WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.
|
|
|
- Julianna Cook
- 9 years ago
- Views:
Transcription
1 WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016
2 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY 11 POLICY OVERVIEW 11 VIOLATIONS 11 ECEPTIONS 11 UPDATES 11 KEY TERMINOLOGY 12 INFORMATION SECURITY PROGRAM STRUCTURE 14 POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE 14 INFORMATION SECURITY CONTROL OBJECTIVES 14 CONTROL OBJECTIVE PRECEDENCE 16 SCOPING & ENHANCEMENTS 16 INFORMATION SECURITY PROGRAM ACTIVITIES 17 INFORMATION SECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS 17 COMMON CONTROLS 18 PROGRAM MANAGEMENT (PM) 18 PM 01: INFORMATION SECURITY PROGRAM PLAN 18 PM 02: ASSIGNED INFORMATION SECURITY RESPONSIBILITIES 19 PM 03: INFORMATION SECURITY RESOURCES 19 PM 04: VULNERABILITY REMEDIATION PROCESS 19 PM 05: INFORMATION SYSTEM INVENTORY 20 PM 06: INFORMATION SECURITY MEASURES OF PERFORMANCE 20 PM 07: ENTERPRISE ARCHITECTURE 20 PM 08: REGULATORY & NON REGULATORY COMPLIANCE 21 PM 09: RISK MANAGEMENT STRATEGY 21 PM 10: SECURITY AUTHORIZATION PROCESS 22 PM 11: BUSINESS PROCESS DEFINITION 22 PM 12: INSIDER THREAT PROGRAM 23 PM 13: INFORMATION SECURITY WORKFORCE 23 PM 14: TESTING, TRAINING & MONITORING 24 PM 15: CONTACTS WITH SECURITY GROUPS & ASSOCIATIONS 24 PM 16: THREAT AWARENESS PROGRAM 24 MANAGEMENT CONTROLS 26 CERTIFICATION, ACCREDITATION & SECURITY ASSESSMENTS (CA) 26 CA 01: SECURITY ASSESSMENT POLICY & PROCEDURES 26 CA 02: SECURITY ASSESSMENTS 26 CA 03: INFORMATION SYSTEM CONNECTIONS 27 CA 04: SECURITY VERIFICATION 28 CA 05: PLAN OF ACTION & MILESTONES (POA&M) 29 CA 06: SECURITY AUTHORIZATION 29 CA 07: CONTROL MONITORING 30 CA 08: PENETRATION TESTING 30 CA 09: INTERNAL SYSTEM CONNECTIONS 31 PLANNING (PL) 32 PL 01: SECURITY PLANNING POLICY & PROCEDURES 32 PL 02: SYSTEM SECURITY PLAN (SSP) 32 PL 03: SYSTEM SECURITY PLAN UPDATE 33 PL 04: RULES OF BEHAVIOR BlackHat Consultants, LLC. All Rights Reserved. Page 2 of 233
3 PL 05: PRIVACY IMPACT ASSESSMENT (PIA) 34 PL 06: SECURITY RELATED ACTIVITY PLANNING 35 PL 07: SECURITY CONCEPT OF OPERATIONS 35 PL 08: SECURITY ARCHITECTURE 36 PL 09: CENTRAL MANAGEMENT 36 RISK ASSESSMENT (RA) 37 RA 01: RISK ASSESSMENT POLICY & PROCEDURES 37 RA 02: SECURITY CATEGORIZATION 37 RA 03: RISK ASSESSMENT 38 RA 04: RISK ASSESSMENT UPDATE 39 RA 05: VULNERABILITY SCANNING 39 RA 06: TECHNICAL SURVEILLANCE COUNTERMEASURES SECURITY 40 SYSTEM & SERVICE ACQUISITION (SA) 41 SA 01: SYSTEM & SERVICES ACQUISITION POLICY & PROCEDURES 41 SA 02: ALLOCATION OF RESOURCES 41 SA 03: SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) 42 SA 04: ACQUISITION PROCESS 42 SA 05: INFORMATION SYSTEM DOCUMENTATION 44 SA 06: SOFTWARE USAGE RESTRICTIONS 46 SA 07: USER INSTALLED SOFTWARE 47 SA 08: SECURITY ENGINEERING PRINCIPLES 47 SA 09: ETERNAL INFORMATION SYSTEM SERVICES 47 SA 10: DEVELOPER CONFIGURATION MANAGEMENT 50 SA 11: DEVELOPER SECURITY TESTING 51 SA 12: SUPPLY CHAIN PROTECTION 52 SA 13: TRUSTWORTHINESS 54 SA 14: CRITICALITY ANALYSIS 55 SA 15: DEVELOPMENT PROCESS, STANDARDS & TOOLS 55 SA 16: DEVELOPER PROVIDED TRAINING 56 SA 17: DEVELOPER SECURITY ARCHITECTURE & DESIGN 56 SA 18: TAMPER RESISTANCE & DETECTION 57 SA 19: COMPONENT AUTHENTICITY 58 SA 20: CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS 58 SA 21: DEVELOPER SCREENING 59 SA 22: UNSUPPORTED SYSTEM COMPONENTS 59 OPERATIONAL CONTROLS 61 AWARENESS & TRAINING (AT) 61 AT 01: SECURITY AWARENESS & TRAINING POLICY & PROCEDURES 61 AT 02: SECURITY AWARENESS 62 AT 03: SECURITY TRAINING 62 AT 04: SECURITY TRAINING RECORDS 64 AT 05: SECURITY INDUSTRY ALERTS & NOTIFICATION PROCESS 64 CONFIGURATION MANAGEMENT (CM) 65 CM 01: CONFIGURATION MANAGEMENT POLICY & PROCEDURES 65 CM 02: BASELINE CONFIGURATIONS 66 CM 03: CONFIGURATION CHANGE CONTROL 67 CM 04: SECURITY IMPACT ANALYSIS 69 CM 05: ACCESS RESTRICTION FOR CHANGE 69 CM 06: CONFIGURATION SETTINGS 71 CM 07: LEAST FUNCTIONALITY 71 CM 08: INFORMATION SYSTEM COMPONENT INVENTORY 73 CM 09: CONFIGURATION MANAGEMENT PLAN 74 CM 10: SOFTWARE USAGE RESTRICTIONS 74 CM 11: USER INSTALLED SOFTWARE 75 CONTINGENCY PLANNING (CP) 76 CP 01: CONTINGENCY PLANNING POLICY & PROCEDURES BlackHat Consultants, LLC. All Rights Reserved. Page 3 of 233
4 CP 02: CONTINGENCY PLAN 77 CP 03: CONTINGENCY TRAINING 77 CP 04: CONTINGENCY TESTING & EERCISES 78 CP 05: CONTINGENCY PLAN UPDATE 78 CP 06: ALTERNATE STORAGE SITE 78 CP 07: ALTERNATE PROCESSING SITE 79 CP 08: TELECOMMUNICATIONS SERVICES 79 CP 09: INFORMATION SYSTEM BACKUP 80 CP 10: INFORMATION SYSTEM RECOVERY & RECONSTITUTION 82 CP 11: ALTERNATE COMMUNICATIONS PROTOCOLS 83 CP 12: SAFE MODE 84 CP 13: ALTERNATIVE SECURITY MEASURES 84 INCIDENT RESPONSE (IR) 85 IR 01: INCIDENCE RESPONSE POLICY & PROCEDURES 85 IR 02: INCIDENT RESPONSE TRAINING 85 IR 03: INCIDENT RESPONSE TESTING & EERCISES 86 IR 04: INCIDENT HANDLING 86 IR 05: INCIDENT MONITORING 87 IR 06: INCIDENT REPORTING 88 IR 07: INCIDENT REPORTING ASSISTANCE 88 IR 08: INCIDENT RESPONSE PLAN (IRP) 89 IR 09: INFORMATION SPILLAGE RESPONSE 90 IR 10: INTEGRATED INFORMATION SECURITY ANALYSIS TEAM 90 MAINTENANCE (MA) 90 MA 01: MAINTENANCE POLICY & PROCEDURES 91 MA 02: CONTROLLED MAINTENANCE 91 MA 03: MAINTENANCE TOOLS 92 MA 04: NON LOCAL MAINTENANCE 92 MA 05: MAINTENANCE PERSONNEL 94 MA 06: TIMELY MAINTENANCE 95 MEDIA PROTECTION (MP) 95 MP 01: MEDIA PROTECTION POLICY & PROCEDURES 95 MP 02: MEDIA ACCESS 96 MP 03: MEDIA MARKING 96 MP 04: MEDIA STORAGE 97 MP 05: MEDIA TRANSPORTATION 98 MP 06: MEDIA SANITIZATION 99 MP 07: MEDIA USE 100 MP 08: MEDIA DOWNGRADING 101 PERSONNEL SECURITY (PS) 101 PS 01: PERSONNEL SECURITY POLICY & PROCEDURES 101 PS 02: POSITION CATEGORIZATION 102 PS 03: PERSONNEL SCREENING 103 PS 04: PERSONNEL TERMINATION 103 PS 05: PERSONNEL TRANSFER 105 PS 06: ACCESS AGREEMENTS 105 PS 07: THIRD PARTY PERSONNEL SECURITY 105 PS 08: PERSONNEL SANCTIONS 106 PHYSICAL & ENVIRONMENTAL PROTECTION (PE) 107 PE 01: PHYSICAL & ENVIRONMENTAL PROTECTION POLICY & PROCEDURES 107 PE 02: PHYSICAL ACCESS AUTHORIZATIONS 107 PE 03: PHYSICAL ACCESS CONTROL 109 PE 04: ACCESS CONTROL FOR TRANSMISSION MEDIUM 111 PE 05: ACCESS CONTROL FOR OUTPUT DEVICES 111 PE 06: MONITORING PHYSICAL ACCESS 112 PE 07: VISITOR CONTROL BlackHat Consultants, LLC. All Rights Reserved. Page 4 of 233
5 PE 08: ACCESS RECORDS 113 PE 09: POWER EQUIPMENT & POWER CABLING 113 PE 10: EMERGENCY SHUTOFF 113 PE 11: EMERGENCY POWER 114 PE 12: EMERGENCY LIGHTING 114 PE 13: FIRE PROTECTION 115 PE 14: TEMPERATURE & HUMIDITY CONTROLS 115 PE 15: WATER DAMAGE PROTECTION 116 PE 16: DELIVERY & REMOVAL 116 PE 17: ALTERNATE WORK SITE 116 PE 18: LOCATION OF INFORMATION SYSTEM COMPONENTS 117 PE 19: INFORMATION LEAKAGE 117 PE 20: ASSET MONITORING & TRACKING 118 SYSTEM & INFORMATION INTEGRITY (SI) 118 SI 01: SYSTEM & INFORMATION INTEGRITY POLICY & PROCEDURES 118 SI 02: FLAW REMEDIATION (SOFTWARE PATCHING) 119 SI 03: MALICIOUS CODE PROTECTION (MALWARE) 120 SI 04: INFORMATION SYSTEM MONITORING 122 SI 05: SECURITY ALERTS, ADVISORIES & DIRECTIVES 124 SI 06: SECURITY FUNCTIONALITY VERIFICATION 124 SI 07: SOFTWARE, FIRMWARE & INFORMATION INTEGRITY 124 SI 08: SPAM PROTECTION 125 SI 09: INFORMATION INPUT RESTRICTIONS 125 SI 10: INPUT DATA VALIDATION 125 SI 11: ERROR HANDLING 126 SI 12: INFORMATION OUTPUT HANDLING & RETENTION 126 SI 13: PREDICTABLE FAILURE ANALYSIS 128 SI 14: NON PERSISTENCE 129 SI 15: INFORMATION OUTPUT FILTERING 129 SI 16: MEMORY PROTECTION 129 SI 17: FAIL SAFE PROCEDURES 130 TECHNICAL CONTROLS 131 ACCESS CONTROL (AC) 131 AC 01: ACCESS CONTROL POLICY & PROCEDURES 131 AC 02: ACCOUNT MANAGEMENT 131 AC 03: ACCESS ENFORCEMENT 132 AC 04: INFORMATION FLOW ENFORCEMENT ACCESS CONTROL LISTS (ACLS) 133 AC 05: SEPARATION OF DUTIES 135 AC 06: LEAST PRIVILEGE 135 AC 07: UNSUCCESSFUL LOGIN ATTEMPTS 136 AC 08: SYSTEM USE NOTIFICATION (LOGON BANNER) 136 AC 09: PREVIOUS LOGON NOTIFICATION 138 AC 10: CONCURRENT SESSION CONTROL 138 AC 11: SCREEN LOCK 138 AC 12: SESSION TERMINATION 139 AC 13: SUPERVISION & REVIEW 139 AC 14: PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHORIZATION 139 AC 15: AUTOMATED MARKING 140 AC 16: SECURITY ATTRIBUTES 140 AC 17: REMOTE ACCESS 140 AC 18: WIRELESS ACCESS 142 AC 19: ACCESS CONTROL FOR MOBILE DEVICES 144 AC 20: INTRANETS 147 AC 21: USER BASED COLLABORATION & INFORMATION SHARING 147 AC 22: PUBLICLY ACCESSIBLE CONTENT 147 AC 23: DATA MINING PROTECTION BlackHat Consultants, LLC. All Rights Reserved. Page 5 of 233
6 AC 24: ACCESS CONTROL DECISIONS 148 AC 25: REFERENCE MONITOR 149 AUDIT & ACCOUNTABILITY (AU) 149 AU 01: AUDIT & ACCOUNTABILITY POLICY & PROCEDURES 149 AU 02: AUDITABLE EVENTS 150 AU 03: CONTENT OF AUDIT RECORDS 150 AU 04: AUDIT STORAGE CAPACITY 151 AU 05: RESPONSE TO AUDIT PROCESSING FAILURES 152 AU 06: AUDIT REVIEW, ANALYSIS & REPORTING 152 AU 07: AUDIT REDUCTION & REPORT GENERATION 153 AU 08: TIME STAMPS 154 AU 09: PROTECTION OF AUDIT INFORMATION 154 AU 10: NON REPUDIATION 155 AU 11: AUDIT RECORD RETENTION 155 AU 12: AUDIT GENERATION 156 AU 13: MONITORING FOR INFORMATION DISCLOSURE 156 AU 14: SESSION AUDIT 156 AU 15: ALTERNATE AUDIT CAPABILITY 157 AU 16: CROSS ORGANIZATIONAL AUDITING 157 IDENTIFICATION & AUTHENTICATION (IA) 158 IA 01: IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES 158 IA 02: USER IDENTIFICATION & AUTHENTICATION (ORGANIZATIONAL USERS) 158 IA 03: DEVICE TO DEVICE IDENTIFICATION & AUTHENTICATION 159 IA 04: IDENTIFIER MANAGEMENT (USER NAMES) 159 IA 05: AUTHENTICATOR MANAGEMENT (PASSWORDS) 160 IA 06: AUTHENTICATOR FEEDBACK 162 IA 07: CRYPTOGRAPHIC MODULE AUTHENTICATION 163 IA 08: IDENTIFICATION & AUTHENTICATION (NON ORGANIZATIONAL USERS) 163 IA 09: SERVICE PROVIDER IDENTIFICATION & AUTHENTICATION (VENDORS) 163 IA 10: ADAPTIVE IDENTIFICATION & AUTHENTICATION 164 IA 11: RE AUTHENTICATION 164 SYSTEM & COMMUNICATION PROTECTION (SC) 165 SC 01: SYSTEM & COMMUNICATION POLICY & PROCEDURES 165 SC 02: APPLICATION PARTITIONING 165 SC 03: SECURITY FUNCTION ISOLATION 166 SC 04: INFORMATION IN SHARED RESOURCES 167 SC 05: DENIAL OF SERVICE (DOS) PROTECTION 167 SC 06: RESOURCE PRIORITY 167 SC 07: BOUNDARY PROTECTION 168 SC 08: TRANSMISSION INTEGRITY 170 SC 09: TRANSMISSION CONFIDENTIALITY 171 SC 10: NETWORK DISCONNECT 171 SC 11: TRUSTED PATH 171 SC 12: CRYPTOGRAPHIC KEY ESTABLISHMENT & MANAGEMENT 172 SC 13: USE OF CRYPTOGRAPHY 173 SC 14: PUBLIC ACCESS PROTECTIONS 174 SC 15: COLLABORATIVE COMPUTING DEVICES 174 SC 16: TRANSMISSION OF SECURITY ATTRIBUTES 174 SC 17: PUBLIC KEY INFRASTRUCTURE (PKI) CERTIFICATES 175 SC 18: MOBILE CODE 175 SC 19: COMMUNICATIONS TECHNOLOGIES 176 SC 20: SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) 176 SC 21: SECURE NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER) 177 SC 22: ARCHITECTURE & PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE 177 SC 23: SESSION AUTHENTICITY 177 SC 24: FAIL IN KNOWN STATE 178 SC 25: THIN NODES BlackHat Consultants, LLC. All Rights Reserved. Page 6 of 233
7 SC 26: HONEYPOTS 178 SC 27: OPERATING SYSTEM INDEPENDENT APPLICATIONS 179 SC 28: ENCRYPTING DATA AT REST 179 SC 29: HETEROGENEITY 180 SC 30: CONCEALMENT & MISDIRECTION 180 SC 31: COVERT CHANNEL ANALYSIS 181 SC 32: INFORMATION SYSTEM PARTITIONING 181 SC 33: TRANSMISSION PREPARATION INTEGRITY 182 SC 34: NON MODIFIABLE EECUTABLE PROGRAMS 182 SC 35: HONEYCLIENTS 182 SC 36: DISTRIBUTED PROCESSING & STORAGE 182 SC 37: OUT OF BAND CHANNELS 183 SC 38: OPERATIONS SECURITY 183 SC 39: PROCESS ISOLATION 184 SC 40: WIRELESS LINK PROTECTION 184 SC 41: PORT & I/O DEVICE ACCESS 185 SC 42: SENSOR CAPABILITY & DATA 185 SC 43: USAGE RESTRICTIONS 186 SC 44: DETONATION CHAMBERS 186 PRIVACY CONTROLS 187 AUTHORITY & PURPOSE (AP) 187 AP 01: AUTHORITY TO COLLECT 187 AP 02: PURPOSE SPECIFICATION 187 DATA ACCOUNTABILITY, AUDIT & RISK MANAGEMENT (AR) 188 AR 01: GOVERNANCE & PRIVACY PROGRAM 188 AR 02: PRIVACY IMPACT & RISK ASSESSMENT 188 AR 03: PRIVACY REQUIREMENTS FOR CONTRACTORS & SERVICE PROVIDERS 189 AR 04: PRIVACY MONITORING & AUDITING 189 AR 05: PRIVACY AWARENESS & TRAINING 189 AR 06: PRIVACY REPORTING 190 AR 07: PRIVACY ENHANCED SYSTEM DESIGN & DEVELOPMENT 190 AR 08: ACCOUNTING OF DISCLOSURES 190 DATA QUALITY & INTEGRITY (DI) 191 DI 01: DATA QUALITY 191 DI 02: DATA INTEGRITY 191 DATA MINIMIZATION & RETENTION (DM) 191 DM 01: MINIMIZATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) 192 DM 02: DATA RETENTION & DISPOSAL 192 DM 03: MINIMIZATION OF PII USED IN TESTING, TRAINING & RESEARCH 194 INDIVIDUAL PARTICIPATION & REDRESS (IP) 195 IP 01: CONSENT 195 IP 02: INDIVIDUAL ACCESS 195 IP 03: REDRESS 196 IP 04: USER FEEDBACK MANAGEMENT 196 DATA SECURITY (SE) 196 SE 01: INVENTORY OF PERSONALLY IDENTIFIABLE INFORMATION (PII) 197 SE 02: PRIVACY INCIDENT RESPONSE 197 DATA TRANSPARENCY (TR) 198 TR 01: PRIVACY NOTICE 198 TR 02: SAFE HARBOR 198 TR 03: DISSEMINATION OF PRIVACY PROGRAM INFORMATION 200 DATA USE LIMITATION (UL) 200 UL 01: INTERNAL USE 200 UL 02: INFORMATION SHARING WITH THIRD PARTIES 201 APPENDICES BlackHat Consultants, LLC. All Rights Reserved. Page 7 of 233
