jasminecorp.net directory
Updated Blogs
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Sample Policies
Directory > Computers > Security > Policy > Sample Policies

Web Sitesi

SANS Sample Security Policies
Policy templates for twenty-four important security requirements.
http://www.sans.org/resources/policies
Reviews Rating: Not yet Rated Whois Check

Sample Policies
Sample Perimeter Defense and Vulnerability Assessment Policies.
http://www.attackprevention.com/ap/policy.htm
Reviews Rating: Not yet Rated Whois Check

Acceptable Use Policy Report
This is a report on the Acceptable Usage Policy: what corporations expect of it, an instance of a
commercially used policy, and a framework for creating your own policy.

http://members.iinet.net.au/~colinwee/mbt/acceptableuse/index.html
Reviews Rating: Not yet Rated Whois Check

Hennepin County E-mail Policy
The Hennepin County Electronic Mail System (e-mail) is designed to facilitate County business
communication among employees and other business associates for messages or memoranda. Since no
computer system is completely secure, the e-mail system is not intended to transmit sensitive
materials, such as personnel decisions and other similar information which may be more
appropriately communicated by written memorandum or personal conversation.

http://www.co.hennepin.mn.us/emailpolicy.html
Reviews Rating: Not yet Rated Whois Check

Sandstorm Modem Policy
This policy is designed to be an addition to an existing corporate security policy. It can be an
addition to a Remote Access Policy, if one exists, or to simply stand alone as a Modem Access
policy if no current policy of this sort exists at the Company.

http://www.sandstorm.net/phonesweep/ModemPolicy.shtml
Reviews Rating: Not yet Rated Whois Check

Computing Policies
The electronic resource usage and security policy for the University of Pennsylvania.
http://www.upenn.edu/computing/policy/
Reviews Rating: Not yet Rated Whois Check

Company Email Policy
Every company needs to establish a policy regarding use of and access to company email systems --
and then tell all employees what its policy is.

http://www.cli.org/emailpolicy/top.html
Reviews Rating: Not yet Rated Whois Check

University of Colorado Email Policy
This administrative policy statement sets forth the University's policy with regard to use of,
access to, and disclosure of electronic mail to assist in ensuring that the University's resources
serve those purposes.

http://www.cusys.edu/~policies/General/email.html
Reviews Rating: Not yet Rated Whois Check

Lab Anti-Virus Policy
Defines requirements which must be met by all computers connected to the organization's lab
networks to ensure effective virus detection and prevention.

http://www.sans.org/newlook/resources/policies/Lab_Anti-Virus_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Internet DMZ Equipment Policy
Sample policy defining the minimum requirement for all equipment located outside the corporate
firewall.

http://www.sans.org/newlook/resources/policies/Internet_DMZ_Equipment_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Server Security Policy
Defines standards for minimal security configuration for servers inside the organization's
production network, or used in a production capacity.

http://www.sans.org/newlook/resources/policies/Server_Security_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Internal Lab Security Policy
Defines requirements for internal labs to ensure that confidential information and technologies are
not compromised, and that production services and interests of the organization are protected from
lab activities.

http://www.sans.org/newlook/resources/policies/Internal_Lab%20Security_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Router Security Policy
Sample policy establishing the minimum security requirements for all routers and switches
connecting to production networks.

http://www.sans.org/newlook/resources/policies/Router_Security_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Information Sensitivity Policy
Sample policy to assist users to assign sensitity levels to information they own.
http://www.sans.org/newlook/resources/policies/Information_Sensitivity_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

DMZ Lab Security Policy
Sample policy establishing the minimum security requirements of any equipment to be deployed in the
corporate DMZ.

http://www.sans.org/newlook/resources/policies/DMZ_Lab_Security_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Acceptable Encryption Policy
Defines requirements for encryption algorithms used within the organization.
http://www.sans.org/newlook/resources/policies/Acceptable_Encryption_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Acquisition Assessment Policy
Defines responsibilities regarding corporate acquisitions, and defines the minimum requirements of
an acquisition assessment to be completed by the information security group.

http://www.sans.org/newlook/resources/policies/Aquisition_Assessment_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Dial-in Access Policy
Sample policy controlling the use of dial-in connection to corporate networks.
http://www.sans.org/newlook/resources/policies/Dial-in_Access_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Database Password Policy
Defines requirements for securely storing and retrieving database usernames and passwords.
http://www.sans.org/newlook/resources/policies/DB_Credentials_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Audit Policy
Defines the requirements and provides the authority for the information security team to conduct
audits and risk assessments to ensure integrity of information/resources, to investigate incidents,
to ensure conformance to security policies, or to monitor user/system activity where appropriate.

http://www.sans.org/newlook/resources/policies/Audit_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Application Service Provider Policy
Defines minimum security criteria that an ASP must execute in order to be considered for use on a
project by the organization.

http://www.sans.org/newlook/resources/policies/Application_Service_Providers.pdf
Reviews Rating: Not yet Rated Whois Check

Virtual Private Network Policy
Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections
to the organization's network.

http://www.sans.org/newlook/resources/policies/Virtual_Private_Network.pdf
Reviews Rating: Not yet Rated Whois Check

Application Service Provider Standards
Sample set of minimum security standards that an application service provider must meet to be
considered for use by a corporation.

http://www.sans.org/newlook/resources/policies/asp_standards.pdf
Reviews Rating: Not yet Rated Whois Check

Automatically Forwarded Email Policy
Documents the requirement that no email will be automatically forwarded to an external destination
without prior approval from the appropriate manager or director.

http://www.sans.org/newlook/resources/policies/Automatically_Forwarded_Email_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Analog/ISDN Line Policy
Defines standards for use of analog/ISDN lines for Fax sending and receiving, and for connection to
computers.

http://www.sans.org/newlook/resources/policies/Analog_Line_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Password Protection Policy
Defines standards for creating, protecting, and changing strong passwords.
http://www.sans.org/newlook/resources/policies/Password_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Anti-Virus Guidelines
Defines guidelines for effectively reducing the threat of computer viruses on the organization's
network.

http://www.sans.org/newlook/resources/policies/Anti-virus_Guidelines.pdf
Reviews Rating: Not yet Rated Whois Check

Third Party Connection Agreement
Sample agreement for establishing a connection to an external party.
http://www.sans.org/newlook/resources/policies/Third_Party_Agreement.pdf
Reviews Rating: Not yet Rated Whois Check

Wireless Communication Policy
Sample policy controlling the use of unsecured wireless communications technology.
http://www.sans.org/newlook/resources/policies/Wireless_Communication_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Risk Assessment Policy
Defines the requirements and provides the authority for the information security team to identify,
assess, and remediate risks to the organization's information infrastructure associated with
conducting business. [pdf format.]

http://www.sans.org/newlook/resources/policies/Risk_Assessment_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Extranet Policy
Defines the requirement that third party organizations requiring access to the organization's
networks must sign a third-party connection agreement. [PDF, 80 KB]

http://www.sans.org/newlook/resources/policies/Extranet_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Remote Access Policy
The purpose of this policy is to define standards for connecting to a corporate network from any
host.

http://www.sans.org/newlook/resources/policies/Remote_Access_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

Acceptable Use Policy (pdf)
Defines acceptable use of equipment and computing services, and the appropriate employee security
measures to protect the organization's corporate resources and proprietary information.

http://www.sans.org/newlook/resources/policies/Acceptable_Use_Policy.pdf
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia