Guidance

Walled Garden for Remote Access (Architectural Pattern 2)

Created:  26 Nov 2015
Updated:  08 Aug 2016
CESG Archive

Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

How businesses can expose applications to remote endpoints without giving those endpoints full access to the core network.

This pattern describes a standard architecture for providing remote access. It is based on a ‘Walled Garden’ concept. This is where services required by endpoints are presented within a protected zone. This concept helps to ensure that a compromised remote endpoint is limited in the damage it can inflict on a system.

Walled Garden for Remote Access (Architectural Pattern 2)_1.1.pdf

PDF, 884.61KB

This file may not be suitable for users of assistive technology.

Was this guidance helpful?

We need your feedback to improve this content.

Yes No