Remote Access Information Security Standard
Remote Access refers to the ability to access TU's resources using the Internet. Students, faculty and staff connecting remotely are responsible for using approved and secure methods to help safeguard university data.
In addition to the following remote access information security safeguards, any data covered by federal laws, state laws, regulations or contractual agreements must meet the security requirements defined by those laws, regulations, or contracts.
Definitions
- Data Classification – how ¿ì»îÊÓƵcategorizes data and guidance on the proper handling of that data.
- Remote Access – accessing TU's information systems using an internet connection (e.g., home network), or TU’s Wi-Fi network.
- Remote Access Solutions – methods used to access TU's resources: Remote Access Gateway-also referred to as Remote Desktop Protocol or Remote Desktop (RDG or RDP), Virtual Private Network (VPN) and Virtual Workspace (VW).
- University Devices (UD) - devices owned and managed by Towson University. Also referred to as ¿ì»îÊÓƵdevice.
- Personal Devices (PD) – devices owned and managed by employees. Also referred to as Bring Your Own Device (BYOD).
- ¿ì»îÊÓƵInternet-Facing Applications - the university's information systems, including Software as a Service (SaaS) applications, available over the internet via a web browser (e.g., PeopleSoft, Blackboard, Office365, etc.).
Safeguards
General Use
- Approved forms of remote access are Remote Access Gateway, Virtual Private Network and Virtual Workspace.  Use Remote Access Gateway and Virtual Workspace whenever possible.
- Use secure Wi-Fi. Don’t access ¿ì»îÊÓƵresources on free Wi-Fi.
- Faculty and staff should connect to the Virtual Private Network (VPN) with a university device only (i.e., ¿ì»îÊÓƵissued laptop).
- Ensure the remote network (non-¿ì»îÊÓƵnetwork) is secure.
- Authenticate with Duo Multi-Factor Authentication when using RDG, VPN, VW and accessing information systems with confidential data.
REmote access by device type
Access Method | Data Classification: Public-Level 1 | Data Classification: Protected-Level 2 | Data Classification: Confidential-Level 3 |
---|---|---|---|
Remote Desktop Gateway |
¿ì»îÊÓƵdevice: yes, personal device: yes |
¿ì»îÊÓƵdevice: yes, personal device: yes |
¿ì»îÊÓƵdevice: yes, personal device: yes |
Virtual Private Network |
¿ì»îÊÓƵdevice: yes, personal device: no |
¿ì»îÊÓƵdevice: yes, personal device: no |
¿ì»îÊÓƵdevice: yes, personal device: no |
Virtual Workspace | ¿ì»îÊÓƵdevice: yes, personal device: yes | ¿ì»îÊÓƵdevice: yes, personal device: yes | ¿ì»îÊÓƵdevice: yes, personal device: yes |
Internet-facing Application (PeopleSoft, Stratus, etc.) | ¿ì»îÊÓƵdevice: yes, personal device: yes | ¿ì»îÊÓƵdevice: yes, personal device: yes | ¿ì»îÊÓƵdevice: yes, personal device: no |
Handling Data
- Read and follow TU’s Data Use Standard.
- Do not access confidential data on public networks (e.g., coffee shop Wi-Fi).
- Do not save confidential data to local hard drives under any circumstance.
- If accessing information systems such as PeopleSoft from a personal device, do not save or export any confidential data.
- Accessing confidential data is not permitted from personal devices unless using Remote Access Gateway or Virtual Workspace.
- Do not store any protected or confidential ¿ì»îÊÓƵdata on personal devices.
Securing Devices
UNIVERSITY DEVICES
- University devices (such as laptops) are actively managed by the university to ensure a current operating system and proper protections such as antivirus, local firewall and up-to-date security patches are in place.
- University-owned desktops are not to be taken off campus.
- Only use a NetID to login to the UD (local user and/or administrator accounts are not permitted without an approved exception).
Personal Devices
- Use Microsoft 365 (web version) to access applications like Outlook, OneNote, etc.
- Make sure personal devices have a current operating system with up-to-date security patches (installed within 30 days of release).
- Have functioning antivirus software installed on the device.
Support
Questions, comments or requests for exceptions to this standard should be directed to the Office of Technology Services (OTS) by submitting a service request.