8 APPENDI A: DATA CLASSIFICATION & HANDLING GUIDELINES 202 A 1: DATA CLASSIFICATION 202 A 2: LABELING 203 A 3: GENERAL ASSUMPTIONS 203 A 4: PERSONALLY IDENTIFIABLE INFORMATION (PII) 203 APPENDI B: DATA CLASSIFICATION EAMPLES 206 APPENDI C: DATA RETENTION PERIODS 207 APPENDI D: BASELINE SECURITY CATEGORIZATION GUIDELINES 209 D 1: SYSTEM CRITICALITY (SC) 209 D 2: DATA SENSITIVITY 210 D 3: ASSURANCE LEVEL (AL) REQUIREMENTS 210 APPENDI E: INFORMATION SECURITY ROLES & RESPONSIBILITIES 211 E 1: INFORMATION SECURITY ROLES 211 E 2: INFORMATION SECURITY RESPONSIBILITIES 211 APPENDI F: INFORMATION SECURITY ECEPTION REQUEST PROCEDURES 214 APPENDI G: TYPES OF SECURITY CONTROLS 215 G 1: PREVENTATIVE CONTROLS 215 G 2: DETECTIVE CONTROLS 215 G 3: CORRECTIVE CONTROLS 215 G 4: RECOVERY CONTROLS 215 G 5: DIRECTIVE CONTROLS 215 G 6: DETERRENT CONTROLS 215 G 7: COMPENSATING CONTROLS 215 APPENDI H: RULES OF BEHAVIOR / USER ACCEPTABLE USE 216 H 1: ACCEPTABLE USE 216 H 2: PROHIBITED USE 216 H 3: ADDITIONAL RULES FOR SECURITY & PRIVILEGED USERS 217 APPENDI I: GUIDELINES FOR PERSONAL USE OF IT RESOURCES 218 APPENDI J: RISK MANAGEMENT FRAMEWORK (RMF) 219 J 1: RISK MANAGEMENT OVERVIEW 219 J 2: RISK MANAGEMENT FRAMEWORK (RMF) 219 J 3: ASSESSING RISK 221 APPENDI K: SYSTEM HARDENING 222 K 1: SERVER CLASS SYSTEMS 222 K 2: WORKSTATION CLASS SYSTEMS 222 K 3: NETWORK DEVICES 222 K 4: MOBILE DEVICES 222 K 5: DATABASES 223 APPENDI L: INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) 224 L 1: INFORMATION SECURITY PROGRAM PLAN 224 L 2: INFORMATION SECURITY PROGRAM DO 224 L 3: INFORMATION SECURITY PROGRAM CHECK 224 L 4: INFORMATION SECURITY PROGRAM ACT 224 ANNE 1 INFORMATION SECURITY POLICIES SUMMARY 225 POLICY STATEMENT 1: INFORMATION SECURITY PROGRAM MANAGEMENT 225 POLICY STATEMENT 2: CERTIFICATION, ACCREDITATION & SECURITY ASSESSMENT 225 POLICY STATEMENT 3: PLANNING 225 POLICY STATEMENT 4: RISK ASSESSMENT 225 POLICY STATEMENT 5: SYSTEM & SERVICES ACQUISITION 226 POLICY STATEMENT 6: AWARENESS & TRAINING 226 POLICY STATEMENT 7: CONFIGURATION MANAGEMENT 226 POLICY STATEMENT 8: CONTINGENCY PLANNING 226 POLICY STATEMENT 9: INCIDENT RESPONSE BlackHat Consultants, LLC. All Rights Reserved. Page 8 of 233
9 POLICY STATEMENT 10: MAINTENANCE 227 POLICY STATEMENT 11: MEDIA PROTECTION 227 POLICY STATEMENT 12: PERSONNEL SECURITY 227 POLICY STATEMENT 13: PHYSICAL & ENVIRONMENTAL PROTECTION 227 POLICY STATEMENT 14: SYSTEM & INFORMATION INTEGRITY 227 POLICY STATEMENT 15: ACCESS CONTROL 228 POLICY STATEMENT 16: AUDIT & ACCOUNTABILITY 228 POLICY STATEMENT 17: IDENTIFICATION & AUTHENTICATION 228 POLICY STATEMENT 18: SYSTEM & COMMUNICATION PROTECTION 228 POLICY STATEMENT 19: DATA AUTHORITY & PURPOSE 228 POLICY STATEMENT 20: DATA ACCOUNTABILITY, AUDIT & RISK MANAGEMENT 229 POLICY STATEMENT 21: DATA QUALITY & INTEGRITY 229 POLICY STATEMENT 22: DATA MINIMIZATION & RETENTION 229 POLICY STATEMENT 23: INDIVIDUAL PARTICIPATION & REDRESS 229 POLICY STATEMENT 24: DATA SECURITY 229 POLICY STATEMENT 25: DATA TRANSPARENCY 230 POLICY STATEMENT 26: DATA USE LIMITATION 230 GLOSSARY: ACRONYMS & DEFINITIONS 231 ACRONYMS 231 DEFINITIONS 231 KEY WORD INDE 232 RECORD OF CHANGES BlackHat Consultants, LLC. All Rights Reserved. Page 9 of 233
10 WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW INTRODUCTION The Written Information Security Program (WISP) provides definitive information on the prescribed measures used to establish and enforce the information security program at ACME Consulting Services, Inc. (ACME). ACME is committed to protecting its employees, partners, clients and ACME from damaging acts that are intentional or unintentional. Effective information security is a team effort involving the participation and support of every ACME user who interacts with data and systems. Therefore, it is the responsibility of every user to know these policies and to conduct their activities accordingly. Protecting company data and the systems that collect, process, and maintain this information is of critical importance. Consequently, the security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure accountability, availability, integrity, and confidentiality of the data: Confidentiality Confidentiality addresses preserving restrictions on information access and disclosure so that access is restricted to only authorized users and services. Integrity Integrity addresses the concern that sensitive data has not been modified or deleted in an unauthorized and undetected manner. Availability Availability addresses ensuring timely and reliable access to and use of information. Security measures must be taken to guard against unauthorized access to, alteration, disclosure or destruction of data and systems. This also includes against accidental loss or destruction. PURPOSE The purpose of the Written Information Security Program (WISP) is to prescribe a comprehensive framework for: Creating an Information Security Management System (ISMS); Protecting the confidentiality, integrity, and availability of ACME data and systems; Protecting ACME, its employees, and its clients from illicit use of ACME systems and data; Ensuring the effectiveness of security controls over data and systems that support ACME s operations. Recognizing the highly networked nature of the current computing environment and provide effective company wide management and oversight of those related information security risks; and Providing for the development, review, and maintenance of minimum security controls required to protect ACME s data and systems. The formation of these information security policies is driven by many factors, with the key factor being risk. These policies set the ground rules under which ACME operates and safeguards its data and systems to both reduce risk and minimize the effect of potential incidents. These policies, including their related standards, procedures, and guidelines, are necessary to support the management of information risks in daily operations. The development of policies provides due care to ensure ACME users understand their day today security responsibilities and the threats that could impact the company. Implementing consistent security controls across the company will help ACME comply with current and future legal obligations to ensure long term due diligence in protecting the confidentiality, integrity and availability of ACME data BlackHat Consultants, LLC. All Rights Reserved. Page 10 of 233
11 SCOPE & APPLICABILITY These policies, standards, procedures and guidelines apply to all ACME data, systems, activities, and assets owned, leased, controlled, or used by ACME, its agents, contractors, or other business partners on behalf of ACME. These policies, standards, procedures and guidelines apply to all ACME employees, contractors, sub contractors, and their respective facilities supporting ACME business operations, wherever ACME data is stored or processed, including any third party contracted by ACME to handle, process, transmit, store, or dispose of ACME data. Some policies are explicitly stated for persons with a specific job function (e.g., a System Administrator); otherwise, all personnel supporting ACME business functions shall comply with the policies. ACME departments shall use these policies or may create a more restrictive policy, but none that are less restrictive, less comprehensive, or less compliant than these policies. These policies do not supersede any other applicable law or higher level company directive, or existing labor management agreement in effect as of the effective date of this policy. Appendix E: Information Security Roles & Responsibilities provides a detailed description of ACME user roles and responsibilities, in regards to Information Security. ACME reserves the right to revoke, change, or supplement these policies, standards, procedures and guidelines at any time without prior notice. Such changes shall be effective immediately upon approval by management, unless otherwise stated. POLICY OVERVIEW In an effort to ensure an acceptable level of Information Security risk, ACME is required to design, implement and maintain a coherent set of policies, standards, procedures and guidelines to manage risks to its data and systems. ACME users are required to protect and ensure the Confidentiality, Integrity, and Availability (CIA) of data and systems, regardless of how it data is created, distributed, or stored. Security controls will be tailored accordingly so that cost effective controls can be applied commensurate with the risk and sensitivity of the data and system; and Security controls must be designed and maintained to ensure compliance with all legal requirements. VIOLATIONS Any ACME user found to have violated any policy, standard or procedure may be subject to disciplinary action, up to and including termination of employment. Violators of local, state, Federal, and/or international law may be reported to the appropriate law enforcement agency for civil and/or criminal prosecution. ECEPTIONS While every exception to a standard potentially weakens protection mechanisms for ACME systems and underlying data, occasionally exceptions will exist. Procedures for requesting an exception to policies, procedures or standards are available in Appendix F: Information Security Exception Request Procedures. UPDATES Updates to the Written Information Security Program (WISP) will be announced to employees via management updates or announcements. Changes will be noted in the Record of Changes to highlight the pertinent changes from the previous policies, procedures, standards and guidelines BlackHat Consultants, LLC. All Rights Reserved. Page 11 of 233
