Remote Access Control Policy for Richmond Investments

Satisfactory Essays
Remote Access Control Policy for Richman Investments

Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend on the permissions of the group they were a member of. With authority-level policy the admin would assign different permissions to individual users based on their position and authority level within the company and what access that position requires.

Identification- Richman Investments needs to assign a unique identifier to each user in order to have accurate records of who is accessing, or trying to access, what applications, which network resource, and what data. The most common ID is the username, account number, or PIN

Authentication- In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification. To do this RI can choose one of the following knowledge type authentications: PIN, password, or passphrase along with one of the following ownership type of authentication: smart card, key, badge, or token. Using a combination of ownership authentication and knowledge authentication proves to offer better security.

Accountability- Richman Investments must hold users responsible for what they do on the system. Log files can be used to detect, prevent, or monitor access to the system. Due to all the different privacy laws, RI must also secure its data. This will involve how data is retained i.e storage, how media is disposed of, and following compliance requirements.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Mon AM Policy General 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments' networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to the company. 2. General access to the Internet for recreational use by employees is discouraged through the Richman Investments Network. Employees of Richman Investments are responsible…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Richman Investments, I have reviewed your needs and circumstances and have designed a remote access control policy that will work for you and your company. This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop…

    • 775 Words
    • 4 Pages
    Better Essays
  • Good Essays

    remote access policy

    • 464 Words
    • 2 Pages

    Remote access policy Purpose The purpose of this policy will provide the standards for connecting to any DoD networks from any host. These standards are created and designed to minimize any potential exposure to DoD network (s) from damage which may result from unauthorized user or access of DoD networks. Damages include loss of confidential or sensitive data, intellectual data, and damage to critical DoD internal systems. Scope This policy will apply to all DoD employees, contractors, vendors…

    • 464 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Remote Access Standards for Richman Investments Remote Access Standards for Richman Investments Purpose: This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Remote Access

    • 496 Words
    • 2 Pages

    Richman Investments To: Senior Manager From: Intern Good day to you and anyone reading this correspondence. I have been tasked by the IT security team to draft a Remote Access Standard to be implemented within the current security infrastructure. Knowing the types of things that could come about from insecure resources I’d like to offer a solution to issues that may come about from using process like VPN and remote access for people that telework into the office from home. Having multiple…

    • 496 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Access Control Policy

    • 703 Words
    • 3 Pages

    Material Appendix F Access Control Policy Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: December 9, 2012 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Associate Level Material Appendix F Access Control Policy Student Name: Casey DeCesare University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Scott Sabo Date: 5/27/2014 1. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 1.1. Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Remote Access

    • 1553 Words
    • 7 Pages

    Remote Access Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Remote Access Control Policy: Richman Corporation Authorization Rules: Controls will be configured to ensure access is approved for only company/corporate employees. These controls will be set up based off of the position (job roles) of the employees to ensure they can only access what is required to allow them to perform their duties. The policy will include group membership policies as well as authority-level policies. The employee access will be assigned to the appropriate groups and authority-…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Remote Access Policy 1. Overview See Purpose. 2. Purpose The purpose of this policy is to define standards for connecting to Corona District High School's network from any host. These standards are designed to minimize the potential exposure to Corona District High School from damages which may result from unauthorized use of Corona District High School resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical…

    • 848 Words
    • 4 Pages
    Good Essays