Attention! Your ePaper is waiting for publication!
By publishing your document, the content will be optimally indexed by Google via AI and sorted into the right category for over 500 million ePaper readers on YUMPU.
This will ensure high visibility and many readers!
Lab: A Lab is any non-production environment, intended specifically for developing, demonstrating, training and/or testing of a product. Firewall: A device that controls access between networks., such as a PIX, a router with access control lists, or a similar security device approved by InfoSec. Internally Connected Lab: A lab within 's corporate firewall and connected to the corporate production network. 149
8.1.6 Network Security Policy 36 Objective: To ensure the protection of information in networks and the protection of the supporting infrastructure. The secure management of networks, which may span organizational boundaries, requires careful consideration to dataflow, legal implications, monitoring, and protection. Additional controls may also be required to protect sensitive information passing over public networks. Network controls Control Networks should be adequately managed and controlled, in order to be protected from threats, and to maintain security for the systems and applications using the network, including information in transit. Implementation guidance Network managers should implement controls to ensure the security of information in networks, and the protection of connected services from unauthorized access. In particular, the following items should be considered: a. operational responsibility for networks should be separated from computer operations where appropriate; b. responsibilities and procedures for the management of remote equipment, including equipment in user areas, should be established; c. special controls should be established to safeguard the confidentiality and integrity of data passing over public networks or over wireless networks, and to protect the connected systems and applications (see 11.4 and 12.3); special controls may also be required to maintain the availability of the network services and computers connected; d. appropriate logging and monitoring should be applied to enable recording of security relevant actions; e. management activities should be closely co-ordinated both to optimize the service to the organization and to ensure that controls are consistently applied across the information processing infrastructure. Other information Additional information on network security can be found in ISO/IEC 18028, Information technology –Security techniques – IT network security. 36 Από το ISO 27002 150