knowt logo

Network Policies

Network policies.

In this section of the course,

we're going to talk about network policies.

When we discuss policies, we're not talking specifically

about technical controls anymore

like adding access control lists to our firewalls or routers

or enabling Mac filtering or even enforcing encryption

and all the other things like that,

that we do to better secure our networks.

No, those are considered technical controls,

and they're not the only way for us to secure our networks.

In fact, there are a lot of network protections

that will come in the form of administrative controls

such as policies.

So when we talk about policies,

remember that policies are one part of a larger concept

known as IT governance.

IT governance is used to provide us

with a comprehensive security management framework

for the organization, and that way we can build upon it.

Now this is done using policies, standards,

baselines, guidelines, and procedures.

Policies are going to be used to define the role of security

inside of an organization

and establishes the desired end state

for that security program.

This is usually going to be provided by senior management

and it's going to clarify

the level in which the organization enforces security

and how the organization will categorize the controls

that are going to be applied.

Policies tend to be very broad

and they provide the basic foundation

upon which standards, baselines, guidelines, and procedures

are going to be built.

Security policies are going to be divided into three levels.

This is organizational, system-specific, and issue-specific.

Organizational security policies

are going to provide direction and goals.

They're going to give you a framework

to meet the business goals

and define the roles, responsibilities, and terms

that are associated with it.

System-specific policies are going to address the security

of a specific technology, application, network,

or computer system.

These system-specific policies

tend to be much more technical

and they focus on protecting a certain piece of the system

or a certain piece of technology.

Issue-specific policies

are built to address a specific security issue,

such as email privacy, employee termination procedures,

and other specific issues.

As we move beyond policies,

we begin to enter the world of standards.

Now, standards are used to implement a policy

within an organization.

These are going to include things like mandatory actions,

steps or rules that are needed

to achieve the desired level of security.

After standards, we have baselines.

And baselines are going to be used to create a reference point

in our network architecture and design.

These baselines are used to document any kind of system

so we can go back later and compare it for analysis

against that baseline.

For example, we may have a baseline configuration

for our network switches,

and we can compare the running configuration on any switch

to our baseline at any time

to see what changes have been made by our administrators

or a possible attacker.

Next, we have guidelines.

Guidelines are not required or mandatory actions,

but instead, they're simply recommended actions.

Guidelines tend to be flexible in nature,

and they allow exceptions and allowances

when a unique situation is going to occur.

For example, let's pretend I have a guideline

that every employee gets one terabyte of storage

on our cloud servers.

That might be fine for most of the people who work here.

Now, our salespeople, and our accountants,

and human resources,

all of those folks

would have no problem fitting all of their documents

into that one terabyte of space

because most of what they do is text files.

Those users will have lots of space here.

But my video editor, she might come up and say,

"Hey, I'm running out of space.

I need at least five terabytes of storage."

Well, based on our storage size limitations,

if they're based on a guideline,

I can make an exception to that

and allow her to have five terabytes

instead of one terabyte,

because it meets the needs of her specific job role

because she's dealing with large video files all day long.

That's the idea of a guideline.

It's something that can be changed on the fly

and an exception can be quickly made.

Next, we have procedures.

Now, procedures are detailed step-by-step instructions

that are created

to ensure personnel can perform a given task

or series of actions.

These procedures are where those high-level policies

are transferred all the way down

through those standards and guidelines into actionable steps

that can be followed by a technician.

For example, your service desk probably has a procedure

on how to create a new user account.

This procedure encompasses

all of the security-related policies,

standards and guidelines to allow your frontline employees

to be able to follow the step-by-step actions

necessary to create a new account

and give that account the proper permissions,

the correct password strength,

and all of those types of things.

For the exam, I want you to remember

all the different types of policies we have

inside of our governance as we work our way down

from the more generic to the more specific.

This includes our policies, our standards, our baselines,

our guidelines, and our procedures.

Now, in this section of the course,

we're going to focus on Domain 3: Network Operations,

specifically in Objective 3.2.

Objective 3.2 states

that you must be able to explain the purpose

of organizational documents and policies.

So let's get started talking

all about the different policies and plans and procedures,

hardening and security policies and common agreements

that you're going to find inside your enterprise networks.

(upbeat music)

Plans and procedures.

In this video, we're going to discuss

the various plans and procedures

that are used in the management of your enterprise networks.

This includes change management, incident response plans,

disaster recovery plans, business continuity plans,

system life cycle,

and standard operating procedures.

First, let's discuss change management.

Change management is a structured way

of changing the state of a computer system,

network, or IT procedure.

Change management is used to make changes to the secure

and known good baseline that exists in our network devices.

A good change management policy

is going to be designed to make sure that all the risks

are considered prior to implementing a change

to your systems or networks.

This ensures that our services remain stable,

reliable, and predictable,

even in the face of rapidly changing business requirements.

Essentially change management is a coordinated system

to account for any upgrades,

installations or network outages and repairs.

For example, let's assume that you need to upgrade a router

or switch in your network,

but you don't want to cause a bunch of unnecessary downtime.

Well, with change management,

we can ensure that all of our actions are pre coordinated

and approved by the relevant stakeholders

prior to us implementing a firmware upgrade.

After all, if I simply ran a firmware upgrade

in the middle of the workday,

I could cause a lot of unnecessary downtime for my end users

because they're relying on those devices

for their network connectivity.

This is because during a firmware upgrade,

that router switch is going to be taken offline

and it won't provide services to our end users

until the firmware has been properly flashed,

and then the configurations are reloaded.

Therefore we need to instead coordinate the firmware upgrade

for the right time so that it would be the least impactful

against our business operations.

For example, at most of my organizations,

we use the period between midnight and 4:00 am

to do our upgrades because

relatively few people are online

and working during those hours.

As you move through your change management process,

you're going to need to ensure

that the upgrade is being planned, approved as a change,

the relevant documentation diagrams are being updated

and our network documentation remains current

after we finish doing the change.

Next, we have incident response plans.

An incident response plan contains a set of instructions

to help our network and system administrators

detect, respond to, and recover

from network security incidents.

These types of plans

are going to address issues like cyber crime, data loss,

and service outages that could threaten our daily work.

Basically what we're doing here

is decide what we're going to do

if there's a security violation

and what are our response actions going to be?

Are we going to take the device off the network and wipe it

and then put it back on?

Are you going to handle it in-house?

Or are you going to fire an employee over it?

Are you going to call the police?

What is your plan going to be?

How are you going to respond?

Now, I don't have these answers for you

because all this is going to depend

on your organization's incident response plan

that you need to create.

When it comes to an incident response plan,

you need to cover six main steps or phases.

First; preparation,

second; identification,

third; containment,

fourth; eradication,

fifth; recovery,

and sixth; lessons learned.

Also, if you're intending to prosecute a computer crime

in conjunction with your incident response,

that's extremely important

that you maintain the chain of custody

over all the data and all the information being collected.

Next, we have disaster recovery plans.

A disaster recovery plan

is a documented structured approach

that documents how an organization

can quickly resume their work after an unplanned incident.

