Mechanisms exist to define, control and review organization-approved, secure remote access methods.
Does the organization define, control and review organization-approved, secure remote access methods?