ISMF Guideline 18. OCIO/G4.18 Government guideline on cyber security. Endpoint protection (incl. smartphones and portable devices) BACKGROUND

Size: px
Start display at page:

Download "ISMF Guideline 18. OCIO/G4.18 Government guideline on cyber security. Endpoint protection (incl. smartphones and portable devices) BACKGROUND"

Transcription

1 OCIO/G4.18 ISMF Guideline 18 Endpoint protection (incl. smartphones and portable devices) BACKGROUND The SA Government s ICT services environment is essential for delivering services within government and to the community. This dependence on information systems and services requires ongoing and sustained device management to reduce service outages and information theft or corruption in light of new and emerging security vulnerabilities and threats. The opportunity to connect a variety of privately-owned and corporate devices (such as smartphones and tablets) to the government s computing network poses an increasingly important risk. Endpoint protection is an umbrella term for security techniques that focus on the devices that are connected to the network. It requires that each computing device on a network complies with a set of standards for network access, and monitoring the status, activities, software, authorization and authentication of connected devices. The Australian Government s Defence Signals Directorate has established that most cyber intrusion techniques could be mitigated by implementing the following key practices 1 : 1. Catching malicious software through Endpoint application whitelisting 2. Patching each Endpoint operating system and application vulnerability 3. Matching the right people with appropriate privileges on the system Together with a number of additional requirements related to Endpoint protection, they have been adopted as ISMF Standard This guideline supports implementation of ISMF Policy Statement 18. GUIDANCE This guideline has been developed to provide information concerning the measures that should be implemented to provide appropriate levels of protection for Endpoint devices. 1 Top 4 Mitigation Strategies to Protect Your ICT System, Australian Signals Directorate, Australian Government. 2 ISMF Standard 141 is introduced in ISMF version 3.2.0

2 WHITELISTING Whitelisting of applications can form an effective component of an Endpoint Defense in Depth security strategy. In simple terms, this practice only allows trusted applications to run while blocking all others. Application whitelisting has been established as the number one security practice in terms of return on investment 34. Controls S141.2 and S141.5 issued under ISMF Standard 141 require Agencies to consider implementing application whitelisting to prevent the use of applications that are not sanctioned by the business, have not been adequately tested or are not required by the user to perform their duties, and remove or otherwise disable non-essential software and functionality (including browser and web navigation plug-ins) according to the following guidance: [SLC] Sensitive: Legal or Commercial [I3] Integrity 3 The Business Owner should establish a formal policy prohibiting the use of unauthorized Endpoint device applications prior to commissioning Endpoint devices into the operating environment. Responsible Parties should implement processes for authorising applications as approved by the Business Owner prior to their deployment into the operating environment. These processes should utilise up-to-date tools and services 5 for identifying and managing applications, such as tools with automated whitelist and exception management. Responsible Parties should use suitable configuration techniques to control all authorised and implemented applications. Examples include techniques based on establishing trust with known application publishers and whitelisting services, or controlled patch management systems. Responsible Parties should deploy Endpoint applications based on device user s role-specific functions and activities (need-touse basis). Role-based application execution privileges may be applied according to the best-practice guidance provided in section PRIVILEGES. Responsible Parties should conduct at least quarterly Endpoint application reviews, and examine any unapproved applications. Responsible Parties should audit log and monitor all operational application updates, and analyse and report whitelisting discrepancies to the Business Owner as needed, but at least quarterly. ISMF Standard 113 ISMF Standard 78 ISMF Standard Top 4 Mitigation Strategies to Protect Your ICT System, Australian Signals Directorate, Australian Government 4 Application Whitelisting Explained, Australian Signals Directorate, Australian Government 5 Examples of contemporary tools include the Bit9 Security Platform, Lumension Application Control and Kaspersky Endpoint Security suite. Page 2 of 10