Now, these unplanned incidents

can be things like natural disasters,

power outages, cyber attacks, or other disruptive events.

Now a disaster recovery plan

will outline your processes and procedures

for shifting your operations

from your main headquarter facilities

to your disaster recovery sites,

such as a hot site, a warm site, a cold site,

or a cloud site.

Now remember a disaster recovery plan

is focused on business interruptions

that are caused by a disaster,

but these aren't going to include things

like everyday operational challenges.

For those types of challenges,

we instead need to look at a different type of plan

known as a business continuity plan or BCP.

Now a business continuity plan

is a document that outlines how a business

is going to continue operating

during an unplanned disruption in service.

Now, a business continuity plan is more comprehensive

than a disaster recovery plan,

and it contains contingencies

for lots of different business processes,

your assets, your human capital and business partners,

and essentially every other thing

and aspect that may be affected in your business.

Now, when you're dealing with a disaster recovery plan,

we're focused mainly on your technology and your facilities,

but a business continuity plan is much more in-depth

as it looks at how you're going to continue

all of your business operations.

In general, a disaster recovery plan or DRP

is going to be referenced

as part of your business continuity plan or BCP,

and the two will work very closely together

when you have a real disaster,

like a hurricane, a fire, or a flood that occurs.

Next, we need to consider the system life cycle plans.

System life cycle plans

also known as the life cycle planning

is going to describe the approach that you're going to use

to maintaining an asset

from its creation to its disposal.

Now, in the information technology world,

we normally have a five phase life cycle

that's used for all of our systems and networks.

This includes planning, design,

transition, operations, and retirement.

Phase one is planning.

Planning involves the planning and requirement analysis

for a given system,

including outlining the architecture

and identifying the possible risks.

Phase two is design.

Design is going to involve the outlining

of the new system or network,

including what interconnections there's going to be,

what technologies will be used,

and how it should be implemented.

This can even include some building of the new system

or even a prototype to validate the architecture

that we want to use.

Phase three is transition.

Transition involves the actual implementation,

which could involve coding some new software,

installing the systems,

or cabling up the networks and their configurations.

All of this is going to be a part of taking this asset

and moving it from a prototype or an initial build

into something that's ready for full production and use,

that's why we call it transition.

We're transitioning it into production and use.

Phase four is operations.

Operations is where the system or network

is now going to be used on a daily basis to do productive work.

In general, about 70% of a system's lifecycle

is going to be spent during operations.

Now, operations includes

things like the daily running of the asset,

as well as updating it, patching it,

fixing any issues that may occur and things like that.

This is often referred to as operations and support

because we're going to conduct our break fix actions

during this portion of the asset's life cycle.

Our fifth phase is retirement.

Retirement is the end of the life cycle

and it occurs when the system or network

no longer has any useful life remaining in it.

At this point,

a single device or your entire system or network

could be retired and the assets will be disposed of

as part of this retirement.

For example, if you had a network switch

that's been used for the last five years,

it's probably reaching the end of its useful lifespan.

So it needs to be replaced with a newer model,

and then we're going to retire that old switch.

Before we throw it away though,

it's important for us to think about that device

and how we're going to sanitize it

or clear it of any configurations or sensitive information

using our proper asset disposal procedures too.

Next, we have standard operating procedures.

Everything we spoke about so far

has been at a higher and more generic level,

but a standard operating procedure or SOP

is a set of step-by-step instructions

that are compiled by an organization

to help its employees carry out their routine operations.

Standard operating procedures aim to achieve efficiency,

quality output, and a uniformity of performance

while they reduce misconfigurations

and a failure to comply with regulations.

For example, our disaster recovery plan

might say that within 48 hours

of a named hurricane reaching our city,

we need to ensure that all of our diesel generators

have been refueled.

Now, this is a single one-line statement

from a disaster recovery plan or DRP,

but that statement doesn't tell you how to actually do it.

Instead, you'd pull out the standard operating procedure

named fueling the generators,

and this would tell you how to perform the operation.

So if I was told to refuel the generators,

I could pull out this SOP and follow it step-by-step,

step one; call the fuel company and schedule a delivery,

step two; turn off the generators

and open the storage tanks,

step three; put the diesel into the storage tanks.

You get the idea here, right?

Now, there might be 5 or 10 or 20 steps to this procedures

as part of this SOP,

but in a disaster recovery plan,

it's just one line that says,

you need to do this thing known as refueling the generators.

So remember when it comes to managing your networks,

there are lots of different plans and procedures

that you may come across.

We just covered a few in this lesson

that you may get asked about on the exam,

but in the real world,

there are many others too.

For the exam, remember,

we have change management, incident response plans,

disaster recovery plans, business continuity plans,

system life cycles,

and standard operating procedures,

to help us manage our networks.

Hardening and security policies.

In this video, we're going to talk about

the various hardening and security policies

that are used in securing your enterprise networks.

This includes password policies, acceptable use policies,

bring your own device policies, remote access policies,

onboarding and off-boarding policies, security policies,

and data loss prevention policies.

First, we have password policies.

Now a password policy is a set of rules created

to improve computer security by motivating users

to create dependable, secure passwords,

and then store and utilize them properly.

This document will promote strong passwords

by specifying a minimum password length,

a complexity requirement requiring periodic password changes

and placing limits on the reuse of passwords.

Once you create your password policy,

it's important to educate your end users on the requirements

that are set forth in this policy.

Also, you want to create guidelines and standards

within your organization based on your password policy

and use those to implement the technical controls

that will enforce the requirements set forth

in your password policy.

Next, we have acceptable use policies.

An acceptable use policy or AUP

is a set of rules applied by the owner, creator

or administrator of a network website or service

that restricts the ways in which the network website

or system may be used and sets guidelines

as to how it should be used.

Now, essentially, this is a policy that governs

the use of the company equipment and its internet services

by its employees.

So what kind of things might you find in an AUP?

Well, this is really going to depend on your organization

and its requirements.

At one of the large organizations I used to work for,

they had restrictions that prevented employees

from accessing websites like eBay,

because you shouldn't be buying and selling things

while you're at work.

They also prevented employees from accessing pornography

or gambling websites.

Another organization I worked at restricted,

the use of Facebook while at work,

because they didn't want people spending their time

on social media during the workday.

But like I said,

this is really going to depend on your organization.

In my company, I don't block Facebook

because I want my team members there

because I want them to be in our Facebook group

and interacting with our students

in the Dion training Facebook group.

As you can see, there's really no one size

fits all answer here,

but for the exam, if you start seeing things

that talk about what things an employee can and cannot do,

what they're allowed to do with company equipment

and internet services,

your correct answer should be unacceptable use policy

or AUP.

Next we have bring your own device policies.

Bring your own device or BYOD is going to allow,

or sometimes encourage employees to access enterprise

networks and systems using personal mobile devices,

such as smartphones, tablets, and laptops.

Some organizations are fully embracing a culture

of bringing your own device

while others have rejected it completely

because it does bring up different security risks

that you have to think about.

After all, let's say I'm able to bring my laptop to work

and connect it to your network.

