Network Security Policy
  • 20 May 2024
  • 3 Minutes to read
  • Contributors
  • Dark
    Light

Network Security Policy

  • Dark
    Light

Article summary

Purpose and Scope

The purpose of this document is to define basic rules and requirements for network security and ensure the protection of information within

and across networks and supporting information processing facilities.

This document applies to the security of all services, architecture, software and systems that make up Transmit's product/service.

Users of this document are all employees and applicable contractors who work on network engineering, security, and maintenance at

Transmit.

Network Controls

Transmit manages, controls, and secures its networks, the connected systems, applications, and data-in-transit to safeguard against internal

and external threats.

Firewalls & Threat Defense

Transmit must utilize network firewalls, web application firewalls, and/or equivalent mechanisms to safeguard applicable internet connections,

internal network zones, and applications from threats. Transmit configures appropriate firewall alerts and alarms for timely response and

investigation. This also applies to applicable wireless networks.

Transmit ensures networking ports and protocols are restricted based on the principle of least functionality. Ports and network routes should

only be open when there is proper business justification. Firewall configurations and rulesets are maintained. Firewall rules are implemented

to minimize exposure to external threats. Significant changes to network services and configurations should be tracked in accordance with the

Change Management Policy.

As an additional layer of defense, Transmit utilizes monitoring solutions to detect and alert on network-based intrusions and/or threats.

Network Diagramming

Transmit maintains network and data flow diagrams. Diagrams are reviewed and updated when significant network infrastructure changes

occur.

Network Access Control

In addition to the Network Security Policy, Transmit establishes, documents, and reviews the Access Control and Termination Policy based on

business and security requirements. This policy also encompasses network access control.

Transmit segregates networks based on the required groups of information services, users, and systems.

Transmit utilizes firewall configurations to restrict connections between untrusted networks and trusted networks.

Additionally, Transmit may utilize security groups and network access control lists (NACLs) to improve network security for individual virtual

machines.

Network Engineering

Transmit implements security functions in a layered approach, minimizing interactions between layers of the design and avoiding any

dependence by lower layers on the functionality or correctness of higher layers.

Transmit utilizes a defense-in-depth (DiD) architecture to protect the confidentiality, integrity, and availability of information systems and

data, i.e. placing information systems that contain sensitive data in an internal network zone, segregated from the DMZ and other untrusted

networks.

Transmit synchronizes clocks of all applicable information systems to the same time protocol to enforce consistent and accurate

timestamping.

Network Service Level Agreements (SLAs)

Security mechanisms, service levels and management requirements of all network services should be identified and included in network

services agreements, whether these services are provided in-house or outsourced.

Exceptions

Transmit business needs, local situations, laws and regulations may occasionally call for an exception to this policy or any other Transmit

policy. If an exception is needed, Transmit management will determine an acceptable alternative approach.

Enforcement

Any violation of this policy or any other Transmit policy or procedure may result in disciplinary action, up to and including termination of

employment. Transmit reserves the right to notify the appropriate law enforcement authorities of any unlawful activity and to cooperate in

any investigation of such activity. Transmit does not consider conduct in violation of this policy to be within an employee’s or contractor’s

course and scope of work.

Any personnel who is requested to undertake an activity that he or she believes is in violation of this policy must provide a written or verbal

complaint to his or her manager or any other manager of Transmit as soon as possible.

The disciplinary process should also be used as a deterrent to prevent employees and contractors from violating organizational security

policies and procedures, and any other security breaches.

Responsibility, Review, and Audit

Transmit reviews and updates its security policies and plans to maintain organizational security objectives and meet regulatory requirements

at least annually. The results are shared with appropriate parties internally and findings are tracked to resolution. Any changes are

communicated across the organization.

This document is maintained by Transmit Network Security Administration.

This document was last updated on 07/26/2022.