Risk Assessment Guide

Size: px
Start display at page:

Download "Risk Assessment Guide"

Transcription

1 Government of Newfoundland and Labrador Office of the Chief Information Officer Information Management Branch Risk Assessment Guide Overview of Information Protection Risk Assessments May 2010 Information Management Branch Information Protection Division

2 Table of Contents Introduction...3 Roles and Responsibilities...3 Branch IP Leads...3 Information Management Branch...4 Project Manager / Project Team...5 Team Lead / Support Team...5 Client (Government Departments)...5 Client Services...5 Project Management Office...6 Overview: Preliminary Threat Risk Assessment...7 Initiate Pre-TRA Process...8 Conduct Pre-TRA...9 Close Out Pre-TRA Process...9 Budget and Scheduling...9 Overview: Threat Risk Assessment...10 Initiate TRA Process...10 Complete Statement of Sensitivity...11 Conduct TRA...11 Close Out TRA Process...12 Budget and Scheduling...12 Overview: Vulnerability Assessment...13 Initiate VA Process...13 Conduct VA...14 Close Out VA Process...15 Budget and Scheduling...15 Overview: Risk-Based Decision Document...16 Initiate Risk-Based Decision Document Process...16 Complete Risk-Based Decision Document...16 Close Out Risk Based Decision Document Process...17 Budget and Scheduling...17 Appendix A: Lead Model...18 Appendix B: TRA Process...19 Appendix C: VA Process...20 Appendix D: VA Timeline...21 Appendix E: Risk-Based Decision Process...22 Appendix F: Functional Architecture (FA2)...23 Page 2 of 23

3 Risk Assessment Guide An Overview of Information Protection Risk Assessments Introduction This document provides an overview of Information Protection risk assessments initiated across the Office of the Chief Information Officer (OCIO) by the Information Management (IM) Branch. This formalized, request-based approach to assessing risk will help all OCIO branches assess threats and vulnerabilities, document existing security measures and make recommendations to either implement additional safeguards or accept the risk. Current Information Protection risk assessments being used across OCIO include: 1. Pre-TRA Assessment ( Pre-TRA Checklist & Information Security Classification ) 2. Threat Risk Assessment 3. Vulnerability Assessment 4. Risk-based Decision Document The implementation of the Lead Model (see Appendix A) and Branch IP Leads will be used to communicate and coordinate risk processes across the branches. This guide will help OCIO staff and contractors understand these risk assessments and related deliverables. Further questions related to this guide or its contents should be directed to the IM Branch (IP Division) at IM@gov.nl.ca. Roles and Responsibilities Branch IP Leads The OCIO has adopted a Lead Model to communicate and facilitate Information Protection processes, initiatives and issues across all branches. As part of this model, each branch has designated a Branch IP Lead that will be the single point of contact to communicate and coordinate IP matters across the branches. A close working relationship between the IM Branch and the Branch IP Leads will help clarify branch responsibilities as they relate to Information Protection and encourage a culture of managing risk across the OCIO. The roles and responsibilities of the Branch IP Leads are as follows: Receive requests for risk assessments from within their branch and submit to the IM Branch Participate in weekly Branch IP Lead meetings, as required Be aware of any Information Protection-related initiatives ongoing within their branch Sign off, on behalf of their branch, on Deviations (i.e. unmitigated items) resulting from Threat Risk Assessments (TRA) and Vulnerability Assessments (VA) Distribute Information Protection communications within their branch, as required Branch IP Lead Jey Kumar Calvin Butt (Backup: Vickie O Neill) Andre Besso OCIO Branch Solutions Delivery Application Services Operations Page 3 of 23

4 Information Management Branch Information Protection Division Information Protection (IP) is an area of practice focused on the protection of information from inappropriate access or use, using a variety of means as required, including, but not limited to policies, directives and guidelines; physical and electronic security measures; and compliance monitoring and reporting. IP represents the point at which management of information converges with security policy and practices. Within the Government of Newfoundland and Labrador, public bodies are required to protect information as part of their accountability under Section 6 of the Management of Information Act SNL2005 c.m Information Protection and Security Program The IP Division is responsible for the definition, administration and oversight of the Information Protection and Security (IP&S) Program on behalf of OCIO. While managed by the IM Branch, the IP&S Program is an OCIO program that holds responsibilities for all branches. The IP&S Program: Enables OCIO to establish appropriate information security controls that safeguard government s information assets and resources; Manages risk by providing the appropriate parts of the organization with the information they need, when they need it and by creating and maintaining risk assessment tools and process; Promotes consistency and reduces overall risk by providing clear accountability and responsibility for information security risk decisions; and Encompasses the following processes as they relate to Information Protection and Security: Governance, Policy and Standards; Planning and Strategy; Education and Awareness; Information Risk Management; Monitoring and Compliance; and Executive Incident Response. Risk Assessment Responsibilities In support of its IP mandate related to risk assessments, the IM Branch is responsible for: Development of IP policies, directives, standards and guidelines, in accordance with the IP&S Policy Mosaic and Framework; Development, coordination, oversight and process definition of the Preliminary Threat Risk Assessment (Pre-TRA), Information Security Classification and Risk-based Decision processes and tools; Oversight and process definition of independent 3 rd party risk assessments (i.e. TRA and VA); Sign off of Deviations resulting from a TRA or VA; Tracking of risk assessments and Deviations; Coordination and facilitation of Branch IP Lead meetings; Advice and guidance to other branches on risk assessment activities; and Communication and education of all risk assessment processes across OCIO Page 4 of 23