Now, any malware issues I have on my device

are now going to be a part of your network too,

and it can spread.

BYOD also has a lot of challenges with maintaining

a proper configuration baseline too,

because the company doesn't technically own that device

and therefore they can't patch them or upgrade them

automatically using their patch management processes

because the employee owns that device.

Now, on the other hand,

a lot of companies really love BYOD

and this bring your own device policy because it means

they don't have to buy you a laptop or a cell phone

or a tablet because you as an employee are simply going to

bring your own personal device and do your work on it.

This will save the company money in the short term,

but again, there's a lot of security concerns here

you have to worry about.

When the data goes onto that device,

whose data is it?

Is it the company's data or is it the employee's data?

Who has the rights to it?

Where do you draw the line between what personal data

can be on that laptop and what is going to be business data

that has to be properly secured.

These are all things you have to think about, right?

If there's going to be an incident,

can the company take your personal devices as evidence

during the investigation?

Can they require you to reformat and purge

all your information from your smartphone,

including all the pictures of your kids?

That is something you have to think about.

As you can see, there are a lot of questions

that come up when you start using a bring your own device

or BYOD policy.

In general, I recommend against using a BYOB policy

in enterprise networks.

But if you are going to embrace a BYOD policy,

then I suggest you create a segmented network

where your BYOD devices can connect directly to the internet

and then use cloud hosted resources,

instead of going into your local network directly.

Next, we have remote access policies.

Now a remote access policy is a document that outlines

and defines acceptable methods of remotely connecting

to the internal network.

For example, are your employees allowed to be connected

to internal network resources such as your email server

directly over the internet?

Now, in most cases,

you're not going to configure your email server

to allow this to happen because it opens you up

to a whole bunch of vulnerabilities.

Instead, you may choose to enable a web mail server

that sits in a screen sub-net or a DMZ,

and then allow your employees to connect to that,

and it will be used essentially as a jump box

into the exchange server.

Or your remote access policy might decide that you're going to

allow employees to use their corporate laptops,

to connect to the internet over a VPN connection.

This way, they're going to be connecting to your network,

using a trusted device, that corporate laptop using your

standard baseline configuration security protocols,

and they can validate their identity using whatever

authentication and authorization procedures

you have to ensure the security of your network.

This again goes into your remote access policy.

What type of services, whether they're VPNs or other things,

are you going to allow your employees to use?

Again, as you start creating your remote access policy,

it's really going to be based on your risk tolerance

and your operational needs,

and it is going to be dependent on your organization.

Next, we have onboarding and offboarding policies.

Now an onboarding policy is a documented policy

that describes all the requirements

for integrating a new employee into the company

and its cultures, as well as getting

that new hire all the tools and information they need

to be able to do their job successfully.

Now, an offboarding policy is a documented policy

that covers all the steps necessary

to successfully part ways with an employee

following their resignation or termination.

When you do this well, a clear off-boarding process

will ensure a smooth transition for both your company

and the departing employee.

Now a good onboarding and offboarding policy needs to extend

beyond the information technology realm.

But for our purposes, we're focusing really

on the IT side of things.

For example, when somebody is hired,

how is that new employee going to get their account created?

How are they going to be issued a new laptop

or smartphone or tablet?

How are they going to be given access

to different network resources

like the company shared drive?

All of these are things that need to be documented

within the onboarding policy and it's associated procedures.

On the other hand,

when an employee resigns or is terminated,

how are you going to remove them from all their accounts

and accesses?

How long do they have before their accounts can be deleted

once they transfer?

Do you need to archive their data for historical purposes

and record-keeping, or can you delete it all?

Do you need to take back equipment like a laptop

or a smartphone or a tablet?

How are you going to refurbish it so it's ready to be issued

to the next employee who's hired into that position?

All of these are things you need to cover

inside your offboarding policy.

Next, we have security policies.

Now a security policy is a document that outlines

how to protect the organization systems,

networks and data from threats,

including computer security threats,

and how to handle situations when they do occur.

A security policy is going to identify

all of a company's assets as well as the potential threats

to those assets.

Now, in many organizations

there may be a single overarching security policy,

that's going to contain all the other security policies

underneath it.

Things like the AUP, the BYOD,

the password policy, the onboarding policy,

the offboarding policy and many others.

In other organizations, they prefer to break apart

the larger security policy

into smaller individual policies

for use within the organization.

Finally, we have our data loss prevention policy.

Now a data loss prevention policy is a document

that defines how organizations can share and protect data.

It's going to guide how data can be used in decision-making

without it being exposed to anyone

who should not have access to it.

Now, the goal of a data loss prevention policy

is to minimize accidental or malicious data loss.

These policies need to cover the entire network,

not just your file servers or your email servers.

In my organization,

we use a data loss prevention system

based on our organizational DLP policies.

Our DLP system goes through our network

and inspects any data being sent or received.

For example, if our system detects that

a large amount of data is being sent out of our network

to a site like Google drive or Dropbox,

it can create an alert and tell our system administrators

that we need to investigate that.

This way we can look at, what particular employee

was sending, what particular documents

and decide is that legitimate or not.

In some cases, an employee might need to send

a large amount of data, but in others they shouldn't

be sending large data files.

And that may be them trynna steal data from our systems.

For example,

let's say that my DLP system created an alert

because one of my employees was uploading

all the video content from this course

into one of our video servers

or to one of our video distribution partners.

That might be 50, a hundred

or 200 gigabytes of data or more.

I guarantee that our data loss prevention system

is going to flag on that amount of data,

leaving our network from a single user

or a single workstation,

because this is typically an indicator of a compromise

for a data breach or data exfiltration attack.

My DLP will flag this data transfer

and based on our policies,

it may even block this data transfer from occurring.

Now our administrator can review that flagged alert

and look at the content and determine

is this somebody who is stealing from us

or is it someone doing their job

and they have a legitimate reason to do this?

For example, if I have my video editor,

we might see that she just uploaded this brand new course

to one of our distribution partners.

And she did it all in a one day period.

So she had to upload two or 300 gigabytes of data

so we can prepare to publish this course.

That would be fine.

We'd mark the alert as normal and acceptable,

and we'd move on with our day.

But again, this is all going to be dependent

on your data loss prevention policies.

And what's going to trigger inside your company.

In your company, if you had a single person

sending 50 or a hundred gigabytes of data,

that would probably be extremely suspicious in most cases

and needs to be investigated further.

As part of your DLP policy, it's always important

to set proper thresholds.

When is your DLP going to alarm?

What is the amount of data transfer or the file types

that it's going to consider acceptable or out of baseline?

What file formats are you going to be able to transfer?

And which ones are going to be blocked?

Are you going to allow people to transfer database files

or zip files or PowerPoint files?

All of these are things that DLP can block

or alert on depending on how you configure it.

So as you look at all these different things,

you need to define that in your data loss prevention policy.

Now, remember when it comes to securing your networks,

there are lots of different hardening techniques

and security policies that you may come across.

We cover just a few in this lesson

that you may get asked about on the exam,

but in the real world there are tons

of other ones out there.

