Network Security Policy Laura Homann
Network Security Policy Laura Homann
Policy Guidelines
Homann, Laura R.
CNIT 383-583
Table of Contents
INTERNET ACCESS..............................................................................................................................4
SOFTWARE LICENSING......................................................................................................................5
MOBILE DEVICES................................................................................................................................5
REMOTE ACCESS.................................................................................................................................5
GUEST ACCESS....................................................................................................................................6
MALWARE PROTECTION...................................................................................................................6
CHANGE MANAGEMENT...................................................................................................................7
Page 2 of 7
ACCEPTABLE USE POLICY
All information obtained through network usage is considered protected information and
Organization names and images cannot be applied to social media or other media outlets
without authorization.
non-repeating numerals.
Users will be authenticated and identity must be confirmed prior to establishing a network
Account access is limited to business procedure and shall not be used for personal use.
All users are required to complete bi-annual risk mitigation meetings and trainings.
All users must be employed by the organization. Any exceptions will require pre-approval
from management.
Page 3 of 7
VPN access is required to access network from outside of the firewall.
VPN approval and two-factor identification are required for remote network connections.
INTERNET ACCESS
Internet usage shall be limited to work related activities. And information that can be used to
Social media accounts may be accessed through company internet access. Unless the account
All downloaded material must be reviewed and approved to maintain network security.
Operating systems are defined and administered by Information Technology staff and may
not be adjusted.
staff.
All devices will be encrypted using a full disk encryption application provided by the
organization.
Any loss or damage to a device owned by the organization should be reported immediately to
Software must remain updated, including but not limited to antivirus, firewall, and
encryption applications.
Page 4 of 7
Installation of any application must be approved by management and installed by a
technology professional.
SOFTWARE LICENSING
Installed software is only for use within the organization for work related activities.
Users must connect to the internal network weekly to ensure all patches and changes are
applied to devices.
MOBILE DEVICES
All mobile devices must be approved by the organization for network use.
Two-factor identification is required for network access from areas outside the firewall.
Loss of any device that is approved for external network access should be reported
immediately.
Automatic device back-ups should be performed nightly to minimize risk of data loss.
Applications installed on company owned mobile devices require business approval before
installation on device.
Staff must complete training on device and network security prior to receiving mobile device
approval.
REMOTE ACCESS
All staff must attend training and pass assessments for safe external network access prior to
Page 5 of 7
Any device used to access the network must have up-to-date anti-virus protection and remote
reset ability.
Usernames and passwords may not be shared with anyone, including family members and
Devices should be reviewed and approved by Information Technology staff prior to VPN
usage.
Staff are responsible for the security of their personal devices and will be held accountable
for any information reaches that may occur due to inappropriate usage.
GUEST ACCESS
Guest access is limited to individuals and contractors who require network access to
All guest will submit applications for access and be evaluated on a case-by-case basis.
Guests are required to abide by password and network security guidelines and policies.
Guest accounts that have not been used in a 7 day period will be automatically disabled.
MALWARE PROTECTION
Any device used to access network information, both inside and outside the organization
Internal devices should be connected to the internet at all times to ease installation of
External devices must be connected to the network weekly to verify all updates are installed
Page 6 of 7
Failure to maintain up-to-date protection will result in restricted access to the network until
CHANGE MANAGEMENT
All network or application changes will follow a five-stage change management procedure.
o The change is reviewed and approved. The level of review is dependent on the
Step 3: Coordinate
o If the change request risk/impact is major or significant, the change request requires
Step 4: Implement
o The change is deployed into the controlled testing environment. Testing must be
o The post implementation review is assessed and the formal change request is closed.
Page 7 of 7