System Access Control & Remote Access Policy

eXpress badging® enforces management-approved access controls for all systems that transmit, process, or store Scoped Systems and Data.

🔐 Controls include unique user IDs, session timeouts, least-privilege provisioning, strong authentication, supervised remote access, and encryption for all data transfers. This policy is reviewed regularly and aligned with NIST CSF 2.0.


🧾 Cheat-Sheet (Answers)

  • Are electronic systems used? Yes — AWS-hosted Portal and internal systems.

  • Access control policy approved & owned? Yes — leadership-approved; Technical Ops owner; communicated org-wide.

  • Unique user IDs? Yes — no shared accounts.

  • Inactive session timeout ≤ 15 min? Supported; configurable by Customer User Admin.

  • Access grant/approval process? Yes — ticketed joiner/mover/leaver with approvals.

  • Passwords required? Yes — required for all users; MFA for remote/support/admin access.

  • Remote access permitted? Yes — company devices only, approved tools, supervised, segmented, encrypted.

  • Remote access: company-owned equipment only? Yes — exclusively.

  • Prevent copying to remote devices? Yes — file transfers require explicit approval and follow ticketed authorization; sessions are supervised and may restrict clipboard/file transfer as policy.


🧭 Scope & Definitions

  • Scoped Systems and Data: Veonics® Portal production services (AWS), customer badge data & photos, and internal systems used to support those services.

  • Constituents: Employees, contractors, and approved partners/customers with system access.


🧑‍⚖️ Governance & Ownership

  • Approved by: Executive Leadership

  • Policy Owner: Technical Operations Lead

  • Review Cadence: At least annually, and quarterly for operational control checks (firewall/ACL, access reviews, session settings).

  • Communication: Onboarding training + internal updates; enforced through EOS accountability.

Related:


👤 Unique User IDs & Authentication

  • Unique accounts are required for all access to systems handling Scoped Data (no shared logins).

  • Passwords required for all users; privileged roles require strong authentication (MFA enforced for remote/support tools and admin access).

  • Accountability: All activity is attributable to an individual user via logs.

Related:


⏱️ Session Management

  • Inactivity timeouts are supported; in the Veonics® Portal, session timeouts are configurable by the Customer User Admin.

  • Standard: 15-minute timeout for privileged roles (customer admins may set stricter values per compliance needs).


🔄 Access Provisioning (Joiner/Mover/Leaver)

  • Grant: Role-based, least-privilege access upon manager request and approval (ticketed).

  • Change of Status: Permissions reduced/adjusted immediately on role changes.

  • Termination: Accounts disabled within minutes of HR confirmation; credentials revoked; keys/devices recovered.

  • Audit Logs: Access changes and user actions are logged for review.

Related:


🌐 Remote Access (When, How, and By Whom)

  • Permitted only when necessary, via company-owned, managed devices and approved tools.

  • AWS / Cloud Admin Access: Restricted to authorized personnel with secure credentials; network isolation via VPCs and security groups.

  • Third-Party Remote Support: Performed rarely using GoTo Assist for printer support; sessions are virtually escorted/supervised.

  • File Transfer Controls: File transfers during support require explicit approval and are restricted to approved, ticketed needs.

  • MFA: Required for remote support/admin accounts.

Related:


📶 Wireless Networking


📨 Data Transfer & Encryption


🛡️ Network Boundaries: Firewalls & Reviews

  • On-prem: SonicWall firewall protects internal perimeter; no “allow-any” rules.

  • Cloud (AWS): Security Groups and (where applicable) AWS Network Firewall enforce least-privilege ingress/egress.

  • Rule/ACL Reviews: Conducted quarterly and during change events; findings fed into remediation.

  • Vulnerability Testing: Internal/external VAPT via Fortra VM; remediation tracked.

Related:


🛰️ Oversight: DNS Filtering & Managed SOC

  • 🌐 DNS Filtering: Blocks access to malicious/phishing/C2 domains at the network layer—preventing connections before payloads execute.

  • 🛰️ Managed Security Operations Center (SOC): 24/7 monitoring and escalation across AV/EDR, DNS filtering, firewalls, remote access, and backups; proactive tuning and incident support.

Related:


🧭 NIST CSF 2.0 Alignment (at a glance)

Function Controls in this Policy
Govern (GV) Management approval, policy owner, scheduled reviews
Identify (ID) Role definitions, asset/scope identification
Protect (PR) Unique IDs, passwords/MFA, least-privilege, firewalls, WiFi governance, encryption, DNS filtering
Detect (DE) SOC monitoring, AV/EDR alerts, VAPT findings
Respond (RS) Ticketed remediation, session controls, supervised remote access
Recover (RC) Backups/restore processes and change rollbacks (see Backup & Recovery KB)

Last Updated: (set date)