BeyondTrust – How to Secure Remote Access for Vendors & Employees: 10 Tips 3.7 3.7.5 3.7.6
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support.
From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.)
NIST resource that defines processes for maintenance personnel.