Network Access and Authentication Policy

The Network Access and Authentication Policy covers the corporate standards for accessing the network, including such topics as account setup and use, authentication methods, minimum configurations, off-hours access, and more.

User authentication is a critical component of a company's security policy, as users are often one of the weaker links in the network security.  This policy ensures consistent application of authentication and access standards across the company's network.

A Network Access and Authentication Policy developed with the application will include the following detailed sections:

1. Overview
2. Purpose
3. Scope
4. Policy
    4.1. Account Setup
    4.2. Account Use
    4.3. Account Termination
    4.4. Authentication
    4.5. Use of Passwords
    4.6. Remote Network Access
    4.7. Use of Screensaver Passwords
    4.8. Minimum Configuration for Network Access
    4.9. Encryption
    4.10. Failed Logons
    4.11. Non-Business Hours Access
    4.12. Applicability of Other Policies
5. Enforcement
6. Definitions
7. Revision History

Available in the Bronze, Silver, and Gold Packages, this is a policy that is intended to be used by technical staff and management only.

Your custom Network Access and Authentication Policy will be delivered immediately upon completion of the wizard via email, as both a PDF and an RTF file.  RTF files are editable in all major word processing programs, including Microsoft Word.

Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability.  This approach aligns with both real-world and industry standard-based objectives, resulting in an invaluable resource for your security policy management.  A Network Access and Authentication Policy developed with the wizard will provide the foundation for a realistic, practical implementation of your IT security policy program.

Please contact us if you have any questions about this policy. has delivered thousands of IT Security Policies to companies from 5 to 50,000 employees.  The management of has over 20 years of successful experience in the field of information security.

Buy Now