DMZ Lab Security Policy
Sample policy establishing the minimum security requirements of any equipment to be deployed in the corporate DMZ.
Extranet Policy
Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [PDF, 80 KB]
Information Sensitivity Policy
Sample policy to assist users to assign sensitity levels to information they own.
Internal Lab Security Policy
Defines requirements for internal labs to ensure that confidential information and technologies are not compromised, and that production services and interests of the organization are protected from lab activities.
Internet DMZ Equipment Policy
Sample policy defining the minimum requirement for all equipment located outside the corporate firewall.
Lab Anti-Virus Policy
Defines requirements which must be met by all computers connected to an organization's lab networks to ensure effective virus detection and prevention.
Password Protection Policy
Defines standards for creating, protecting, and changing strong passwords.
Remote Access Policy
The purpose of this policy is to define standards for connecting to a corporate network from any host.
Risk Assessment Policy
Defines the requirements and provides the authority for the information security team to identify, assess, and remediate risks to the organization's information infrastructure associated with conducting business. [pdf format.]
Router Security Policy
Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks.
Sample ISO 27001 Policies
A policy template aligned with this emerging standard.
Sample Policies
Sample Perimeter Defense and Vulnerability Assessment Policies.
Sandstorm Modem Policy
This policy is designed to be an addition to an existing corporate security policy. It can be an addition to a Remote Access Policy, if one exists, or to simply stand alone as a Modem Access policy if no current policy of this sort exists at the Company.
SANS Sample Security Policies
Policy templates for twenty-four important security requirements.
Server Security Policy
Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity.
Third Party Connection Agreement
Sample agreement for establishing a connection to an external party.
University of Colorado Email Policy
This administrative policy statement sets forth the University's policy with regard to use of, access to, and disclosure of electronic mail to assist in ensuring that the University's resources serve those purposes.
Virtual Private Network Policy
Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network.
Wireless Communication Policy
Sample policy controlling the use of unsecured wireless communications technology.
Results: Previous 1 2 3 4 5 6