SEARCH RESULTS


University of Cincinnati – Privileged Access Policy     3.1 3.1.15 Access Control

https://www.uc.edu/content/dam/uc/infosec/docs/policies/Privileged_Access_Policy_9.1.14.pdf

The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”

YouTube – Verify and control/limit connections to and use of external systems     3.1 3.1.20 Access Control

https://www.youtube.com/watch?v=W-8pcvpW4II

In this edition of the On Call Compliance Solutions Compliance Tip of the Week, we discuss how organizations must establish terms and conditions for the use of external systems in accordance with organizational security policies and procedures. Those terms and conditions must address as a minimum, the types of applications that can be accessed on organizational systems from external systems.