5 Project Manager / Project Team For risk assessments conducted on projects coming through the System Development Lifecycle (SDLC), it is the responsibility of Project Managers to contact their Branch IP Lead and request the Pre-TRA. Once contacted, the Branch IP Lead will submit a formal Request for Service to the IM Branch. When the Pre-TRA determines a TRA and/or VA are required, it is the responsibility of Project Manager to contact the Project Management Office (PMO) to initiate the risk assessments. While not tasked with the hands-on completion of risk assessments, Project Managers and project teams are expected to attend assessment meetings as well as provide project knowledge, subject matter expertise and relevant documentation to the IM Branch throughout the risk assessment process. Project team members that are familiar with the business requirements and system design will participate in the assessment meetings, where required. With respect to a TRA and/or VA, Project Managers are responsible for ensuring all vulnerabilities identified in the independent assessor s VA/TRA Report are mitigated to a standard deemed acceptable by the Project Management Office (PMO). In the event that items cannot be mitigated before Go Live, Project Managers are responsible for identifying and documenting unmitigated items and clearly justifying the reason for not mitigating all vulnerabilities. Team Lead / Support Team For risk assessments conducted on existing systems/environments, it is the responsibility of Team Leads (AS / Ops) to contact their Branch IP Lead and request a risk assessment, where required. Once contacted, the Branch IP Lead will submit a formal Request for Service to the IM Branch. While not tasked with the hands-on completion of risk assessments, Team Leads and Support Teams are expected to attend assessment meetings as well as provide project knowledge, subject matter expertise and relevant documentation to the IM Branch throughout the risk assessment process. Support team members that are familiar with the business requirements and system design will participate in the assessment meetings, where required. With respect to a TRA and/or VA, Team Leads are responsible for ensuring all vulnerabilities identified in the independent assessor s VA/TRA Report are mitigated to a standard deemed acceptable by the Project Management Office (PMO). In the event that items cannot be mitigated before Go Live, Team Leads are responsible for identifying and documenting unmitigated items and clearly justifying the reason for not mitigating all vulnerabilities. Client (Government Departments) As the sponsor, the client provides an overview and understanding of their business needs throughout a risk assessment process. They are invaluable to understanding sensitivity and criticality of their information assets. All engagements with the client should be facilitated through the appropriate Client Services representative within the Client Services and Corporate Operations Branch. The client, where possible, should attend Pre-TRA meetings because this process will complete the Information Security Classification and the client will provide guidance and background about information assets and key business requirements. In the event that a TRA is required, the client will again play a critical advisory role in understanding the sensitivity and criticality of information assets during the Statement of Sensitivity process. The VA process may require engagement of the client in terms of user acceptance testing and communication of appropriate outage windows, but active participation in VA activities is not required. Client Services Client Services representatives are responsible for communicating the importance of risk assessments to their clients, as well as facilitating discussions with the client to discuss specific risks that are identified, where required. Page 5 of 23

6 Project Management Office The PMO is responsible for the day to day operational tasks of TRA and VA activity, including: Scheduling of VA and TRA; Preparing the Statement of Work; Facilitating completion of the Statement of Sensitivity for the TRA; Arranging setup and close-out of the test environment for the VA; Managing external resources conducting the TRA or VA; receiving / distributing draft and final reports; and Sanctioning and monitoring proposed TRA and VA mitigation activities and confirming completion of those activities; Forwarding unmitigated TRA and VA items to the IM Branch (i.e. Deviations ) Important: The IM branch will continue to own the TRA and VA processes, sign off on the TRA and VA process completion and maintain responsibility for oversight and definition of these processes. In addition, the IM Branch will continue to recommend when an independent (i.e. external) TRA or VA is required via the existing Pre-TRA process. Page 6 of 23

