Greater Saskatoon Catholic
Schools
I.T. Remote Access Standards
1.0
Overview
It is often necessary to provide access to corporate information resources to
employees or others working outside GSCS's network. While this can lead to productivity
improvements, it can also create certain vulnerabilities if not implemented
properly. The goal of this document is
to provide the framework for secure remote access implementation.
2.0 Purpose
This document defines standards for accessing corporate information technology
resources from outside the network. This
includes access for any reason from the employee's home, remote working
locations, while traveling, etc. The
purpose is to define how to protect information assets when using an insecure
transmission medium.
3.0 Scope
The scope of these standards covers all employees, contractors, and external
parties that access GSCS resources over a third-party network, whether such
access is performed with GSCS-provided or non-GSCS-provided equipment.
4.0 Policy
4.1 Prohibited Actions
Remote access to corporate systems is only to
be offered through a GSCS-provided means of remote access in a secure
fashion. The following are specifically
prohibited:
·
Installing
a modem, router, or other remote access device inside the GSCS network
·
Remotely
accessing corporate systems with a remote desktop tool, such as VNC, Citrix, or
GoToMyPC
·
Use
of non-GSCS-approved remote access software.
·
Split
Tunneling to connect to an insecure network in addition to the corporate
network, or in order to bypass security restrictions.
4.2 Use of non-GSCS-provided Machines
Accessing the corporate network through home
or public machines can present a security risk, as GSCS cannot completely
control the security of the system accessing the network. Use of non-GSCS-provided machines to access
the corporate network is permitted as long as this policy is adhered to, and as
long as the machine meets the following criteria:
·
It
has up-to-date antivirus software installed
·
Its
software patch levels are current
·
It
is protected by a firewall
When accessing the network remotely, users
must not store confidential information on home or public machines.
4.3 Client Software
GSCS will supply users with remote access
software that allows for secure access and enforces the remote access
policy. The software will provide
traffic encryption in order to protect the data during transmission. The user is responsible for maintaining a
secure system, free of viruses and backdoors.
4.4 Network Access
There are no restrictions on what information
or network segments users can access when working remotely, however the level
of access should not exceed the access a user receives when working in the
office.
4.5 Idle Connections
Due to the security risks associated with
remote network access, it is a good practice to dictate that idle connections be
timed out periodically. Remote
connections to GSCS's network must be timed out after 1 hour of inactivity.
5.0
Enforcement
This policy will be enforced by Superintendents of Education. Violations may
result in disciplinary action, which may include suspension, restriction of
access, or more severe penalties up to and including termination of employment.
Where illegal activities or theft of GSCS property (physical or intellectual)
are suspected, GSCS may report such activities to the applicable authorities.
6.0 Definitions
Modem-A hardware device that
allows a computer to send and receive digital information over a telephone
line.
Remote Access-The act of communicating with a computer or network from
an off-site location. Often performed by
home-based or traveling users to access documents, email, or other resources at
a main site.
Split Tunneling-A method of accessing a local network and a public
network, such as the Internet, using the same connection.
Timeout-A technique that drops or closes a connection after a certain
period of inactivity.
Two Factor Authentication-A means of authenticating a user that utilizes
two methods: something the user has, and something the user knows. Examples are smart cards, tokens, or
biometrics, in combination with a password.
7.0
Revision History
Revision 1.0, 8/9/2011
Revision
2.0, 8/13/2012