Remote Access | AC-17
Description
- Remote access to an information resource must be approved by the Chief Information & Technology Officer's designee and the Cybersecurity Manager before access is made
- Usage restrictions, configuration/connection requirements and implementation guidance is allowed. At a minimum:
- Remote access to MCC-owned information resources must be conducted using a MCC controlled, encrypted point-to-point tunnel. Examples include the MCC Virtual Private Network (VPN), SSH, Microsoft Remote Desktop Protocol (RDP) over TLS, TN3270 over TLS and HTTPS over TLS.
- RDP must be configured to require appropriate network encryption such as TLS.
- RDP and SSH connections must initiate within the MCC network or through a secure Public access for these services is not allowed.
Last updated: 3/11/2024
Contact Hours
Questions?