O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding the Door to the Internet

A logical place to begin your policy is from the front door. Your entry or portal to the Internet can come from one of many technologies and require different hardware configurations. Once connected, this passageway will support many services that will allow the outside world to enter some or all of your organization’s network as well as letting members of your organization access other networks. When I work with companies to create their Internet policies, I like to keep this part of the discussion to two very important issues:

  • Policies governing how that doorway will be created

  • Which services will be allowed to pass through that doorway

Architecture Issues

Policies that protect the doorway to the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required