For the exam, I want you to remember

that we have things like password policies,

acceptable use policies,

bring your own device policies,

remote access policies,

onboarding and offboarding policies,

security policies,

and data loss prevention policies,

and what each one is used for.

Common Agreements.

In this video, we're going to discuss

common types of agreements that are used

in our enterprise networks.

Some common agreements are things

like non-disclosure agreements or NDAs,

a memorandum of understanding or MOU

and a service-level agreement, an SLA.

First we have non-disclosure agreements or NDAs.

Now, a non-disclosure agreement

is a document agreement between two parties

that define what data is considered confidential

and cannot be shared outside of that relationship.

Now, NDAs are often used by organizations

to protect their intellectual property,

and they're either going to be between two different

organizations or between an organization and its employee.

Now, why would an organization require their employee

to sign an NDA?

Well, it's because those NDAs can be a form

of non-competitive clauses inside

of an employment agreement,

or the company might fear that that employee

might take the information

they're learning from the organization

and go off and start their own business

or disclose it to their competitors.

Now, if two organizations are working jointly

on a project system or network,

they can also utilize a non-disclosure agreement.

This allows the companies to share the type of data

they need to in order to develop this product

without fear that the other company is going to steal

their trade secrets.

Keep in mind though, a non-disclosure agreement

is an administrative control not a technical control.

There is nothing in the system that is going to prevent

one of these people from sending data to the others,

if all you have is an NDA,

they only have the word and signature on that piece of paper

that promises not to do it.

Now, if you want to get some technical controls involved

with an NDA, you can do that using a DLP

or data loss prevention system,

but the DLP is the technical control

not the NDA in that case.

An NDA is considered a legally binding agreement

and it carries penalties for breaking the NDA,

including fines, forfeiture of intellectual property rights,

or even jail time in some extreme circumstances.

Next, we need to discuss an MOU

or memorandum of understanding.

A memorandum of understanding is a non-binding agreement

between two or more organizations

to detail what common actions they intend to take.

Essentially, this is a formal version

of a gentleman's agreement,

because it's actually written down and signed

by both parties and it isn't really legally enforceable.

Essentially, this is like a handshake deal,

but slightly more formalized because we wrote it down

and we both signed it.

For example, if you and I both agree

that we were going to go into business together

on a joint project, we could create an MOU

that outlines what things each of us

is going to be responsible for doing.

So, you might say that you're going to do A, B and C

and I'm going to handle X, Y and Z.

We would write that down inside of an MOU,

we could sign it and then at anytime we can look back

on that document, if we have a disagreement in the future

and say, "But Hey, you said you were going to handle item B,

"and I said, I was going to handle item Y."

But if I didn't do item Y, you can't sue me

just because I didn't finish it,

because this agreement is non-binding.

Now, a memorandum of understanding

is often referred to as a letter of intent.

Because again, it's an intent to do something

it's not a requirement to do it.

It's often going to be used within an organization

by two or more smaller internal divisions

because of this non-binding legal status.

So, for example, I used to be the director

of an IT department for a really large organization.

And I was responsible for managing the service desk

as part of my responsibilities.

Now, my service desk provided assistance

to several thousand employees across multiple countries.

There was one critical business unit that wanted to have

at least one tier two service desk agent located

in their specific building at all times

because their building was a little bit further away

than our headquarters was.

Now, this way, if something went offline in the network

that tier two agent didn't have to get in their car

and drive from the headquarters to this branch office,

which was about an hour away,

and that way they could immediately start

the restore process because they're already sitting

in the building.

Now, I thought this was a pretty good idea.

So, we agreed to it and we wrote up an MOU.

The leader of that part of the organization and I

both wrote down what we were going to do.

I said, "I'm going to provide one full-time

"tier two service desk agent and I'm going to have them do

"all their daily functions out of your building."

In return, they said they would provide

my tier two agent with a small office

and a dedicated parking spot.

We both wrote all this up,

we put it in the MOU and we signed it.

This way we were able to minimize the time

to repair for lots of critical issues

that happen at this business unit,

because the guy was already sitting in that building

as a tier two agent.

Now, this wasn't a binding agreement on either of our parts.

At any time I could have said,

"You know what, I think I need Tom to come back

"to the main office and I can't have him sit

"in your office five days a week anymore."

Or "Maybe I need to have Tom work out of the headquarters

"for Mondays and Tuesdays but on Wednesday,

Thursday and Friday he can work in your unit."

Now, the other business unit leader couldn't really complain

because he had no way of forcing me to keep Tom

in that building for all 40 hours every single week,

because we had this MOU, which is non-binding.

Now, this MOU does give us some formality to our agreement

that we had made between the two directors.

This was the director of operations

and myself as the IT director.

But at any time we could modify it or break it

without any serious consequences.

As I said, MOUs are usually used internally

between two business units as in my previous example,

but they can also be used externally

between your organization and one or more

other organizations.

There are some consortiums out there

that have multi-party MOUs with five or six

or seven organizations that all come together

to do a common thing or a common goal.

But remember it is not legally binding

when you're dealing with MOUs.

So at any time these partner organizations

could simply leave and there'll be no consequences.

Next, we have a service-level agreement or SLA.

Now, a service-level agreement is a document commitment

between a service provider and a client

where the quality, availability and responsibilities

are agreed upon by both parties.

Service-level agreements are primarily concerned

with the ability to support and respond to problems

within a given timeframe while providing

the agreed upon level of service to your end users.

If you work in the IT service management realm already,

you are probably already familiar with SLAs.

SLAs are going to be used to provide a written agreement

for not only the security priorities

but also more importantly, your operational priorities.

It also is going to outline the responsibilities, guarantees

and warranties for a given service and its components.

For example, in one of my previous organizations,

we didn't want to keep a bunch of extra switches and routers

in our supply closet in case one of them broke.

This would be really expensive

to have all this extra gear just sitting there.

So, we opted to have a service-level agreement

in place with our supplier.

And that agreement said, "If a router or switch failed

"and we couldn't get back online within 10 minutes,

"they would bring us a new device

"within four hours of the outage."

Now, these service-level agreements can really help bring

some predictability to an otherwise hard to predict area,

like when will a device fail?

SLAs can be really good in this case,

but only if your service provider is going to live up

to their end of the agreement.

Now, another place you're often going to see SLAs

is in regard to your internet connections,

or when dealing with internet service providers

or cloud service providers.

For example, my internet service provider

has a service-level agreement with us

that says they're going to maintain an uptime of 99.999%,

which equates to having no more than five minutes

of downtime per year.

Now, because it's a service-level agreement,

if they don't meet that uptime requirement,

what's going to happen?

Well, that depends on your agreement

and your underlying contracts.

In our contract, we actually get a refund

for the entire monthly service fee

if they can't maintain the uptime they promised in the SLA.

This is their penalty for not meeting the SLA

and it works essentially like a fine

that they pay back to us.

Some contracts have these and some contracts don't,

it just depends on how you negotiate your deal.

So, remember when it comes to agreements used

in our a network management we have three main types.

We have non-disclosure agreements,

memorandums of understanding and service-level agreements.