7 Overview: Preliminary Threat Risk Assessment The Pre-TRA is comprised of two deliverables in the form of a Risk Assessment Workbook : 1. Information Security Classification (& Functional Control Recommendations) 2. Pre-TRA Checklist Information Security Classification An Information Security Classification ranks the sensitivity and criticality of government information and guides the process to place appropriate levels of security and protection around information assets. Classification supports the Risk Assessment model in its selection of suitable safeguards. While the Information Security Classification is not a risk assessment per say, it drives a risk assessment process by identifying and ranking asset(s) that must be protected from threats, vulnerabilities and risk. The sensitivity and criticality of government information will receive a ranking of High, Medium, Low or Unclassified, based on the following criteria: Confidentiality (C) upholding required restrictions against unauthorized access or disclosure of information (e.g., personal information, cabinet confidences, trade secrets) Integrity (I) maintaining the authenticity and preventing unauthorized modification or destruction of information (e.g., food or water testing, health care, law enforcement) Availability (A) ensuring timely and reliable access to and use of information (e.g., emergency communications or health services, financial systems, benefits systems) For every Information Security Classification, a ranking of High, Medium and Low (as well as Unclassified, for Confidentiality only) is provided for each of the CIA criteria. Based on these rankings, Functional Control Recommendations are provided, stating the minimum level of information protection and security functions to be implemented to adequately protect the information asset. Functional Control Requirements As part of the IP&S Framework, OCIO s Security Architecture is grouped into three layers Conceptual, Functional and Physical. The Conceptual and Functional layers are owned by the IM Branch; the Physical Architecture layer is owned by the EAG, SD Branch. The Functional Architecture (FA2) identifies the functions (i.e. functional controls) that must be in place to adequately protect the information asset. Functional control requirements will increase as the sensitivity of the information asset increases the extent to which an information asset is protected, from a functional perspective, is relative to the sensitivity of that asset (i.e. the underlying Information Security Classification). For an overview of the Functional Architecture (FA2), see Appendix F. The IM Branch (via the Information Security Classification) is only responsible for identifying what functions must be in place to protect information the EAG, as owners of the Physical Architecture, are responsible for identifying how those functions should be implemented. For example, the Classification states that the functional control 2 nd Factor Authentication is mandatory to access High Sensitivity information from outside the Government network. Identification of specific technologies, tools, architectures or designs considered acceptable to perform the function of 2 nd Factor Authentication would be the responsibility of the EAG. The IM Branch and the Classification only state the required functional controls. Page 7 of 23

8 Pre-TRA Checklist The Pre-TRA Checklist determines the need for a TRA and/or VA. The Checklist makes this recommendation based on the underlying Information Security Classification and exposure of the system, as defined below: Internal the system is exposed only to the internal network users without access to the GNL network cannot access this system. Trusted Source (3 rd Party) the system is exposed to the network via a third party that is known to GNL and shares a level of trust with our network users can access some or all of the system from this trusted source. Internet the system has some or full exposure outside of the GNL network users can access some or all of the system from the Internet. The exposure of a system will influence the degree of risk posed to the information. For example, 3 rd Party or Internet-facing systems may demand a higher level of security than an internal application with the same Information Security Classification. The degree of risk increases as the system moves away from the internal network. Recommendations for a TRA and/or VA provided via the Pre-TRA Checklist are mandatory and apply to independent third party risk assessments they do not refer to any internal Quality Assurance reviews or requirements that may be mandated by the PMO. Initiate Pre-TRA Process When to Engage Engaging the Pre-TRA is mandatory for all projects coming through the SDLC. It will be initiated during the Analysis phase, after client sign off of the Business Requirements. If the project team is disbanding after the Business Requirement deliverable, the Pre-TRA process will be engaged after the client signs off the first draft of the requirements. If the project does not have a Business Requirement deliverable, the Pre-TRA will be initiated midway through the Analysis phase. At this time, engaging the Pre-TRA process is not mandatory for the Application Services and Operations Branches, but may be requested on a voluntary basis, as deemed necessary. The IM Branch continues to work with the Branch IP Leads in those areas to develop a fixed integration process for these deliverables. How to Engage A request to engage the Pre-TRA must be made to the respective Branch IP Lead, who will submit a formal Request for Service (DOC10365/2009) to the IM Branch. Only the Branch IP Leads can submit requests for risk assessments to the IM Branch. How to Prepare Upon receipt of the request, the IM Branch will set up a meeting to conduct the Pre-TRA. Informal discussions may take place prior to the meeting in preparation for the actual assessment. Key stakeholders and subject matter experts should be identified to the IM Branch prior to the meeting to ensure their participation in the assessment process. Key participants would typically include the Project Manager or Support Team Manager/Lead, technical leads, Client, Branch IP Lead and where appropriate, the Client Services representative for the client department. The following deliverables must be provided to the IM Branch before the Pre-TRA meeting: Business Requirements IM Assessment Report PPIA Checklist & Privacy Impact Assessment (PIA) Recommendation Letter Page 8 of 23