12 KEY TERMINOLOGY In the realm of IT security terminology, the National Institute of Standards and Technology (NIST) IR 7298, Revision 1, Glossary of Key Information Security Terms, is the primary reference document that ACME uses to define common IT security terms. 1 Key terminology to be aware of includes: Asset Custodian: A term describing a person or entity with the responsibility to assure that the assets are properly maintained, to assure that the assets are used for the purposes intended, and assure that information regarding the equipment is properly documented. Cardholder Data Environment (CDE): A term describing the area of the network that possesses cardholder data or sensitive authentication data and those systems and segments that directly attach or support cardholder processing, storage, or transmission. Adequate network segmentation, which isolates systems that store, process, or transmit cardholder data from those that do not, may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment Control: A term describing any management, operational, or technical method that is used to manage risk. Controls are designed to monitor and measure specific aspects of standards to help ACME accomplish stated goals or objectives. All controls map to standards, but not all standards map to Controls. Applicability: A term describing the scope in which a control or standard is relevant and applicable. Control Objective: A term describing targets or desired conditions to be met that are designed to ensure that policy intent is met. Where applicable, Control Objectives are directly linked to an industry recognized best practice to align ACME with accepted due care requirements. Data: A term describing an information resource that is maintained in electronic or digital format. Data may be accessed, searched, or retrieved via electronic networks or other electronic data processing technologies. Appendix A: Data Classification & Handling Guidelines provides guidance on data classification and handling restrictions. Data Owner: A term describing a person or entity that has been given formal responsibility for the security of an asset, asset category, or the data hosted on the asset. It does not mean that the asset belongs to the owner in a legal sense. Asset owners are formally responsible for making sure that assets are secure while they are being developed, produced, maintained, and used. Encryption: A term describing the conversion of data from its original form to a form that can only be read by someone that can reverse the encryption process. The purpose of encryption is to prevent unauthorized disclosure of data. Guidelines: A term describing recommended practices that are based on industry recognized best practices. Unlike Standards, Guidelines allow users to apply discretion or leeway in their interpretation, implementation, or use. Information Security: A term that covers the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Focus is on the Confidentiality, Integrity, and Availability (CIA) of data. Least Privilege: A term describing the theory of restricting access by only allowing users or processes the least set of privileges necessary to complete a specific job or function. 1 NIST IR BlackHat Consultants, LLC. All Rights Reserved. Page 12 of 233
13 Sensitive Personally Identifiable Information (spii): spii is commonly defined as the first name or first initial and last name, in combination with any one or more of the following data elements: 2 Social Security Number (SSN) / Taxpayer Identification Number (TIN) / National Identification Number (NIN) Driver License (DL) or other government issued identification number (e.g., passport, permanent resident card, etc.) Financial account number Payment card number (e.g., credit or debit card) Policy: A term describing a formally established requirement to guide decisions and achieve rational outcomes. Essentially, a policy is a statement of expectation that is enforced by standards and further implemented by procedures. Procedure: A term describing an established or official way of doing something, based on a series of actions conducted in a certain order or manner. Procedures are the responsibility of the asset custodian to build and maintain, in support of standards and policies. Sensitive Data: A term that covers categories of data that must be kept secure. Examples of sensitive data include sensitive Personally Identifiable Information (spii), Electronic Protected Health Information (ephi), and all other forms of data classified as Restricted or Confidential in Appendix A: Data Classification & Handling Guidelines. Standard: A term describing formally established requirements in regard to processes, actions, and configurations. System: A term describing an asset; an information system or network that can be defined, scoped, and managed. Includes, but is not limited to, computers, workstations, laptops, servers, routers, switches, firewalls, and mobile devices. Target Audience: A term describing the intended group for which a control or standard is directed. 2 The source of this definition comes from two state laws Oregon Consumer Identity Theft Protection Act ORS 646A.600(11)(a) and Massachusetts 201 CMR Standards For The Protection of Personal Information of Residents of The Commonwealth MA201CMR BlackHat Consultants, LLC. All Rights Reserved. Page 13 of 233
14 INFORMATION SECURITY PROGRAM STRUCTURE POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE Information security documentation is comprised of five main parts: a core policy; a control objective that identifies desired conditions; measureable standards used to quantify the requirement; procedures that must be followed; and guidelines that are recommended, but not mandatory. Figure 1: Information Security Documentation Framework INFORMATION SECURITY CONTROL OBJECTIVES Security control objectives are sometimes synonymous with standards. Since security control objectives have a well defined organization and structure, ACME s standards are likewise organized into classes and families for ease of use in the control selection and specification process. There are five (5) general classes of security control objectives and these classes are further broken down into twenty six (26) families of security control objective. Common o Common control objectives address information security program level security topics. o These common control objectives establish the overall framework for management, operational and technical controls. Management o Management control objectives address techniques and concerns that are normally addressed by management in ACME s information security program. o In general, Management control objectives focus on the management of the information security program and the management of risk within ACME. Operational o Operational control objectives address techniques and concerns that are generally implemented and executed by people, as opposed to systems, that are put in place to improve the security of a particular system or group of systems. o Operational control objectives often require technical or specialized expertise; often relying upon management activities as well as technical controls. Technical o Technical control objectives address processes and concerns that a computer system executes. o Technical control objectives are dependent upon the proper functioning of the system for their effectiveness and therefore require significant operational considerations. Privacy o Privacy control objectives address Personally Identifiable Information (PII). o Privacy control objectives are dependent upon the proper functioning of the other classes of controls for their effectiveness and therefore require significant operational considerations BlackHat Consultants, LLC. All Rights Reserved. Page 14 of 233
15 Each family contains security controls related to the security functionality of the family. A two character identifier is assigned to uniquely identify each control family. The table below summarizes the classes and families in the security control catalog and the associated family identifiers. Class Family Identifier Common Security Program Management PM Management Certification, Accreditation & Security Assessments CA Management Planning PL Management Risk Assessment RA Management System & Services Acquisition SA Operational Awareness & Training AT Operational Configuration Management CM Operational Contingency Planning CP Operational Incident Response IR Operational Maintenance MA Operational Media Protection MP Operational Personnel Security PS Operational Physical & Environmental Protection PE Operational System & Information Integrity SI Technical Access Control AC Technical Audit & Accountability AU Technical Identification & Authentication IA Technical System & Communications Protection SC Privacy Authority & Purpose AP Privacy Data Accountability, Audit & Risk Management AR Privacy Data Quality & Integrity DI Privacy Data Minimization & Retention DM Privacy Individual Participation & Redress IP Privacy Data Security SE Privacy Data Transparency TR Privacy Data Use Limitation UL Figure 2: NIST SP Control Objectives Families & Classes Figure 3: NIST Security Control Objective Relationships BlackHat Consultants, LLC. All Rights Reserved. Page 15 of 233
16 CONTROL OBJECTIVE PRECEDENCE The Common, Management, Operational, Technical, and Privacy standards create security baselines for systems, based on their Assurance Level. The precedence of security control objectives is: 1. Common: Corporate level scope pertaining to the IT security program. 2. Management: Management level scope. 3. Operational: Infrastructure or project level scope. 4. Technical: System level scope. 5. Privacy: Corporate level scope pertaining to Personally Identifiable Information (PII). SCOPING & ENHANCEMENTS Security standard enhancements are used to strengthen or broaden the fundamental security capability described in the base control objective and these represent elevated security requirements. These enhanced requirements are available to use on any system, but may only be mandated by certain laws and regulations. TARGET AUDIENCES & APPLICABILITY OVERVIEW There are five (5) different combinations of target audience & applicability: TARGET AUDIENCE IS INTENDED FOR ALL USERS IN ALL PARTS OF THE ORGANIZATION All end users need to be familiar with and follow these standards: Target Audience: All Users Applicability: Basic Requirement TARGET AUDIENCE IS INTENDED FOR TECHNICAL ORIENTED PERSONNEL IN ALL PARTS OF THE ORGANIZATION All network administrators / system admins / database admin (DBAs) / data owners / technical project managers / IT personnel need to be familiar with and follow these standards: Target Audience: Technical Users Applicability: Basic Requirement TARGET AUDIENCE IS INTENDED FOR TECHNICAL ORIENTED PERSONNEL IN ONLY CERTAIN PARTS OF THE ORGANIZATION Enhanced controls are focused on enhanced requirements that might not apply to all systems, such as environments covered by PCI DSS, HIPAA, GLBA, SO, FACTA or other laws. For all network administrators / system admins / database admin (DBAs) / data owners / project managers / IT personnel that have assets that are within scope for regulatory or non regulatory coverage, they need to be familiar with and follow these standards: Target Audience: Technical Users Applicability: Enhanced Requirement TARGET AUDIENCE IS INTENDED FOR MANAGERS THROUGHOUT THE ORGANIZATION All personnel in management positions need to be familiar with and follow these standards: Target Audience: Management Applicability: Basic Requirement TARGET AUDIENCE IS INTENDED FOR MANAGERS THROUGHOUT WITH OVERSIGHT IN ONLY CERTAIN PARTS OF THE ORGANIZATION Enhanced controls are focused on enhanced requirements that might not apply to all systems, such as environments covered by PCI DSS, HIPAA, GLBA, SO, FACTA or other laws. For personnel in management positions that have assets that are within scope for regulatory or non regulatory coverage, they need to be familiar with and follow these standards. Target Audience: Management Applicability: Enhanced Requirement BlackHat Consultants, LLC. All Rights Reserved. Page 16 of 233
17 INFORMATION SECURITY PROGRAM ACTIVITIES An Information Security Management System (ISMS) focuses on IT security management and IT related risks. The governing principle behind ACME s ISMS is that, as with all management processes, the ISMS must remain effective and efficient in the long term, adapting to changes in the internal organization and external environment. In accordance with ISO/IEC 27001, ACME s ISMS incorporates the typical "Plan Do Check Act" (PDCA), or Deming Cycle, approach: Plan: This phase involves designing the ISMS, assessing IT related risks, and selecting appropriate controls. Do: This phase involves implementing and operating the appropriate security controls. Check: This phase involves reviewing and evaluating the performance (efficiency and effectiveness) of the ISMS. Act: This has involves making changes, where necessary, to bring the ISMS back to optimal performance. INFORMATION SECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS Appendix G: Types of Security Controls provides a detailed description of information security considerations for protecting systems, based on the importance of the system and the sensitivity of the data processed or stored by the system BlackHat Consultants, LLC. All Rights Reserved. Page 17 of 233
