Here is a checklist of Remote Access Policy which defines the standards for connecting to the organizational network and security standards for computers that are allowed to connect to the organizational network.
|Check the encryption is enabled. It should only allow intranet.||Eavesdropping|
|Check if Remote Access is disabled. If enabled, It should only allow intranet.||Eavesdropping|
|Check access policies are present||Unauthorized access|
|Check wireless communication policies are implemented||Unauthorized access|
|Check remote user’s permission levels and ensure that remote user have desired permission only||Misuse of resources and confidentiality|
|Make sure Gateways installed for external communications and they are configured to provide secure connections.||Secure gateways allow internal users to connect to external networks while
protecting internal systems from compromise