Remote Administration
To gain the benefits of remote access without taking on unacceptable risks, remote
administration needs to take place securely. The following are just a few of
the guidelines to use.
• Commands and data should not take place in cleartext (that is, should
be encrypted). For example, SSH should be used, not Telnet.
• Truly critical systems should be administered locally instead of remotely.
• Only a small number of administrators should be able to carry out this
remote functionality.
• Strong authentication should be in place for any administration activities.
• Anyone who wears green shoes really should not be able to access these
systems. They are weird.