Internet Resource Access Policy | TechRepublic
Briefly

Company devices like web servers, routers, and FTP servers need strict access guidelines due to vulnerabilities and criticality for business operations.
Rules include enabling access only for business purposes, physically securing resources in data centers, utilizing firewalls in DMZ subnets, and segregating critical systems based on subnets and firewall rules.
Access to devices should be limited based on users, permissions, roles, and ports, and administrator/root account information should be stored securely in a centralized password management system.
Read at TechRepublic
[
|
]