W

Network Policies

Network policies.

In this section of the course,

we're going to talk about network policies.

When we discuss policies, we're not talking specifically

about technical controls anymore

like adding access control lists to our firewalls or routers

or enabling Mac filtering or even enforcing encryption

and all the other things like that,

that we do to better secure our networks.

No, those are considered technical controls,

and they're not the only way for us to secure our networks.

In fact, there are a lot of network protections

that will come in the form of administrative controls

such as policies.

So when we talk about policies,

remember that policies are one part of a larger concept

known as IT governance.

IT governance is used to provide us

with a comprehensive security management framework

for the organization, and that way we can build upon it.

Now this is done using policies, standards,

baselines, guidelines, and procedures.

Policies are going to be used to define the role of security

inside of an organization

and establishes the desired end state

for that security program.

This is usually going to be provided by senior management

and it's going to clarify

the level in which the organization enforces security

and how the organization will categorize the controls

that are going to be applied.

Policies tend to be very broad

and they provide the basic foundation

upon which standards, baselines, guidelines, and procedures

are going to be built.

Security policies are going to be divided into three levels.

This is organizational, system-specific, and issue-specific.

Organizational security policies

are going to provide direction and goals.

They're going to give you a framework

to meet the business goals

and define the roles, responsibilities, and terms

that are associated with it.

System-specific policies are going to address the security

of a specific technology, application, network,

or computer system.

These system-specific policies

tend to be much more technical

and they focus on protecting a certain piece of the system

or a certain piece of technology.

Issue-specific policies

are built to address a specific security issue,

such as email privacy, employee termination procedures,

and other specific issues.

As we move beyond policies,

we begin to enter the world of standards.

Now, standards are used to implement a policy

within an organization.

These are going to include things like mandatory actions,

steps or rules that are needed

to achieve the desired level of security.

After standards, we have baselines.

And baselines are going to be used to create a reference point

in our network architecture and design.

These baselines are used to document any kind of system

so we can go back later and compare it for analysis

against that baseline.

For example, we may have a baseline configuration

for our network switches,

and we can compare the running configuration on any switch

to our baseline at any time

to see what changes have been made by our administrators

or a possible attacker.

Next, we have guidelines.

Guidelines are not required or mandatory actions,

but instead, they're simply recommended actions.

Guidelines tend to be flexible in nature,

and they allow exceptions and allowances

when a unique situation is going to occur.

For example, let's pretend I have a guideline

that every employee gets one terabyte of storage

on our cloud servers.

That might be fine for most of the people who work here.

Now, our salespeople, and our accountants,

and human resources,

all of those folks

would have no problem fitting all of their documents

into that one terabyte of space

because most of what they do is text files.

Those users will have lots of space here.

But my video editor, she might come up and say,

"Hey, I'm running out of space.

I need at least five terabytes of storage."

Well, based on our storage size limitations,

if they're based on a guideline,

I can make an exception to that

and allow her to have five terabytes

instead of one terabyte,

because it meets the needs of her specific job role

because she's dealing with large video files all day long.

That's the idea of a guideline.

It's something that can be changed on the fly

and an exception can be quickly made.

Next, we have procedures.

Now, procedures are detailed step-by-step instructions

that are created

to ensure personnel can perform a given task

or series of actions.

These procedures are where those high-level policies

are transferred all the way down

through those standards and guidelines into actionable steps

that can be followed by a technician.

For example, your service desk probably has a procedure

on how to create a new user account.

This procedure encompasses

all of the security-related policies,

standards and guidelines to allow your frontline employees

to be able to follow the step-by-step actions

necessary to create a new account

and give that account the proper permissions,

the correct password strength,

and all of those types of things.

For the exam, I want you to remember

all the different types of policies we have

inside of our governance as we work our way down

from the more generic to the more specific.

This includes our policies, our standards, our baselines,

our guidelines, and our procedures.

Now, in this section of the course,

we're going to focus on Domain 3: Network Operations,

specifically in Objective 3.2.

Objective 3.2 states

that you must be able to explain the purpose

of organizational documents and policies.

So let's get started talking

all about the different policies and plans and procedures,

hardening and security policies and common agreements

that you're going to find inside your enterprise networks.

(upbeat music)

Plans and procedures.

In this video, we're going to discuss

the various plans and procedures

that are used in the management of your enterprise networks.

This includes change management, incident response plans,

disaster recovery plans, business continuity plans,

system life cycle,

and standard operating procedures.

First, let's discuss change management.

Change management is a structured way

of changing the state of a computer system,

network, or IT procedure.

Change management is used to make changes to the secure

and known good baseline that exists in our network devices.

A good change management policy

is going to be designed to make sure that all the risks

are considered prior to implementing a change

to your systems or networks.

This ensures that our services remain stable,

reliable, and predictable,

even in the face of rapidly changing business requirements.

Essentially change management is a coordinated system

to account for any upgrades,

installations or network outages and repairs.

For example, let's assume that you need to upgrade a router

or switch in your network,

but you don't want to cause a bunch of unnecessary downtime.

Well, with change management,

we can ensure that all of our actions are pre coordinated

and approved by the relevant stakeholders

prior to us implementing a firmware upgrade.

After all, if I simply ran a firmware upgrade

in the middle of the workday,

I could cause a lot of unnecessary downtime for my end users

because they're relying on those devices

for their network connectivity.

This is because during a firmware upgrade,

that router switch is going to be taken offline

and it won't provide services to our end users

until the firmware has been properly flashed,

and then the configurations are reloaded.

Therefore we need to instead coordinate the firmware upgrade

for the right time so that it would be the least impactful

against our business operations.

For example, at most of my organizations,

we use the period between midnight and 4:00 am

to do our upgrades because

relatively few people are online

and working during those hours.

As you move through your change management process,

you're going to need to ensure

that the upgrade is being planned, approved as a change,

the relevant documentation diagrams are being updated

and our network documentation remains current

after we finish doing the change.

Next, we have incident response plans.

An incident response plan contains a set of instructions

to help our network and system administrators

detect, respond to, and recover

from network security incidents.

These types of plans

are going to address issues like cyber crime, data loss,

and service outages that could threaten our daily work.

Basically what we're doing here

is decide what we're going to do

if there's a security violation

and what are our response actions going to be?

Are we going to take the device off the network and wipe it

and then put it back on?

Are you going to handle it in-house?

Or are you going to fire an employee over it?

Are you going to call the police?

What is your plan going to be?

How are you going to respond?

Now, I don't have these answers for you

because all this is going to depend

on your organization's incident response plan

that you need to create.

When it comes to an incident response plan,

you need to cover six main steps or phases.

First; preparation,

second; identification,

third; containment,

fourth; eradication,

fifth; recovery,

and sixth; lessons learned.

Also, if you're intending to prosecute a computer crime

in conjunction with your incident response,

that's extremely important

that you maintain the chain of custody

over all the data and all the information being collected.

Next, we have disaster recovery plans.

A disaster recovery plan

is a documented structured approach

that documents how an organization

can quickly resume their work after an unplanned incident.

