Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Sample Security Policy


This is a portion of a sample security policy for a VPN. It includes all the points that a good security policy must contain.

Purpose


The purpose of this policy is to provide guidelines for remote access IPSec connections to the XYZ corporate network.

Scope


The policy applies to all XYZ employees, contractors, consultants, temporaries, and other workers, including all personnel affiliated with third parties who are using VPNs to access the XYZ corporate network. The policy applies to implementations of VPN that are established though a VPN concentrator.

Policy


Employees and authorized third parties (customers, vendors, and so on) who are approved by XYZ may use the benefits of VPNs, which constitute a company-managed service. This means that the user is not responsible for selecting an Internet service provider (ISP). XYZ will coordinate the installation and will pay associated fees. No equipment other than that ordered by XYZ can be used for this purpose. Further details can be found in the Remote Access Policy.

The following list identifies some additional guidelines:

  • It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to XYZ's internal networks.

  • VPN access is controlled by using a one-time password authentication with a token device. While connected to the corporate network, no other connections can be established.

  • When actively connected to the corporate network, VPNs force all traffic to and from the PC over the VPN tunnel. All other traffic is dropped.

  • Split tunneling is not permitted. Only one network connection is allowed.

  • VPN gateways are set up and managed by XYZ network operational groups.

  • All computers connected to XYZ internal networks via VPN or any other technology must use the most up-to-date antivirus software that is the corporate standard.

  • VPN users are automatically disconnected from XYZ's network after 15 minutes of inactivity. The user has to log on again to reconnect to the network.

  • The VPN concentrator is limited to an absolute connection time of 12 hours.


Enforcement


Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Definitions


In this security policy, the following definitions apply:

  • VPN concentrator
    A device in which VPN connections are terminated. This device is sometimes also called the IPSec concentrator.

  • InfoSec
    A term used to refer to the team of people responsible for network and information security.

  • Split tunneling
    The term used to describe a multiple-branch networking path. A tunnel is split when some network traffic is sent to the VPN concentrator and other traffic is sent directly to the remote location without passing through the VPN concentrator.



/ 196