?
Solved

firewall policy document template

Posted on 2011-02-13
3
Medium Priority
?
5,588 Views
Last Modified: 2013-11-25
Need firewall policy document templates.
0
Comment
Question by:mash1978
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 34885005
Here is NITS's Guidlines on Firewall and Firewall Policies:

     http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf

At the end is a list of other resource that may be of help.

Here is a list of varius examples from SANS:

     http://www.sans.org/security-resources/policies/#template
0
 
LVL 29

Expert Comment

by:leonstryker
ID: 35239139
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question