Now, these unplanned incidents

can be things like natural disasters,

power outages, cyber attacks, or other disruptive events.

Now a disaster recovery plan

will outline your processes and procedures

for shifting your operations

from your main headquarter facilities

to your disaster recovery sites,

such as a hot site, a warm site, a cold site,

or a cloud site.

Now remember a disaster recovery plan

is focused on business interruptions

that are caused by a disaster,

but these aren't going to include things

like everyday operational challenges.

For those types of challenges,

we instead need to look at a different type of plan

known as a business continuity plan or BCP.

Now a business continuity plan

is a document that outlines how a business

is going to continue operating

during an unplanned disruption in service.

Now, a business continuity plan is more comprehensive

than a disaster recovery plan,

and it contains contingencies

for lots of different business processes,

your assets, your human capital and business partners,

and essentially every other thing

and aspect that may be affected in your business.

Now, when you're dealing with a disaster recovery plan,

we're focused mainly on your technology and your facilities,

but a business continuity plan is much more in-depth

as it looks at how you're going to continue

all of your business operations.

In general, a disaster recovery plan or DRP

is going to be referenced

as part of your business continuity plan or BCP,

and the two will work very closely together

when you have a real disaster,

like a hurricane, a fire, or a flood that occurs.

Next, we need to consider the system life cycle plans.

System life cycle plans

also known as the life cycle planning

is going to describe the approach that you're going to use

to maintaining an asset

from its creation to its disposal.

Now, in the information technology world,

we normally have a five phase life cycle

that's used for all of our systems and networks.

This includes planning, design,

transition, operations, and retirement.

Phase one is planning.

Planning involves the planning and requirement analysis

for a given system,

including outlining the architecture

and identifying the possible risks.

Phase two is design.

Design is going to involve the outlining

of the new system or network,

including what interconnections there's going to be,

what technologies will be used,

and how it should be implemented.

This can even include some building of the new system

or even a prototype to validate the architecture

that we want to use.

Phase three is transition.

Transition involves the actual implementation,

which could involve coding some new software,

installing the systems,

or cabling up the networks and their configurations.

All of this is going to be a part of taking this asset

and moving it from a prototype or an initial build

into something that's ready for full production and use,

that's why we call it transition.

We're transitioning it into production and use.

Phase four is operations.

Operations is where the system or network

is now going to be used on a daily basis to do productive work.

In general, about 70% of a system's lifecycle

is going to be spent during operations.

Now, operations includes

things like the daily running of the asset,

as well as updating it, patching it,

fixing any issues that may occur and things like that.

This is often referred to as operations and support

because we're going to conduct our break fix actions

during this portion of the asset's life cycle.

Our fifth phase is retirement.

Retirement is the end of the life cycle

and it occurs when the system or network

no longer has any useful life remaining in it.

At this point,

a single device or your entire system or network

could be retired and the assets will be disposed of

as part of this retirement.

For example, if you had a network switch

that's been used for the last five years,

it's probably reaching the end of its useful lifespan.

So it needs to be replaced with a newer model,

and then we're going to retire that old switch.

Before we throw it away though,

it's important for us to think about that device

and how we're going to sanitize it

or clear it of any configurations or sensitive information

using our proper asset disposal procedures too.

Next, we have standard operating procedures.

Everything we spoke about so far

has been at a higher and more generic level,

but a standard operating procedure or SOP

is a set of step-by-step instructions

that are compiled by an organization

to help its employees carry out their routine operations.

Standard operating procedures aim to achieve efficiency,

quality output, and a uniformity of performance

while they reduce misconfigurations

and a failure to comply with regulations.

For example, our disaster recovery plan

might say that within 48 hours

of a named hurricane reaching our city,

we need to ensure that all of our diesel generators

have been refueled.

Now, this is a single one-line statement

from a disaster recovery plan or DRP,

but that statement doesn't tell you how to actually do it.

Instead, you'd pull out the standard operating procedure

named fueling the generators,

and this would tell you how to perform the operation.

So if I was told to refuel the generators,

I could pull out this SOP and follow it step-by-step,

step one; call the fuel company and schedule a delivery,

step two; turn off the generators

and open the storage tanks,

step three; put the diesel into the storage tanks.

You get the idea here, right?

Now, there might be 5 or 10 or 20 steps to this procedures

as part of this SOP,

but in a disaster recovery plan,

it's just one line that says,

you need to do this thing known as refueling the generators.

So remember when it comes to managing your networks,

there are lots of different plans and procedures

that you may come across.

We just covered a few in this lesson

that you may get asked about on the exam,

but in the real world,

there are many others too.

For the exam, remember,

we have change management, incident response plans,

disaster recovery plans, business continuity plans,

system life cycles,

and standard operating procedures,

to help us manage our networks.

Hardening and security policies.

In this video, we're going to talk about

the various hardening and security policies

that are used in securing your enterprise networks.

This includes password policies, acceptable use policies,

bring your own device policies, remote access policies,

onboarding and off-boarding policies, security policies,

and data loss prevention policies.

First, we have password policies.

Now a password policy is a set of rules created

to improve computer security by motivating users

to create dependable, secure passwords,

and then store and utilize them properly.

This document will promote strong passwords

by specifying a minimum password length,

a complexity requirement requiring periodic password changes

and placing limits on the reuse of passwords.

Once you create your password policy,

it's important to educate your end users on the requirements

that are set forth in this policy.

Also, you want to create guidelines and standards

within your organization based on your password policy

and use those to implement the technical controls

that will enforce the requirements set forth

in your password policy.

Next, we have acceptable use policies.

An acceptable use policy or AUP

is a set of rules applied by the owner, creator

or administrator of a network website or service

that restricts the ways in which the network website

or system may be used and sets guidelines

as to how it should be used.

Now, essentially, this is a policy that governs

the use of the company equipment and its internet services

by its employees.

So what kind of things might you find in an AUP?

Well, this is really going to depend on your organization

and its requirements.

At one of the large organizations I used to work for,

they had restrictions that prevented employees

from accessing websites like eBay,

because you shouldn't be buying and selling things

while you're at work.

They also prevented employees from accessing pornography

or gambling websites.

Another organization I worked at restricted,

the use of Facebook while at work,

because they didn't want people spending their time

on social media during the workday.

But like I said,

this is really going to depend on your organization.

In my company, I don't block Facebook

because I want my team members there

because I want them to be in our Facebook group

and interacting with our students

in the Dion training Facebook group.

As you can see, there's really no one size

fits all answer here,

but for the exam, if you start seeing things

that talk about what things an employee can and cannot do,

what they're allowed to do with company equipment

and internet services,

your correct answer should be unacceptable use policy

or AUP.

Next we have bring your own device policies.

Bring your own device or BYOD is going to allow,

or sometimes encourage employees to access enterprise

networks and systems using personal mobile devices,

such as smartphones, tablets, and laptops.

Some organizations are fully embracing a culture

of bringing your own device

while others have rejected it completely

because it does bring up different security risks

that you have to think about.

After all, let's say I'm able to bring my laptop to work

and connect it to your network.

