Remote Access | AC-17
Description
- All forms of remote access must have appropriate safeguards to protect the confidentiality, integrity, and availability of the information Example safeguards include encrypted communication channels, and multi-factor authentication.
- Remote access to an information resource must be approved by the Chief Information & Technology Officer's designee and the Cybersecurity Manager before access is made
- Information Resource Owners or their designees are responsible for documenting usage restrictions, configuration/connection requirements and implementation guidance if remove access to systems under their control is allowed. At a minimum:
- Remote access to MCC-owned information resources must be conducted using a MCC controlled, encrypted point-to-point tunnel. Examples include the MCC Virtual Private Network (VPN), SSH, Microsoft Remote Desktop Protocol (RDP) over TLS, TN3270 over TLS and HTTPS over TLS.
- RDP must be configured to require appropriate network encryption such as TLS.
- RDP and SSH connections must initiate within the MCC network or through a secure Public access for these services is not allowed.
Last updated: 5/8/2026
Contact Hours or Questions?