remote Access End User Guide (Cisco VPN Client)

Remote Access End User Guide (Cisco VPN Client) Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information