Remote Access

An access method whereby users can remotely and securely access information assets where the user and/or endpoint are uniquely attributed to users and verifiable through assigned keys or tokens; examples are Secure Shell or Transport Layer Security (TLS).