Remote Access Policy

Remote Access Policy

The Remote Access Policy was developed by the Company in order to define a common minimum baseline level of security for the provision of access to Company’s systems from external locations (remote access connections used to do work on behalf of Company, including reading or sending email and viewing intranet web resources) not under the control of that Company.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. ROLES AND RESPONSIBILITIES
4.1 DEPARTMENT MANAGER
4.2 TECHNOLOGY SECURITY TEAM
4.3 EMPLOYEE
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 9

Review Remote Access Policy.

Your email address will not be published. Required fields are marked *

Related Products:

€559.99

Purchase

This bundle contains all the products listed in the Identity and Access Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

The objective of the Configuration Management Procedure is to ensure the integrity and availability of Company information and to prevent damages from uncontrolled configuration changes to all IT and physical infrastructure services that support Company’s systems.

€79.99

Purchase

The Managing IS Risks in IT Services Provided by Third Parties Standard requires the use of risk management techniques to stipulate controls necessary for the management of the relationship with IT third parties and those controls required in formal agreements with the IT third parties.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link