Remote Access Policy

Cross-cutting

1. Purpose

Establish requirements for secure remote access to [ORGANIZATION]'s information systems and network resources to protect against unauthorized access while enabling business productivity.

2. Scope

This policy applies to all remote access connections to [ORGANIZATION]'s network and information systems by employees, contractors, and authorized third parties.

3. Policy

3.1 Approved Remote Access Methods

3.1.1

Remote access to [ORGANIZATION]'s network shall only be performed through approved methods: [ORGANIZATION]-provided VPN client with MFA, approved zero-trust network access (ZTNA) solution, approved virtual desktop infrastructure (VDI), or approved cloud application portals with MFA.

3.1.2

Direct connections (RDP, SSH, database connections) to internal systems from the internet are prohibited without VPN or approved secure gateway.

3.1.3

Split tunneling on VPN connections is [CUSTOMIZE: prohibited / allowed only with DNS and endpoint security controls active].

3.2 Device Requirements

3.2.1

Devices used for remote access shall meet minimum security requirements: current and supported operating system with automatic updates enabled, active endpoint protection (antivirus/EDR), host-based firewall enabled, full disk encryption enabled, and screen lock configured with [CUSTOMIZE: 5/10] minute timeout.

3.2.2

Personal devices (BYOD) used for remote access shall be enrolled in [ORGANIZATION]'s device management solution and shall meet the same security requirements as organization-owned devices.

3.2.3

Public or shared computers shall not be used to access [ORGANIZATION]'s internal systems.

3.3 Session Management

3.3.1

Remote access sessions shall have an idle timeout of [CUSTOMIZE: 30/60] minutes and a maximum session duration of [CUSTOMIZE: 10/12/24] hours.

3.3.2

Users shall lock their workstation when stepping away during a remote session.

3.3.3

Remote access activity shall be logged and monitored. Anomalous remote access patterns shall trigger alerts.

3.4 Third-Party Remote Access

3.4.1

Third-party remote access shall be pre-authorized, time-limited, and documented with: business justification, authorized systems, access duration, and responsible [ORGANIZATION] contact.

3.4.2

Third-party remote access shall be monitored in real-time or recorded where technically feasible.

3.4.3

Standing (persistent) third-party remote access connections are prohibited unless specifically approved by [CUSTOMIZE: CISO] with compensating controls documented.

4. Compliance

4.1

Compliance with this policy is mandatory for all personnel within its scope. Compliance will be monitored through periodic audits, automated controls, and management review.

4.2

Exceptions to this policy must be documented with a business justification, approved by [CUSTOMIZE: CISO/Security Team], and reviewed at least annually.

5. Enforcement

5.1

Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and may result in civil or criminal penalties where applicable law has been violated.

5.2

[ORGANIZATION] reserves the right to audit compliance with this policy at any time, with or without notice.

6. Review and Revision

6.1

This policy shall be reviewed at least annually by [CUSTOMIZE: CISO/Policy Owner] and updated as necessary to reflect changes in the threat landscape, regulatory requirements, or organizational structure.

6.2

All revisions shall be documented with version number, date, author, and description of changes.

Policy Approval

Approved By

[CUSTOMIZE]

Title

[CUSTOMIZE]

Date

[CUSTOMIZE]

Document Control

Version: [CUSTOMIZE: 1.0]
Effective Date: [CUSTOMIZE]
Last Reviewed: [CUSTOMIZE]
Next Review: [CUSTOMIZE]
Classification: Internal