9 Conduct Pre-TRA Hold Pre-TRA Meeting The Pre-TRA meeting will be scheduled for a maximum of two hours. During the meeting, the IM Branch will facilitate a discussion to ascertain the sensitivity and criticality of the information assets and determine the need for a TRA and VA. Complete Information Security Classification and Pre-TRA Checklist Completing the Information Security Classification and Pre-TRA Checklist is the responsibility of the IM Branch. Follow up and informal discussion may be required with relevant stakeholders during completion of the Classification to ensure all necessary background and criteria are captured and documented appropriately. DELIVERABLE: Risk Assessment Workbook - Information Security Classification - Pre-TRA Checklist - Functional Control Recommendations Owner: Close Out Pre-TRA Process Close out of the Pre-TRA will occur when the Risk Assessment Workbook is finalized and stored in TRIM. Budget and Scheduling As the Pre-TRA is an internal process, there is no additional cost to engage associated with its completion. However, projects may have to adjust resource costs to ensure participation in required assessment activities and discussions. In most cases, projects can expect to schedule 2-3 weeks from the time a request is initiated until the Risk Assessment Workbook is completed. Larger, more complex projects may have to allow for additional time. Page 9 of 23

10 Overview: Threat Risk Assessment A TRA is a detailed, structured process designed to provide an understanding of the risks and issues associated with the implementation of a new application or infrastructure. The intention of a TRA is to determine: What needs to be protected; Who/What are the threats and vulnerabilities; Likelihood of threat occurrence; Impact to the organization; What are the implications if they were damaged or lost; What is the value to the organization; What can be done to minimize exposure to the loss or damage; and The residual risk. The outcome or objective of a TRA is to provide recommendations to maximize the protection of information confidentiality, integrity and availability while still providing functionality and usability for business owners. The TRA will be performed by an independent security vendor, upon recommendation from the IM Branch during the Pre-TRA process. For an overview of the TRA process, see Appendix B. Initiate TRA Process When to Engage If the Pre-TRA Checklist indicates that a TRA is required, the TRA process should be initiated upon receipt of the Risk Assessment Workbook from the IM Branch. How to Engage While the IM Branch makes the initial recommendation to complete a TRA via the Pre-TRA Checklist, engagement to proceed with actual TRA activities must be made to the PMO, as they are the entity responsible for day to day operational tasks within the TRA and VA processes. To initiate the TRA, please contact OCIO-PMO@gov.nl.ca. How to Prepare The PMO will arrange on-site visitation and stakeholder interviews on behalf of the vendor, as required. The vendor will require several items before assessing the threats and risks, including (but not limited to): Detailed Architecture Design (DAD); Information Security Classification; Network Diagram (Visio); Preliminary Privacy Impact Assessment (PPIA) Incident Response Protocols; and Other relevant documentation, as necessary (e.g., such as user manuals, technical guides, document handling procedures, policies, processes and procedures, etc ) Page 10 of 23

