Nested Knowledge

Bringing Systematic Review to Life

User Tools

Site Tools


wiki:policies:network

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
wiki:policies:network [2021/11/20 23:10]
katcow
wiki:policies:network [2024/01/24 21:24] (current)
katcow
Line 11: Line 11:
 ==== III. Wireless Connection Policy ==== ==== III. Wireless Connection Policy ====
  
-Wireless network acceptable practices are based on data classification. Public data may be accessed on any network. Internal Nested Knowledge data, confidential data, and restricted data may only be accessed on secure networks. All personnel accessing non-public data must avoid the use of public, high-risk networks.+Wireless network acceptable practices are based on the data classification system. Public data may be accessed on any network. Internal Nested Knowledge data, confidential data, and restricted data may only be accessed on secure networks. All personnel accessing non-public data must avoid the use of public, high-risk networks.
  
 === Home Network Procedures: === === Home Network Procedures: ===
  
-All employess and contractors will be provided with guidance on procedures for safely using home networks, which includes practices such as using strong passwords, eliminating guest networks, securing IoT devices, and frequently updating devices.+All employees and contractors are provided with guidance on procedures for safely using home networks, which includes practices such as using strong passwords, eliminating guest networks, securing IoT devices, and frequently updating devices.
  
 ====== Network Security Policy ====== ====== Network Security Policy ======
Line 31: Line 31:
 Nested Knowledge, a fully remote company, does not maintain any internal networks for employees. Nested Knowledge, a fully remote company, does not maintain any internal networks for employees.
  
-The Nested Knowledge cloud application, marketing site, and wiki run in an isolated, private network (Virtual Private Cloud, "VPC"). Only front-end servers are exposed to the internet via gateway; backend services and databases are unreachable outside the VPC. Access to the VPC is provided by a bastion host via SSH key authentication. All access attempts to the VPC are logged with IP address, port/protocol, and time of access and periodically reviewed for unexpected or malicious activity and retained for a period of 1 year.+The Nested Knowledge cloud application, marketing site, and wiki run in an isolated, private network (AWS Virtual Private Cloud, "VPC"). Only front-end servers are exposed to the internet via gateway; backend services and databases are unreachable outside the VPC. Access to the VPC is provided by a bastion host via SSH key authentication. All access attempts to the VPC are logged with IP address, port/protocol, and time of access and periodically reviewed for unexpected or malicious activity and retained for a period of 1 year.
  
 ==== Security protocols for the transmission of data across the network ==== ==== Security protocols for the transmission of data across the network ====
Line 44: Line 44:
  
 ^Author^Date of Revision/Review^Comments| ^Author^Date of Revision/Review^Comments|
-|K. Cowie|11/15/2021|Initial draft completed; needs technical review+|K. Cowie|01/24/2024|Reviewed
-|K. Holub|11/18/2021| |+|K. Holub|11/7/2022|Review| 
 + 
 +[[:wiki:policies|Return to Policies]]
  
  
wiki/policies/network.1637449821.txt.gz · Last modified: 2021/11/20 23:10 by katcow