Overview
* Only authorized personnel should be granted access to the internal network.
* Access should be granted on a need-to-know basis.
* Access controls should be reviewed regularly and updated as necessary.
* Strong passwords should be used for all accounts.
* Passwords should be changed regularly and not be shared.
* Regular monitoring of network activity should be performed.
* Suspicious activity should be investigated immediately.
* All confidential data should be encrypted.
* Data backups should be performed regularly.
* All software should be updated regularly to ensure security patches are applied.
* An incident response plan should be in place in case of a security breach.
* All employees should be trained on the incident response plan.
Revision History
Accept
Revision and acceptance filter: DO NOT CHANGE