Remote Access Policy Template v1.0
Remote Access Policy Template v1.0
Date:
Remote Access Policy Template
Document Control
Document
Remote Access Policy Template
Title:
Document ID: Version: 0.1
Status: Draft
Publish Date:
Document Review
Version
No. Date Reviewer(s) Remarks
Remote Access Policy Template
Table of Contents
1. Objective.....................................................................................................4
2. Scope..........................................................................................................4
3. Policy..........................................................................................................4
3.4 Communication....................................................................................5
3.5 Encryption............................................................................................6
4. Policy Enforcement.....................................................................................6
Remote Access Policy Template
1. Objective
In this day’s number of request for working out of office are increased and
become a mandatory to obtain a Remote Access service for <entity name>
employees, contractors, third-parties and stockholders to reach internal
information’s and data external unsecured network (e.g. home, wireless,
public, etc.), this policy is to minimize risks associated with using remote
access service, and defines controls against the threats of unauthorized
access, theft of information, theft of services, and malicious disruption of
services.
2. Scope
This policy applies to employees, contracted personnel and any third parties
representatives who have been provided to access remotely to organization/
entities internal network.
3. Policy
3.1.2 remote access requests shall be through the <entity name> requests process
for management approval and must be conducted before network access
granted.
3.1.3 Accessing internet must be routed through the <entity name> internet
gateway during the remote access.
3.1.4 Remote access for individual services shall be secured such as deploying for
a Hypertext Transfer Protocol Secure (HTTPS) to access web services (e.g.
webmail, etc).
3.1.8 DST must ensure all remote access are comply with <entity name> security
policy before network access granted by implementing a Network Access
Control (NAC).
Remote Access Policy Template
3.1.10 All <entity name> employees must be aware of remote access compliance
and procedure.
3.2.1 Employees are responsible to ensure of their used devices to access <entity
name> network are comply with remote access policy.
3.3.1 All devices used for remote access must be up to date from devices OS,
security patches, anti-viruses, anti-malware and host firewall.
3.3.3 Portable media and external storages must be prohibited unless when they
are needed.
3.3.4 <entity name> information and data stored in remote access devices must be
encrypted, backup and able to wipe in lost or theft.
3.3.5 Remote access devices must be protected physical by not been left
unattended.
3.3.6 Bring Your Own Device (BYOD) shall not be used for remote access,
however if <entity name> intends to use, approval from management is
required before access granted to internal network and a certain level of
security from the OS version, batches and updates based on DST
instructions.
3.3.7 All devices used for remote access shall be in accordance with Mobile
Devices Policy.
3.4 Communication
3.4.1 Home wired network used for remote access must be secured by:
3.4.2 Wireless network used for remote access must be secured by:
3.4.3 <entity name> agreed with Internet Service Provider (ISP) to provide for a
dongle or MIFI for all remote access and must be secured by:
a. Using for static public IP address for dongle or MIFI to add it in the <entity
name> allowed access list.
3.5 Encryption
a. Virtual Private Network (VPN) to initiate for a secured tunnel between the
remote devices and the <entity name> security gateways.
1.
2.
3.6.1 Remote access for third-party, contractors, business partners and vendors
must be approved by the DST.
3.6.2 Signed agreement must contain the purpose of the remote access, time
period, network and services privilege access required, revocation of access
at the end of the agreement.
3.6.3 Provided remote access for third-party must be reviewed and monitor.
Remote Access Policy Template
3.6.4 Misuse of the remote access must be revoked, reported and action must be
taken based on the agreement penalty clause.
4. Policy Enforcement
4.1 Policy document sponsor and owner: <Head of Cyber Security Department>.
4.3 Any violation of this policy may subject the offender to disciplinary action as per
the procedures followed in <entity name>.