18 COMMON CONTROLS Common Controls are essential for managing information security program. The Common Controls focus complements the other 26 families of security controls by focusing on company wide information security requirements that are independent of any particular system and are essential for managing an information security program. Common Controls are security controls whose implementation results in a security capability that is inheritable. Security capabilities provided by Common Controls can be inherited from many sources including, for example, organizations, business units, sites, enclaves, environments of operation, or other systems. PROGRAM MANAGEMENT (PM) Information Security Program Management Policy: ACME shall implement IT security program management controls to provide a foundation for ACME s Information Security Management System (ISMS). Purpose: The purpose of the Program Management (PM) policy is for ACME to specify the development, implementation, assessment, authorization, and monitoring of the IT security program management. The successful implementation of security controls for organizational systems depends on the successful implementation of the organization s program management controls. The IT security Program Management (PM) controls are essential for managing the IT security program. Supporting Documentation: Program Management (PM) control objectives & standards directly support this policy. PM 01: INFORMATION SECURITY PROGRAM PLAN Target Audience: Management Control Applicability: Standard Control Control Objective: The organization: 3 Develops and disseminates organization wide information security standards that: o Provides an overview of the requirements for the information security program and a description of the controls in place, or planned, for meeting those requirements; o Provides sufficient information about controls to enable an implementation that is unambiguously compliant with the intent of the plan; o Includes roles, responsibilities, management commitment, and compliance; o Is approved by a senior management with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, and other organizations; Reviews standards for applicability; and Revises standards to address organizational changes and problems identified during implementation or security assessments. Standard: ACME s information security policies and standards shall be represented in a single document, the Written Information Security Program (WISP) that: (a) Shall be reviewed and updated at least annually; and (b) Disseminated to the appropriate parties to ensure all ACME personnel understand their applicable requirements. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: The security plans for individual systems and the organization wide information security program plan together, provide complete coverage for all security controls employed within the organization. Enhancements: None 3 HIPAA (a)(1)(i) & (a) (b) / GLBA Sec 6801(b)(1) / PCI DSS 12.1 & / MA201CMR (1), & 17.03(2)(b)(2) / NIST CSF ID.GV 1 & ID.GV BlackHat Consultants, LLC. All Rights Reserved. Page 18 of 233
19 PM 02: ASSIGNED INFORMATION SECURITY RESPONSIBILITIES Target Audience: Management Control Applicability: Standard Control Control Objective: The organization appoints an individual assigned with the mission and resources to coordinate, develop, implement, and maintain an organization wide information security program. 4 Standard: The authority and responsibility for managing the information security program is delegated to ACME s Information Security Officer (ISO and he/she is required to perform or delegate the following information security management responsibilities: (a) Establish, document, and distribute security policies and procedures; (b) Monitor and analyze security alerts and information; (c) Distribute and escalate security alerts to appropriate personnel; (d) Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations; (e) Administer user accounts, including additions, deletions, and modifications; and (f) Monitor and control all access to data. Procedures: The ISO is authorized by executive management to take all actions necessary to establish, implement and manage ACME s Information Security Program. Supplemental Guidance: None Enhancements: None PM 03: INFORMATION SECURITY RESOURCES Target Audience: Management Applicability: Basic Control Objective: The organization addresses all capital planning and investment requests, including the resources needed to implement the information security program, and documents all exceptions to this requirement. Standard: The Information Security Officer (ISO) and his/her designated representatives are responsible for managing and providing oversight for the information security related aspects of the planning and service / tool selection process. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: None Enhancements: None PM 04: VULNERABILITY REMEDIATION PROCESS Target Audience: Management Applicability: Basic Control Objective: The organization implements a process for ensuring that vulnerabilities are properly identified, documents remediation actions and tracks vulnerabilities to mitigate risk to operations, assets, individuals, and other organizations. 5 Standard: ACME is required to use a Plan of Action & Milestones (POA&M), or some other company approved method, as a key tool in documenting identified weaknesses, their status, and remediation steps. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: POA&M related issues shall be based on the findings from security control assessments, security impact analyses, and continuous monitoring activities. 4 HIPAA (a)(2) / GLBA Safeguards Rule / PCI DSS / MA201CMR (2)(a) / OR646A.622(2)(d)(A)(i) / NIST CSF ID.AM 6 & ID.GV 2 5 MA201CMR (2)(j) / OR646A.622(2)(d)(B)(iii) / NIST CSF ID.RA BlackHat Consultants, LLC. All Rights Reserved. Page 19 of 233
20 AT 02: SECURITY AWARENESS Target Audience: Management Applicability: Basic Control Objective: The organization provides basic security awareness training to all system users (including managers, senior executives, and contractors) as part of initial training for new users, when required by system changes, and thereafter as required. 57 Standard: ACME s IT security personnel are responsible for developing and implementing a formal security awareness program to make all ACME users aware of the importance of information security. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: Organizations generally determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. Enhancements: AT 02(1) Practical Exercises AT 02(2) Insider Threat AT 02(1): SECURITY AWARENESS PRACTICAL EERCISES Target Audience: Management Applicability: Enhanced Control Control Objective: The organization includes practical exercises in security awareness training that simulate actual cyber attacks. Standard: ACME s IT security personnel are responsible for developing and implementing practical exercises in security awareness training that simulate actual cyber attacks. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: Practical exercises may include, for example, no notice social engineering attempts to collect information, gain unauthorized access, or simulate the adverse impact of opening malicious attachments or invoking malicious web links. AT 02(2): SECURITY AWARENESS INSIDER THREAT Target Audience: Management Applicability: Enhanced Control Control Objective: The organization includes security awareness training on recognizing and reporting potential indicators of insider threat. Standard: ACME s IT security personnel are required to implement security awareness training that includes how to communicate employee/management concerns regarding potential indicators of insider threat. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: Potential indicators and possible precursors of insider threat can include concerning behaviors such as inordinate, long term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow colleagues, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, and/or practices. AT 03: SECURITY TRAINING Target Audience: Management Applicability: Basic 57 HIPAA (a)(5)(i) & (a)(5)(ii)(A) / PCI DSS 12.6 / MA201CMR (8) & 17.03(2)(b)(1) / NIST CSF PR.AT BlackHat Consultants, LLC. All Rights Reserved. Page 62 of 233
21 Control Objective: The organization provides role based security related training: 58 Before authorizing access to the system or performing assigned duties; When required by system changes; and Annually thereafter. Standard: For information security training: (a) Human Resources (HR) and users direct management shall provide initial security training to personnel upon hire; and (b) ACME s IT security personnel are required to provide training, at least annually, thereafter. Procedures: Methods can vary depending on the role of the personnel and their level of access to sensitive data. For end user training: All users must sign an acknowledgement form stating they have read and understand ACME s requirements regarding information security policies, standards, procedures and guidelines prior to having access to ACME systems or data. All new users must attend a security awareness training class within thirty (30) days of, being granted access to any system; All users shall undergo at least one (1) hour of security awareness training annually. All users must be provided with sufficient training and supporting reference materials to allow them to properly protect ACME s systems and data; and ACME s management must develop and maintain a communications process to be able to communicate new Information Security program information, such as an informational security bulletin or about security items of interest. Supplemental Guidance: Initial orientation and ongoing security training should include the following topics: Information security basics Company information security policies policy Acceptable usage policy Data classification & handling Malicious software & spam Offsite security / security at home Wireless security Third party security (outsourced vendors) Visitor security procedures Incident response procedures Business continuity roles and procedures Enhancements: AT 03(1) Awareness Training for Sensitive Information AT 03(2) Vendor Security Training AT 03(1): SECURITY TRAINING AWARENESS TRAINING FOR SENSITIVE INFORMATION Target Audience: Management Applicability: Enhanced Control Control Objective: The organization ensures that every user accessing a system processing, storing, or transmitting types of sensitive information is formally trained in handling procedures for all of the relevant types of information on the system. 59 Standard: ACME s management is required to ensure that every user accessing a system that processes, stores, or transmits sensitive information is formally trained in handling procedures for all of the relevant types of sensitive information. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: None 58 PCI DSS / MA201CMR (8) / OR646A.622(2)(d)(A)(iv) / NIST CSF PR.AT 2, PR.AT 4 & PR.AT 5 59 PCI DSS 1.5, 2.5, 3.7, 4.3, 5.4, 6.7, 7.3, 8.8, 9.10, 10.8, 11.6, 12.6, , , & , BlackHat Consultants, LLC. All Rights Reserved. Page 63 of 233