Now, any malware issues I have on my device

are now going to be a part of your network too,

and it can spread.

BYOD also has a lot of challenges with maintaining

a proper configuration baseline too,

because the company doesn't technically own that device

and therefore they can't patch them or upgrade them

automatically using their patch management processes

because the employee owns that device.

Now, on the other hand,

a lot of companies really love BYOD

and this bring your own device policy because it means

they don't have to buy you a laptop or a cell phone

or a tablet because you as an employee are simply going to

bring your own personal device and do your work on it.

This will save the company money in the short term,

but again, there's a lot of security concerns here

you have to worry about.

When the data goes onto that device,

whose data is it?

Is it the company's data or is it the employee's data?

Who has the rights to it?

Where do you draw the line between what personal data

can be on that laptop and what is going to be business data

that has to be properly secured.

These are all things you have to think about, right?

If there's going to be an incident,

can the company take your personal devices as evidence

during the investigation?

Can they require you to reformat and purge

all your information from your smartphone,

including all the pictures of your kids?

That is something you have to think about.

As you can see, there are a lot of questions

that come up when you start using a bring your own device

or BYOD policy.

In general, I recommend against using a BYOB policy

in enterprise networks.

But if you are going to embrace a BYOD policy,

then I suggest you create a segmented network

where your BYOD devices can connect directly to the internet

and then use cloud hosted resources,

instead of going into your local network directly.

Next, we have remote access policies.

Now a remote access policy is a document that outlines

and defines acceptable methods of remotely connecting

to the internal network.

For example, are your employees allowed to be connected

to internal network resources such as your email server

directly over the internet?

Now, in most cases,

you're not going to configure your email server

to allow this to happen because it opens you up

to a whole bunch of vulnerabilities.

Instead, you may choose to enable a web mail server

that sits in a screen sub-net or a DMZ,

and then allow your employees to connect to that,

and it will be used essentially as a jump box

into the exchange server.

Or your remote access policy might decide that you're going to

allow employees to use their corporate laptops,

to connect to the internet over a VPN connection.

This way, they're going to be connecting to your network,

using a trusted device, that corporate laptop using your

standard baseline configuration security protocols,

and they can validate their identity using whatever

authentication and authorization procedures

you have to ensure the security of your network.

This again goes into your remote access policy.

What type of services, whether they're VPNs or other things,

are you going to allow your employees to use?

Again, as you start creating your remote access policy,

it's really going to be based on your risk tolerance

and your operational needs,

and it is going to be dependent on your organization.

Next, we have onboarding and offboarding policies.

Now an onboarding policy is a documented policy

that describes all the requirements

for integrating a new employee into the company

and its cultures, as well as getting

that new hire all the tools and information they need

to be able to do their job successfully.

Now, an offboarding policy is a documented policy

that covers all the steps necessary

to successfully part ways with an employee

following their resignation or termination.

When you do this well, a clear off-boarding process

will ensure a smooth transition for both your company

and the departing employee.

Now a good onboarding and offboarding policy needs to extend

beyond the information technology realm.

But for our purposes, we're focusing really

on the IT side of things.

For example, when somebody is hired,

how is that new employee going to get their account created?

How are they going to be issued a new laptop

or smartphone or tablet?

How are they going to be given access

to different network resources

like the company shared drive?

All of these are things that need to be documented

within the onboarding policy and it's associated procedures.

On the other hand,

when an employee resigns or is terminated,

how are you going to remove them from all their accounts

and accesses?

How long do they have before their accounts can be deleted

once they transfer?

Do you need to archive their data for historical purposes

and record-keeping, or can you delete it all?

Do you need to take back equipment like a laptop

or a smartphone or a tablet?

How are you going to refurbish it so it's ready to be issued

to the next employee who's hired into that position?

All of these are things you need to cover

inside your offboarding policy.

Next, we have security policies.

Now a security policy is a document that outlines

how to protect the organization systems,

networks and data from threats,

including computer security threats,

and how to handle situations when they do occur.

A security policy is going to identify

all of a company's assets as well as the potential threats

to those assets.

Now, in many organizations

there may be a single overarching security policy,

that's going to contain all the other security policies

underneath it.

Things like the AUP, the BYOD,

the password policy, the onboarding policy,

the offboarding policy and many others.

In other organizations, they prefer to break apart

the larger security policy

into smaller individual policies

for use within the organization.

Finally, we have our data loss prevention policy.

Now a data loss prevention policy is a document

that defines how organizations can share and protect data.

It's going to guide how data can be used in decision-making

without it being exposed to anyone

who should not have access to it.

Now, the goal of a data loss prevention policy

is to minimize accidental or malicious data loss.

These policies need to cover the entire network,

not just your file servers or your email servers.

In my organization,

we use a data loss prevention system

based on our organizational DLP policies.

Our DLP system goes through our network

and inspects any data being sent or received.

For example, if our system detects that

a large amount of data is being sent out of our network

to a site like Google drive or Dropbox,

it can create an alert and tell our system administrators

that we need to investigate that.

This way we can look at, what particular employee

was sending, what particular documents

and decide is that legitimate or not.

In some cases, an employee might need to send

a large amount of data, but in others they shouldn't

be sending large data files.

And that may be them trynna steal data from our systems.

For example,

let's say that my DLP system created an alert

because one of my employees was uploading

all the video content from this course

into one of our video servers

or to one of our video distribution partners.

That might be 50, a hundred

or 200 gigabytes of data or more.

I guarantee that our data loss prevention system

is going to flag on that amount of data,

leaving our network from a single user

or a single workstation,

because this is typically an indicator of a compromise

for a data breach or data exfiltration attack.

My DLP will flag this data transfer

and based on our policies,

it may even block this data transfer from occurring.

Now our administrator can review that flagged alert

and look at the content and determine

is this somebody who is stealing from us

or is it someone doing their job

and they have a legitimate reason to do this?

For example, if I have my video editor,

we might see that she just uploaded this brand new course

to one of our distribution partners.

And she did it all in a one day period.

So she had to upload two or 300 gigabytes of data

so we can prepare to publish this course.

That would be fine.

We'd mark the alert as normal and acceptable,

and we'd move on with our day.

But again, this is all going to be dependent

on your data loss prevention policies.

And what's going to trigger inside your company.

In your company, if you had a single person

sending 50 or a hundred gigabytes of data,

that would probably be extremely suspicious in most cases

and needs to be investigated further.

As part of your DLP policy, it's always important

to set proper thresholds.

When is your DLP going to alarm?

What is the amount of data transfer or the file types

that it's going to consider acceptable or out of baseline?

What file formats are you going to be able to transfer?

And which ones are going to be blocked?

Are you going to allow people to transfer database files

or zip files or PowerPoint files?

All of these are things that DLP can block

or alert on depending on how you configure it.

So as you look at all these different things,

you need to define that in your data loss prevention policy.

Now, remember when it comes to securing your networks,

there are lots of different hardening techniques

and security policies that you may come across.

We cover just a few in this lesson

that you may get asked about on the exam,

but in the real world there are tons

of other ones out there.

