ISO 27001 Network Security Management Policy
In this guide, you will learn what an ISO 27001 Network Security Management Policy is, how to write it yourself and I give you a template you can download and use right away.
Table of contents
What is an ISO 27001 Network Security Management Policy?
The ISO 27001 Network Security Management Policy sets out how you manage your networks for information security to protect the confidentiality, integrity and availability of data over networks.
It is one of theย ISO 27001 policiesย required by theย ISO 27001ย standard forย ISO 27001 certification.

How to write an ISO 27001 Network Security Management Policy
Time needed: 1 hour and 30 minutes
How to write an ISO 27001 Network Security Management Policy
- Create your version control and document mark-up
ISO 27001 documents require version control of the author, the change, the date and the version as well as document mark up such as document classification.
- Write the ISO 27001 Network Security Management Policy Contents Page
Document Version Control
Document Contents Page
Network Security Management Policy
Purpose
Scope
Principle
Network Controls
Security of Network Services
Segregation in Networks
Access to networks and network services
Network locations
Physical Network Devices
Web Filtering
Host Intrusion, Network Intrusion, Malware and Antivirus
Policy Compliance
Compliance Measurement
Exceptions
Non-Compliance
Continual Improvement
Areas of the ISO 27001 Standard Addressed - Write the ISO 27001 Network Security Management Policy purpose
The purpose of this policy is to ensure the protection of information in networks and its supporting information processing facilities.
- Write the ISO 27001 Network Security Management Policy principle
The network is managed on the principle of least privilege with security by design and default.
- Write the ISO 27001 Network Security Management Policy scope
All company employees and external party users.
All company networks, network services, network administration and management solutions and network devices. - Define the network controls
Responsibilities and procedures for the management of networking equipment are established.
Operational responsibility for networks is separated from computer operations where appropriate.
Special controls are established to safeguard the confidentiality and integrity of data passing over public networks or over wireless networks and to protect the connected systems and applications.
Appropriate logging and monitoring are applied to enable recording and detection of actions that may affect, or are relevant to, information security.
Management activities should be closely coordinated both to optimise the service to the organization and to ensure that controls are consistently applied across the information processing infrastructure.
Systems on the network are authenticated.
Systems connection to the network should be restricted.
Perimeter firewalls are installed between all wireless networks and the cardholder data environment and configured to deny traffic. (Unless traffic is necessary for business purposes and documented and approved then permit only authorised traffic between the wireless environment and the cardholder data environment).
Permit only โestablishedโ connections into the network.
Do not disclose private IP addresses and routing information to unauthorised parties. - Describe the security of network services
Security mechanisms, service levels and management requirements of all network services are identified and included in network services agreements, whether these services are provided in-house or outsourced.
The ability of the network service provider to manage agreed services in a secure way are determined and regularly monitored, and the right to audit should be agreed.
The security arrangements necessary for particular services, such as security features, service levels and management requirements, should be identified. The company should ensure that network service providers implement these measures. - Explain the segregation of networks
Large networks are divided into separate network domains. The domains are chosen based on trust levels.
Segregation can be done using either physically different networks or by using different logical networks (e.g., Virtual private networking).
The perimeter of each domain is well defined.
Access between network domains is allowed but is controlled at the perimeter using a gateway (e.g., firewall, filtering router).
The criteria for segregation of networks into domains, and the access allowed through the gateways, is based on an assessment of the security requirements of each domain. The assessment is in accordance with the access control policy, access requirements, value and classification of information processed and takes account of the relative cost and performance impact of incorporating suitable gateway technology.
Wireless networks require special treatment due to the poorly defined network perimeter. For sensitive environments, consideration is made to treat all wireless access as external connections and to segregate this access from internal networks until the access has passed through a gateway before granting access to internal systems. - Set out access to networks and network services
Users are only provided with access to the network and network services that they have been specifically authorized to use.
Access to networks and network services is in line with the Access Control Policy.
Before connecting to the network devices have:
– Been registered in the asset register
– Been patched to the latest security patch levels
– Appropriate malware protection installed
– Default passwords and accounts deleted or disabled
– Been included where possible in the network management system
– Ports, services, applications, and guest accounts removed or disabled that are not required. - Describe network locations
In the order of preference, physical networks should be within these geographical boundaries:
1. Within the UK boarders
2. Within the European Economic Area (EEA) boarders
3. Within countries with adequacy of the protection of personal data in non-EU countries as outlined by GDPR.
Where standard contractual clauses are in place as outlined by GDPR.ย - Explain the management of physical network devices
Physical network devices are managed in line with the Physical and Environmental Security Policy and specifically the section on Network Access Control, Cabling Security, Equipment Siting and Protection.
Physical network devices are destroyed in line with the Information Classification and Handling Policy specifically the section on the Destruction of Electronic Media / Devices.
Physical networks devices are in line with the Asset Management Policy and subject to the asset management process. - Describe web filtering
Access to websites containing illegal information or known to contain virus or phishing material is restricted.
Access to the following types of websites where practicable is blocked:
– Websites with an information upload function unless permitted for valid business reasons
– Know or suspected malicious websites
– Command and control servers
– Malicious websites identified in threat intelligence
– Websites sharing illegal content - Explain host intrusion, network intrusion, malware and antivirus
Network services and devices are managed in line with theMalware and Antivirus Policyand specifically all sections of the policy.
Host intrusion and network intrusion is deployed based on risk, business need and where practical to do so.
ISO 27001 Network Security Management Policy Template
Theย ISO 27001 Network Security Management Policy Templateย is designed to fast track your implementation and give you an exclusive, industry best practice policy template that is pre written and ready to go. ย It is included in theย ISO 27001 toolkit.
ISO 27001 Network Security Management Policy Example
An example ISO 27001 Network Security Management Policy:
Further Reading
ISO 27001 Network Security Management Policy Template
ISO27001 Annex A 8.20 Network Security
ISO27001 Annex A 8.21 Security of Network Services