22 (b) Processes to facilitate the implementation of the system and information integrity policy, procedures and associated controls. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable laws, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for systemspecific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations. The procedures can be established for the security program in general and for particular systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures. Enhancements: None SI 02: FLAW REMEDIATION (SOFTWARE PATCHING) Target Audience: Technical Users Applicability: Basic Control Objective: The organization: 141 Identifies, reports, and corrects system flaws; Tests software updates related to flaw remediation for effectiveness and potential side effects on organizational systems before installation; and Incorporates flaw remediation into the organization s configuration management process. Standard: Asset custodians and data owners are required to ensure that all system components and software are protected from known vulnerabilities by having the latest vendor supplied security patches installed: (a) Install applicable, critical security patches within one (1) month of release from the vendor; and (b) Install applicable, non critical patches within three (3) months of release from the vendor. Procedures: Asset custodians (e.g., system administrators) are charged with developing system specific procedures for software patching to meet the published standard. Supplemental Guidance: Organizations identify systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security relevant software updates include, for example, patches, service packs, hot fixes, and anti virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational systems. By incorporating flaw remediation into ongoing configuration management processes, required/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US CERT guidance and Information Assurance Vulnerability Alerts. ACME is required to ensure it maintains its information security solutions by ensuring Systems are maintained and kept updated to manufacturer's specifications. This will help ensure that existing solutions are up to date and operating properly. Enhancements: SI 02(1) Implementing Security Patches & Software Modifications SI 02(1): FLAW REMEDIATION IMPLEMENTING SECURITY PATCHES & SOFTWARE MODIFICATIONS Target Audience: Technical Users Applicability: Basic Control Objective: The organization requires change control procedures for the implementation of security patches and software modifications PCI DSS 6.1 & 6.2 / MA201CMR (6) / OR646A.622(2)(d)(B)(iii) / NIST CSF ID.RA 1 & PR.IP PCI DSS 6.2, & / MA201CMR (7) BlackHat Consultants, LLC. All Rights Reserved. Page 119 of 233
23 Standard: Asset custodians and data owners are required to follow change control procedures for the implementation of security patches and software modifications. Procedures: Asset custodians (e.g., system administrators) are charged with developing system specific procedures for software patching to meet the published standard. Supplemental Guidance: Asset custodians should use the following process to help ensure patches do not compromise the security of the information resources being patched: Obtain the patch from a known, trusted source; Verify the integrity of the patch through such means as comparisons of cryptographic hashes to ensure the patch obtained is the correct, unaltered patch; Apply the patch to an isolated test system and verify that the patch: o Is compatible with other software used on systems to which the patch will be applied; o Does not alter the system's security posture in unexpected ways, such as altering log settings; and o Corrects the pertinent vulnerability. Backup production systems prior to applying the patch; Apply the patch to production systems using secure methods, and update the cryptographic checksums of key files as well as that system's software archive; and Create and document an audit trail of all changes. SI 03: MALICIOUS CODE PROTECTION (MALWARE) Target Audience: Technical Users Applicability: Basic Control Objective: The organization: 143 Employs malicious code protection mechanisms at system entry and exit points and at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code: o Transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means; or o Inserted through the exploitation of system vulnerabilities; Updates malicious code protection mechanisms (including signature definitions) whenever new releases are available in accordance with organizational configuration management policy and procedures; Configures malicious code protection mechanisms to: o Perform periodic scans of the system and real time scans of files from external sources as the files are downloaded, opened, or executed in accordance with organizational security policy; o Quarantines malicious code; send alert to an administrator; in response to malicious code detection; and Addresses the receipt of false positives during malicious code detection. Standard: ACME is required to deploy anti malware software on all systems commonly affected by malicious software, including but not limited to: (a) Servers; (b) Workstations; (c) Laptops; (d) Tablets; and (e) Smart phones. Procedures: Asset custodians (e.g., system administrators) are charged with developing system specific procedures for managing antimalware software. Supplemental Guidance: System entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, and remote access servers. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Enhancements: SI 03(1) Evolving Malware Threats SI 03(2) Always On Protection 143 HIPAA (a)(5)(ii)(B) / PCI DSS 5.1, & 5.2 / MA201CMR (7) / NIST CSF DE.CM 4 & DE.DP BlackHat Consultants, LLC. All Rights Reserved. Page 120 of 233
24 (c) Require written authorization by a supervisor or manager to receive a user ID. Supplemental Guidance: Management of individual identifiers is not applicable to shared system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the names of the system accounts associated with those individuals. Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices. Enhancements: IA 04(1) Privileged Account Identifiers IA 04(1): IDENTIFIER MANAGEMENT PRIVILEGED ACCOUNT IDENTIFIERS Target Audience: All Users Applicability: Basic Control Objective: The organization manages system identifiers for privileged users by: Receiving authorization from a designated organizational official to assign a privileged user identifier; and Selecting an identifier that uniquely identifies the privileged user; Standard: ACME requires privileged user accounts be: (a) A unique account, separate from a standard user account; and (b) Used only when necessary for running privileged functions. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: An example of uniqueness, the difference can be adding a designator to the end of the username, such as an A for administrator. Examples include: Standard user named John Smith: JSMITH1 Privileged user named John Smith: A.JSMITH1 IA 05: AUTHENTICATOR MANAGEMENT (PASSWORDS) Target Audience: All Users Applicability: Basic Control Objective: The organization manages system authenticators for users and devices by: 196 Verifying, as part of the initial authenticator distribution, the identity of the individual and/or device receiving the authenticator; Ensuring that authenticators have sufficient strength of mechanism for their intended use; Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators; Changing default content of authenticators upon system installation; Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators (if appropriate); Changing/refreshing authenticators according to an organization defined time period by authenticator type; Protecting authenticator content from unauthorized disclosure and modification; and Requiring users to take, and having devices implement, specific measures to safeguard authenticators. Standard: ACME manages system accounts (authenticators) for users and devices by the following: (a) User Accounts: i. Password Length: Minimum of eight (8) characters ii. Password Reuse: Ten (10) (users cannot use any of the last ten (10) password he or she have used) iii. Password Life: 1. Maximum: Ninety (90) days 2. Minimum: One (1) day iv. Password Complexity: 1. Passwords are not a derivative of the user ID 196 HIPAA (a)(5)(ii)(D) / PCI DSS 8.1.2, 8.2.3, & / MA201CMR (1)(b) (e) & 17.04(2)(b) BlackHat Consultants, LLC. All Rights Reserved. Page 160 of 233
25 2. Passwords have at least one (1) lower alpha, one (1) upper alpha, one (1) number, and one (1) special character. 3. Passwords cannot contain two identical, consecutive characters (b) Service Accounts: i. Password Length: Minimum of eight (8) characters ii. Password Reuse: Ten (10) (service accounts cannot use any of the last ten (10) password he or she have used) iii. Password Life: 1. Maximum: Three hundred sixty five (365) days 2. Minimum: One (1) day iv. Password Complexity: 1. Passwords are not a derivative of the user ID 2. Passwords have at least one (1) lower alpha, one (1) upper alpha, one (1) number, and one (1) special character. 3. Passwords cannot contain two identical, consecutive characters (c) Password Protection: i. Do not use the same password for ACME accounts as for other non ACME access (e.g., personal ISP account, online banking, benefits, etc.). Users must not use the same password for various ACME access needs and are required to have unique passwords for each account they access. ii. Do not share ACME passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as Restricted, Confidential ACME information. iii. Prohibited password practices: 1. Do not use default vendor passwords 2. Do not reveal a password over the phone to anyone for any reason 3. Do not reveal a password in an e mail message 4. Do not reveal a password to a co worker or supervisor 5. Do not talk about a password in front of others 6. Do not hint at the format of a password (e.g., "my family name") 7. Do not reveal a password on questionnaires or security forms 8. Do not share a password with family members 9. Do not write passwords down and store them anywhere in the user s office 10. Do not store passwords in a file on any information asset without encryption (d) Compromise: i. If an account or password is suspected to have been compromised, report the incident to management and change all passwords immediately. Procedures: Passwords should never be written down or stored on line in an unencrypted format. Users must create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. NOTE: Do not use either of these examples as passwords! Strong (good) passwords have the following characteristics: Contain both upper and lower case characters (e.g., a z, A Z) Have digits and punctuation characters as well as letters (e.g., 0 9,!@#$%^&*) Eight (8) or more alphanumeric characters. Not a word in any language, slang, dialect, or jargon. Not based on personal information, names of family, or important calendar dates. Weak (bad) passwords have the following characteristics: Default vendor password Contain less than eight (8) characters A word found in a dictionary (English or foreign) A common usage word such as: o Names of family, pets, friends, co workers, fantasy characters, etc. o Computer terms and names, commands, sites, companies, hardware, software. The words "ACME" or any derivation. Birthdays and other personal information such as addresses and phone numbers. Word or number patterns (e.g., aaabbb, qwerty, zyxwvuts or ) BlackHat Consultants, LLC. All Rights Reserved. Page 161 of 233
26 Any of the above spelled backwards. Any of the above preceded or followed by a digit (e.g., secret1 or 1secret) ACME staff may perform password cracking on a periodic or random basis as part of the company s security testing procedures. If a password is guessed or cracked during one of these events, the user will be required to change it immediately. Supplemental Guidance: Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. Systems support individual authenticator management by organization defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one time tokens, and number of allowed rejections during verification stage of biometric authentication. Specific actions to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing authenticators with others, and reporting lost or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords. Enhancements: IA 05(1) Vendor Supplied Defaults IA 05(1): AUTHENTICATOR MANAGEMENT VENDOR SUPPLIED DEFAULTS Target Audience: Technical Users Applicability: Basic Control Objective: The organization changes vendor supplied defaults before installing a system on the network, including but not limited to passwords, Simple Network Management Protocol (SNMP) strings, and eliminate unnecessary accounts. 197 Standard: Asset custodians and data owners are required to changes vendor supplied defaults before installing a system on the network, including but not limited to (a) Passwords; (b) Encryption keys; (c) Simple Network Management Protocol (SNMP) strings; and (d) Removing unnecessary, default accounts. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: None IA 06: AUTHENTICATOR FEEDBACK Target Audience: Technical Users Applicability: Enhanced Control Control Objective: Systems obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. Standard: Asset custodians and data owners are required to ensure all systems and applications obscure the visible feedback of authentication information (e.g., passwords) during the authentication process to protect the information from possible exploitation by unauthorized individuals. Procedures: No formal procedures are currently applicable to this control. Supplemental Guidance: The feedback from systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users types passwords into input devices. 197 PCI DSS 2.1, & BlackHat Consultants, LLC. All Rights Reserved. Page 162 of 233
