Network Security Policy
Document Version: 1.0
Last Updated: July 19, 2025
Owner: Information Security Officer
Approved By: Executive Management
1. Purpose
The purpose of this policy is to secure the internal network infrastructure of the organization—including on-premises systems, private clouds, and hybrid components—by defining controls that protect data and services from unauthorized access, disruption, and compromise in line with ISO/IEC 27001 requirements.
2. Scope
This policy applies to:
- All internal networks (LAN, VLANs, data center networks)
- Private cloud networks (e.g., OpenStack, VMware)
- Internal system components (e.g., file servers, databases, authentication servers)
- Employees, contractors, and devices connected to the internal network
3. Policy Statements
3.1 Network Segmentation
- Internal networks must be segmented by business function and sensitivity (e.g., HR, Finance, Engineering, DevOps).
- Production systems must be logically and physically separated from development and test environments.
- Sensitive systems (e.g., identity stores, financial systems) must reside in isolated VLANs or security zones.
3.2 Access Control
- Access to internal networks must be authenticated via centralized identity systems (e.g., Active Directory, LDAP).
- Role-Based Access Control (RBAC) must be enforced, granting users only the minimum network access required.
- Admin access must be restricted and logged via bastion hosts or jump servers.
3.3 Network Device Hardening
- Default credentials must be changed, and unused services disabled.
- Configuration backups of critical switches, routers, and firewalls must be encrypted and stored securely.
- Only authorized personnel may configure network devices.
3.4 Endpoint Controls
- Only organization-managed and compliant devices may connect to the internal network.
- Endpoint protection software (EDR/AV) must be deployed and regularly updated.
- Device access may be restricted based on network posture checks (e.g., NAC enforcement).
3.5 Monitoring and Logging
- All internal network traffic must be monitored for anomalies (e.g., lateral movement, port scanning).
- Logs from internal routers, switches, firewalls, and IDS must be sent to a centralized SIEM system.
- Log retention must meet audit and compliance requirements (typically 12+ months).
3.6 Patch Management
- Network devices and internal services must be regularly updated with vendor-released security patches.
- Patching schedules must be defined and documented, with risk-based prioritization.
3.7 Wireless Networks
- Internal wireless networks must use WPA2-Enterprise or WPA3 encryption.
- Corporate wireless must be segmented from guest and BYOD access.
- MAC address filtering or certificate-based authentication should be used where possible.
3.8 Remote and VPN Access
- Internal network access from external locations (e.g., remote work) must use VPN with encryption and multi-factor authentication (MFA).
- VPN traffic must be inspected and logged.
- Split tunneling is not allowed unless explicitly approved and risk-assessed.
3.9 Physical Security
- Access to networking infrastructure (e.g., IDFs, MDFs, data centers) must be physically secured and monitored.
- Cable routing and switch ports must be documented and regularly audited.
3.10 Change Control
- Any configuration change to the internal network must be reviewed, documented, and approved via the formal change management process.
- Emergency changes must be documented retroactively and reviewed.
4. Roles and Responsibilities
Role | Responsibility |
---|---|
IT Network Team | Maintain and monitor internal network security |
Security Team | Oversee policy compliance and threat detection |
System Owners | Ensure internal systems are properly segmented and patched |
Employees | Use internal network resources responsibly and securely |
5. References
- ISO/IEC 27001:2022 Annex A Controls
- A.8.20 – Network security
- A.5.15 – Access control
- A.5.7 – Physical security
- A.8.25 – Secure configuration
- A.8.21 – Security of network services
- A.8.16 – Monitoring activities
6. Review and Updates
This policy must be reviewed at least annually or following significant changes to the internal network architecture.