The Password Policy describes the security rules that cover activities that must be followed on different internal network areas or systems that require user credential to access on different network.
Password protection ensures that only those users who establish a proof of their authorization will be granted access to data and programs.
A poorly chosen password may result in the compromise of Company’s entire corporate network. As such, all Company employees and Company owned companies employees (including contractors and vendors with access to Company systems) are responsible for taking the appropriate steps, as outlined in this document, to select and secure their passwords. elements.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
3.1 GENERAL PASSWORD CONSTRUCTION GUIDELINES
3.2 PASSWORD PROTECTION STANDARDS
3.3 TECHNICAL CONTROLS OVER THE USE OF PASSWORDS
3.4 ELECTRONIC STORAGE OF PASSWORDS
4. EXCEPTIONS
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION
Pages: 10
This bundle contains all the products listed in the Identity and Access Management section. Take advantage of the 25% OFF when buying the bundle!
The objective of this procedure is to ensure the security of Company’s assets. Effective security controls in relation to access the data are an essential component of the effective risk management of Company's data resource.
The purpose of this Business Continuity Plan Procedure is to provide an effective, fit-for-purpose, predefined and documented framework and process to enable the Business Continuity Management of the Company’s Mission Critical Activities and their dependencies.
Review Password Policy.