Now Accepting Apple Pay

Apple Pay is the easiest and most secure way to pay on StudyMoose in Safari.

Access control

Categories: ControlTechnology

The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.

Scope

This policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation used to connect to the Richman Investments network.

This policy applies to remote access connections used to do work on behalf of Richman Investments including reading or sending email and viewing intranet web resources and wireless devices. Remote access implementations that are covered by this policy include, but are not limited to, dial-in Modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. VPN access control model for a large scale company.

Get quality help now
Dr. Karlyna PhD
Verified writer

Proficient in: Control

4.7 (235)

“ Amazing writer! I am really satisfied with her work. An excellent price as well. ”

+84 relevant experts are online
Hire writer

This policy will support remote access control for systems, applications, and data access. Remote access Defined Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings. The following diagram shows the VPN server that provides remote access VPN connections.

Domain/Network Config

For each employee that is allowed VPN access:

  • The network access permission on the dial-in properties of the user account is set to Control access through NPS Network Policy.

    Get to Know The Price Estimate For Your Paper
    Topic
    Number of pages
    Email Invalid email

    By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

    "You must agree to out terms of services and privacy policy"
    Check writers' offers

    You won’t be charged yet!

The user account is added to the VPN_Users group in Active Directory. To define the authentication and encryption settings for remote access VPN clients, the following remote access network policy is created in Network Policy Server (NPS):

  • Policy name: Remote Access VPN Clients
  • Conditions:
  • NAS Port Type is set to Virtual (VPN)
  • Windows Groups is set to VPN_Users
  • Calling Station ID is set to 207. 209. 68. 1
  • Permission is set to Grant access. NPS policy settings:
  • On the Constraints tab, under Authentication Methods, for EAP Types select Microsoft: Smart Card or other certificate. Also enable Microsoft Encrypted Authentication version 2 (MS-CHAP v2).
  • Or SSTP, L2tp/IPsec, PPTP, IKEv2

Access control model/ policy

This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and provides and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the VPN tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and permissions

Cite this page

Access control. (2018, Nov 13). Retrieved from https://studymoose.com/access-control-2-essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment