Remote Access Security Policy
Remote Access Security Policy
Corporate policy
This policy describes the department’s approach to safeguarding sensitive information and information systems via
approved remote access. It aims to provide a secure and consistent approach to remote access where
confidentiality, integrity, authentication and non-repudiation of information are maintained. It is aligned to the
Australian Cyber Security Centre Information Security Manual.
Policy statement
Risk-based approach
Remote access controls are implemented following a risk-based approach that considers the sensitivity of the
information and information systems the controls are planned to protect. The implementation of remote access
controls does not alter the sensitivity of the information and information systems. This policy limits the ability of the
information and information systems to be accessed by an unauthorised user, external to the department’s network.
The methods of remote access include Virtual Private Network (VPN), virtual desktop and applications and cloud
based systems.
© State of New South Wales through Department of Planning and Environment 2022. Information contained in this publication is based on knowledge and
understanding at the time of writing and is subject to change. For more information, please visit dpie.nsw.gov.au/copyright POL21/15
Remote Access Security Policy
Log management
Logging of systems that provide remote access should adhere to the Operations Security Standard.
Exemptions
• Exemptions to this policy must comply with the ISMS Exemption Request Management Standard. •
Exemptions must only be approved where it is technically, practically or financially infeasible to comply with
this policy.
Individuals who are not government sector employees such as volunteers, contingent or labour hire workers,
professional services contractors and consultants may have their services, contract or agreement terminated
immediately, or legal action could be taken if they are found to have violated this policy.
Review timeframe
Digital Information Office will review this policy no later than 3 years from the date the document is approved. This
policy may be reviewed earlier in response to post-implementation feedback, changes to legislation, or as
necessary in accordance with the department’s policy and procedures.
Related documents
This policy should be read in conjunction with the following documents: •
Policy metadata
Table 1. Policy metadata
Category Description
Status Final
Policy owner Chief Digital and Information Officer Document location DPE
intranet
Any additional applicability Additional applicability will be considered in the future Superseded
document N/A
POL21/15
Version control
Table 2. Version Control
Date issued
27.05.2021
3 May 2022
Version Change
1 New Policy
1.1 Updated to reflect new branding and name change.
Appendices
Appendix 1 – Definitions
Appendix 1 – Definitions
Table 3 - Definitions
Term Definition
Access control To ensure that access to assets is authorized and restricted based on business and security
requirements.
Cloud Servers that are accessed over the internet, and the software and databases that run on those servers.
Multi-factor authentication An authentication method that requires a user to provide two or more factors to
authenticate. Usually requires something you know (password) and
something you have (soft token, hard token, one time password), in order to
confirm the legitimacy of your identity for an online transaction or to gain
access to an application.
Remote access Access to a system that originates from outside an organisation’s network and enters the
network through a gateway, including over the internet.
Virtual application Provides a virtualisation solution for application delivery to any device over any network.
Virtual desktop Provides a virtualisation solution for desktop delivery to any device over any network.
Department of Planning and Environment | POL21/15 5
Role Responsibility
Chief Digital and Information Officer (CDIO) • Approve exemptions to this policy.
Employees • Must apply to Digital Information Office to get a remote access VPN token (hardware or
software).