Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Creating a network security policy for a business

Posted on 2014-02-20
3
Medium Priority
?
307 Views
Last Modified: 2014-03-26
Hi EE,

One of the important things often overlooked in a business network is to have a network security policy.

Policy that safe guards a network from miss use. Not too restrictive such that work cannot be done but also be able to prevent intentional as well as unintentional miss use.

Obviously this is a big topic so I would like to focus more on network devices such as switches, routers, firewall etc.

Any leads, advice, directions on how to create a network policy, from conceving it to implementation, testing and applying it in prod would be most appreciated.

Thanks
0
Comment
Question by:Daera
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 35

Accepted Solution

by:
Dan Craciun earned 1500 total points
ID: 39872931
SANS are big advocates of their own Critical Security Controls.
They're popular because you can implement them in layers, starting at Control 1 and working your way up.

HTH,
Dan
0
 

Author Comment

by:Daera
ID: 39883859
Thanks Dan, good read
0
 

Author Closing Comment

by:Daera
ID: 39956996
good info
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question