Network Security Policy: (Company Name)
Network Security Policy: (Company Name)
[Company Name]
Document Owner:
Effective Date:
Updated:
Disclaimer: This sample policy has been provided by Apptega, Inc. as a generic document to support the
development of your compliance program. It is unlikely to be complete for your organization without
customization. This is document is not legal advice and Apptega is not a registered CPA firm.
Network Security Policy
Version 1.0
[Updated Date]
[Company Name]
Network Security Policy
Effective Date: Document Owner:
Revision History
Revision Rev. Date Description Prepared By Reviewed By Date Approved By Date
1.0
1. Purpose................................................................................................................................................2
2. Scope...................................................................................................................................................2
3. Policy...................................................................................................................................................2
4. Responsibilities....................................................................................................................................3
4.1 Chief Information Officer.............................................................................................................3
4.2 Security Manager, IT Services Director, and System Administrators.................................................3
4.3 Department Heads and Directors......................................................................................................3
4.4 Users..................................................................................................................................................3
5. System Access Control.........................................................................................................................4
5.1 End-User Passwords....................................................................................................................4
5.2 Password System Setup...............................................................................................................4
5.3 Logon and Logoff Process............................................................................................................5
6. System Privileges.................................................................................................................................6
6.1 Limiting System Access................................................................................................................6
6.2 Process for Granting System Privileges........................................................................................6
6.3 Process for Revoking System Access............................................................................................7
7. Establishment of Access Paths.............................................................................................................8
8. Computer Malware (Viruses, Worms, Trojan Horses, etc.).................................................................9
9. Data and Program Backup...................................................................................................................9
10. Portable Computers.......................................................................................................................10
11. Remote Printing.............................................................................................................................10
12. Privacy...........................................................................................................................................10
13. Logs and Systems Security Tools....................................................................................................11
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
1. Purpose
The purpose of this policy is to establish administrative direction, procedural requirements, and
technical guidance to ensure the appropriate protection of <Company> information handled by
computer networks.
2. Scope
This policy applies to all personnel and systems that access the organization’s computer
networks. Throughout this policy, the word “user” will be used to collectively refer to all such
individuals. The policy also applies to all computer and data communication systems owned by
or administered by the organization or its partners.
3. Policy
All information traveling over the organization’s networks that has not been specifically
identified as the property of other parties will be treated as though it is an organizationally-
owned asset. It is the policy of the organization to prohibit unauthorized access, disclosure,
duplication, modification, diversion, destruction, loss, misuse, or theft of this information. In
addition, it is the policy of the organization to protect information belonging to third parties that
have been entrusted with the organization in a manner consistent with its sensitivity and in
accordance with all applicable agreements.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
4. Responsibilities
4.1 Chief Information Officer
The Chief Information Officer (CIO) is responsible for establishing, maintaining, implementing,
administering, and interpreting organization-wide information systems security policies,
standards, guidelines, and procedures. While responsibility for information systems security on
a day-to-day basis is every employee’s duty, specific guidance, direction, and authority for
information systems security is centralized for all of <Company> in the Information Technology
department. This department will perform information systems risk assessments, prepare
information systems security action plans, evaluate information security products, and perform
other activities necessary to assure a secure information systems environment.
4.4 Users
Users are responsible for complying with this and all other organizational policies defining
computer and network security measures. Users also are responsible for bringing all known
information security vulnerabilities and violations that they notice to the attention of the
Information Technology department.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
5.2.4 Whenever system security has been compromised or if there is a reason to believe
that it has been compromised, the involved system administrator must immediately
take measures to ensure that passwords are properly protected. This may involve
resetting all user passwords and requiring users to change them prior to next system
log on.
5.2.5 Whenever system security has been compromised or if there is a reason to believe
that it has been compromised, the involved system administrator must take
measures to restore the system to secure operation. This may involve reloading a
trusted version of the operating system and all security-related software from
trusted storage media or original source-code disks/sites. The involved system then
would be rebooted. All changes to user privileges taking effect since the time of
suspected system compromise must be reviewed by the system administrator for
unauthorized modifications.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
certain privileges, they must have initially logged on employing a user ID that clearly
indicates their identity or affiliation.
6. System Privileges
6.1 Limiting System Access
6.1.1 The computer and communications system privileges of all users, systems, and
independently-operated programs such as agents must be restricted on a need-to-
know basis. This means that privileges must not be extended unless a legitimate
need for such privileges exists.
