Loading...
HomeMy WebLinkAboutRemote Network AccessIdaho Department of Correction Standard Operating Procedure Division of Management Services General Administration Control Number: 141.03.04.007 Version: 1.1 Page Number: 1 of 8 Adopted: 5-12-2010 Reviewed: 5-12-2010 Title: Remote Network Access This document was approved by Tony Meatte, chief of the Division of Management Services, on 5/12/10 (signature on file). BOARD OF CORRECTION IDAPA RULE NUMBER None POLICY STATEMENT NUMBER 141 Information Technology Management POLICY DOCUMENT NUMBER 141 Information Technology Management DEFINITIONS Standardized Definitions List Authentication: The process of proving the identity of a computer or computer user. (E.g., for users it generally involves the use of a user identification [user ID] and password or personal identification number [PIN], and for computers it usually involves the computer passing a code that identifies that it is part of a network.) Digital Subscriber Line (DSL): Technology that provides a dedicated digital circuit between a residence or business and a telephone company's central office, allowing high-speed data transport over existing twisted copper telephone lines. (E.g., a DSL is widely used to connect to the Internet because of its high speed capability and reasonable cost.) Integrated Services Digital Network (ISDN): Technology that provides the capability for voice, data, etc. to be converted to a digital signal and transmitted over existing telephone lines. (E.g., An ISDN is an alternative to a digital subscriber line [DSL] but is rarely used for home Internet use because of its expense.) Internet: An open global network of interconnected commercial, educational, and governmental computer networks that use a common communications protocol such as TCP/IP (transmission control protocol/Internet protocol) to share data. Manager: An employee appointed to manage, direct, and control a designated work unit. Managers include division chiefs, deputy division chiefs, facility heads, deputy wardens (or second-in-commands), district managers, designated lieutenants, program managers, or any appointed unit manager. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 2 of 8 Modem: A device that converts a digital bit stream into an analog signal (and back again) so computers can communicate digitally across analog telephone lines. (Modem is a contraction for MOdulation/DEModulation.) Pass Phrase: A sequence of words or other text that is (1) used to control access to a computer system, program, or data, and (2) similar to a password in usage but is generally longer for added security. Personal Identification Number (PIN): A number (usually consisting of four [4] to six [6] digits) that is used in conjunction with user identification (user ID) to complete the login authorization process. Remote Access: The ability to gain access to a computer or a network from outside a local area or wide area network via the Internet through a desktop, notebook, or handheld computer modem over a regular telephone line or dedicated line such as a digital subscriber line (DSL) or integrated services digital network (ISDN). Security Token: A small hardware device (sometimes referred to as an authentication token or key fob) that a user carries to authorize access to a computer network through the use of a personal identification number (PIN). User Identification (User ID): Generally a name, nickname, or alphanumeric value that identifies the user of a computer network and controls the user’s access in terms of (1) type (change, read, update or delete), and (2) what data and level of detail can be accessed. Virtual Private Network (VPN): A private network connection that makes use of the public telecommunications infrastructure, maintaining privacy through the use of tunneling protocol and security procedures. PURPOSE The purpose of this standard operating procedure (SOP) is to establish procedures for requesting and responding to Idaho Department of Correction (IDOC) users’ requests to obtain, modify, or remove remote access to the IDOC computer network. SCOPE This SOP applies to all IDOC employees, contractors, subcontractors, and vendors who need access to or use the IDOC computer network from a remote site. RESPONSIBILITY Chief of the Division of Management Services The chief of the Division of Management Services (or designee) is responsible for overseeing and monitoring the provisions provided herein. Information Technology (IT) Executive Management IT executive management shall be responsible for implementing this SOP and for ensuring IDOC employees, contractors, subcontractors, and vendors are practicing the guidelines, standards, and procedures provided herein. Division Deputy Chiefs or Chiefs Division deputy chiefs or chiefs shall be responsible for permitting IDOC employees, contractors, subcontractors, and vendors remote access to the IDOC computer network. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 3 of 8 Table of Contents General Requirements ......................................................................................................... 3 1. Eligibility for Access to the Virtual Private Network (VPN)............................................... 3 2. Use of the VPN ............................................................................................................... 3 3. Requesting (i.e., Adding, Modifying, Removing) Remote Access.................................... 4 4. Processing Requests for Remote Access or Removal .................................................... 6 References ........................................................................................................................... 