Appendix B. Sample Network Usage Policy

Although this appendix is included to provide you with a sample network usage policy, ideally usage policies are process-driven and usually go through several steps that are part of a never-ending cycle as business needs and technology change.

NOTE

The following link is an example of a real-world usage policy: http://www.security.gatech.edu/policy/usage/policy.html.

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.