官术网_书友最值得收藏!

System and communications protection policy

The systems and communications protection policy establishes the rules necessary to properly establish network segmentation and boundary protection thought the organization, as well as establishing the necessary rules around how cryptography will be implemented. Additionally, this policy establishes rules around allowed communication methods and mechanisms to ensure that the authenticity of those methods is maintained.

What the system and communications policy should address:

  • Monitoring, controlling, and protecting organizational communications (that is, information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems
  • Employing architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems
  • Implementing subnetworks for publicly accessible system components that are physically or logically separated from internal networks
  • Denying network communications traffic by default and allowing network communications traffic by exception (that is, deny all, permit by exception)
  • Preventing remote devices from simultaneously establishing non-remote connections with the information system and communicating via some other connection to resources in external networks
  • Implementing cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical safeguards
  • Terminating network connections associated with communication sessions at the end of the sessions or after a defined period of inactivity
  • Establishing and managing cryptographic keys for cryptography employed in the information system
  • Employing cryptography to protect the confidentiality of system information
  • Prohibiting remote activation of collaborative computing devices and provide an indication of devices in use to users present at the device
  • Controlling and monitoring the use of mobile codes
  • Controlling and monitoring the use of Voice over Internet Protocol (VoIP) technologies
  • Protecting the authenticity of communication sessions
  • Protecting the confidentiality of information at rest
主站蜘蛛池模板: 旅游| 永吉县| 沾化县| 金昌市| 曲麻莱县| 东莞市| 高邑县| 旬阳县| 东海县| 榆树市| 嘉峪关市| 东阳市| 景谷| 南雄市| 巧家县| 江达县| 莆田市| 洱源县| 邵武市| 礼泉县| 哈密市| 长寿区| 会昌县| 鄄城县| 鹿邑县| 新建县| 竹山县| 义马市| 仙游县| 沁水县| 宝应县| 泽库县| 汕头市| 墨脱县| 合水县| 洪雅县| 榆社县| 吴桥县| 吴江市| 托克逊县| 大新县|