Skip to main content

Secure Environment

This article applies to: Managing Vendors and Consultants


Secure environment for administrative access

Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks. These environments require users to be either on-campus or using the Cornell secure VPN. Access to external services (web, email,...) is not allowed from these systems. Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations such as Cornell Secure File Transfer and Jenkins. These systems are restricted to not allow email. This should never be attempted from these systems.

Secure environment for controlled consultant access

These environments are functionally the same as the administrative environments, but are distinct to allow controlled access for outside consultants and contractors who require secure access to some systems.  As with all secure working environments, access to external services (web, email,...) is not allowed from these systems. Web access is restricted to Cornell campus services, and should only be used for secure transfers and operations such as Cornell Secure File Transfer. These systems are restricted not to allow email. This should never be attempted from these systems.

About this Article

Last updated: 

Friday, August 23, 2019 - 10:28am

Was this page helpful?

Your feedback helps improve the site.

Comments?