A.05.80 HP Insight Remote Support Advanced and Remote Device Access Security Overview (October 2012)

Security Overview
Chapter 3: Remote Device Access (RDA)
Ad Hoc RDA options include:
l HP Virtual Support Rooms (VSR) A web-based desktop sharing application.
l HP Instant Customer Access Server (iCAS) A meet in the middle access model that allows HP
remote access connections between HP and a customer network using SSH tunneled over a HTTP
connection.
Entitled Remote Access options include:
l SSH-Direct The SSH tunnel runs bare over the Internet.
l IPSec VPN Connectivity The SSH tunnel runs over a peer to peer IPSec VPN tunnel between HP
and a customer's network.
l SSL VPN Connectivity This solution requires a SSL VPN concentrator on the customer network to
be configured to allow access for HP Support. Connections are tunneled through a secure SSL
(HTTPS) connection over the Internet.
l ISDN Connectivity The SSH tunnel runs over an ISDN connection.
Note: The ISDN Connectivity option is not available in all countries.
Most of the Entitled Remote Access solutions leverage the end-to-end encryption and application
tunneling capabilities of SSHv2. While using SSHv2 is strongly recommended, some versions of Entitled
Remote Access can be configured without SSHv2. Not using SSHv2 can lower the security profile and
limit the functionality of the RDA solution.
Service Value
The RDA solution provides HP customers an information security compliance level so that customers can
meet most government and industry regulations. Authentication, access control and secure
communications conform to industry best practices.
Authentication
Customers can identify that they are securely connected to HP support specialists. Only authorized HP
support specialists are able to establish connections, authenticated with digital certificates.
Access Control Overview
HP customers using RDA have full control of all incoming connections. Authorization and access
restrictions can be configured to meet the requirements of most IT network security policies. For
unattended RDA, audit trails are stored in audit log files.
Secure Communications
All HP RDA communication options use strong encryption technologies and two factor authentication
methodologies to insure all remote access connections are secured. A multi-layer security approach
insures the confidentiality, integrity and availability of every connection and insures that HP Customers
and HP Support can use RDA with confidence.
HP Insight Remote Support Advanced and Remote Device Access (A.05.80)Page 38 of 97