476 | 3 files | DOC, PDF
Who can get into the server room is every bit as important as who can connect to the network remotely. Use this policy template to govern access to your computer rooms and other critical physical facilities.
The majority of the rules in this policy are specific to access to computer rooms, which loosely refers to any room containing sensitive computer equipment such as the network operation center, help desk, server room or telecommunications room.
If your organization already has a well-developed policy regarding access to your buildings, you can delete anything that doesn't pertain to access to computer rooms. Use this tool to set policies for access to your physical locations.
Included in this zip file are:
Software authenticity and the assurance of user identity are two key components of system integrity. ... More >>
Review the basics of Secure Socket Layer Virtual Private Networks.... More >>
Teleworkers need reliable, secure access to the corporate network.... More >>