Employees have recently requested remote access to corporate email and shared drives. Remote access has never been offered; however, the need to improve productivity and rapidly responding to customer demands means staff now requires remote access.
Which of the following controls will BEST protect the corporate network?
A . Develop a security policy that defines remote access requirements. Perform regular audits of user accounts and reviews of system logs.
B . Secure remote access systems to ensure shared drives are read only and access is provided through a SSL portal. Perform regular audits of user accounts and reviews of system logs.
C . Plan and develop security policies based on the assumption that external environments have active hostile threats.
D . Implement a DLP program to log data accessed by users connecting via remote access. Regularly perform user revalidation.
Answer: C
Leave a Reply