Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, dial-up, broadband, and wireless. Virtual private networks (VPNs), when adequately provisioned with appropriate security controls, are considered internal networks, rather than a remote access method.
Unless restrictions are in place, a user connecting to the LAN via remote access can access/perform everything he/she could access/perform as those connected internally. Auditing will ensure unauthorized access to the enclave's resources and data will not go undetected.
The security zone connecting to the remote access gateway must be at a lower level that the security zone where the organizationally defined list of security functions and security-relevant information resides. Access control lists can also be used to monitor (by logging all access) or restrict access to these systems. |