This document provides information security guidelines for network infrastructure at an organization. It outlines requirements for securely designing, implementing, and managing the network. This includes maintaining accurate network diagrams, securing communication circuits, disabling unused modems, controlling router access and configuration, implementing strong password policies, logging activities, and regularly reviewing guidelines. The goal is to help IT teams securely operate the network while delivering projects by articulating security best practices for all network devices.