Having the correct systems in place to ensure that remote employees are able to work as if they were in a corporate office is called “remote access.” Whenever transactions occur between a remote worker and the corporate environment, both entities want to ensure that security is implemented. Remote workers need to know their data are not shared with outside entities. IT security personnel need to know the correct person is gaining access to the internal network, and that the correct access is being provided once those users are on the network. Implementing identification, authentication, and authorization for remote access assists in this protection.
Implementing various technologies and addressing remote access concerns ensures your systems and data are protected. You will learn about a variety of remote access technologies and their benefits throughout this chapter. First, it’s important to understand the concerns associated with remote access:
Whenever transactions or communications occur on a network, it is important for users to provide identification and for organizations to ensure users are authenticated and authorized to perform actions, such as downloading data from the organization’s intranet. This occurs in three steps: identification, authentication, and authorization.
Identification is the process of uniquely distinguishing an individual. In most cases, identification needs to be provided prior to authenticating the user. Common forms of identification are a name or an account number. Identification can refer to a person, computer system, or program. Identification is important because if, for example, everyone had the same bank account number, it would be almost impossible for a bank to know how much money you have in your account. In a network environment, a username is your unique identification. Some organizations also provide employees with a corporate identification number or a badge number as a separate identification mechanism.
Authentication is the process of verifying that users are who they say they are. Access and privileges should not be provided to a user unless verification has occurred. Authentication can take many forms when it is based on identity. Every form of authentication is based on something you have, something you are, or something you know.
You can set up a remote access authentication using authentication methods such as multifactor authentication. Most enterprises implement two-factor authentication, such as requiring a personal identification number (PIN) and token when connecting to the internal network via a VPN. This is necessary because the security concerns specifically associated with remote access are greater. Allowing a remote computer to directly access an organization’s network poses a high risk. It is necessary to use stronger authentication methods so that identity verification is correct and is not being mimicked by an attacker. Remote access authentication can also be achieved through protocols that you will learn about later in this chapter.
Once authentication is completed, authorization can occur. Authorization is determining which actions are allowed or not allowed by a user or system. Although a user may have provided identification and been authenticated, this does not mean the user is authorized to access all systems or run all commands. Once the user performs an action, mechanisms such as an access control list are used to authorize or not authorize user actions. Although authorization is not necessarily tied to remote access, it is important to understand how access control systems work together and complement one another. Remote access is an important part of the infrastructure, and authorization provides a secondary layer to securing the network and data that reside on the network.