Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 1 of 5
Richman Investments is hereinafter referred to as “the company.”
1.0 Overview
Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.
2.0 Purpose
The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.
3.0 Scope
The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.
Richman Investments Confidential
Richman Investments
Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 2 of 5
4.0 Policy
4.1 Account Setup During initial account setup, certain checks must be performed in order to ensure the integrity of the process. The