Halloo there! I have compiled response answers in the attached document. Please review and let me know. Thank you
Remote access via VPN, recommended control mechanisms and Remote Access user policies
Name of student
Remote access via Virtual Private Networks (VPN’s) to corporate resources for the purposes of
e-commerce, telework and remote administration is becoming commonplace. From an auditing
perspective, suggest two or more controls that should be in place to prevent the loss or theft of
Remote access means that resources are being tapped from an outside location in the network,
even when using a Virtual Private Network (Ellingwood, 2015). To ensure access control,
organizations can implement;
a. SSH Keys. With the SSH keys, there is the provision of cryptographic authentication, which
serves as a typical password option or alternative. The SSH keys are private and secretly
known, meaning controlled access to resources in the network, and thus security to
b. Firewalls. These are infrastructures, software or hardware that are put in place to control
service exposure in any given network. In a VPN, a firewall ensures that there is con...
15 Million Students Helped!
Sign up to view the full answer