Network Security Standard - Template

Network Security Standard – Template 2

This standard documents the security requirements for network security including router and switch configuration to assist in the protection of business critical Company assets and information from accidental loss or corruption. It shall also provide a level of control to limit the potential of unauthorized access.

The objectives of this standard are to:

a. Describe system functionality/ parameters that are necessary to fulfill security requirements

b. Identify the scope of systems and equipment to which this standard applies.

In this standard “network components” refers to but are not limited to firewalls, switchers, routers, wireless access points, network appliances, and other security appliances.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. NETWORK SECURITY
3.1 ROLES AND RESPONSIBILITIES
3.2 DOCUMENTATION
3.3 PHYSICAL ACCESS
3.4 RESILIENCE
3.5 DEVICE CONFIGURATION
3.6 NETWORK ACCESS DEVICES
3.7 DEVICE CONNECTIVITY
3.8 NETWORK SEGREGATION
3.9 INTERNAL NETWORK CONNECTIVITY
3.10 EXTERNAL NETWORK CONNECTIVITY
3.11 ROUTERS AND SWITCHES
3.12 REMOTE MAINTENANCE
3.13 CHANGE MANAGEMENT
3.14 BACK-UP
3.15 MONITORING
3.16 CONTINUITY
3.17 INCIDENT MANAGEMENT
4. EXCEPTIONS
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION

Pages: 14

Review Network Security Standard – Template 2.

Related Products:

€1,549.00

Purchase

This bundle contains all the products listed in the Operations Management section. Take advantage of the 25% OFF when buying the bundle!

€49.00

Purchase

The Document Control Procedure details the procedure, which needs to be following, regarding the development and maintenance of internal policies and procedures at the Company.

€49.00

Purchase

This document highlights the standard requirements for Information Security Incident Handling within the Company.