官术网_书友最值得收藏!

System and communications protection policy

The systems and communications protection policy establishes the rules necessary to properly establish network segmentation and boundary protection thought the organization, as well as establishing the necessary rules around how cryptography will be implemented. Additionally, this policy establishes rules around allowed communication methods and mechanisms to ensure that the authenticity of those methods is maintained.

What the system and communications policy should address:

  • Monitoring, controlling, and protecting organizational communications (that is, information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems
  • Employing architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems
  • Implementing subnetworks for publicly accessible system components that are physically or logically separated from internal networks
  • Denying network communications traffic by default and allowing network communications traffic by exception (that is, deny all, permit by exception)
  • Preventing remote devices from simultaneously establishing non-remote connections with the information system and communicating via some other connection to resources in external networks
  • Implementing cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical safeguards
  • Terminating network connections associated with communication sessions at the end of the sessions or after a defined period of inactivity
  • Establishing and managing cryptographic keys for cryptography employed in the information system
  • Employing cryptography to protect the confidentiality of system information
  • Prohibiting remote activation of collaborative computing devices and provide an indication of devices in use to users present at the device
  • Controlling and monitoring the use of mobile codes
  • Controlling and monitoring the use of Voice over Internet Protocol (VoIP) technologies
  • Protecting the authenticity of communication sessions
  • Protecting the confidentiality of information at rest
主站蜘蛛池模板: 米脂县| 清丰县| 沭阳县| 福贡县| 库伦旗| 大英县| 定襄县| 婺源县| 汉寿县| 开阳县| 错那县| 东乡族自治县| 蒲江县| 巧家县| 嘉峪关市| 鄢陵县| 襄汾县| 金塔县| 陆良县| 上饶市| 通海县| 安泽县| 漳州市| 礼泉县| 桃源县| 平顺县| 拉孜县| 澄城县| 旅游| 南京市| 车险| 泰兴市| 卢湾区| 绩溪县| 会东县| 恩施市| 和顺县| 格尔木市| 托里县| 巫溪县| 富裕县|