6.1.2 Default user file permissions must not automatically permit anyone on the system
to read, write, execute, or delete a system file. Although users may reset
permissions on a file-by-file basis, such permissive default file permissions are
prohibited. Default file permissions granted to limited groups of people who have a
genuine need-to-know are permitted.
6.1.3 Users with personally-owned computers are responsible for administering a screen
saver program securing access to their machine’s hard disk drive and setting
passwords for all applications and systems software that provide the capability of
connecting to the organization’s resources.
6.1.4 The organization’s computer and communications systems must restrict access to
the computers that users can reach over <Company> networks. These restrictions
can be implemented through routers, gateways, firewalls, wireless access points,
and other network components. These restrictions must be used to, for example,
control the ability of a user to log on to a certain computer then move from that
computer to another.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Employees must not establish electronic bulletin boards, local area networks, FTP servers, web
servers, modem connections to existing local area networks, illegal Peer-to-Peer sharing or
other multi-user systems for communicating information without the specific approval of the IT
Infrastructure Services director. New types of real-time connections between two or more
inhouse computer systems must not be established unless such approval is obtained.
All <Company> computers that connect to an internal or external network must employ
password-based access controls or an extended user authentication system. Multi-user systems
should employ software that restricts access to the files of each user, logs the activities of each
user, and has special privileges granted to a system administrator. Single-user systems should
employ access control software approved by the Information Technology department that
includes boot control and an automatic screen blanker that is invoked after a certain period of
no input activity. Portable computers and home/personally-owned computers that contain
<Company> information are also covered by this policy, as are network devices such as firewalls,
gateways, routers, and bridges.
Remote maintenance ports for <Company> computer and communication systems must be
disabled until the time they are needed by the vendor. These ports must be disabled
immediately after use.
Portable devices (smartphones, tablet computers, etc.) using WiFi or commercial data networks
should not be used for data transmissions containing confidential personal information unless
the connection is encrypted. Such links may be used for electronic communications so long as
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
users understand that confidential personal information must not be transmitted using this
technology.
Users are responsible for damage occurring because of viruses on computer systems under their
control. As soon as a virus is detected, the involved user must immediately call the Information
Technology department to assure that no further infection takes place and that any experts
needed to eradicate the virus are promptly engaged.
All personal computer software should be copied prior to its initial usage, and such copies must
be stored in a safe place. These master copies can be used for recovery from computer virus
infections, hard disk crashes, and other computer problems.
<Company> computers and networks must not run software that comes from sources other
than business partners, knowledgeable and trusted user groups, well-known systems security
authorities, computer or network vendors, or commercial software vendors. Software
downloaded from electronic bulletin boards, shareware, public domain software, and other
software from untrusted sources must not be used unless it has been subjected to a testing
regimen approved by the IT Infrastructure Services director.
To ensure that valuable or critical data is backed up, it must be stored on network servers
managed by the Information Technology department or a trusted partner.
<Company> requires the use of industry-standard media, techniques, and timelines in executing
all backups. For multi-user computer systems, whenever systems software permits, backups
must be performed without end-user involvement, over an internal network and during the off
hours.
Storage of backup media is the responsibility of the office computer user or multi-user computer
system administrator involved in the backup process. Media should be stored in fireproof safes,
at a separate from the system being backed up.
Information listed on the Data Retention Schedule must be retained for the period specified.
Other information must be properly disposed of when no longer needed, which is generally
within two years.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Department managers/Directors are responsible for preparing, testing and periodically updating
department contingency plans to restore service for all non-IT managed production applications
and systems. The Information Technology department is responsible for preparing, testing and
periodically updating network service contingency plans.
All Confidential information stored on backup media should be encrypted using approved
encrypting methods as outlined in the Encryption and Cryptography Policy.
Whenever Confidential information is written to a disk or other storage media, the storage
media should be suitably marked with as such. When not in use, this media should be stored in a
locked safe, locked furniture, or a similarly secured location.
Unattended printing is permitted if the area surrounding the printer is physically protected such
that persons who are not authorized to see the material being printed may not enter.
12. Privacy
Unless contractual agreements dictate otherwise, messages sent over <Company> computer
and communications systems are the property of <Company>. Administration reserves the right
to examine all data stored in or transmitted by these systems. Because <Company> computer
and communication systems are to be used for business purposes, users are to have no
expectation of privacy associated with the information they store in or send through these
systems.
