BeyondTrust – How to Secure Remote Access for Vendors & Employees: 10 Tips 3.7 3.7.5 3.7.6
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This link provides 5 best practices for controlling third-party vendor risks.
This blog details security improvements that can be used to combat password spraying.
This article highlights MFA and the necessity to implement to all privileged account access and users who access network resources.
This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support.
From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.)
NIST resources that defines requirements for review, assessment, and approval of system maintenance tools
NIST resources that define requirements for nonlocal system maintenance activities
Control objectives for the implementation of multi-factor authentication from NIST SP 800-53.
The organization: a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel; b. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.