Premium Essay

It255 Define an Acceptable Use Policy Essay

In:

Submitted By hermanOtis
Words 487
Pages 2
IT255
Acceptable Use Policy (AUP)

I have reviewed the list of forbidden traffic and came up with this acceptable use policy. Some ports (20&69) would be disabled denying file transfer if all traffic listed is forbidden. I propose the use of content filtering, file transfer monitoring, scanning and alarming for unknown file types from unknown or restricted sources. The restriction on downloading executables could be changed in the same fashion. Both of these guidelines could otherwise interfere with otherwise normal business practice and hinder the productivity of the company. The redistribution copyrighted material is restricted because the system administrator ensures all workstations have what they need. No exporting internal software or technical material in violation of export control laws. If a worker needs such software or material for a location that does not have it then they will be issued license for said use of such property. Workstations will run antivirus and malicious removal software. These programs will be update as new definitions and malicious code data are provided. The organizations data classification standard should address remote access. The company will deny outbound traffic using source IP addresses in access control lists. If remote access is allowed, encrypt where necessary. This will prevent any unauthorized access to internal resources or information from external sources. No unauthorized port scanning or probing on the company’s network. This mitigation includes disabling ping, probing and port scanning on all exterior IP devices within the LAN-to-WAN domain. Ping uses ICMP protocol. Disallow IP port numbers used for probing and scanning and monitor with IDS/IPS. No denial of service or circumventing authentication to legitimate users. There are filters in place on IP stateful firewalls and IP router WAN interfaces to

Similar Documents