Guest Access Policy

The Guest Access Policy states the company's policy for allowing guests, such as contractors or visitors, to connect to the corporate network.  The policy covers AUP acceptance, account use, security of guest machines, guest infrastructure requirements, and more.

Allowing guests to access the company network is sometimes necessary, but this access can introduce outside threats and thus must be tightly controlled.  A sound policy on guest network access will reduce risk and ensure consistent application of security standards across the company.

A Guest Access Policy developed with the application will include the following detailed sections:

1. Overview
2. Purpose
3. Scope
4. Policy
    4.1. Granting Guest Access
        4.1.1. Acceptable Use Policy Acceptance
        4.1.2. Approval
        4.1.3. Account Use
        4.1.4. Security of Guest Machines
    4.2. Guest Access Infrastructure Requirements
    4.3. Restrictions on Guest Access
    4.4. Monitoring of Guest Access
    4.5. Applicability of Other Policies
5. Enforcement
6. Definitions
7. Revision History

Available in the Silver and Gold Packages only, this is a policy that is intended to be used by technical staff and management only.

Your custom Guest Access Policy will be delivered immediately upon completion of the wizard via email, as both a PDF and an RTF file.  RTF files are editable in all major processing programs, including Microsoft Word.

Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability.  This approach aligns with both real-world and industry standard-based objectives, resulting in an invaluable resource for your security policy management.  A Guest Access Policy developed with the wizard will provide the foundation for a realistic, practical implementation of your IT security policy program.

Please contact us if you have any questions about this policy. has delivered thousands of IT Security Policies to companies from 5 to 50,000 employees.  The management of has over 20 years of successful experience in the field of information security.

Buy Now