It is the responsibility of the University's central IT departments to ensure that all workstations residing on the University's networks are protected by enterprise firewalls and appropriate intrusion prevention and detection systems. No inbound internet access to workstations will be allowed except through secure methods.
Remote Access Requirements
- All remote administrator tasks must be performed through secure protocols.
- Remote access to workstations must be established through the use of VPN or other secure technologies.
- Third party remote access (i.e. vendor support) must be conducted using secure methods. Access should be limited to the duration of an incident or support request and should not persist outside of the active issue remediation.