Solved

Creating a network security policy for a business

Posted on 2014-02-20
3
291 Views
Last Modified: 2014-03-26
Hi EE,

One of the important things often overlooked in a business network is to have a network security policy.

Policy that safe guards a network from miss use. Not too restrictive such that work cannot be done but also be able to prevent intentional as well as unintentional miss use.

Obviously this is a big topic so I would like to focus more on network devices such as switches, routers, firewall etc.

Any leads, advice, directions on how to create a network policy, from conceving it to implementation, testing and applying it in prod would be most appreciated.

Thanks
0
Comment
Question by:Daera
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 35

Accepted Solution

by:
Dan Craciun earned 500 total points
ID: 39872931
SANS are big advocates of their own Critical Security Controls.
They're popular because you can implement them in layers, starting at Control 1 and working your way up.

HTH,
Dan
0
 

Author Comment

by:Daera
ID: 39883859
Thanks Dan, good read
0
 

Author Closing Comment

by:Daera
ID: 39956996
good info
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question