Skip to content
Duke University
Information Security

Action navigation

Utility navigation

Duke University
Information Security

Primary navigation

Loading...

Protected Network

  1. Policies, Procedures, and Standards
  2. Protected Network

OIT has a specialized secure network, or “protected network,” which hosts virtual machines (VMs) and network storage that contain protected data. This data cannot be accessible to the general public and may either be sensitive or restricted. Sign in with your NetID and password to view the protected network diagram. 

Applicable Policies, Procedures, and Standards:

  • OIT Protected Network Service
  • Protected Network: Acceptable Use Policy
  • Protected Network: Account, Data and Incident Policies
    • Protected Network: Disaster Recovery Test Procedure
    • Protected Network: Logical Access Control Process
    • Protected Network: Establishing and Terminating Access Procedure
    • Protected Network: Malicious Software Protection (End User Devices)
  • Protected Network: Infrastructure Policies
    • Protected Network: Backups and Encryption
    • Protected Network: Disposing of Equipment and Re-using Media
    • Protected Network: Malicious Software Protection Procedure for Servers
    • Enterprise Data Center: Contingency Operations
    • Enterprise Data Center: Facility Access Control
    • Enterprise Data Center: Facility Security
    • Enterprise Data Center: Maintenance Records
    • Protected Network: Managing Assets
    • Protected Network: Server Security Checklist

Information Security

security@duke.edu

This page is maintained in partnership by the Duke University IT Security Office and Duke Health Information Security Office

Footer navigation

Get HelpAbout the Duke Security Offices

Duke University
Copyright © 2023 Duke University
AccessibilityPrivacy Statement