VPN Policy and Procedure

Details

DateVersionStatusInformation ClassificationDocument Template IDDocument No
27-01-20201.7ApprovedInternalAMS DOCAMS-ISMS-PL-03

Revision History

DateVersionDescriptionAuthorReviewed byApproved byApproved date
18-01-20131.0Initial Version
18-01-20141.1Reviewed version
18-06-20141.2Reviewed for adequacyGaneshPremanand/PraveenPremanand
06-06-20151.3Reviewed as part of AMS transition
23-06-20161.3Annual Review – No Changes Done
09-08-20161.4Added 2FA authentication along with VPN access Deleted usage from Non-Antares Owned Equipment point
31-07-20171.4Reviewed no changes
10-08-20171.5Replaced shall with will and deleted etc.,
18-08-20191.6Reviewed no changes
14-01-20201.7Annual Review 2020 - Changes made to align with the standard document format, Added VPN provision for CRM and ConsultantsNuthan, UshaShailaPraveen27-01-2020

Acronym Used

AcronymExpanded Form
2FA2 Factor Authentication
VPNVirtual Private Network

Purpose

The purpose of this policy is to specify the security standards required for VPN access, ensuring the integrity of data transmitted and received, and securing the VPN pathways into the network.

Scope

This VPN Policy covers how the employees connect to the production environment at Antares Systems Ltd from outside the office network.

Policy Statement

All users who are required to establish a real-time connection with Antares Systems' production network through the Internet must employ a Virtual Private Network (VPN) product configured by the IT dept. along with the 2FA for 2 levels of authentication for a user and encrypt all traffic exchanged.

Authority

This policy is approved by the IT Head & CISO.

Summary

The purpose of this policy is to define standards for connecting to Antares Systems' network from hosts (IT Team, Java Team Helpdesk, Antares Consultants, CRM Team) on the Internet by using a VPN & 2FA to the internal network. These standards are designed to minimize potential exposure to Antares Systems production environment from damages that may result from unauthorized use of Antares resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image and damage to critical Information & technology systems.

Applicability

This policy applies to all Antares Systems' employees, utilizing VPNs to access the Antares production network.

Remote Computer Security

Remote computers become an extension of the Antares production network, and therefore are subject to the same rules and regulations that apply to Antares' managed computers (acceptable use of assets).

Software Security Patches

Remote computers must have up-to-date security patches for the operating system and applications that are installed.

Anti-virus Software

Remote computers must have up-to-date and active anti-virus software (this includes personal computers) and these must be free from viruses.

Remote Vulnerability Scanning

Remote computers using VPN technology are subject to being remotely scanned to determine that the software is current and that the system has been properly secured.Computers that do not meet the requirements will be disconnected automatically from the Antares' network until a secure computing environment has been re-established.

Approved VPN Client & Fortigate application

Only VPN clients & 2FA application which is approved by the IT Dept will be used.

Responsibilities

Users

  • It is the responsibility of users with VPN & 2FA privileges to ensure that unauthorized users are not allowed access to Antares Systems' networks when the privilege is given to the concerned user for IT related/helpdesk activities.

  • The usage of the VPN & 2FA technology with personal equipment is not permitted, users must use the Laptop provided by ASL only

  • Users are responsible for communications from their computers while connected to the VPN

  • Users will comply with organization password management policy.

Network Administrator

  • VPN gateways, Fortigate 2FA Security and concentrators will be setup and maintained by an administrator from the IT Dept. to meet minimum requirements.

  • The Network Administrator will configure the Forticlient for VPN on System and Fortitoken for 2FA on the mobile device given to users to access the network through VPN. The development team will be given predefined usernames and cannot be changed.

  • It is the responsibility of employees with VPN & 2FA privileges to ensure that unauthorized users are not allowed access to Antares network when the privilege is given to the concerned user for IT related/helpdesk activities.

  • The VPN requires the user to authenticate. VPN use is to be controlled using 1) password authentication and 2) a one-time Fortitoken which will be generated and sent to the user's mobile (valid for 60secs). When actively connected to the administrative network, VPNs will force all traffic to and from the PC over the VPN tunnel.

  • All communication over the VPN are encrypted

  • All authentication attempts will be logged.

Notification of Changes

The IT team will provide users with a copy of this policy (or a link to it), and notify users of changes to this policy.

Enforcement

Any employee found to have violated this policy may be subject to disciplinary action in accordance with the HR policy.