Remote Access Policies

Remote Access Policies
Here is a checklist of Remote Access Policy which defines the standards for connecting to the organizational network and security standards for computers that are allowed to connect to the organizational network.

Checklist Threat
Check the encryption is enabled. It should only allow intranet. Eavesdropping
Check if Remote Access is disabled. If enabled, It should only allow intranet. Eavesdropping
Check access policies are present Unauthorized access
Check wireless communication policies are implemented Unauthorized access
Check remote user’s permission levels and ensure that remote user have desired permission only Misuse of resources and confidentiality
Make sure Gateways installed for external communications and they are configured to provide secure connections. Secure gateways allow internal users to connect to external networks while
protecting internal systems from compromise