Topic 1 - Current State and Stakeholders of Remote Access

This survey helps enlist and review the various remote access methods currently being deployed and outline all stakeholders involved with remote access.

Question Title

* 1. Enter your e-mail

Question Title

* 2. Which methods of Remote Access are you currently using? Please reference the OpX white paper for details of each type. Click here to view the report.

Question Title

* 3. What is the primary reason for which method of remote access you are currently using?

Question Title

* 4. What steps do you recommend for doing a current assessment of Remote access to determine the current use and coverage area?

Question Title

* 5. What individuals are, or should be, involved with Remote Access?

Question Title

* 6. What training material or guidelines do you currently have with regards to using Remote Access?

Question Title

* 7. Here are some example of Glossary of Terms to be used with the Best Practices recently provided by a work group member? 

DMZ – De-Militarized Zone, a network that sits between a secured process or controls network (OT) and the corporate business network (IT)  

IT – Information Technology. IT systems are typically transactional in nature and are frequently based on relational database management systems (RDBMSs). They can be horizontal and applicable across multiple industries (for example, administrative processes such as ERP, HR, payroll and accounting).

ERP – Enterprise Resource Planning. Software application(s) that provide business management capabilities.  This includes processes such as Production Planning, Sales, Marketing, Order Entry, Order Tracking, etc.

OT - Operational Technology. These systems are typically event-driven and, frequently, "real-time“ software applications or devices with embedded software. They control technology processes through devices or sensors used to manage the production or delivery processes.

Remote Access Access to an OT System from outside the OT network.  This applies to all outside connections whether they originate within another internal network or from locations outside the infrastructure entirely. 

VPN – A Virtual Private Network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

What others do you recommend we include?

Question Title

* 8. We would like members to share learning experiences (positive or negative) on any of the topics above that may help others gain a better understanding. If you have one then please describe briefly.

Question Title

* 9. Would you like an opportunity to share this experience in the next meeting and answer any questions that the group may have? If yes, we will be in touch with you to allocate you a 3-5 mins slot to present this to the group. 

Question Title

* 10. Are there any other subtopics that you would like to cover under this session?

Thank You! The results of this survey will be shared at the Sep 23 meeting and will be shown only in aggregate. Please hit "Submit" 

T