Remote Access Policy
KS currently does not provide access it servers for users who buy our services. But arrangements will be made in the further for this. If you have a dedicated server, access will be provided.
This policy mainly only applies to KS Staff or people who have remote access into the KS Cloud system. This could be contractors, vendors or people who have dedicated server/private cloud.
|Name||KS Remote Access Policy|
|Owner||KSCloud/KS Corporate/KS IT|
|Issue Date||March 2019|
Remote access to our corporate network is essential to maintain our Team’s productivity, but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network. While these remote networks are beyond the control of KS/Kieran Saul policy, we must mitigate these external risks the best of our ability.
The purpose of this policy is to define rules and requirements for connecting to KS/Kieran Saul's network from any host. These rules and requirements are designed to minimize the potential exposure to <Company Name> from damages which may result from unauthorized use of KS/Kieran Saul resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical KS/Kieran Saul internal systems, and fines or other financial liabilities incurred as a result of those losses.
This policy applies to all KS/Kieran Saul employees, contractors, vendors and agents with a KS/Kieran Saul-owned or personally-owned computer or workstation used to connect to the KS/Kieran Saul network. This policy applies to remote access connections used to do work on behalf of KS/Kieran Saul, including reading or sending email and viewing intranet web resources. This policy covers any and all technical implementations of remote access used to connect to KS/Kieran Saul networks.
It is the responsibility of KS/Kieran Saul employees, contractors, vendors and agents with remote access privileges to KS/Kieran Saul's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to KS/Kieran Saul.
General access to the Internet for recreational use through the KS/Kieran Saul network is strictly limited to KS/Kieran Saul employees, contractors, vendors and agents (hereafter referred to as “Authorized Users”). When accessing the KS/Kieran Saul network from a personal computer, Authorized Users are responsible for preventing access to any KS/Kieran Saul computer resources or data by non-Authorized Users. Performance of illegal activities through the KS/Kieran Saul network by any user (Authorized or otherwise) is prohibited. The Authorized User bears responsibility for and consequences of misuse of the Authorized User’s access. For further information and definitions, see the Acceptable Use Policy.
For additional information regarding KS/Kieran Saul's remote access connection options, including how to obtain a remote access login, free anti-virus software, troubleshooting, etc., go to the Remote Access Services website.
4.1.1 - Secure remote access must be strictly controlled with encryption (i.e., Virtual Private Networks (VPNs)) and strong pass-phrases.
4.1.3 - While using a KS/Kieran Saul-owned computer to remotely connect to KS/Kieran Saul's corporate network, Authorized Users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or Third Party.
4.1.4 - Use of external resources to conduct KS/Kieran Saul business must be approved in advance by InfoSec and the appropriate business unit manager.
4.1.5 - All hosts that are connected to KS/Kieran Saul internal networks via remote access technologies must use the most up-to-date anti-virus software, this includes personal computers.
4.1.6 - Personal equipment used to connect to KS/Kieran Saul's networks must meet the requirements of <Company Name>-owned equipment for remote access
5.1 - Compliance Measurement
The Infosec Team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and inspection, and will provide feedback to the policy owner and appropriate business unit manager.
5.2 - Exceptions
Any exception to the policy must be approved by Remote Access Services and the Infosec Team in advance.
Users who have violated this policy may be subject to their accounts being terminated or suspended. KS Staff who have violated this policy may be subject to disciplinary action.