3 PATCHING Patching devices, particularly the operating systems and applications, is a highly effective security practice. It mitigates exploitation of known vulnerabilities. In support of control S141.2, Responsible Parties should maintain the operating system and installed applications with relevant patches as provided by the manufacturer following best practice guidance. [SLC] Sensitive: Legal or Commercial [A3] Availability 3 Responsible Parties should monitor vulnerability notifications from device or application vendors on a daily basis (e.g. through authoritative vulnerability notification services). Responsible Parties should undertake vulnerability risk assessment and patching on all Endpoint devices to the current security patch level (n) within 48 hours of patch availability. Responsible Parties should implement a strategy for periodically scanning or otherwise monitoring all Endpoint devices for known vulnerabilities and appropriate patch implementation. Additional automated tools and utilities may assist in this undertaking 6. Responsible Parties should have in place defined procedures for establishing, documenting, maintaining and changing the Endpoint patch configuration, e.g. as part of an overall Endpoint configuration management strategy. Patching should be agreed with the Business Owner and only performed after successful verification and testing outside of the production environment. Responsible Parties should consider compensating controls, such as segmentation of networks, if keeping security patch levels current within 48 hours is not practical at all times. ISMF Standard 121 ISMF Standard 121 ISMF Standard 121 ISMF Standard 134 ISMF Standard 116 ISMF Standard 53 ISMF Standard 50 ISMF Standard 84 Agencies should also weigh up the merits versus risks of permitting user-level accounts to selfinstall patches for approved agency endpoint applications and/or the operating system. This is described in control S78.5 (Privilege Management) of the ISMF: S78.5. Agencies shall define and enforce policies and/or procedures defining what (if any) software may be installed by non-privileged accounts (such as user accounts). Such measures should factor in the relative value versus risk of permitting user accounts to install security patches and updates to existing software that is present on the 6 Example tools include but are not limited to the Secunia Corporate Software Inspector, Lumension or Shavlik suites of tools Page 3 of 10

4 information asset(s). Implementation of this control S78.5 and ISMF Standard 78 satisfies the requirements and objectives described by control of the ISO/IEC 27002:2013 standard. PRIVILEGES Ensuring users are provided with adequate rather than excessive privilege is a prudent measure to counter cyber threats. It helps to reduce Endpoint device misuse. Administrative privileges are particularly significant, since over allocation of account privileges can exacerbate Endpoint device compromise. Control S141.3 under ISMF Standard 141 specifies that Responsible Parties should establish procedures for the granting and revocation of administrative privileges while discouraging their use unless explicitly required, according to the following best practice guidance: [I3] Integrity 3 Business Owners should integrate Endpoint device access privilege management into the Agency s information access policy (refer ISMF Standard 76 Access control policy). Responsible Parties should maintain and regularly review the security mechanisms for granting and revoking end-point device privileges. Responsible Parties should strictly assign end-point access privileges based on a user s functions and role, and to restrict access to information assets they need to carry out their job. Responsible Parties must not temporarily assign excessive privileges (e.g. administrative privileges) to end-point device users, even temporarily. When users need to perform privileged tasks, the permission must be limited to the specific tasks. If this is not practical, authorised administrators should perform the tasks. Consideration should be given to implementing products to define and manage access to administrator accounts (e.g. Sudo, Run as ). This removes the need to share broad administrative privileges between those requiring that level of access, as well as allowing access to be defined only to the specific functions required in order to meet job responsibilities. Responsible Parties should prescribe suitable procedures and authentication techniques that prevent privilege sharing, such as shared Endpoint device logins. Responsible Parties should log all privileged account allocations, changes and activity for regular reviews. Responsible Parties should review privileged allocations and changes when significant employment changes occur, but at least every three months. ISMF Standard 76 ISMF Standard 77 ISMF Standard 78 ISMF Standard 78 ISMF Standard 94 ISMF Standard 80 ISMF Standard 77 Business Owners should authorise privileged Endpoint access (e.g. ISMF Standard 80 Page 4 of 10

