Secure Environment
This article applies to: Managing Vendors and Consultants
Secure environment for administrative access
Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks. These environments require users to be either on-campus or using the Cornell secure VPN. Access to external services (web, email,...) is not allowed from these systems. Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations such as Cornell Secure File Transfer and Jenkins. These systems are restricted to not allow email. This should never be attempted from these systems.
Secure environment for controlled consultant access
These environments are functionally the same as the administrative environments, but are distinct to allow controlled access for outside consultants and contractors who require secure access to some systems. As with all secure working environments, access to external services (web, email,...) is not allowed from these systems. Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations such as Cornell Secure File Transfer. These systems are restricted not to allow email. This should never be attempted from these systems.
Comments?
To share feedback about this page or request support, log in with your NetID