From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Remote access

Remote access

- [Instructor] We'll over this lesson on remote access. In this lesson, we'll first talk about some access methods, and then we'll follow it up with a discussion on access controls. To get started, you may be familiar with some of these concepts, but just in case you're not, we will go over them to make sure that everybody's on the same page. When accessing many types of resources, including cloud resources, especially remotely, it's imperative to use secure protocols. Starting with SSH, it's a standard for secure remote access, and this is often through a command light interface or CLI, and it ensures secure data transmission and user authentication. While SSH was originally built for the Linux operating system and other operating systems, including Windows now provide native support for SSH. RDP or Remote Desktop Protocol is another widely used method initially for Windows, but it now also supports various platforms and it ensures encrypted data transmission and robust user…

Contents