Network Security Policy
Network Security Policy
Document Details
Version: 1.0
Modification History
This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 2 of 6
ISMS FRAMEWORK
1 CONTENTS
1 Contents ........................................................................................................................................................................3
2 Scope .............................................................................................................................................................................4
3 Procedure Description...................................................................................................................................................4
3.1 Purpose ............................................................................................................................................................4
3.2 Procedure ............................................................................................................................................................4
This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 3 of 6
ISMS FRAMEWORK
2 SCOPE
• All users of RECOM CONSULTING LIMITED’s information system and information asset
regardless of location.
• Providers in respect of the facilities that they provide.
• Asset owners with respect to the asset that they own.
This procedure provides security requirement for network which are used to communicate or
transmit information to staff and external parties.
3 PROCEDURE DESCRIPTION
3.1 PURPOSE
This procedure describes the security requirements for connections to internal computers and
networks equipment’s. It covers a wide variety of technologies including wireless connections,
dial-up modem links, Internet encrypted tunnels (also known as virtual private networks or VPNs),
segmentation of network using LANs, restricted access to network services, restricted physical
access to network devices etc.
3.2 PROCEDURE
o Use network security devices to implement access control lists and network
protection features to control traffic travelling between network zones with differing
This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 4 of 6
ISMS FRAMEWORK
Network security
This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 5 of 6
ISMS FRAMEWORK
• Asset owners will conduct risk assessments for RECOM CONSULTING LIMITED web-based
applications to determine if the application requires protection through the use of a web
application firewall.
• Providers will ensure that web application firewalls are implemented and configured to
block security incidents and attacks from occurring, where deemed necessary by the
asset owner.
• Will ensure that strong end-to-end encryption is used to protect data transmitted over
external network connections to and from the RECOM CONSULTING LIMITED
network. Information that is classified as public does not require encryption.
• Will ensure that remote access to RECOM CONSULTING LIMITED information assets is
through the use of a virtual private network (VPN) connection. Asset owners must
approve other access methods.
• Will ensure that all users connecting to the RECOM CONSULTING LIMITED network via
VPN are limited to the access they require to perform their studies or duties. Access will
be limited to specific hosts and ports/services/protocols as is required.
Infrastructure devices
• The IT Team will approve, where appropriate, all wireless and network access devices
that are directly connected to the RECOM CONSULTING LIMITED network. Providers and
users will not directly connect unapproved wireless and network access devices to the
RECOM CONSULTING LIMITED network.
• The IT Team may disable unapproved or unsupported network access devices at any time
and without notice.
This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 6 of 6