Network Perimeter Security: Building Defense In-Depth

Not every security control is technical in nature. The acceptable use policy (AUP) is a portion of the information security document that clearly describes to network users the boundary between acceptable and unacceptable usage of network resources for your company.

A quick search of the Internet will provide any number of sample acceptable use policies for your perusal; but like the security policy, in the end it is important that the AUP specifically address your network environment. Copying and pasting an AUP from another organization will only cause confusion and headaches for the IS team when users begin to either do their job and find that their normal job functions are somehow in violation of the AUP or challenge the AUP in some manner.

The primary objective of the AUP is to support the goals set out in the information security document. Although you should welcome input in the creation of the AUP, the document should not contradict or otherwise come into conflict with the goals of the information security policy. At the same time, users should know that the AUP is not to simply take the fun out of their jobs, but to ensure that the information security policy, which supports the objectives of the business, is upheld.

Every AUP is going to be different, but successful AUPs share a lot of common characteristics, including:

With that in mind, what follows are some suggestions for items to consider when creating an AUP. Some of these items are fairly cut and dry; but when appropriate, flexibility and compromises are also discussed.

These are just the tip of the iceberg, but they should give a good idea of the types of topics that an AUP should address. Some AUPs simply lay out these rules while others attempt to organize them according to task or network usage such as "Email AUP," "Web Use AUP," etc. in an attempt to make the rules as specific as possible. Again, this decision will be based on your operating environment and user needs.

Категории