Laserfiche WebLink
Security Policies and Procedures <br />outlined in the Physical Security section of this document. In general, these rules will <br />require: <br />1. Access limited to authorized personnel only <br />2. Physical security, including RFID or passcode controlled locks, are in place <br />D. Modifications, updates <br />Changes to the network architecture which affect the protections must be approved by <br />the ISO. Examples of such changes include firewalls, wireless configurations, ports and <br />proxies. <br />E. Documentation <br />The ISO shall maintain an accurate set of documentation of the networks and their <br />components. This documentation is considered to be highly valuable and will be <br />classified "Protected". <br />F. Network design <br />The goal for network design is to facilitate Virtru's business, while still providing <br />protection for Company assets. <br />G. Segmentation <br />Virtru's networks will be segmented, in order to limit access to Confidential and <br />Protected Information, without impacting the Company's business. There will be a <br />guest network that will have no access to Virtru's Network Attached Storage, and other <br />vital network resources. <br />H. Firewalls <br />Virtru's network and workstations in the DC office is protected using the Fortinet <br />FortiGate 100D Firewall appliance. This device is configured to monitor and log all <br />unusual traffic and warn Virtru of any network irregularities or attacks. <br />Definitions <br />Firewall: A part of the computer operating system or network that is designed to <br />block unauthorized access while permitting outward communication. There are two <br />different types of firewalls. <br />1. Software Firewall: Part of the operating system or can be a software add -on. <br />2. Hardware Firewall: Built into a router or a stand alone device. All computing <br />devices will access a network through this point. <br />Firewall Settings <br />1. Whitelisting: Blocks all incoming traffic, and only allows traffic from good, or <br />known IP addresses. The user will be required to authorize connections to <br />their device. <br />Rev.2015.8.6 <br />48 <br />