Sample – File and Directory Permissions Policy

Policy Number   Program Corporate External Access Control Objective   Department Owner Risk Management / Information Security Officer Approval Authorities   Effective Date   ISO Reference ISO/IEC 270001 (section 9.1.1 -2, 9.2.2, 9.2.4) CobiT 2000 (page 144) BS 7799 (section 9.2) Regulatory Reference   Purpose The purpose of this policy is to define the security… Continue reading Sample – File and Directory Permissions Policy

GPO Order of Execution Flow and Visio

Sample Visio Download GPO_Order_of_Execution Active Directory / Citrix GPO order of execution. OU GLO’s takes precedence over Domain GPO’s Domain GPO’s take precedence over site GPO’s Site GPO’s take precedence over Local Machine Policies Citrix IMA Local Policies Microsoft Local Policies Local Machine Policies IMA based policies take precedence over local server settings Citrix and… Continue reading GPO Order of Execution Flow and Visio

SAML Integration: Single Sign-On (SSO) for Cloud Apps

The user enters the URL to access the on-premises application through Application Proxy. Application Proxy redirects the request to Azure AD authentication services to preauthenticate. At this point, Azure AD applies any applicable authentication and authorization policies, such as multifactor authentication. If the user is validated, Azure AD creates a token and sends it to… Continue reading SAML Integration: Single Sign-On (SSO) for Cloud Apps

Sample – Secure Configuration Policy

Introduction The purpose of this policy is to establish standards for the base configuration of internal server equipment that is owned and/or operated by Corporate. Effective implementation of this policy will minimize unauthorized access to corporate proprietary information and technology. Scope This policy applies to server equipment owned and/or operated by Corporate, and to servers… Continue reading Sample – Secure Configuration Policy

Sample – Corporate Implementation Services

Policy Executive Summary Corporate recognizes the importance of adherence to policies and procedures when implementing new customer projects. In an effort to mitigate both the corporate risk as well Customer risk this Implementation Policy has been developed. The policy will serve as the implementation guidelines which will be utilized to support all new customer implementation… Continue reading Sample – Corporate Implementation Services

Sample – Media Handling Policy

Introduction The purpose of this policy is to ensure all electronic information and licensed software are properly removed when disposing of computers with hard drives. A large volume of electronic information is stored on computer hard disk and other electronic media throughout Corporate. Much of this information is sensitive to disclosure due to its confidentiality.… Continue reading Sample – Media Handling Policy

Sample – OS Hardening Guidelines

OS Hardening is the process of carefully considering the configuration of the underlying Operating Systems in order to reduce the security risk. To minimize the exposure of possible vulnerabilities, there are a variety of OS-specific installation, configuration options and parameters to consider. The desired outcome is to reduce the chances of a system compromise. Operating… Continue reading Sample – OS Hardening Guidelines

Sample – Administering Anti-Virus Software Policy

Introduction The purpose of this policy is to describe how the Windows anti-virus software is configured to monitor virus activity in order to detect and prevent transmission of data or files that contain certain virus signatures. It also describes how the Exchange / SMTP anti-virus software is configured to monitor mail-related traffic to detect and… Continue reading Sample – Administering Anti-Virus Software Policy