Information Security: 1.0 Purpose and Benefits
Information Security: 1.0 Purpose and Benefits
No:
Information Technology Policy
IT Policy: Updated:
Issued By:
Information Security
Owner:
2.0 Authority
[Organization information]
3.0 Scope
This policy encompasses all systems, automated and manual, for which the entity has
administrative responsibility, including systems managed or hosted by third parties on
behalf of the entity. It addresses all information, regardless of the form or format,
which is created or used in support of business activities.
b. Network Systems:
1. Connections between systems must be authorized by the executive
management of all relevant entities and protected by the implementation
of appropriate controls.
2. All connections and their configurations must be documented and the
documentation must be reviewed by the information owner and the
ISO/designated security representative annually, at a minimum, to
assure:
i. the business case for the connection is still valid and the
connection is still required; and
ii. the security controls in place (filters, rules, access control lists, etc.)
are appropriate and functioning correctly.
3. A network architecture must be maintained that includes, at a minimum,
tiered network segmentation between:
i. Internet accessible systems and internal systems;
ii. systems with high security categorizations (e.g., mission critical,
systems containing PII) and other systems; and
iii. user and server segments.
4. Network management must be performed from a secure, dedicated
network.
5. Authentication is required for all users connecting to internal systems.
Term Definition
Internal Revenue Service Publication 1075: Tax Information Security Guidelines for
Federal, State and Local Agencies