Remote Access Policy
1. Overview Remote access to our corporate network is essential to maintain our Team’s productivity, but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network. While these remote networks are beyond the control of Hypergolic Reactions, LLC policy, we must mitigate these external risks the best of our ability.
2. Purpose The purpose of this policy is to define rules and requirements for connecting to neaPay's network from any host. These rules and requirements are designed to minimize the potential exposure to neaPay from damages which may result from unauthorized use of neaPay resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical neaPay internal systems, and fines or other financial liabilit Consensus Policy Resource Community For additional information regarding neaPay's remote access connection options, including how to obtain a remote access login, free anti-virus software, troubleshooting, etc., go to the Remote Access Services website (company url).
4.1 Requirements
4.1.1 Secure remote access must be strictly controlled with encryption (i.e., Virtual Private Networks (VPNs)) and strong pass-phrases. For further information see the Acceptable Encryption Policy and the Password Policy.
4.1.2 Authorized Users shall protect their login and password, even from family members.
4.1.3 While using a neaPay-owned computer to remotely connect to neaPay's corporate network, Authorized Users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or Third Party.
4.1.4 Use of external resources to conduct neaPay business must be approved in advance by InfoSec and the appropriate business unit manager.
4.1.5 All hosts that are connected to neaPay internal networks via remote access technologies must use the most up-to-date anti-virus software (place url to corporate software site here), this includes personal computers. Third party connections must comply with requirements as stated in the Third Party Agreement.
4.1.6 Personal equipment used to connect to neaPay's networks must meet the requirements of neaPay-owned equipment for remote access as stated in the Hardware and Software Configuration Standards for Remote Access to neaPay Networks.
5. Policy Compliance
5.1 Compliance Measurement The Infosec Team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and inspection, and will provide feedback to the policy owner and appropriate business unit manager.
5.2 Exceptions Any exception to the policy must be approved by Remote Access Services and the Infosec Team in advance.
5.3 Non-Compliance An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
6 Related Standards, Policies and Processes Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of neaPay’s network: Acceptable Encryption Policy Acceptable Use Policy Password Policy Third Party Agreement Hardware and Software Configuration Standards for Remote Access to neaPay Networks
Convert ISO8583 to JSON XML SQL
ISO8583 Interface Handler
Convert ISO20022 to ISO8583 ...
Build ISO8583 from scratch
ISO8583 Router by criteria
Authorize cards and ledger
Acquiring host from devices
Generate and issue cards
ISO8583 HISO98 HISO87 simulator
ISO20022 & SWIFT simulator
POS protocols simulator
Web API tester Performance
Get a free quote, Ask for details
Get help
Try the software yourself
Download
Read Documentation and Start guides
Online Tools Overview