This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
wiki:policies:network [2021/11/16 03:13] katcow |
wiki:policies:network [2024/01/24 21:24] (current) katcow |
||
---|---|---|---|
Line 2: | Line 2: | ||
==== I. Purpose ==== | ==== I. Purpose ==== | ||
+ | |||
+ | Though the networks used by remote workers are beyond our control, it is essential that we mitigate these possible external threats as much as we can through this policy. | ||
==== II. Scope ==== | ==== II. Scope ==== | ||
Line 9: | Line 11: | ||
==== III. Wireless Connection Policy ==== | ==== III. Wireless Connection Policy ==== | ||
- | Wireless network acceptable practices are based on data classification. Public data may be accessed on any network. Internal Nested Knowledge data, confidential data, and restricted data may only be accessed on secure networks. | + | Wireless network acceptable practices are based on the data classification |
+ | |||
+ | === Home Network Procedures: === | ||
+ | |||
+ | All employees and contractors are provided with guidance on procedures for safely using home networks, which includes practices such as using strong passwords, eliminating guest networks, securing IoT devices, and frequently updating devices. | ||
====== Network Security Policy ====== | ====== Network Security Policy ====== | ||
Line 15: | Line 21: | ||
==== I. Purpose ==== | ==== I. Purpose ==== | ||
- | Though the networks used by remote workers are beyond our control, it is essential that we mitigate these possible external threats as much as we can through this policy. | + | This policy |
==== II. Scope ==== | ==== II. Scope ==== | ||
Line 23: | Line 29: | ||
==== III. Network Security Policy ==== | ==== III. Network Security Policy ==== | ||
- | Nested Knowledge, a fully remote company, does not maintain any networks. | + | Nested Knowledge, a fully remote company, does not maintain any internal |
+ | |||
+ | The Nested Knowledge | ||
+ | |||
+ | ==== Security protocols for the transmission of data across the network ==== | ||
+ | |||
+ | All communications from the VPC are encrypted by SSH (developers) or HTTPS (users of the application). Within the VPC, communcations between all services and the database are encrypted via TSL. | ||
+ | |||
+ | ==== Network change management procedures ==== | ||
+ | |||
+ | When network architecture changes, a review by the technical lead, Karl Holub, must be processed. Additionally, | ||
+ | |||
+ | ===== Revision History ===== | ||
+ | |||
+ | ^Author^Date of Revision/ | ||
+ | |K. Cowie|01/ | ||
+ | |K. Holub|11/ | ||
+ | |||
+ | [[: | ||