You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy - Section IX: Network Management Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
Section IX: Network Management Policy
Read next: Section X: Operations Management Policy
IX. Network Management Policy
This Policy establishes requirements for access control and security management of Local Agency networks.
- Network Security Management
All Local Agency networks must be adequately managed and controlled, in order to be protected from threats, and to maintain security for the systems and application using the network, including information in transit. Local Information Service Providers must at minimum, implement the following:- Managing and monitoring network security is separate from computer operations when possible;
- When necessary, special controls are implemented to safeguard the confidentiality and integrity of sensitive data passing over public networks (i.e., the Internet);
- Security requirements of network services must be identified and documented, which include specification of:
- Technologies applied for security of network services, (e.g., authentication, encryption and connection controls);
- Technical parameters and rules for secured connection with the network; and
- Procedures and processes to control and/or restrict access.
- Network Connections
All connections to Local Agency networks must be authorized by the Local Information Service Provider. - Network Access Control
To prevent unauthorized access to network services the following controls, at minimum, must be implemented:- Access to a Local Agency’s network must require all authorized Users to authenticate themselves through use of an individually assigned User-ID and an authentication mechanism, (e.g., password or token).
- Network access controls must ensure that Users can only access the Local Agency IT resources and data they have been specifically authorized to use.
- Where technically feasible, access to a Local Agency network must be limited to identified devices or locations.
- Physical and logical access controls must be implemented and maintained to protect diagnostic and configuration ports.
- Access controls must be implemented between segments as necessary.
- Remote Access Control
- Remote access connections to a Local Agency network must be done in a secure manner to preserve the integrity of the network, data transmitted over the network, and the availability of the network.
- To maintain information security during remote access to Local Agency IT resources, individual accountability must be maintained.
- Use of a common access point is required. All remote connections to Local Agency IT resources must be made through managed central points of entry.
- All Virtual Private Network (VPN) connections must have split tunneling disabled. In the case where split tunneling must be enabled to accommodate a business need, a risk assessment must be performed to ensure that the connection will not compromise the Local Agency network.