Table of Contents
Network Security Policy: Best Practices White Paper....................................................................................1
Document ID: 13601................................................................................................................................1
Introduction..........................................................................................................................................................1
Preparation...........................................................................................................................................................1
Create Usage Policy Statements.............................................................................................................1
Conduct a Risk Analysis.........................................................................................................................2
Establish a Security Team Structure.......................................................................................................4
Prevention............................................................................................................................................................4
Approving Security Changes..................................................................................................................4
Monitoring Security of Your Network...................................................................................................5
Response..............................................................................................................................................................5
Security Violations.................................................................................................................................5
Restoration..............................................................................................................................................6
Review.............................................