450 KB | 3 files | DOC, PDF
Employees should know by now that installing file-sharing software on company hardware is a major security threat. Use this policy to ensure that they understand the rules against peer-to-peer file sharing and the consequences for breaking them.
Sharing company files via any platform other than secure FTP is a major security and intellectual property risk. Employees need to understand that they cannot use peer-to-peer file sharing software on company-owned devices or any hardware that connects to the company network.
Use this template to set file-sharing policies for your organization.
Included in this zip file are:
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ... More >>