Connection to Untrusted Network Standard Policy

Subscriber Content
Screenshot of the first page of Connection to Untrusted Network Standard Policy
Protocols and Procedures for Safeguarding Corporate Connections

This sample policy documents security requirements surrounding network access between a company’s computer network and untrusted computer networks.

Sample procedures include ensuring that technical and procedural controls are in place prior to activating network connections; verifying management approval; advising management on technical risk factors to support the approval decision; configuring network-security-specific devices; presenting requests for new connections or changes to existing connections to management for approval; and gathering technical requirements necessary for secure configuration, including endpoint IP addresses and port numbers.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.