For the exam, I want you to remember

that we have things like password policies,

acceptable use policies,

bring your own device policies,

remote access policies,

onboarding and offboarding policies,

security policies,

and data loss prevention policies,

and what each one is used for.

Common Agreements.

In this video, we're going to discuss

common types of agreements that are used

in our enterprise networks.

Some common agreements are things

like non-disclosure agreements or NDAs,

a memorandum of understanding or MOU

and a service-level agreement, an SLA.

First we have non-disclosure agreements or NDAs.

Now, a non-disclosure agreement

is a document agreement between two parties

that define what data is considered confidential

and cannot be shared outside of that relationship.

Now, NDAs are often used by organizations

to protect their intellectual property,

and they're either going to be between two different

organizations or between an organization and its employee.

Now, why would an organization require their employee

to sign an NDA?

Well, it's because those NDAs can be a form

of non-competitive clauses inside

of an employment agreement,

or the company might fear that that employee

might take the information

they're learning from the organization

and go off and start their own business

or disclose it to their competitors.

Now, if two organizations are working jointly

on a project system or network,

they can also utilize a non-disclosure agreement.

This allows the companies to share the type of data

they need to in order to develop this product

without fear that the other company is going to steal

their trade secrets.

Keep in mind though, a non-disclosure agreement

is an administrative control not a technical control.

There is nothing in the system that is going to prevent

one of these people from sending data to the others,

if all you have is an NDA,

they only have the word and signature on that piece of paper

that promises not to do it.

Now, if you want to get some technical controls involved

with an NDA, you can do that using a DLP

or data loss prevention system,

but the DLP is the technical control

not the NDA in that case.

An NDA is considered a legally binding agreement

and it carries penalties for breaking the NDA,

including fines, forfeiture of intellectual property rights,

or even jail time in some extreme circumstances.

Next, we need to discuss an MOU

or memorandum of understanding.

A memorandum of understanding is a non-binding agreement

between two or more organizations

to detail what common actions they intend to take.

Essentially, this is a formal version

of a gentleman's agreement,

because it's actually written down and signed

by both parties and it isn't really legally enforceable.

Essentially, this is like a handshake deal,

but slightly more formalized because we wrote it down

and we both signed it.

For example, if you and I both agree

that we were going to go into business together

on a joint project, we could create an MOU

that outlines what things each of us

is going to be responsible for doing.

So, you might say that you're going to do A, B and C

and I'm going to handle X, Y and Z.

We would write that down inside of an MOU,

we could sign it and then at anytime we can look back

on that document, if we have a disagreement in the future

and say, "But Hey, you said you were going to handle item B,

"and I said, I was going to handle item Y."

But if I didn't do item Y, you can't sue me

just because I didn't finish it,

because this agreement is non-binding.

Now, a memorandum of understanding

is often referred to as a letter of intent.

Because again, it's an intent to do something

it's not a requirement to do it.

It's often going to be used within an organization

by two or more smaller internal divisions

because of this non-binding legal status.

So, for example, I used to be the director

of an IT department for a really large organization.

And I was responsible for managing the service desk

as part of my responsibilities.

Now, my service desk provided assistance

to several thousand employees across multiple countries.

There was one critical business unit that wanted to have

at least one tier two service desk agent located

in their specific building at all times

because their building was a little bit further away

than our headquarters was.

Now, this way, if something went offline in the network

that tier two agent didn't have to get in their car

and drive from the headquarters to this branch office,

which was about an hour away,

and that way they could immediately start

the restore process because they're already sitting

in the building.

Now, I thought this was a pretty good idea.

So, we agreed to it and we wrote up an MOU.

The leader of that part of the organization and I

both wrote down what we were going to do.

I said, "I'm going to provide one full-time

"tier two service desk agent and I'm going to have them do

"all their daily functions out of your building."

In return, they said they would provide

my tier two agent with a small office

and a dedicated parking spot.

We both wrote all this up,

we put it in the MOU and we signed it.

This way we were able to minimize the time

to repair for lots of critical issues

that happen at this business unit,

because the guy was already sitting in that building

as a tier two agent.

Now, this wasn't a binding agreement on either of our parts.

At any time I could have said,

"You know what, I think I need Tom to come back

"to the main office and I can't have him sit

"in your office five days a week anymore."

Or "Maybe I need to have Tom work out of the headquarters

"for Mondays and Tuesdays but on Wednesday,

Thursday and Friday he can work in your unit."

Now, the other business unit leader couldn't really complain

because he had no way of forcing me to keep Tom

in that building for all 40 hours every single week,

because we had this MOU, which is non-binding.

Now, this MOU does give us some formality to our agreement

that we had made between the two directors.

This was the director of operations

and myself as the IT director.

But at any time we could modify it or break it

without any serious consequences.

As I said, MOUs are usually used internally

between two business units as in my previous example,

but they can also be used externally

between your organization and one or more

other organizations.

There are some consortiums out there

that have multi-party MOUs with five or six

or seven organizations that all come together

to do a common thing or a common goal.

But remember it is not legally binding

when you're dealing with MOUs.

So at any time these partner organizations

could simply leave and there'll be no consequences.

Next, we have a service-level agreement or SLA.

Now, a service-level agreement is a document commitment

between a service provider and a client

where the quality, availability and responsibilities

are agreed upon by both parties.

Service-level agreements are primarily concerned

with the ability to support and respond to problems

within a given timeframe while providing

the agreed upon level of service to your end users.

If you work in the IT service management realm already,

you are probably already familiar with SLAs.

SLAs are going to be used to provide a written agreement

for not only the security priorities

but also more importantly, your operational priorities.

It also is going to outline the responsibilities, guarantees

and warranties for a given service and its components.

For example, in one of my previous organizations,

we didn't want to keep a bunch of extra switches and routers

in our supply closet in case one of them broke.

This would be really expensive

to have all this extra gear just sitting there.

So, we opted to have a service-level agreement

in place with our supplier.

And that agreement said, "If a router or switch failed

"and we couldn't get back online within 10 minutes,

"they would bring us a new device

"within four hours of the outage."

Now, these service-level agreements can really help bring

some predictability to an otherwise hard to predict area,

like when will a device fail?

SLAs can be really good in this case,

but only if your service provider is going to live up

to their end of the agreement.

Now, another place you're often going to see SLAs

is in regard to your internet connections,

or when dealing with internet service providers

or cloud service providers.

For example, my internet service provider

has a service-level agreement with us

that says they're going to maintain an uptime of 99.999%,

which equates to having no more than five minutes

of downtime per year.

Now, because it's a service-level agreement,

if they don't meet that uptime requirement,

what's going to happen?

Well, that depends on your agreement

and your underlying contracts.

In our contract, we actually get a refund

for the entire monthly service fee

if they can't maintain the uptime they promised in the SLA.

This is their penalty for not meeting the SLA

and it works essentially like a fine

that they pay back to us.

Some contracts have these and some contracts don't,

it just depends on how you negotiate your deal.

So, remember when it comes to agreements used

in our a network management we have three main types.

We have non-disclosure agreements,

memorandums of understanding and service-level agreements.

robot