27 APPENDICES APPENDI A: DATA CLASSIFICATION & HANDLING GUIDELINES A 1: DATA CLASSIFICATION Information assets are assigned a sensitivity level based on the appropriate audience for the information. If the information has been previously classified by regulatory, legal, contractual, or company directive, then that classification will take precedence. The sensitivity level then guides the selection of protective measures to secure the information. All data are to be assigned one of the following four sensitivity levels: CLASSIFICATION RESTRICTED CONFIDENTIAL INTERNAL USE PUBLIC Definition Potential Impact of Loss Definition Potential Impact of Loss Definition Potential Impact of Loss Definition Potential Impact of Loss DATA CLASSIFICATION DESCRIPTION Restricted information is highly valuable, highly sensitive business information and the level of protection is dictated externally by legal and/or contractual requirements. Restricted information must be limited to only authorized employees, contractors, and business partners with a specific business need. SIGNIFICANT DAMAGE would occur if Restricted information were to become available to unauthorized parties either internal or external to ACME. Impact could include negatively affecting ACME s competitive position, violating regulatory requirements, damaging the company s reputation, violating contractual requirements, and posing an identity theft risk. Confidential information is highly valuable, sensitive business information and the level of protection is dictated internally by ACME MODERATE DAMAGE would occur if Confidential information were to become available to unauthorized parties either internal or external to ACME. Impact could include negatively affecting ACME s competitive position, damaging the company s reputation, violating contractual requirements, and exposing the geographic location of individuals. Internal Use information is information originated or owned by ACME, or entrusted to it by others. Internal Use information may be shared with authorized employees, contractors, and business partners who have a business need, but may not be released to the general public, due to the negative impact it might have on the company s business interests. MINIMAL or NO DAMAGE would occur if Internal Use information were to become available to unauthorized parties either internal or external to ACME. Impact could include damaging the company s reputation and violating contractual requirements. Public information is information that has been approved for release to the general public and is freely sharable both internally and externally. NO DAMAGE would occur if Public information were to become available to parties either internal or external to ACME. Impact would not be damaging or a risk to business operations BlackHat Consultants, LLC. All Rights Reserved. Page 202 of 233
28 A 2: LABELING Labeling is the practice of marking a system or document with its appropriate sensitivity level so that others know how to appropriately handle the information. There are several methods for labeling information assets. Printed. Information that can be printed (e.g., spreadsheets, files, reports, drawings, or handouts) should contain one of the following confidentiality symbols in the document footer on every printed page (see below), or simply the words if the graphic is not technically feasible. The exception for labeling is with marketing material, since marketing material is primarily developed for public release. Displayed. Restricted or Confidential information that is displayed or viewed (e.g., websites, presentations, etc.) must be labeled with its classification as part of the display. A 3: GENERAL ASSUMPTIONS Any information created or received by ACME employees in the performance of their jobs at is Internal Use, by default, unless the information requires greater confidentiality or is approved for release to the general public. Treat information that is not assigned a classification level as Internal Use at a minimum and use corresponding controls. When combining information with different sensitivity levels into a single application or database, assign the most restrictive classification to the combined asset. For example, if an application contains Internal Use and Confidential information, the entire application is Confidential. Restricted, Confidential and Internal Use information must never be released to the general public but may be shared with third parties, such as government agencies, business partners, or consultants, when there is a business need to do so and the appropriate security controls are in place according to the level of classification. You may not change the format or media of information if the new format or media you will be using does not have the same level of security controls in place. For example, you may not export Restricted information from a secured database to an unprotected Microsoft Excel spreadsheet. A 4: PERSONALLY IDENTIFIABLE INFORMATION (PII) Personally Identifiable Information (PII) is defined as the first name or first initial and last name, in combination with any one or more of the following data elements: Government Issued Identification Number (e.g., passport, permanent resident card, etc.) o Social Security Number (SSN) / Taxpayer Identification Number (TIN) / National Identification Number (NIN) o Passport number o Permanent resident card Driver License (DL) Financial account number o Payment card number (credit or debit) o Bank account number Electronic Protected Health Information (ephi) BlackHat Consultants, LLC. All Rights Reserved. Page 203 of 233
29 A 5: DATA HANDLING GUIDELINES HANDLING CONTROLS RESTRICTED CONFIDENTIAL INTERNAL USE PUBLIC Non Disclosure Agreement (NDA) NDA is required prior to access by non ACME employees. NDA is recommended prior to access by non ACME employees. No NDA requirements No NDA requirements Internal Network Transmission (wired & wireless) Encryption is required Instant Messaging is prohibited FTP is prohibited Encryption is recommended Instant Messaging is prohibited FTP is prohibited No special requirements No special requirements External Network Transmission (wired & wireless) Encryption is required Instant Messaging is prohibited FTP is prohibited Remote access should be used only when necessary and only with VPN and twofactor authentication Encryption is required Instant Messaging is prohibited FTP is prohibited Encryption is recommended Instant Messaging is prohibited FTP is prohibited No special requirements Data At Rest (file servers, databases, archives, etc.) Encryption is required Logical access controls are required to limit unauthorized use Physical access restricted to specific individuals Encryption is recommended Logical access controls are required to limit unauthorized use Physical access restricted to specific groups Encryption is recommended Logical access controls are required to limit unauthorized use Physical access restricted to specific groups Logical access controls are required to limit unauthorized use Physical access restricted to specific groups Mobile Devices (iphone, ipad, MP3 player, USB drive, etc.) Encryption is required Remote wipe must be enabled, if possible Encryption is required Remote wipe must be enabled, if possible Encryption is recommended Remote wipe should be enabled, if possible No special requirements (with and without attachments) Encryption is required Do not forward Encryption is required Do not forward Encryption is recommended No special requirements Physical Mail Mark Open by Addressee Only Use Certified Mail and sealed, tamper resistant envelopes for external mailings Delivery confirmation is required Hand deliver internally Mark Open by Addressee Only Use Certified Mail and sealed, tamper resistant envelopes for external mailings Delivery confirmation is required Hand delivering is recommended over interoffice mail Mail with company interoffice mail US Mail or other public delivery systems and sealed, tamperresistant envelopes for external mailings No special requirements Printer Verify destination printer Attend printer while printing Verify destination printer Attend printer while printing Verify destination printer Retrieve printed material without delay No special requirements BlackHat Consultants, LLC. All Rights Reserved. Page 204 of 233
30 APPENDI B: DATA CLASSIFICATION EAMPLES The table below shows examples of common data instances that are already classified to simplify the process. This list is not inclusive of all types of data, but it establishes a baseline for what constitutes data sensitivity levels and will adjust to accommodate new types or changes to data sensitivity levels, when necessary. IMPORTANT: You are instructed to classify data more sensitive than this guide, if you feel that is warranted by the content. DATA CLASS SENSITIVE DATA ELEMENTS PUBLIC INTERNAL USE CONFIDENTIAL RESTRICTED Client or Employee Personal Data Employee Related Data Sales & Marketing Data Networking & Infrastructure Data Strategic Financial Data Operating Financial Data Social Security Number (SSN) Employer Identification Number (EIN) Driver s License (DL) Number Financial Account Number Payment Card Number (credit or debit) Government Issued Identification (e.g., passport, permanent resident card, etc.) Birth Date First & Last Name Age Phone and/or Fax Number Home Address Gender Ethnicity Address Compensation & Benefits Data Medical Data Workers Compensation Claim Data Education Data Dependent or Beneficiary Data Business Plan (including marketing strategy) Financial Data Related to Revenue Generation Marketing Promotions Development Internet Facing Websites (e.g., company website, social networks, blogs, promotions, etc.) News Releases Username & Password Pairs Public Key Infrastructure (PKI) Cryptographic Keys (public & private) Hardware or Software Tokens (multifactor authentication) System Configuration Settings Regulatory Compliance Data Internal IP Addresses Privileged Account Usernames Service Provider Account Numbers Corporate Tax Return Information Legal Billings Budget Related Data Unannounced Merger and Acquisition Information Trade Secrets (e.g., design diagrams, competitive information, etc.) Electronic Payment Information (Wire Payment / ACH) Paychecks Incentives or Bonuses (amounts or percentages) Stock Dividend Information Bank Account Information Investment Related Activity Account Information (e.g., stocks, bonds, mutual funds, money markets, etc.) Debt Amount Information SEC Disclosure Information BlackHat Consultants, LLC. All Rights Reserved. Page 206 of 233
31 APPENDI D: BASELINE SECURITY CATEGORIZATION GUIDELINES Systems are categorized by two primary attributes: (1) the potential impact they pose from misuse and (2) the data classification processed or stored on the system. These two attributes combine to establish a basis for controls that should be assigned to that system or asset. This basis is called an Assurance Level (AL). The System Criticality (SC) reflects the importance of the asset relative to the achievement of the company s goals and objectives. Data sensitivity represents the sensitivity of the data processed by or stored on the asset. There are twelve (12) combinations of MAC and data sensitivity, which establish two (2) baseline ALs: High and Basic. The Assurance Level (AL) determines the level of security controls and testing required to meet minimum requirements for operation in a production environment: ASSET CATEGORIZATION RISK MATRI DATA SENSITIVITY RESTRICTED CONFIDENTIAL INTERNAL USE PUBLIC SYSTEM CRITICALITY HIGH MEDIUM LOW HIGH ASSURANCE HIGH ASSURANCE HIGH ASSURANCE HIGH ASSURANCE HIGH ASSURANCE BASIC ASSURANCE HIGH ASSURANCE BASIC ASSURANCE BASIC ASSURANCE HIGH ASSURANCE BASIC ASSURANCE BASIC ASSURANCE Figure D 1: Asset Categorization Risk Matrix D 1: SYSTEM CRITICALITY (SC) The MAC reflects the importance of the system/project relative to the achievement of company goals and objectives. MACs are primarily used to determine the requirements for availability and integrity. There are three defined mission assurance categories: HIGH: High integrity, High availability (MISSION CRITICAL): High criticality systems handle information that is determined to be vital to the operations or mission effectiveness of the company: Cannot go down without having a significant impact on the company s mission. The consequences of loss of integrity or availability of a High criticality system are unacceptable and could include the immediate and sustained loss of mission effectiveness. High criticality systems require the most stringent protection measures that exceed best practices to ensure adequate assurance. MEDIUM: Medium integrity, Medium availability (MISSION OPERATIONS): Medium criticality systems handle information that is important to the support of the company s primary operations: Can go down for up to 12 hours without having a significant impact on the company s mission. Loss of availability is difficult to deal with and can only be tolerated for a short time. The consequences could include delay or degradation in providing important support services or commodities that may seriously impact mission effectiveness or the ability to operate. The consequences of loss of integrity are unacceptable. Medium criticality systems require additional safeguards equal to or beyond best practices to ensure adequate assurance. LOW: Basic integrity, Basic availability (MISSION SUPPORT): Low criticality systems handle information that is necessary for the conduct of day to day business, but do not mission critical in the short term: Can go down for up to 3 days without having a significant impact on the company s mission. The consequences of loss of integrity or availability can be tolerated or overcome without significant impacts on mission effectiveness. The consequences could include the delay or degradation of services or routine activities. Low criticality systems require protective measures, techniques or procedures generally commensurate with best practices BlackHat Consultants, LLC. All Rights Reserved. Page 209 of 233
32 D 2: DATA SENSITIVITY System criticality and data sensitivity are independent characteristics. Data sensitivity is based on whether the system processes confidential or public information. Information assets are assigned a data sensitivity level based on the appropriate audience for the information. If the information has been previously classified by regulatory, legal, contractual, or company directive, then that sensitivity level will take precedence. The sensitivity level then guides the selection of minimum protective measures to secure the information. All systems are classified into one of the following four data sensitivity levels (see Appendix A), based on the types of data the system processes, transmits, and/or stores: D 3: ASSURANCE LEVEL (AL) REQUIREMENTS The Assurance Level (AL) determines the level of security controls and testing required to meet minimum requirements for operation in a production environment: HIGH ASSURANCE INFORMATION SYSTEMS (AL1) Assurance Requirement: For security controls in high assurance systems, the focus is expanded to require the capabilities that are needed to support ongoing consistent operation of the control and continuous improvement in the control s effectiveness. The asset custodian is expected to expend significant effort on the design, development, implementation, and component/integration testing of the controls and to produce associated design and implementation documentation to support these activities. This documentation is also needed by assessors to analyze and test the internal components of the control as part of the overall assessment of the control. BASIC ASSURANCE INFORMATION SYSTEMS (AL2) Assurance Requirement: For security controls in low assurance systems, the focus is on the controls being in place with the expectation that no obvious errors exist and that as flaws are discovered they are addressed in a timely manner. Systems with basic assurance are expected to follow industry recognized best practices, which create the basis for secure systems BlackHat Consultants, LLC. All Rights Reserved. Page 210 of 233
33 APPENDI E: INFORMATION SECURITY ROLES & RESPONSIBILITIES E 1: INFORMATION SECURITY ROLES Every user at ACME, regardless of position or job classification, has an important role, when it comes to safeguarding the Confidentiality, Integrity and Availability (CIA) of the systems and data maintained by ACME. It is important that every individual fully understand their role, their associated responsibilities, and abide by the security standards, policies, and procedures set forth by the Written Information Security Program (WISP). Role Information Security Officer (ISO) Description of Security Role The ISO is accountable to the organization s senior management for the development and implementation of the information security program. The ISO will be the central point of contact for setting the day to day direction of the information security program and its overall goals, objectives, responsibilities, and priorities Asset Owners Business or department manager with budgetary authority over the system(s) with responsibility for the basic operation and maintenance of the system(s). Asset Custodians Under the direction of the ISO, asset custodians (e.g., system & network administrators) are responsible for the technical implementation and management of the Written Information Security Program (WISP). Party responsible for certain aspects of system security, such as adding and deleting user accounts, as authorized by the asset owner, as well as normal operations of the system in keeping with job requirements. End Users All employees (and contractors) are considered both custodians and users of the systems and data on their issued systems and are required to uphold all applicable Written Information Security Program (WISP) policies, standards, procedures and guidelines. E 2: INFORMATION SECURITY RESPONSIBILITIES Responsibilities shall be assigned based on ownership or stake holding by the Information Security Officer (ISO). Role Company Management Information Security Officer (ISO) Description of Security Responsibility Oversee and approve the company s information security program; Appoint, in writing, an Information Security Officer (ISO) to implement the information security program; Ensure an appropriate level of protection for all company owned or maintained information resources; whether retained in house or under the control of contractors; Ensure that funding and resources are programmed for staffing, training, and support of the information security program and for implementation of system safeguards, as required; Ensure that persons working in an information security role are properly trained, and supported with the appropriate resources; and Provide a secure processing environment including redundancy, backup and fault tolerance services. Oversee and approve the company s information security program including the employees, contractors and vendors who safeguard the company s systems and data, as well as the physical security precautions for employees and visitors; Ensure an appropriate level of protection for the company s information resources; whether retained in house or under the control of outsourced contractors; Issue the Written Information Security Program (WISP) policies and guidance that establish a BlackHat Consultants, LLC. All Rights Reserved. Page 211 of 233
34 APPENDI J: RISK MANAGEMENT FRAMEWORK (RMF) ACME maintains an information security risk management program to evaluate threats and vulnerabilities in order to assure the creation of appropriate remediation plans. J 1: RISK MANAGEMENT OVERVIEW There is sometimes conflict between information security and other general system/software engineering principles. Information security can sometimes be construed as interfering with ``ease of use'' where installing security countermeasures take more effort than a ``trivial'' installation that works, but is insecure. Often, this apparent conflict can be resolved by re thinking the problem and it is generally possible to make a secure system also easy to use. Based on the value owners place on their assets, it is a necessity to impose countermeasures to mitigate any risks posed by specific threats. Figure J 1: Risk Overview J 2: RISK MANAGEMENT FRAMEWORK (RMF) Risk management requires finding security equilibrium between vulnerabilities and acceptable security controls. This equilibrium can be thought of as acceptable risk it changes as vulnerabilities and controls change. From a systems perspective, the components used to determine acceptable risk cover the entire Defense in Depth (DiD) breadth. If one component is weakened, another component must be strengthened to maintain the same level of security assurance. Risk management activities can be applied to both new and legacy systems BlackHat Consultants, LLC. All Rights Reserved. Page 219 of 233
35 WRITTEN INFORMATION SECURITY PROGRAM (WISP) SUPPLEMENTAL FORMS & DOCUMENTATION ACME Consulting Services, Inc. Copyright 2016
36 TABLE OF CONTENTS WISP IMPLEMENTATION OVERVIEW 3 WISP TEMPLATE 1: MANAGEMENT DIRECTIVE EAMPLE WORDING 4 WISP TEMPLATE 2: USER ACKNOWLEDGEMENT FORM 5 WISP TEMPLATE 3: USER EQUIPMENT RECEIPT OF ISSUE 6 WISP TEMPLATE 4: SERVICE PROVIDER NON DISCLOSURE AGREEMENT FORM 7 WISP TEMPLATE 5: INCIDENT RESPONSE FORM 8 WISP TEMPLATE 6: APPOINTMENT ORDERS INFORMATION SECURITY OFFICER (ISO) 9 WISP TEMPLATE 7: ADMINISTRATOR ACCOUNT REQUEST FORM 10 WISP TEMPLATE 8: CHANGE MANAGEMENT REQUEST FORM 11 WISP TEMPLATE 9: CHANGE CONTROL BOARD (CCB) MEETING DOCUMENTATION TEMPLATE 13 WISP TEMPLATE 10: PLAN OF ACTION & MILESTONES (POA&M) DOCUMENTATION TEMPLATE 14 WISP TEMPLATE 11: PORTS, PROTOCOLS & SERVICES (PPS) DOCUMENTATION TEMPLATE 15 WISP TEMPLATE 12: REGULATORY & NON REGULATORY COMPLIANCE CHECKLIST 16 WISP TEMPLATE 13: INCIDENT RESPONSE PLAN (IRP) TEMPLATE 17 WISP TEMPLATE 14: BUSINESS IMPACT ANALYSIS (BIA) TEMPLATE 30 WISP TEMPLATE 15: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (BCP) TEMPLATE 32 WISP TEMPLATE 16: PRIVACY IMPACT ASSESSMENT (PIA) 36 WISP REFERENCE: ELECTRONIC DISCOVERY (E DISCOVERY) GUIDELINES 38 WISP REFERENCE: REGULATORY & NON REGULATORY COMPLIANCE GUIDE 39 GRAMM LEACH BLILEY ACT (GLBA) 39 SARBANES OLEY ACT OF 2002 (SO) 40 FAIR AND ACCURATE CREDIT TRANSACTION ACT OF 2003 (FACTA) 40 HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) 41 HIPAA SECURITY RULE 41 SECURITIES & ECHANGE COMMISSION (SEC) 42 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) 43 Written Information Security Program (WISP) Supplemental Documentation BlackHat Consultants, LLC. All Rights Reserved. Page 2 of 43
37 WISP IMPLEMENTATION OVERVIEW The diagram depicted below is an illustration of the process flow that generally takes place to implement a Written Information Security Program (WISP) within an organization. There will most likely be some level of customization of the WISP that is necessary to meet ACME s unique requirements and staffing levels. If No Customization Is Needed... Choice: You can implement the WISP as it is or make changes to specifically fit your organization s unique needs. Work with your IT staff to implement the technical components of the WISP s policies and standards: Identify the most important changes and prioritize the work. You may find a lot of the standards are already being followed, even though they were not documented. If Some Customization Is Needed... First off make a copy of the original WISP so you have an original you can revert to, if necessary. From there: If a section does not pertain to your business model, you can either delete it or edit the standard to state something like At this time, this standard is not applicable. If you need to edit content, you are free to edit since the WISP is in Microsoft Word format. Publish the WISP to your users in your organization and educate them on any changes that they need to be aware of. With the included user acknowledgement form, have users sign off that they have read and will abide by your company s policies and standards. File this sign off in their personnel folder. Note: There is a helpful applicability chart provided that clearly shows the intended audience of the WISP controls: Management Asset Owners & Custodians General Users This helps focus what controls are relevant to different types of employees. Asset owners and custodians (e.g., application owners & IT staff) will have the greatest amount of controls they need to be intimately familiar with. Management and users have far less controls that truly pertain to them on a day to day basis. Following the Plan Do Check Act approach, work with the IT staff and other departments to look for weaknesses in the IT security program and correct those deficiencies. Written Information Security Program (WISP) Supplemental Documentation BlackHat Consultants, LLC. All Rights Reserved. Page 3 of 43
38 WISP TEMPLATE 6: APPOINTMENT ORDERS INFORMATION SECURITY OFFICER (ISO) ACME Consulting Services, Inc. (ACME ) Duty Description: The Information Security Officer (ISO) is accountable to the organization s senior management for the development and implementation of the Information Security program. The ISO will be the central point of contact for setting the day to day direction of the Information Security program and its overall goals, objectives, responsibilities, and priorities. Responsibilities: Oversee and approve the company s Information Security program including the employees, contractors and vendors who safeguard the company s information systems and data, as well as the physical security precautions for employees and visitors; Ensure an appropriate level of protection for the company s information resources; whether retained in house or under the control of outsourced contractors; Issue the Written Information Security Program (WISP) policies and guidance that establish a framework for an Information Security Management System (ISMS); Identify protection goals, objectives and metrics consistent with corporate strategic plan; Ensure appropriate procedures are in place for Security Testing & Evaluation (ST&E) for all information systems; and monitor, evaluate, and report to company management on the status of IT security within the company; Ensure that persons working in an Information Security role are properly trained, and supported with the appropriate resources; Assist in compliance reviews and other reporting requirements; Provide feedback to company management on the status of the Information Security program, and suggest improvements or areas of concern in the program or any other security related activity; Promote best practices in Information Security management; Monitor and evaluate the status of the company s Information Security posture by performing annual compliance reviews of the WISP and system controls (including reviews of security plans, risk assessments, security testing processes, and others); Provide security related guidance and technical assistance to all operating units; Develop the Computer Incident Response Program (CIRP) and act as the company s central point of contact for incident handling, in concert with the company s Computer Incident Response Team (CIRT). Maintain liaison with external organizations on security related issues; Identify resource requirements, including funds, personnel, and contractors, needed to manage the Information Security program; and Assign ownership of resources. Qualifications: Must be an intelligent, articulate and persuasive leader who can serve as an effective member of the senior management team and who is able to communicate security related concepts to a broad range of technical and non technical staff; and Should have experience with business continuity planning, auditing, and risk management, as well as contract and vendor negotiation. I, of ACME, (CEO or Designated Corporate Officer) hereby appoint the following as Information Security Officer (ISO): Effective as of: (date) Authorized: (Signature of Corporate Officer) I understand and hereby accept the role and responsibilities of the ISO, as defined by these appointment orders. (Printed Name of ISO) (Signature of ISO) (date) Written Information Security Program (WISP) Supplemental Documentation BlackHat Consultants, LLC. All Rights Reserved. Page 9 of 43
39 WISP TEMPLATE 13: INCIDENT RESPONSE PLAN (IRP) TEMPLATE By the very nature of every incident being somewhat different, the guidelines provided in this Incident Response Plan (IRP) do not comprise an exhaustive set of incident handling procedures. These guidelines document basic information about responding to incidents that can be used regardless of hardware platform or operating system. This plan describes the stages of incident identification and handling, with the focus on preparation and follow up, including reporting guidelines and requirements. PLAN OBJECTIVES The objective of Incident Response Plan (IRP) is to: Limit immediate incident impact to customers and business partners; Recover from the incident; Determine how the incident occurred; Find out how to avoid further exploitation of the same vulnerability; Avoid escalation and further incidents; Assess the impact and damage in terms of financial impact and loss of image; Update company policies, procedures, standards and guidelines as needed; and Determine who initiated the incident for possible criminal and/or civil prosecution. INCIDENT DISCOVERY Malicious Actions Denial of Service (DoS) Examples Network-based DoS against a particular host Possible Indications of an Incident You might be experiencing a DoS if you see User reports of system unavailability Unexplained connection losses Network intrusion detection alerts Host intrusion detection alerts (until the host is overwhelmed) Increased network bandwidth utilization Large number of connections to a single host Asymmetric network traffic pattern (large amount of traffic going to the host, little traffic coming from the host) Firewall and router log entries Packets with unusual source addresses Network-based DoS against a network DoS against the operating system of a particular host DoS against an application on a particular host User reports of system and network unavailability Unexplained connection losses Network intrusion detection alerts Increased network bandwidth utilization Asymmetric network traffic pattern (large amount of traffic entering the network, little traffic leaving the network) Firewall and router log entries Packets with unusual source addresses Packets with nonexistent destination addresses User reports of system and application unavailability Network and host intrusion detection alerts Operating system log entries Packets with unusual source addresses User reports of application unavailability Network and host intrusion detection alerts Application log entries Packets with unusual source addresses Written Information Security Program (WISP) Supplemental Documentation BlackHat Consultants, LLC. All Rights Reserved. Page 17 of 43
40 WISP TEMPLATE 15: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (BCP) TEMPLATE DISASTER RECOVERY PLAN (DRP) A Disaster Recovery Plan (DRP) specifies emergency response procedures, including specifying individual responsibility for responding in emergency situations, and specifying procedures to enable team members to communicate with each other and with management during and after emergency. DRP CLASSIFICATION Information system criticality and mission importance for the DRP is the same Mission Assurance Category (MAC) levels as defined in Appendix D: Baseline Security Categorization Guidelines. DRP SCOPING REQUIREMENTS The DRP requirements for critical assets are summarized below: Disaster Recovery Plan (DRP) Summary Criticality MAC I MAC II MAC III Restricted High security required; must be in Disaster Recovery Plan High security required; must be in Disaster Recovery Plan High security required; must be in Disaster Recovery Plan Data Sensitivity Confidential Internal Use Moderate security required; must be in Disaster Recovery Plan Minimal security required; must be in Disaster Recovery Plan Moderate security required; may be in Disaster Recovery Plan Minimal security required; may be in Disaster Recovery Plan Moderate security required; need not be in Disaster Recovery Plan Minimal security required; need not be in Disaster Recovery Plan Public Minimal security required; must be in Disaster Recovery Plan Minimal security required; may be in Disaster Recovery Plan Minimal security required; need not be in Disaster Recovery Plan Backup copies of data and software that are sufficient for recovery from an emergency situation pertaining to critical assets must be stored at a secure, external site providing standard protection against hazards such as fire, flood, earthquake, theft, and decay. Requirements and procedures for such offsite backup shall be included in the DRP, including procedures and authorities for obtaining access to such sites in the event of an emergency. Disaster recovery requirements should be specified when establishing maintenance agreements with vendors supplying components of critical resources. Ensure that vendors can provide replacement components within a reasonable period of time, when planning system upgrades or deployments. DATA BACKUP AVAILABILITY Backup copies of data and software must be sufficient to satisfy DRP requirements, application or other critical information asset processing requirements, and any functional requirements of any critical information asset custodian dependent upon such data. Backup copies for disaster recovery purposes must be stored at a secure, off site location that provides industry standard protection. These backup requirements extend to all information systems and data necessary to be reconstituted in the event of disaster. Written Information Security Program (WISP) Supplemental Documentation BlackHat Consultants, LLC. All Rights Reserved. Page 32 of 43
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Written Information Security Program (WISP)
Your Logo Will Be Placed Here Written Information Security Program (WISP) ACME Consulting, LLC Copyright 2014 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Security Control Standards Catalog
Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) INFORMATION SECURITY POLICY. ACME Consulting Services, Inc.
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) INFORMATION SECURITY POLICY ACME Consulting Services, Inc. Copyright 2016 TABLE OF CONTENTS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
CRR-NIST CSF Crosswalk 1
IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
INFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
HITRUST Common Security Framework Summary of Changes
HITRUST Common Security Framework Summary of Changes Apr-14 CSF 2014 V6.1 Incorporates changes in PCI-DSS v3 and updates stemming from the HIPAA Omnibus Final Rule. Includes mappings to the v1. Fundamental
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002
ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Managing Security and Privacy Risk in Healthcare Applications
Managing Security and Privacy Risk in Healthcare Applications 5 th Annual OCR / NIST HIPAA Security Rule Conference June 6, 2012 Dr. Ron Ross Computer Security Division Information Technology Laboratory
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
