A.11 ABC Inc. InfoSec VPN Communication Policy


A.11 ABC Inc. InfoSec VPN Communication Policy

Policy No. 10

Effective date Month / Day / Year

Implement by Month / Day / Year

1.0 Purpose

The purpose of this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the ABC Inc. corporate network.

2.0 Scope

This policy applies to all ABC Inc. employees , contractors, consultants , temporaries, and other workers including all personnel affiliated with third parties utilizing VPNs to access the ABC Inc. network. This policy applies to implementations of VPN that are directed through an IPSec Concentrator. Site-to-site VPN connection policies are covered in the Extranet Policy.

3.0 Policy

Approved ABC Inc. employees and authorized third parties (customers, vendors , etc.) may utilize the benefits of VPNs, which are a "user managed" service. This means that the user is responsible for selecting an Internet Service Provider (ISP), coordinating installation, installing any required software, and paying associated fees. Further details may be found in the Remote Access Policy. Additionally:

  1. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to ABC Inc. internal networks.

  2. VPN use is to be controlled using either a one-time password authentication such as a token device or a public/private key system with a strong passphrase.

  3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC over the VPN tunnel: all other traffic will be dropped.

  4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.

  5. VPN gateways will be set up and managed by ABC Inc. network operational groups.

  6. All computers connected to ABC Inc. internal networks via VPN or any other technology must use the most up-to-date anti-virus software that is the corporate standard (provide URL to this software); this includes personal computers.

  7. VPN users will be automatically disconnected from ABC Inc.'s network after 30 minutes of inactivity. The user must then logon again to reconnect to the network. Pings or other artificial network processes are not to be used to keep the connection open .

  8. The VPN concentrator is limited to an absolute connection time of 24 hours.

  9. Users of computers that are not ABC Inc.-owned equipment must configure the equipment to comply with ABC Inc.'s VPN and Network policies.

  10. Only InfoSec-approved VPN clients may be used.

  11. By using VPN technology with personal equipment, users must understand that their machines are a de facto extension of ABC Inc.'s network, and as such are subject to the same rules and regulations that apply to ABC Inc.-owned equipment, i.e., their machines must be configured to comply with InfoSec's Security Policies.

4.0 Enforcement

Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

5.0 Definitions

6.0 Exceptions

Exceptions to information system security policies exist in rare instances where a risk assessment examining the implications of being out of compliance has been performed, where a Systems Security Policy Exception Form has been prepared by the data owner or management, and where this form has been approved by both the CSO or Director of InfoSec and the Chief Information Officer (CIO).

7.0 Revision History

Date ___/____/_____

Version:_______________________

Author:____________________________________

Summary:__________________________________




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net