Send me a Quote
Information Type: Sample Format - Just answer the questions honestly
and fill in the Blanks.
NSP - Strawman Network Security Plan
This document is very detailed and when completed will provide a complete
Network Security Plan your company information security. For obvious reasons
"Complete with Purchase" has been inserted in most of the document.
1. General Information:
2. Scope and Applicability:
3. Objective:
4. Personnel Assignments:
5. Protection Requirements:
6. Risk Analysis Guidance:
7. Security Test & Evaluation Guidance:
1. General Information:
|
a. Facility Name/Address.
|
|
b. Complete with purchase
|
|
c. Complete with purchase
|
|
d. Complete with purchase
|
|
e. Complete with purchase
|
|
(1) Applicable laws...
|
|
(2) Complete with purchase
|
|
(3) Complete with purchase
|
|
f. Network Identification:
|
|
(1) Complete with purchase
|
|
(2) Complete with purchase
|
|
(3) Complete with purchase
|
|
(a) Complete with purchase
|
|
(b) Complete with purchase
|
|
(4) System operational status.
|
|
(a) Complete with purchase
|
|
(b) Complete with purchase
|
|
(c) Complete with purchase
|
|
(5) Network inventory.
|
|
(a) Description of the network.
|
|
(b) Complete with purchase
|
|
(c) Complete with purchase
|
|
(d) Identification of designated points of demarcation between
networks.
|
|
(e) Hardware components.
|
|
1. Complete with purchase
|
|
2. Network nodes.
|
|
3. User nodes.
|
|
4. Complete with purchase
|
|
5. Complete with purchase
|
|
6. Complete with purchase
|
|
a. Complete with purchase
|
|
b. Complete with purchase
|
|
c. Complete with purchase
|
|
7. Complete with purchase
|
|
(f) Software components.
|
|
1. Protocols used.
|
|
2. Complete with purchase
|
|
3. Complete with purchase
|
|
4. Complete with purchase
|
|
5. Complete with purchase
|
|
(6) Network configuration. This paragraph provides a network
configuration description.
|
|
(7) Complete with purchase
|
|
(8) Physical location.
|
|
(a) Complete with purchase
|
|
(b) Complete with purchase
|
2. Scope and Applicability:
|
a. Who will use the network?
|
|
b. State if the plan will be used for life-cycle security procedures.
|
3. Objective: Explain the planned... Complete with purchase
4. Personnel Assignments:
|
a. Designated Approving Authority.
|
|
b. Complete with purchase
|
|
c. Complete with purchase
|
|
d. Complete with purchase
|
|
e. Complete with purchase
|
|
f. Complete with purchase
|
|
g. Complete with purchase
|
|
h. Complete with purchase
|
5. Protection Requirements:
|
a. Applicable Guidance.
|
|
b. Personnel Security.
|
|
(1) Describe... Complete with purchase
|
|
(2) Outline... Complete with purchase
|
|
c. Physical Security.
|
|
(1) Complete with purchase
|
|
(a) Describe... Complete with purchase
|
|
(b) Describe... Complete with purchase
|
|
(2) Complete with purchase
|
|
d. Telecommunication Security:
|
|
(1) Complete with purchase
|
|
(2) WEMSEC Security. Complete with purchase
|
|
(3) Complete with purchase
|
|
e. Administrative Security.
|
|
(1) Complete with purchase
|
|
(2) Complete with purchase
|
|
(3) Configuration Management Procedures. Describe the procedures for
maintaining configuration control.
|
|
(4) Complete with purchase
|
|
(5) User Authorization Procedures. Complete with purchase
|
|
(6) Complete with purchase
|
|
(7) Complete with purchase
|
|
(8) User responsibilities. Describe training available to the users
of the network to increase their network security awareness.
|
|
(9) Information Security. Describe procedures for handling classified
information and for the destruction of classified data.
|
|
(10) Node responsibilities. Describe the minimum security a node must
meet before it will be allowed connection to the network.
|
|
f. Hardware and Software Security.
|
|
(1) User access Control
Describe... Complete with purchase
Describe... Complete with purchase
Describe... Complete with purchase
Describe the methods used to... Complete with purchase
|
|
(2) Need-to-know... Complete with purchase
|
|
(3) Discretionary/mandatory access controls.
Describe... Complete with purchase
Describe... Complete with purchase
Describe... Complete with purchase.
Identify the security level of all interconnected subnetworks.
Describe the features provided by... Complete with purchase
|
|
(4) Audit and monitoring function.
Describe the... Complete with purchase
Describe... Complete with purchase
|
|
g. Operational Controls. Describe the operational controls used to
provide the following:
|
|
(1) Complete with purchase
|
|
(2) Complete with purchase
|
|
(3) Emergency, backup, and contingency planning
|
|
(4) Complete with purchase
|
|
(5) Application software maintenance controls.
|
|
(6) Documentation.
|
|
h. Security Control Measures for... Complete with purchase
|
|
(1) Development/implementation controls.
|
|
(a) Complete with purchase
|
|
(b) Complete with purchase
|
|
(c) Certification.
|
|
(2) Technical Controls.
|
|
(a) User identification and authentication.
|
|
(b) Authorization/access controls.
|
|
(c) Complete with purchase
|
|
(d) Complete with purchase
|
|
(e) Complete with purchase
|
|
(3) Complete with purchase
|
|
i. Security Awareness and Training.
|
6. Risk Analysis Guidance: Include guidelines for performing the risk
analysis; for example, scope of the risk analysis, list any assumption or
constraints and include criteria each system or user must meet to connect to the
network.
7. Security Test & Evaluation Guidance: Include guidelines for performing
the ST&E; for example, the scope for the ST&E requirements to test
against.
8. Additional Comments:
File Owner: Jim Tracy
Organization: INTEK
Phone: (314) 596-8750
E-mail: jimt@intek.net
Date Last Reviewed: May 2010
For
the "Do it yourself folks" get the "Complete
Security Planning Package". Get all three templates ready for your
Information Technology experts to fill-in the blanks and answer the
questions. Network Security Plan, Risk Analysis Assessment and Security
Test and Evaluation,- $1,250.00 - Purchase any one template for $500.00
each.
BACK
|