When providing computer-networking services, <Company> does not provide default message
protection services such as encryption. No responsibility is assumed for the disclosure of
information sent over <Company> networks, and no assurances are made about the privacy of
information handled by the company’s internal networks. In those instances where session
encryption or other special controls are required, it is the user’s responsibility to ensure that
adequate security precautions have been taken. Nothing in this paragraph must be construed to
imply that <Company> policy does not support the controls dictated by agreements with third
parties, such as organizations that have entrusted <Company> with confidential information.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Whenever cost justifiable, automated tools for handling common security problems must be
used on <Company> computers and networks. For example, software that automatically checks
personal computer software licenses through a local area network should be used on a regular
basis.
To the extent that systems software permits, computer and communications systems handling
sensitive, valuable, or critical <Company> information must securely log all significant security
relevant events. Examples of security relevant events include users switching user IDs during an
online session, attempts to guess passwords, attempts to use privileges that have not been
authorized, modifications to production application software, modifications to system software,
changes to user privileges, and changes to logging system configurations.
Logs containing computer or communications system security relevant events must be retained
for at least three months. During this period, logs must be secured such that they cannot be
modified, and such that only authorized persons can read them.
Although system administrators are not required to promptly load the most recent version of
operating systems, they are required to promptly apply all security patches to the operating
system that have been released by knowledgeable and trusted user groups, well-known systems
security authorities, or the operating system vendor. Only those systems security tools supplied
by these sources or by commercial software organizations may be used on <Company>
computers and networks. Additionally, only vendor-supported versions of operating systems
and applications should be used on production systems. This will generally require periodic
upgrades to the current release or the most recent prior version.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Provided that no intent to damage <Company> systems existed, if users report a computer virus
infestation immediately after it is noticed, even if their negligence was a contributing factor, no
disciplinary action should be taken.
All network or systems software malfunctions must be reported immediately to the Information
Technology department or the involved external service provider.
Information about security measures for <Company> computer and communication systems are
confidential and must not be released to people who are not authorized users of the involved
systems unless the permission of the IT Infrastructure Services director has been obtained. For
example, publishing system access information in directories is prohibited.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
All employees who must keep Confidential <Company> information offsite in order to do their
work must possess lockable furniture for the proper storage of this information. At the time of
separation from <Company>, all Confidential information must be returned immediately.
Network diagram(s)
System configurations
Firewall rule set
IP addresses
Access Control Lists (ACLs)
20. Exceptions
<Company> acknowledges that under rare circumstances, certain users may need to employ
systems that are not compliant with these policies. All such instances must be approved in
writing and in advance using the Exception process.
21. Violations
<Company> network users who willingly and deliberately violate this policy will be subject to
disciplinary action up to and including termination, expulsion from the organization, and/or legal
action.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Term Definition
Access Control A system to restrict the activities of users and processes based on
the need to know.
Agents A type of software that performs special tasks on behalf of a user,
such as searching multiple databases for designated information.
Algorithm A mathematical process for performing a certain calculation. In the
information security field, it is generally used to refer to the process
for performing encryption.
Confidential Information A sensitivity designation for information, the disclosure of which is
expected to damage the organization or its partners.
Default File Permission Access control file privileges, read, write, execute, and delete,
granted to computer users without further involvement of either a
security administrator or users.
Default Password An initial password issued when a new user ID is created, or an initial
password provided by a computer vendor when hardware or
software is delivered.
Dynamic Password A password that changes each time a user logs on to a computer
system.
Encryption Key A secret password or bit string used to control the algorithm
governing an encryption process.
End User An individual who employs computers to support the organization’s
business activities, who is acting as the source or destination of
information flowing through a computer system.
CONFIDENTIAL
Network Security Policy
Version 1.0
[Updated Date]
Gateway A computer system used to link networks that can restrict the flow
of information and that employ some access control method.
Data Retention Schedule A formal listing of the types of information that must be retained for
archival purposes and the time frames that these types of
information must be kept.
Isolated Computer A computer that is not connected to a network or any other
computer. For example, a stand-alone personal computer.
Logon Banner The initial message presented to a user when he or she makes
connection with a computer.
Multi-User Computer Any computer that can support more than one user simultaneously.
System
Privilege An authorized ability to perform a certain action on a computer,
such as read a specific computer file.
Security Patch A software program used to remedy a security or other problem,
commonly applied to operating systems, database management
systems, and other systems software.
System Administrator A designated individual who has special privileges on a multi-user
computer system, and who looks after security and other
administrative matters.
CONFIDENTIAL