Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
APPROVALS:
Name Signature Date
REVISION HISTORY:
Revision Initials and Date Summary of Changes
00
- Montrium has inserted instructions in blue text into this document to help you
understand the information in each section. Once you have modified this document
to meet the specifics of your organization, please delete the blue text.
- Italicized blue text in this document indicates elements which should be revised or
completed by you so that the text meets your company’s needs and quality system
requirements. Once you have completed this information, please remove the italics
in the document.
Confidential Page 1 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Contents
1.0 PURPOSE .............................................................................................................................. 4
2.0 SCOPE .................................................................................................................................. 4
3.0 DEFINITIONS ........................................................................................................................ 4
3.1 Acronyms ......................................................................................................................... 4
3.1.1 AD – Active Directory .............................................................................................. 4
3.1.2 HR – Human Resources ........................................................................................... 4
3.1.3 IPS – Intrusion Prevention System .......................................................................... 4
3.1.4 IT – Information Technology ................................................................................... 4
3.1.5 QA – Quality Assurance ........................................................................................... 4
3.1.6 SOP – Standard Operating Procedure ..................................................................... 4
3.1.7 VPN – Virtual Private Network ................................................................................ 4
3.2 Terms ............................................................................................................................... 4
3.2.1 Communication Tools .............................................................................................. 4
3.2.2 Executables .............................................................................................................. 4
3.2.3 Firewall .................................................................................................................... 4
3.2.4 Log ........................................................................................................................... 4
3.2.5 Logical Security ........................................................................................................ 4
4.0 RESPONSIBILITY ................................................................................................................... 5
4.1 IT Manager, representative or designee ......................................................................... 5
4.2 Management ................................................................................................................... 5
4.3 Human Resources representative .................................................................................... 5
4.4 Users ................................................................................................................................ 5
5.0 PROCEDURE ......................................................................................................................... 5
5.1 Firewall Maintenance ...................................................................................................... 5
5.2 VPN Management ........................................................................................................... 6
5.3 Network Access ............................................................................................................... 6
5.3.1 New Users ................................................................................................................ 6
5.3.2 Changes to Existing Users ........................................................................................ 6
5.3.3 Users Leaving the Company .................................................................................... 7
5.3.4 Contractors, Consultants and Visitors ..................................................................... 7
5.4 Password Management Policy ........................................................................................ 7
5.5 Account Management ..................................................................................................... 8
5.6 Logical Security Breaches ................................................................................................ 9
5.7 Antivirus and Antispam Control ...................................................................................... 9
Confidential Page 2 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Confidential Page 3 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
1.0 PURPOSE Commented [MTM1]: In this section, you should insert a short
statement describing the purpose of the procedural document to
The purpose of this procedure is to describe Company Name appropriate logical security describe why it is needed, and what it is being implemented to
accomplish.
measures necessary to protect data and users.
If the text in Section 1 is acceptable, you need only to insert your
Company name to replace the highlighted field.
2.0 SCOPE Commented [MTM2]: In this section, you should insert a short
statement describing the scope of the procedural document,
This procedure applies to all systems, employees and contractors at Company Name. outline the reason the document was created and define its
intended audience.
Confidential Page 4 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
4.0 RESPONSIBILITY
4.1 IT Manager, representative or designee
4.2 Management
4.4 Users
5.0 PROCEDURE
5.1 Firewall Maintenance
Confidential Page 5 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Confidential Page 6 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Confidential Page 7 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Confidential Page 8 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
Confidential Page 9 of 13
Document No
STANDARD OPERATING PROCEDURE [Document Number]
<ENTER COMPANY LOGO> Revision: [00]
TITLE Effective date
Logical Security [Effective Date]
6.0 REFERENCES
Document Number Document Title
Document number Access/Termination Request form
Confidential Page 10 of 13
FORM Document No
ENTER COMPANY LOGO [Document Number]
TITLE
Revision: [00]
Logical Security
Request Number:
PART A
Request Information
Request Type: ☐ ☐
Request Activity: ☐ ☐ ☐
Permissions/Requirements
Date of effect:
Valid until (if applicable):
Confidential Page 11 of 13
FORM Document No
ENTER COMPANY LOGO [Document Number]
TITLE
Revision: [00]
Logical Security
Request Signature(s)
Signature Date
(First Name and Surname) (dd-MMM-yyyy)
Signature Date
( (dd-MMM-yyyy)
PART B
☐ Yes ☐ No
Comment:
☐ Yes ☐ No
Comment:
Confidential Page 12 of 13
FORM Document No
ENTER COMPANY LOGO [Document Number]
TITLE
Revision: [00]
Logical Security
Request Number:
Signature Date
(First Name and Surname) (dd-MMM-yyyy)
Confidential Page 13 of 13