8 GENERAL REQUIREMENTS 1. Eligibility for Access to the Virtual Private Network (VPN) To be approved for access to the IDOC VPN, IDOC employees, contractors, subcontractors, and vendors (hereinafter referred to as ‘remote users’) shall: • Have an approved background check on file with IDOC Human Resource Services (HRS); • Read, acknowledge, and abide by IDOC policy 141, Computer, Electronic Mail, and Internet Use, with particular regard to the importance of data integrity and confidentiality of IDOC information; and • Have the applicable division deputy chief or chief’s authorization to remote access the VPN. Note: For the background check, a Background Investigation Questionnaire will need to be downloaded from the IDOC’s Website, completed, and submitted to HRS. (The Relatives and Friends under IDOC Jurisdiction Agreement that is attached to the questionnaire does not need to be submitted to HRS.) Note: The remote user’s IDOC manager shall periodically evaluate the remote user’s need to remote access the VPN, and modify or remove access as needed in accordance with section 3. 2. Use of the VPN To use the IDOC VPN, remote users shall: • Use a two-factor security token or a network user identification (user ID) and pass phrase to gain access to the VPN (as determined by the IT Unit); • Not record their pass phrase or personal identification number (PIN) on the hardware security token (provided a token was issued); • Not allow unauthorized or unapproved users to access the VPN; • Re-authenticate and/or disconnect from the network after 30 minutes of inactivity; and • Notify the IT help desk to address problems encountered with remote access. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 4 of 8 3. Requesting (i.e., Adding, Modifying, Removing) Remote Access To obtain, modify, or remove remote access, the requestor (to include the prospective remote user or IDOC manager) shall begin the process by using the following process steps. Functional Roles and Responsibilities Step Tasks Requestor 1 Download, and save appendix A, Request for Remote Access or Removal Form, to your computer. Note: The form can be accessed by clicking on the title of the form or by visiting the Electronic Department of Correction (E-Doc). Note: If you already have a current form saved on your computer, you may use it. The most current form in use will always be hyperlinked to this SOP or available on E-Doc and can be identified by the date in the footer of the form. Requestor 2 Ensure that you complete the form fields as described in steps 2A through 2P below and that the information provided is accurate. Requestor 2A ‘Requested By’ field – Enter the requestor’s first and last name. Requestor 2B ‘Requestor Phone’ field – Enter a phone number that the requestor can be reached on during normal IDOC business hours (i.e., 8:00 am – 5:00 pm mountain time). Requestor 2C ‘Division/Unit’ field – Enter the IDOC division or unit that the prospective remote user is assigned to or will be most associated with. Requestor 2D ‘Location’ field – Using the drop-down box, select the location that the prospective remote user is assigned to or will be most associated with. If the location is not listed in the drop-down box, select the ‘other location’ box and enter the location. Requestor 2E ‘Date of Request’ field – Enter the current date in MM/DD/YYYY format. Requestor 2F ‘Needed By’ field – Enter the date (in MM/DD/YYYY format) that remote access service is needed by, needs to be modified by, or removed by. Requestor 2G ‘Type of Request’ field – Select the ‘new’ box if new services is being requested; select the ‘modification’ box if existing service needs to be modified; or select the ‘removal’ box if existing services needs to be discontinued. Requestor 2H ‘Access Same As’ field – If the access you are requesting is identical to another remote user’s access, enter that remote user’s name and/or network user ID. Requestor 2I ‘Remote User Name’ field – Enter the prospective remote user’s first and last name. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 5 of 8 Functional Roles and Responsibilities Step Tasks Requestor 2J ‘Remote User Phone’ field – Enter a phone number that the prospective remote user can be reached on during normal IDOC business hours (i.e., 8:00 am – 5:00 pm mountain time). Requestor 2K ‘Remote User Email’ field – If the prospective remote user is a vendor, enter the vendor’s company email address. Otherwise, enter the prospective remote user’s IDOC email address. Requestor 2L ‘Remote User Address’ field – Enter the physical address from which the prospective remote user will access the VPN. Requestor 2M ‘Need Access to the Following Systems’ field – Enter any IDOC IT systems that the prospective remote user will require access (e.g., HelpStar, Novell GroupWise, Offender Management-CIS, Offender Management-Reflections, etc.). Note: For a complete list of systems, see the appendix attached to SOP 141.03.04.005, IT Service Desk: Request for Support, Services, and Resolution. Requestor 2N ‘Job Function’ field – Select the box (employee, contactor/sub, or vendor) that best describes the prospective remote user’s relationship with the IDOC. Requestor 2O ‘Computer’ field – If the prospective remote user is a vendor, select the ‘vendor computer’ box. Otherwise, select the ‘IDOC Computer’ box. Note: If the ‘vendor computer’ box is selected, enter the vendor’s company name in the area below the selected box. Also inform the vendor that the computer must be brought into the IT Unit (located at Central Office) to be physically inspected. Also inform prospective remote users that personal computers will not be used to access the VPN. Requestor 2P ‘Comments’ field – Enter any additional comments or information that the IT Unit may need to help facilitate your request. Requestor 3 • Save and print the form; • In the ‘Remote User Signature’ field, secure the prospective remote user’s signature; and • Forward the hardcopy form to the deputy chief or chief of the division indicated in the ‘Division/Unit’ field. Note: Ensure the prospective remote user reads the statement on the form and agrees before he signs the form. If the prospective remote user does not sign the form, the process ends here until he voluntarily signs. