What Are Your Policies for Temporarily Giving Vendors Access to Your Network?

0
12
Asked By MysticPenguin42 On

I'm curious about how others handle temporary access to their networks for third-party vendors. We need this occasionally and currently offer two main options: the first is using Fortiportal with Fortitoken MFA and an account linked to a specific PC, while the second is providing access via Forticlient VPN with an AD account and DUO MFA. Both methods include GPOs to limit access to specific resources. I prefer the Fortiportal method since it feels safer, but it can be a hassle since it requires two accounts. Since we only need to do this for a few vendors at a time (no more than five), I don't want to create more solutions but would love to hear thoughts on which option is better, or if my approach is outdated. Thanks for your insights!

5 Answers

Answered By CloudNinja21 On

Consider using Windows365 VDIS through Intune for vendors, especially if they’re auditors.

Answered By TechGuru99 On

One option is to set up a virtual host that’s isolated via firewall policies. You can control access closely and only give vendors what they actually need.

Answered By AuditWizard23 On

A while back, I had success with SecureLink. Nowadays, I'd recommend BeyondTrust PRA if I had to set it up again. It simplifies access management without juggling numerous vendor AD accounts or explaining FortiToken.

Answered By SecureAccessMaster On

We built a web-based vendor portal using Zscaler, where they log in with their credentials, select the resources they need, and we can log and monitor everything they do.

Answered By VendorAccessPro On

How long are these access periods?

MysticPenguin42 -

It's usually around 6-8 weeks for this case, nothing ongoing.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.