5 administrative privileges), and undertake a comprehensive review relative to general user access rights at least quarterly. INACTIVITY MEASURES FOR UNATTENDED DEVICES Devices may be prone to being operational but unattended for extended periods (e.g. user(s) remain logged-in with applications running). This provides easy access to the Endpoint device, its information and the environment it is connected to. Inactivity measures can reduce this risk. They limit how long an Endpoint can be unattended or inactive. Controls S141.7 and S141.8 under ISMF Standard 141 require Responsible Parties to consider additional controls for unattended or inactive Endpoint devices according to the following best practice guidance: Responsible Parties must implement measures to progressively limit access to an Endpoint device, or revoke the device s access to its operating environment. ISMF Standard 97 The following timeout measures should be considered: Lock: clear or lock the Endpoint device screen to conceal information from public view Close: log the user out of applications, or the Endpoint device, and require re-authentication. Discourage or disable silent reauthentication via cached credentials or background re-authentication End: ending application sessions, applications or connections on inactive mobile or remote Endpoint devices outside the organization's physical security controls, or de-provision devices via remote wipe Sensitive Integrity 2 Availability 2 Responsible Parties should consider implementing timeout activation after15 minutes of inactivity. Responsible Parties should implement timeouts not exceeding 2 minutes of system user inactivity for mobile or remote Endpoint devices outside the organization's physical security controls. Any inactivity measures should take into account business and technical timeout constraints, including the impact of timeout measures on a user s ability to use the Endpoint device in a time-critical situation, or the disruption of user-initiated background activities. Responsible Parties should restricting mobile Endpoint device connections to specified times during normal or extended office hours, or predetermined or explicitly arranged time slots. ISMF Standard 97 ISMF Standard 97 ISMF Standard 98 Page 5 of 10

6 MALICIOUS SOFTWARE PROTECTION Malicious software (Malware), including viruses, trojans, ransomware, adware and backdoors (covert channels,) is executable code designed to disrupt or undermine a computer system. Without adequate protection, it can easily be introduced to an entire network from one infected device often without the knowledge of the user. Once introduced, it can be used to gain access to sensitive or classified information, or compromise an organisation s service, system or information availability and integrity. Control S141.1 under ISMF Standard 141 requires Responsible Parties to deploy and maintain appropriate anti-virus/anti-malware solutions encompassing Endpoint devices with consideration of the following best practice guidance: The Business Owner should establish a formal policy requiring that all Endpoint devices used to conduct SA Government business have fit-for-purpose anti-malware tools installed 7. Responsible Parties should consider anti-malware tools using contemporary malware protection techniques and characteristic, including: reputation-based analysis, which determines trustworthiness on external factors, such as software origin and known usage history heuristic analysis, which determines trustworthiness based on software characteristics such as harmful instructions or execution behaviours cross-platform coverage, which means protection is provided across Endpoint device platforms Responsible Parties should configure anti-malware tools to automatically scan all files that are accessed on, or downloaded to the Endpoint device. Responsible Parties should implement a strategy for periodically scanning or otherwise monitoring all Endpoint devices for known malware. Responsible Parties should update the tool s data files for malware identification on a daily basis. 7 Examples include the McAfee, Trend Micro and Kaspersky endpoint protection suites of tools. Page 6 of 10

7 MOBILE AND PORTABLE DEVICES Mobile and portable devices, such as smartphones, tablet or notebook computers, have unique Endpoint protection concerns due to their personal nature (e.g. employee-owned devices), technical capabilities (e.g. easy connectivity), and portability (e.g. convenience of use outside of the organisation s physical security controls). In recognition of the unique risks of mobile Endpoint devices (also referred to as mobility devices), Agencies should develop and implement specific policies, procedures and controls to prevent unauthorised device access with consideration of the following best practice guidance: Business Owners should establish a policy governing the use of mobile Endpoint devices. It will need to consider if bringyour-own-device is an appropriate practice, and in the affirmative should address practice and procedures with personnel s use of personal assets in the workplace. ISMF Standard 59 ISMF Standard 131 Responsible Parties should manage all mobile Endpoint devices through a Mobile Device Management tool as approved by the Business Owner 8. Business Owners should require that mobile Endpoint devices outside of the organisation s physical security controls are not left unattended, and physical locks are used to secure unattended equipment. ISM Control 1195 ISMF Standard 82 Responsible Parties should raise awareness of the risks associated with web-based information storage, which may not be secure 9. ISMF Standard 25 ISMF Standard 139 Responsible Parties should implement encryption of sensitive information on mobile Endpoint devices according to the Agency information security policies. ISMF Standard 59 ISMF Standard 108 For Official Use Only Sensitive Integrity 3 The Business Owner must establish procedures that include sensitive mobile and portable device information output, transfer, reallocation and disposal. This may be achieved by requiring the exclusive use of secure office printers, secure data transfer services, or device return to the office where there are appropriate facilities for sanitisation or disposal. Business Owners should implement formal procedures for accessing business information across public networks, including rules and advice on restrictions to connect mobile Endpoint devices to public networks, and usage in public places. ISMF Standard 44 ISMF Standard 45 ISMF Standard 68 ISMF Standard Examples include the Citrix or MobileIron Mobile Device Management suites. 9 E.g. cloud-based drop boxes or file drives, especially if they are hosted off-site where stored information may be subjected to unauthorised access or interception during storage or transit in foreign jurisdictions. Page 7 of 10

