Connecting securely to servers remotely
There should be extra attention paid when setting up and configuring remote access to your environment. Remote access should be very strategic and the footprint extremely small. Access to your environment directly over the internet should be limited. This exposure poses significant risks and could easily allow an attacker to gain access to your servers. Ensure your standards cover a secure and locked-down remote management strategy, and limit or eliminate internet access to your servers. This section will provide more detail about several tools that you can use to enforce a secure remote access policy.
Remote management and support tools
Remote management is a critical task that is used to support both your end users and the infrastructure within your environment. There are many methods available to remotely manage and access your environment. Your support desk will have some form of remote management tools in place to access end user devices...