<section title="16.5. Remote Access"><subsection title="Objective"><paragraph
    title="16.5.1."


><![CDATA[<p><span class="TextRun SCXW46699965 BCX8"><span class="NormalTextRun SCXW46699965 BCX8">Remote access to systems is</span> <span class="NormalTextRun SCXW46699965 BCX8">secure, controlled</span><span class="NormalTextRun SCXW46699965 BCX8"> and</span><span class="NormalTextRun SCXW46699965 BCX8"> authorised.</span></span></p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.5.2."


><![CDATA[<p>This section covers information relating to the methods used by personnel to access an agency system from a remote location.</p>]]></paragraph>
</block>
<block title="Remote access"><paragraph
    title="16.5.3."


><![CDATA[<p>Remote access is defined as user access to agency systems originating outside an agency network. &nbsp;It does not include web–based access to DMZ resources. &nbsp;Further information on working off–site can be found in <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 – Distributed working</a>. &nbsp;The requirements for using multi–factor authentication are described in the Identification and Authentication section of this chapter.</p>]]></paragraph>
</block>
<block title="Remote privileged access"><paragraph
    title="16.5.4."


><![CDATA[<p>Remote access by a privileged user to an agency system via a less trusted security domain (for example, the Internet) may present additional risks.  Controls in this section are designed to prevent escalation of user privileges from a compromised remote access account.</p>]]></paragraph>
<paragraph
    title="16.5.5."


><![CDATA[<p><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">Remote privileged access does </span></span><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">not </span></span><span class="TextRun SCXW186714649 BCX8"><span class="NormalTextRun SCXW186714649 BCX8">include privileged access across disparate physical sites that are within the same security domain or privileged access across remote sites that are connected via trusted infrastructure</span><span class="NormalTextRun SCXW186714649 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW186714649 BCX8">Privileged access of this nature faces different threats to those discussed above</span><span class="NormalTextRun SCXW186714649 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW186714649 BCX8">Ensuring robust processes and procedures are in place within an </span><span class="NormalTextRun SCXW186714649 BCX8">organis</span><span class="NormalTextRun SCXW186714649 BCX8">ation</span><span class="NormalTextRun SCXW186714649 BCX8"> to </span><span class="NormalTextRun SCXW186714649 BCX8">monitor</span><span class="NormalTextRun SCXW186714649 BCX8"> and detect the threat of a malicious insider are the most important measure for this scenario.</span></span></p>]]></paragraph>
</block>
<block title="Encryption"><paragraph
    title="16.5.6."


><![CDATA[<p>Cryptography is used to provide confidentiality and preserve integrity of data transmitted over networks where it may be intercepted or examined and is outside the control of the sender and recipient.</p>]]></paragraph>
<paragraph
    title="16.5.7."


><![CDATA[<p>With the increases in speed and computing power and the cost reductions of modern computing, older cryptographic algorithms are increasingly vulnerable.  It is vital that recommendations and controls in the NZISM are followed.</p>]]></paragraph>
<paragraph
    title="16.5.8."


><![CDATA[<p>The use of approved cryptographic algorithms to encrypt authentication, session establishment and data for all remote access connections is considered good practice (See <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a> and <a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 - Distributed Working</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.5.9."


><![CDATA[<p class="NormS10C7">Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>Title</td>
<td>Publisher</td>
<td>Source</td>
</tr>
<tr>
<td>
<p><span class="TextRun SCXW106064733 BCX8"><span class="NormalTextRun SCXW106064733 BCX8">Multi-Site Connectivity</span></span><span class="EOP SCXW106064733 BCX8">&nbsp;</span></p>
</td>
<td>NSA</td>
<td>
<p><a href="https://www.nsa.gov/Resources/Commercial-Solutions-for-Classified-Program/Capability-Packages/#multi-site">Capability Packages (nsa.gov)</a></p>
</td>
</tr>
<tr>
<td>
<p><span class="TextRun SCXW138605928 BCX8"><span class="NormalTextRun SCXW138605928 BCX8">NIST Special Publication 800-114</span><span class="NormalTextRun SCXW138605928 BCX8">: </span><span class="NormalTextRun SCXW138605928 BCX8">User’s Guide to Telework and Bring Your Own Device (BYOD) Security</span></span><span class="EOP SCXW138605928 BCX8">&nbsp;</span></p>
</td>
<td>NIST</td>
<td>
<p><a class="Hyperlink SCXW213998247 BCX8" rel="noopener noreferrer" href="https://csrc.nist.gov/pubs/sp/800/46/r2/final" target="_blank"><span class="TextRun Underlined SCXW213998247 BCX8"><span class="NormalTextRun SCXW213998247 BCX8">SP 800-46 Rev. 2, Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security | CSRC</span></span></a><span class="EOP SCXW213998247 BCX8">&nbsp;</span></p>
</td>
</tr>
</tbody>
</table>
<p class="NormS10C7">&nbsp;</p>
<p class="NormS10C7">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Authentication"><paragraph
    title="16.5.10.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Authenticating remote system users and devices ensures that only authorised system users and devices are allowed to connect to agency systems.</p>]]></paragraph>
<paragraph
    title="16.5.10.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="1973"
><![CDATA[<p>Agencies MUST authenticate each remote connection and user prior to permitting access to an agency system.</p>]]></paragraph>
<paragraph
    title="16.5.10.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1974"
><![CDATA[<p>Agencies SHOULD authenticate both the remote system user and device during the authentication process.</p>]]></paragraph>
</block>
<block title="Remote privileged access"><paragraph
    title="16.5.11.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>A compromise of remote access to a system can be limited by preventing the use of remote privileged access from an untrusted domain.</p>]]></paragraph>
<paragraph
    title="16.5.11.C.01."

    tags="Technical,Access Control,Passwords"


    classification="Top Secret, Secret, Confidential"
    compliance="Must Not"
    cid="1977"
><![CDATA[<p>Agencies MUST NOT allow the use of remote privileged access from an untrusted domain, including logging in as an unprivileged system user and then escalating privileges.</p>]]></paragraph>
<paragraph
    title="16.5.11.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should Not"
    cid="1978"
><![CDATA[<p>Agencies SHOULD NOT allow the use of remote privileged access from an untrusted domain, including logging in as an unprivileged system user and then escalating privileges.</p>]]></paragraph>
</block>
<block title="Virtual Private Networks (VPNs)"><paragraph
    title="16.5.12.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Virtual Private Networks (VPN’s) use a tunnelling protocol to create a secure connection over an intermediate (public) network such as the internet. &nbsp;A VPN uses techniques such as encryption, authentication, authorisation and access control to achieve a secure connection. See Chapter 17 for details on cryptographic selection and implementation.</p>]]></paragraph>
<paragraph
    title="16.5.12.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>A VPN can connect remote or mobile workers or remote locations to a private (agency) network.</p>]]></paragraph>
<paragraph
    title="16.5.12.R.03."


><![CDATA[<p><span class="TextRun Highlight SCXW191307459 BCX8"><span class="NormalTextRun SCXW191307459 BCX8">Using Zero Trust principles alongside the use of VPNs provides </span><span class="NormalTextRun SCXW191307459 BCX8">additional</span><span class="NormalTextRun SCXW191307459 BCX8"> security to </span><span class="NormalTextRun SCXW191307459 BCX8">agency</span> <span class="NormalTextRun SCXW191307459 BCX8">systems. For example, if a compromised device connects through a VPN to an </span><span class="NormalTextRun SCXW191307459 BCX8">organisation</span> <span class="NormalTextRun SCXW191307459 BCX8">enforcing Zero Trust principles, potential damage to the </span><span class="NormalTextRun SCXW191307459 BCX8">organisation</span> <span class="NormalTextRun SCXW191307459 BCX8">will be minimised through limiting the access of the potential compromise</span><span class="NormalTextRun SCXW191307459 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.5.12.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1982"
><![CDATA[<p>Agencies SHOULD establish VPN connections for all remote access connections.</p>]]></paragraph>
<paragraph
    title="16.5.12.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="7555"
><![CDATA[<p><span class="TextRun Highlight SCXW162426022 BCX8"><span class="NormalTextRun SCXW162426022 BCX8">Agencies</span> <span class="NormalTextRun SCXW162426022 BCX8">SHOULD use Zero Trust principles alongside the use of VPN connections to enhance the security posture of the </span><span class="NormalTextRun SCXW162426022 BCX8">organisation</span><span class="NormalTextRun SCXW162426022 BCX8">.</span><span class="NormalTextRun SCXW162426022 BCX8"> This should include removing the ability for a standard user to disable the VPN connection.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