8 ENDPOINT SECURITY AWARENESS Overall security is only as strong as its weakest link. Despite technology advances, user behaviour (involving people and processes) may be the weakest security link. Awareness and understanding of end user security issues, roles and responsibilities in implementing organisational security policies and procedures is important. In support of ISMF Standard 25, Agencies should provide Endpoint security awareness and education according to the following good practice guidance: Business Owners should include Endpoint-specific security awareness and training in the Agency s Information Security Awareness Program. It must include contemporary Endpoint security issues and adversary techniques, including: Unobserved tampering with mobile Endpoint devices Shoulder surfing while Endpoint devices are used in public places Social engineering techniques to tempt, entice or compel users into providing access to Endpoint devices, their sensitive information, or information about Endpoint security measures and practices Connecting Endpoint devices to USB devices and privately owned devices, or connecting them to other networks ISMF Standard 25 Business Owners should establish and document Endpoint device responsibilities in appropriate policies and procedures, which must include: Usage obligations for appropriate Endpoint device practices during and after employment and engagement ISMF Standard 25 ISMF Standard 27 ISMF Standard 131 Reporting obligations, mechanisms and procedures for suspicious activities and incidents Business Owners should demonstrate the effect that Endpoint security breaches have by: Showing relevance by providing the background and rationale for mitigation strategy and a threat s incidence and prevalence, e.g. through anecdotal evidence of intrusions and attempts at the organisation and similar organisations Demonstrating and involving users in actions that lead to incidents in order to cultivate a healthy level of vigilance, e.g. penetration tests or social engineering exercises Proving the effects of mitigation by showing indicators of reduced incident frequency and severity. ISMF Standard 25 Page 8 of 10

9 REFERENCES, LINKS & ADDITIONAL INFORMATION 1. OCIO/F4.1 Government of South Australia Information Security Management Framework [ISMF] 2. PC030 Government of South Australia Protective Security Management Framework [PSMF] 3. Australian Government Protective Security Policy Framework [PSPF] 4. Australian Government Information Security Manual, Australian Signals Directorate 5. ISMF Standard 141 (Endpoint protection), Government of South Australia 6. Top 4 Mitigation Strategies to Protect Your ICT System, Australian Signals Directorate 7. Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details, Australian Signals Directorate, Australian Government 8. Application Whitelisting Explained, Australian Signals Directorate, Australian Government 9. Patching evaluated products, Australian Signals Directorate, Australian Government, Canberra. 10. Minimising Administrative Privileges Explained, Australian Signals Directorate 11. Guide to information security, Office of the Australian Information Commissioner, Australian Government 12. Critical Controls for Effective Cyber Defense, SANS Institute, United States 13. Application Whitelisting: Panacea or Propaganda, SANS Institute, United States 14. System Administrator - Security Best Practices, SANS Institute, United States 15. ISMF Guideline 21 (Storage devices and media), Government of South Australia Page 9 of 10

