FAQ

Do off-site workers require remote access?

Do you allow end users to access the network remotely? If so, how many end users have remote access?

Remote access has become a much more common occurrence for many organizations. Workers connect from home and work through virtual private networks, check their email from Web page interfaces and use a number of other common network protocols to access servers on the network. If your customer's organization has remote employees or allows remote access, you need to ensure that the authentication mechanisms adequately restrict access to only those individuals authorized to access resources.

About the author
Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government.

The number of workers requiring remote access is also an important consideration. If the only individuals remotely accessing the customer's network resources are a couple of network administrators who occasionally need to reboot a router or tweak a switch, a simple SSH implementation may be sufficient. But if the customer has 50+ employees who all need direct access to the primary servers, you're going to need an authentication mechanism that ties into the internal network through a secure channel of some sort.


This was first published in September 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: