Remote access

Écrit par Admin FAQ (Super Administrator)

Mis à jour le 19/03/2024

Remote Access Policy

The purpose of this policy is to define standards for connecting to the Externis Network from a Computer or other device located outside of the Externis network. This policy is designed to minimize the potential exposure to Externis from risks associated with remote access connections by ensuring only secure methods are used to connect to the Externis network.
This policy applies to all Externis employees or Third parties with either an Externis owned or personally owned computer used to connect to the Externis network.

Permitted remote access connections

Remote access connections to the Externis network is only allowed by IT Service. All users who need a remote access must ask for the specific permission to the IT Service. The IT Service is allowed to grant/deny remote access. These include but are not limited to:

  • Approved use of network resources service by registered staff.
  • Teleworking by registered Externis employees.
  • Network administration purposes by registered System Administration Staff.
  • Administration of Externis Applications or Systems by approved Third parties.

Methods of Remote connection

IT Services only may approve appropriate remote access technologies for use to access the Externis network. 
Externis Users should apply to IT Services for a list of currently approved methods.
Current preferred remote access technologies are limited to:

  • Approved Externis Virtual private network (VPN)

Non-standard remote access connections

Organizations or individuals wishing to implement non-standard Remote Access must obtain prior approval from IT Services.

Protecting Remote Access Credentials

All individuals are responsible for safeguarding the remote access credentials granted to them and making sure that unauthorized individuals do not use them. These credentials may consist of username and password combinations, digital certificates or other software or hardware.

Username/Password Authentication

Where Username/Password authentication is used the following apply:

  • Where remote access authentication is facilitated using a username and password a strong password must be used.
  • At no time should any Externis employee provide his or her username or password to any unauthorized third party.

Remote Access Hosts

All hosts that are used for remote access to the Externis networks must:

  • Use the most up-to-date anti-virus software.
  • Be protected by an Externis or private Firewall.
  • Not be made available for use to unauthorized third parties.
  • Be available for inspection by IT Services if requested.

All Individuals/groups granted remote access connection privileges

It is the responsibility of all individuals/groups with remote access privileges to the Externis network to ensure that:

  • Their remote access connection meets security standards as approved by Externis.
  • The connection is only used for approved purposes.
  • The remote access credentials granted to them are held safely and not disclosed to unauthorized third parties.

Externis employees providing remote access to Third parties

Externis employees must not provide remote access to the Externis network to third parties. This is strictly forbidden.

Third Parties

It is the responsibility of all contractors, vendors and agents with remote access privileges to the Externis network to ensure that the remote access connection adheres to the Security Standards as defined in this policy.
All Third parties must comply with the security measures as outlined in this policy document.

Groupe Externis

Externis, éditeur de eCOS® Blue Eagle, la première suite SaaS dédiée au retail execution des acteurs de l’univers du retail (marques, distributeurs, grossistes, …), tous canaux de distribution confondus

Solution conçue, développée et hébergée en France

© 2015-2022 EXTERNIS GROUP, Tous droits réservés | Mentions légales