Remote Access Security Best Practices
Remote Access Security Best Practices
Access Security
Best Practices
How to ensure security when so many
of your employees are working remotely
With the explosion of cloud technologies and widespread availability of broadband internet, many organizations
are allowing employees to work remotely. After all, being able to work from anywhere enhances flexibility and
productivity. But it’s not so rosy for the IT pros who need to set up the infrastructure to support remote work. As
they strive to ensure seamless access to services and applications, other important projects are getting put on
the back burner — including critical security-related initiatives. Cybercriminals are noticing that organizations
are more vulnerable than ever, and are ramping up their attacks.
No matter how far along you are in setting up your infrastructure to support remote work, here are some
valuable tips for making it as secure as it can be:
Whenever possible, use managed devices. For every device that connects to your network.
Enable encryption using BitLocker for Windows and FileVault for macOS.
Ensure all operating systems and other software are currently supported by the vendor.
Keep all operating systems and other software up to date, with all critical updates installed.
Enforce password policy, disable automatic login, and enable automatic lock.
If you’re not able to use managed devices, give all employees a security guide that explains the security
measures required and recommended for remote workers.
Use VPN — remember that your employees might use public Wi-Fi networks.
If possible, use multi-factor authentication (MFA) to protect VPN accounts and cloud services from
unauthorized access.
Avoid using Remote Desktop Protocol (RDP). If you have to use RDP:
Don’t expose RDP to the internet. All activity should be go through a secure connection.
Avoid direct RDP connections. RDP sessions should be forced through Remote Desktop Gateway
(ideally, in a DMZ).
Taking the steps in the previous checklist will help make your environment more secure, but your attack surface
is still larger than ever. Follow these best practices to further mitigate the risk of breaches and other security
incidents:
Identify all stale and unused accounts and then delete or disable them.
Review all permission and remove excessive and unused rights, especially remote access rights.
Ensure that your password policy is configured correctly. Check your length and complexity requirements,
focusing on passwords to be easy to remember and hard to guess.
Have an account lockout policy in place to prevent attackers from getting into your network by guessing a
user’s password. But don’t make the number of failed attempts permitted before lockout so low that you
cause frustration and loss of productivity for legitimate users who make the occasional typo.
Use Active Directory and Azure AD groups to control access across your infrastructure. Regularly review
your groups and group membership to make sure no one has excessive permissions.
Ensure that NTFS permissions and permissions to shared resources like SharePoint, SharePoint Online,
OneDrive for Business and Teams follow the least-privilege principle.
Configuration auditing — Make sure that the configuration of all critical resources matches your
security baseline, and audit all configuration changes for errors and malicious activity.
Access auditing — Monitor logons to both cloud and on-prem resources, as well as VPN logons.
Activity auditing — Monitor user activity around data, especially activity around sensitive data and in
cloud solutions that support remote workers, such as SharePoint Online, OneDrive for Business and MS
Teams. Watch for suspicious group membership and permission changes that could indicate privilege
escalation. And be on the lookout for spikes in suspicious activity around your network ports and VPN
connections, especially port scans and failed login attempts, which could be a sign of password-spray
or brute-force attacks.
Perform an enterprise-wide risk assessment. Pay particular attention to your remote services.
Document your policies and distribute them to everyone who accesses your IT environment.
Ensure security in the age
of increased remote work
with Netwrix Auditor
Identify and mitigate IT risks to reduce your vulnerability as your remote
workforce grows
Know who has access to what data on your file servers and SharePoint,
and remediate excessive access rights and directly assigned permissions
to protect your critical data