BeyondTrust – How to Secure Remote Access for Vendors & Employees: 10 Tips 3.7 3.7.5 3.7.6
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This article highlights MFA and the necessity to implement to all privileged account access and users who access network resources.
This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support.
From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.)
NIST resources that defines requirements for review, assessment, and approval of system maintenance tools
NIST resources that define requirements for nonlocal system maintenance activities
Control objectives for the implementation of multi-factor authentication from NIST SP 800-53.
NIST resource that defines processes for maintenance personnel.
This blog post describes why multifactor authentication (MFA) is important for remote access.
This example policy from the State of Georgia provides a starting point for system maintenance.