BDC-IT-P-006 : Network Security Policy Ver 1.0

BDC-IT-P-006 : Network Security Policy Ver 1.0

INTRODUCTION
Ensuring the security and reliability of our network infrastructure is a top priority at BDC. This network security policy outlines our commitment to redundancy, advanced firewall and security controls, high availability, web filtering, and network segmentation. By adhering to these principles, we safeguard our data, protect against evolving threats, and maintain a secure, resilient network environment, reflecting our dedication to maintaining trust and operational continuity.

PURPOSE
The purpose of this network security policy is to establish clear guidelines, standards, and best practices to safeguard our network infrastructure, data, and operations. It serves as a framework to proactively address security threats and vulnerabilities while promoting data integrity, availability, and confidentiality. By adhering to this policy, we ensure that our network remains resilient, reliable, and secure, upholding our commitment to protecting the interests of BDC and its stakeholders.

SCOPE
1. Redundancy of Information Processing Facilities
    1.1 SharePoint and File Sharing
2. Network Security Policy - Firewall
     2.1. Firewall and Security Controls
     2.2 Intrusion Prevention System (IPS):
     2.3 Web Filtering:
     2.4 Application Control:
     2.5 Firewall Rules and Network Address Translation (NAT):
3. Security of Network Services
     3.1 Redundant Firewall (HA) Configurations:
     3.2 Redundant Switches, including Staging and Multi-Chassis Link Aggregation (MLAG):
     3.3 Dual Direct Internet Access (DIA) for All Sites:
4. Network Segmentation/Segregation of Networks
5. Switch Port Control:
6. IP Request Form for Vendor and External Parties.





    • Related Articles

    • BDC-IT-P-001 : Information Technology Usage Security Policy Ver 2.1

      INTRODUCTION This document describes the general concepts of information technology usage & security to be practiced in BDC. It also describes the needs and responsibilities of the relevant parties with regards to the implementation, monitoring, and ...
    • BDC-IT-P-005: System Change Management Policy Ver 2.3

      INTRODUCTION The System Change Management Policy establishes a structured approach for managing changes to systems within our organization. This policy aims to ensure that changes are implemented efficiently, minimize risks to system integrity and ...
    • BDC-IT-P-009 : Password Policy Ver 1.0

      INTRODUCTION Passwords form an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. All staff, including contractors and vendors with access to BDC systems and ...
    • BDC-IT-P-002: Information Technology Backup Policy Ver 1.5

      INTRODUCTION The purpose of Backup procedure is to ensure that critical information for the systems below are adequately backed up on to prevent loss of data: • Customer Portal • File Server • Building Management System • CCTV System • Access card ...
    • BDC-IT-P-007: Confidential Document Disposal Policy Ver 1.0

      INTRODUCTION In an era where the protection of sensitive information is of utmost importance, our office recognizes the need for a robust Confidential Document Disposal Policy. This policy sets clear guidelines and procedures for the secure disposal ...