Hi guys,
I am planning for a scenario where one of my system administrators will not legally be allowed access to particular network resources. This needs to be considered from both a logical and a physical perspective. Despite him being an honest guy, I have to consider what he can do, not what he will do.
The resources might be a small file server. A handful of users will need to be able to access these resources on their regular PC's, but the access will need to be logged and they will not be able to copy files outside of this specific environment.
Only these specific users will be able to have IP connectivity to these resources. They will be able to access it from a number of places on-site, but other people should not be able to access it using the same ports.
The users will be able to use a publicly accessible printer.
The environment will also need to be backed up to tape. He will be able to change the tapes as they will be encrypted.
My general thoughts are along the following lines:
- Build a new domain for these resources. Might set up a one-way trust, maybe not.
- Use Citrix or RDP to allow a user to access the stuff
- Environment on different box to regular gear
- Environment goes into a different, locked rack. Tape drive can go into the regular rack.
The network is giving me a headache though.. On the surface it seems like a clean-cut case of a protected vlan and use 802.1x to govern access. This administrator has access to the switches in the field and core, so he could easily set his own ports native vlan to the protected vlan. Maybe an alternative is to sit the environment behind an internal firewall and vpn to it?
Thoughts? Is there a better (or less complex) way of doing this perhaps? Am I overlooking something?
This sounds like homework? Is it homework?