Secure Environment
This article applies to: Managing Vendors and Consultants
Secure environment for administrative access
Application administrators are required to use secure environments to carry out administrative operations and tasks.
- These environments require users to be either on-campus or using the Cornell secure VPN.
- Access to external services (web, email,...) is not allowed from these systems.
- Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations (example: Cornell Secure File Transfer).
Secure environment for controlled consultant access
Controlled environments allow outside consultants and contractors secure access to approved and authorized systems.
- These environments require users to be either on-campus or using the Cornell secure VPN.
- Access to external services (web, email,...) is not allowed from these systems.
- Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations (example: Cornell Secure File Transfer).
Comments?
To share feedback about this page or request support, log in with your NetID