Objective
Safeguard the company’s network infrastructure from unauthorized access and cyber threats.
Policy
Network Access Controls:
- Implement strong authentication mechanisms for network access.
- Define and enforce policies for remote access.
Firewall Rules:
- Define and enforce firewall rules to control traffic entering and leaving the network.
- Regularly review and update firewall configurations.
Network Monitoring:
- Use intrusion detection and prevention systems to monitor network traffic.
- Respond promptly to any abnormal network activity.
Wireless Security:
- Secure wireless networks with strong encryption protocols.
- Regularly change wireless access passwords.
Vulnerability Management:
- Conduct regular vulnerability assessments on network infrastructure.
- Patch and remediate identified vulnerabilities promptly.