This part of GB/T 25068 specifies the security guidelines for safe use of remote access (the method of remotely connecting a computer to another computer or a network using a public network and its IT security implications). This section describes the different types of remote access and the protocols used, discusses authentication issues associated with remote access, and provides support when establishing remote access securely. This section applies to those network administrators and technicians who plan to use this connection or have already used this connection and need advice on its safe establishment and safe operation.
GB/T 25068.4-2010 history
2022GB/T 25068.3-2022 Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
2010GB/T 25068.4-2010 Information technology.Security techniques.IT network security.Part 4:Securing remote access
GB/T 25068.4-2010 Information technology.Security techniques.IT network security.Part 4:Securing remote access was changed to GB/T 25068.3-2022 Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios.