Designing Access Controls

Comprehensive Security Policy

laptops. Resource endpoints consist of databases, specialized server clusters, the supercomputer, and other high-end computing components. The endpoints run a variety of OSs, including Linux, UNIX, and some Berkeley Software Division (BSD)-based systems.

Remote access—Faculty members access PCU’s LAN from home (or while away on sabbatical) via a virtual private network (VPN). (Students can access their email from home via HTTPS. Because these students are accessing resources on a Web server, this doesn’t constitute network access and is not discussed in this chapter.)

From this evaluation, the IT staff divides the campus and the network into network access zones. (For more information about network access zones, see Chapter 2: “Customer Needs Assessment.”)

Figure 3-2. PCU Campus Zones

3-11