NETWORK MANAGEMENT POLICY
ThinkBig Networks
Network Management Policy
Introduction
Purpose:
The purpose of this Network Management Policy is to establish guidelines for managing, securing, and optimizing the ThinkBig Networks “ThinkBig” infrastructure to ensure reliable and efficient service delivery while protecting organizational assets and data.
Scope:
This policy applies to all network systems, devices, and users within ThinkBig, including employees, contractors, and third-party vendors who access the network.
Objectives
- Performance: Ensure network availability of 99.9% uptime, optimize bandwidth usage, and minimize latency.
- Security: Protect the network from unauthorized access, data breaches, and cyber threats.
- Compliance: Adhere to industry standards and regulatory requirements such as GDPR and HIPAA when applicable.
Roles and Responsibilities
- Network Administrators: Responsible for configuring, managing, and monitoring network devices, responding to incidents, and performing routine maintenance.
- End Users: Required to follow acceptable use policies, report network issues, and adhere to security practices.
- Company Management: Oversees network operations, approves major changes, and allocates budget resources.
Network Design and Configuration
- Topology: The network follows a hierarchical topology with core, distribution, and access layers to optimize performance and manageability.
- Redundant Ring Topology: Whenever possible, the network utilizes ring topology connecting devices on primary and redundant links to multiple switches and routers to allow for the loss of the primary connection. Provides fault tolerance by rerouting traffic if one segment fails.
- IP Address Management: IP addresses are managed using DHCP for dynamic assignments and reserved ranges for static IPs.
- Hardware and Software: Standardized to include Juniper routers and switches, firewalls, and inline monitoring tools for network monitoring.
Monitoring and Maintenance
- Monitoring Tools: Utilizes inline and exterior monitors for real-time network monitoring, performance metrics, and alerting.
- Maintenance Schedule: Routine maintenance is performed monthly, including updates, backups, and hardware inspections.
- Incident Management: Incidents are logged, with escalation to senior administrators as needed.
Security Policies
- Access Control: Employs role-based access control (RBAC) and multi-factor authentication (MFA) for network access.
- Data Protection: Uses encryption for data in transit and at rest.
- Threat Management: Regular vulnerability assessments and intrusion detection systems are in place to identify and mitigate threats.
Change Management
- Change Request Process: All changes must be submitted and reviewed and approved by Management before implementation.
- Testing and Validation: Changes are tested in a staging environment prior to production deployment.
- Rollback Procedures: In case of failure, changes can be rolled back using predefined procedures and backup configurations.
Training and Awareness
- User Training: Provide annual training on network policies, security best practices, and incident reporting.
- Administrator Training: Offers specialized training for network administrators on advanced management techniques and new technologies.
Policy Review and Updates
- Review Frequency: The policy will be reviewed annually or following significant network changes.
- Update Process: Changes to the policy will be communicated to all stakeholders and updated in the policy repository.
Enforcement and Disciplinary Actions
- Enforcement: The policy will be enforced through regular monitoring and audits. Non-compliance will result in disciplinary action.
- Disciplinary Actions: Violations may lead to retraining, restricted access, or more severe consequences depending on the nature of the breach.
Contact Information
- Policy Owner: Chris Stengel, Network Operations Manager (cstengel@thinkbignets.com)
- Support Contacts: IT Help Desk (cservice@thinkbignets.com, Option 4)