10 This guideline does not aim to provide the reader with all of the responsibilities and obligations associated with Endpoint protection. It is merely an overview of the information provided in applicable government cyber security policy, applicable governance frameworks and the resources and utilities available at the time of publication. It is highly recommended that agencies review these documents in their entirety. The individual requirements of agencies will have direct bearing on what measures are implemented to mitigate identified risk(s). ID OCIO_G4.18 Classification/DLM PUBLIC-I2-A1 Issued April 2014 Authority State Chief Information Security Officer Master document location Q:\SecurityRiskAssurance\Policy Development Sub-program\Policy and Standards\ISMF\v3.2\ISMFguidelines\ISMFguideline18(endpoint protection).docx Records management File Folder: 2011/15123/01 - Document number: Managed & maintained by Office of the Chief Information Officer Author(s) Christian Bertram CEA, MSIT, Enterprise Architect Tony Stevens, Senior Analyst Reviewer Jason Caley CISM, MACS (CP), IP3P, CRISC, CEA, Principal Policy Adviser Compliance Discretionary Next review date March 2016 To attribute this material, cite the Office of the Chief Information Officer, Government of South Australia, ISMF Guideline 18. This work is licensed under a Creative Commons Attribution 3.0 Australia Licence Copyright South Australian Government, Disclaimer

Cyber Security Incident Reporting Scheme

Cyber Security Incident Reporting Scheme OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE 13/2011 21 July 2011 Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details INTRODUCTION 1. This document provides further information regarding DSD s list

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 Executive Summary PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 In today s business environment, managing and controlling access to data is critical to business viability

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

This policy outlines different requirements for the use of PSDs based on the classification of information.

This policy outlines different requirements for the use of PSDs based on the classification of information. POLICY OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples

More information

Malicious Email Mitigation Strategy Guide

Malicious Email Mitigation Strategy Guide CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits CYBER CRIME & SECURITY SURVEY REPORT 2013 Foreword Malicious cyber activity is on the increase and every business with an online presence is at risk. This may involve the loss of critical data and consumer

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

Using Remote Desktop Clients

Using Remote Desktop Clients CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION ONLINE AND MOBILE BANKING, YOUR RISKS COVERED WITH KASPERSKY FRAUD PREVENTION Financial fraud is a serious risk with damaging

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program Gatekeeper Public Key Infrastructure Framework Compliance Audit Program V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright. Apart from any use as permitted

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

Mobile Device Security Information for IT Managers

Mobile Device Security Information for IT Managers Mobile Device Security Information for IT Managers July 2012 Disclaimer: This paper is intended as a general guide only. To the extent permitted by law, the Australian Government makes no representations

More information

Securing OS Legacy Systems Alexander Rau

Securing OS Legacy Systems Alexander Rau Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background: 1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Guidance on the Use of Portable Storage Devices 1

Guidance on the Use of Portable Storage Devices 1 Guidance on the Use of Portable Storage Devices Introduction Portable storage devices ( PSDs ) such as USB flash memories or drives, notebook computers or backup tapes provide a convenient means to store

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

Security Solutions for HIPAA Compliance

Security Solutions for HIPAA Compliance Security Solutions for HIPAA Compliance www.currentware.com 613-368-4300 info@currentware.com In today s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Information Security Policy Schedule A - Roles, Standards and Operational Procedures

Information Security Policy Schedule A - Roles, Standards and Operational Procedures Information Security Policy Schedule A - Roles, Standards and Operational Procedures Approving authority Pro Vice Chancellor (Information Services) Approval date 3 July 2014 Advisor Next scheduled review

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy

Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident

More information

Security Best Practices for Mobile Devices

Security Best Practices for Mobile Devices Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Information Security Baseline (minimal measures)

Information Security Baseline (minimal measures) Information Security Baseline (minimal measures) 1 Version management Version 0.1 9 September 2013 1st draft Version 0.2 23 September 2013 2nd draft after review by Erik Adriaens Version 0.3 8 October

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Closing the Antivirus Protection Gap

Closing the Antivirus Protection Gap A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Telemedicine HIPAA/HITECH Privacy and Security

Telemedicine HIPAA/HITECH Privacy and Security Telemedicine HIPAA/HITECH Privacy and Security 1 Access Control Role Based Access The organization shall provide secure rolebased account management. Privileges granted utilizing the principle of least

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information