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 6 of 8 Functional Roles and Responsibilities Step Tasks Deputy Chief or Chief 4 • Print first and last name in the ‘Authorized Signer Name’ field. • Print title in the ‘Authorized Signer Title’ field; • Sign name in the ‘Authorized Signature’ field; • Enter IDOC phone number; and • Return the form to the requestor. Note: If not approving the request, contact the requestor and inform him of the reason(s). The process will then end here. Requestor 5 If the form is returned with the deputy chief or chief’s signature approval, fax or hand-deliver the signed form to the IT help desk for processing in accordance with section 4 of this SOP. Note: The fax number is located at the top of the form. If faxed, you may want to follow up with a phone call or email to the helpdesk to confirm receipt. 4. Processing Requests for Remote Access or Removal After the IT helpdesk receives a division deputy chief or chief signed Request for Remote Access or Removal Form, the following process steps shall be used. Functional Roles and Responsibilities Step Tasks IT Help Desk Staff 1 Review the received Request for Remote Access or Removal Form to determine whether or not the request is complete and the proper signature approval was obtained. Note: If the form is incomplete or the proper signature approval was not obtained, return the form to the requestor to correct. The process ends here until the form is complete and has the proper signature approval. IT Help Desk Staff 2 Note: In accordance with SOP 141.03.04.005, IT Helpdesk Request for Support, Services, and Resolution, the urgency (priority level) for this type request shall be ‘low priority’ and an ‘initial response’ provided within 48 hours of receipt. Log into the HelpStar system and enter a new work order. Ensure the ‘type of request’ (new, modification, or removal), as provided on the form, is also provided on the work order. Note: If needed, SOP 141.03.04.005 is a good resource to use for information on how to enter the new work order. IT Help Desk Staff 3 • Record the work order number on the received Request for Remote Access or Removal Form (complete the ‘HelpStar WO No.’ field as provided in the ‘Information Technology Use Only’ section of the form); • Dispatch the IT support resource. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 7 of 8 Functional Roles and Responsibilities Step Tasks IT Support Resource 4 • Monitor the HelpStar system dispatch queue for assigned requests; • Obtain the received Request for Remote Access or Removal Form from the IT helpdesk staff; and • In accordance with SOP 141.03.04.005, IT Helpdesk Request for Support, Services, and Resolution, process the work order within the 120 ‘resolution/escalation hours’. ♦ If the type of request is ‘new’, proceed to step 5. ♦ If the type of request is ‘modification’ skip to step 6. ♦ If the type of request is ‘removal’ skip to step 7. IT Support Resource 5 • To add a [new] remote access, determine the appropriate ‘access type’ (security token, virtual private network, sporlash [a type of encryption], etc.); ♦ Security token needed – assign a token and PIN, and update the inventory list. ♦ VPN or other needed – assign a user ID and pass phrase. • If the prospective remote user is a vendor, arrange for the user to bring his computer into the IT Unit to be physically inspected; and • Skip to step 8. IT Support Resource 6 • To change (modify) remote access, modify the remote user’s VPN account in accordance with the form; and • Skip to step 9. IT Support Resource 7 • To remove remote access, determine what type of access was provided (e.g., security token, virtual private network, sporlash, etc.); ♦ Security token provided – remove security token assignment, return token to the inventory, and update the inventory list. ♦ VPN or other provided – Delete the account. • Skip to step 9. IT Support Resource 8 Train the prospective remote user on: • The login process; • Use of the VPN (see section 2 of this SOP);.and • Risks and responsibilities associated with accessing the VPN. Note: If the user is a vendor, ensure that the vendor brought his computer into the IT Unit to be physically inspected. Do not proceed to step 9 until the computer is inspected. Control Number: 141.03.04.007 Version: 1.1 Title: Remote Network Access Page Number: 8 of 8 Functional Roles and Responsibilities Step Tasks IT Support Resource 9 As applicable, when access has been granted and the prospective remote user has received training (if they had not previously been trained): • Answer question #1, located in the ‘Information Technology Use Only’ section of the received Request for Remote Access or Removal Form. (Not required for a removal of remote access); • Sign the form and forward to the IT operations manager; and • Update the HelpStar system with resolution information. IT Operations Management 10 • Answer questions #2 thru 4, located in the ‘Information Technology Use Only’ section of the received Request for Remote Access or Removal Form. (Not required for a modification or removal of remote access); • If all approval requirements have not been met – ensure the missing approval(s) is/are obtained before proceeding with the next task; or • If all approval requirements have been met – sign the form and file; and • Confirm approval and access with the remote user. Note: The completed and approved form must be scanned and filed in a network drive location designated by IT operations management, and the original must be maintained in a designated network analyst’s files. One (1) year after access is removed, all request and removal forms pertaining to the remote user and his initial request may be deleted and shredded. REFERENCES Appendix A, Request for Remote Access or Removal Form – End of Document –