Connection to Untrusted Network Standard Policy

Subscriber Content
Screenshot of the first page of Connection to Untrusted Network Standard Policy

This sample policy documents security requirements surrounding network access between a company’s computer network and untrusted computer networks.

Sample procedures include ensuring that technical and procedural controls are in place prior to activating network connections; verifying management approval; advising management on technical risk factors to support the approval decision; configuring network-security-specific devices; presenting requests for new connections or changes to existing connections to management for approval; and gathering technical requirements necessary for secure configuration, including endpoint IP addresses and port numbers.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.