Get started Bring yourself up to speed with our introductory content.

Do off-site workers require remote access?

As remote access is becoming more common, authentication opportunities are on the rise. Find out what you should know about your customer's remote employees before implementing any authentication solution.

Do you allow end users to access the network remotely? If so, how many end users have remote access?

Remote access has become a much more common occurrence for many organizations. Workers connect from home and work through virtual private networks, check their email from Web page interfaces and use a number of other common network protocols to access servers on the network. If your customer's organization has remote employees or allows remote access, you need to ensure that the authentication mechanisms adequately restrict access to only those individuals authorized to access resources.

About the author
Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government.

The number of workers requiring remote access is also an important consideration. If the only individuals remotely accessing the customer's network resources are a couple of network administrators who occasionally need to reboot a router or tweak a switch, a simple SSH implementation may be sufficient. But if the customer has 50+ employees who all need direct access to the primary servers, you're going to need an authentication mechanism that ties into the internal network through a secure channel of some sort.

Dig Deeper on Identity and access management (IAM) security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.