Network traffic management policy
- Policy owner: Pedro Piñera Buendía
- Policy owner: Effective Date: December 12, 2024
Purpose
To establish rules and procedures for monitoring, managing, and securing network traffic to protect Tuist GmbH’s infrastructure.
Scope
This policy applies to all network traffic within Tuist GmbH’s infrastructure.
Policy
Traffic Monitoring:
- Network traffic must be monitored using tools such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).
- Anomalous traffic must be flagged and investigated promptly.
Traffic Prioritization:
- Business-critical traffic must be prioritized to ensure smooth operations.
- Non-essential traffic may be restricted during high-demand periods.
Threat Mitigation:
- Tools and protocols must be in place to detect and block malicious traffic.
- Security patches and updates must be applied to all network devices regularly.
Compliance
Any breach of this policy may result in access restrictions or termination of network privileges.
Review
This policy will be reviewed annually or as required.
Version history
The version history of this document can be found in Tuist's handbook repository.