11 Complete Statement of Sensitivity The first step in the TRA process is the completion of a Statement of Sensitivity (SoS). The SoS identifies the relative importance of assets based on the degree of injury that could result from their unauthorized disclosure, destruction, removal, modification, interruption or use. The Information Security Classification completed during the Pre-TRA Assessment will feed into the SoS. The SOS identifies all valuable and essential assets and determines their financial or business value to the client, based on their confidentiality, integrity and availability ranking. Completion of the SOS will serve to scope the requirements for the Threat Risk Assessment. While not a formal deliverable, the SoS should be reviewed by the client, IM Branch and PMO for accuracy and acceptance before proceeding with the remainder of the TRA. The PMO will complete the Statement of Work for the TRA (including the Statement of Sensitivity) and make any necessary arrangements to engage the independent security vendor performing the assessment (i.e. travel, meetings, interviews, etc ). Important: The client plays a crucial role in explaining their business needs - they are invaluable to understanding the assets and their importance to the line of business. Client Services should be engaged to facilitate client involvement in completing the SoS. Conduct TRA Completion of the TRA is the responsibility of the independent security vendor hired to do the assessment. However, participation and consultation is expected of the client and project/support staff through interviews, document reviews and on-site visits to the business operating location(s), including the OCIO. After completion of the hands on portion of the assessment (i.e. that period of time where the vendor is on-site and meeting with key stakeholders), the vendor will assess and document identified vulnerabilities, potential threats, as well as existing safeguards and their effectiveness in the business and technical environment. Some follow up with the client and/or stakeholders may be required. The initial results of the vendor s findings will be documented in a draft Threat Risk Assessment Report. DELIVERABLE: TRA Report (DRAFT) Owner: Independent Security Vendor (not OCIO) The vendor will provide the draft TRA Report to the PMO and the IM Branch for review. Upon review, feedback, updates and/or changes will be incorporated into the document by the vendor and a final TRA Report will be delivered for sign off by the IM Branch. The Branch IP Lead for the branch that required the TRA will sign off to indicate acceptance of the final TRA Report and the Director of Information Protection, IM Branch, will sign off on the final TRA Report. DELIVERABLE: TRA Report (FINAL) Owner: Independent Security Vendor (not OCIO) Mitigation The PMO and IM Branch will review the TRA Report and the IM Branch will forward recommendations to stakeholders for mitigation via a TRA Recommendations Summary. DELIVERABLE: TRA Recommendations Summary Owner: Page 11 of 23

12 Recommendations may apply to the client or other key stakeholders outside of OCIO (e.g., Transportation and Works, for issues related to physical security). For recommendations that fall under the responsibility of entities outside of OCIO, the PMO and IM Branch will engage Client Services to communicate the TRA findings and results, but OCIO will not be responsible for the mitigation efforts of stakeholders outside of OCIO. The PMO will oversee all mitigation efforts but completion of mitigation activities is the responsibility of the Project team, who must document all mitigation efforts in a Threat Risk Assessment (TRA) Report Response. If follow-up with other branches is required to ensure completion of mitigation efforts, the Project Manager is responsible for facilitating those discussions and following through on completion of those activities. DELIVERABLE: TRA Report Response Owner: Project Manager Deviations Any TRA recommendation under OCIO control that is not mitigated at the time of Go Live will be documented as a Deviation by the IM Branch. All branches, via their Branch IP Lead will be required to sign off on the Deviations prior to Go Live to indicate approval to proceed, even though these items will not be fully mitigated at that time. The Director of Information Protection, IM Branch, will have final sign off of the Deviations after branch approval is obtained in writing (i.e. Deviations Summary and Sign-Off Report). It is important to note that the Director has the authority to refuse sign off of the Deviations even after branch approval is received, if the Director determines the risk to OCIO is unacceptable. Important: Items that are scheduled for a change window but not yet implemented at the time the Deviations are signed must still be documented as Deviations. Important: There will be only one Deviation Summary and Sign-Off Report per project, which may include Deviations resulting from the TRA and/or VA. DELIVERABLE: Deviation Summary and Sign-Off Report Owner: Close Out TRA Process Close out of the TRA process, as determined by the IM Branch, will occur when the assessment moves from an active phase to a tracking phase. Close out of the formal process takes place when the Director of Information Protection signs off on the final TRA Report. The IM Branch will continue to track the status of TRA mitigation after formal close-out of the process. Budget and Scheduling The time required to complete the TRA process will depend on the scope of the system(s) being assessed in the TRA. A minimum of 45 days should be scheduled from the time the hands-on assessment begins (i.e. on-site vendor visit and interviews with stakeholders) until the draft TRA Report is received by the PMO and IM Branch. Mitigation of items identified in the draft TRA Report that fall under the responsibility of the OCIO would occur parallel to regularly scheduled project activities in the Design and Build phases of the SDLC. Costs associated with a TRA for projects coming through the SDLC are a project responsibility. Costs associated with a TRA completed outside of the SDLC are the responsibility of the branch requesting the TRA. Page 12 of 23

13 Overview: Vulnerability Assessment A VA is a series of processes and procedures used to assess and prioritize security vulnerabilities in a system (i.e. application and/or infrastructure). Conducting a VA assists an organization in determining the state of the environment and the level of exposure to threats. A VA will identify vulnerabilities by evaluating if the system has the proper controls in place as they were designed and meant to be implemented. For an overview diagram of the VA process, see Appendix C. Initiate VA Process When to Engage If the Pre-TRA Checklist indicates that a VA is required, the VA process should be initiated upon receipt of the Risk Assessment Workbook from the IM Branch. How to Engage While the IM Branch makes the initial recommendation to complete a VA via the Pre-TRA Checklist, engagement to proceed with actual VA activities must be made to the PMO, as they are the entity responsible for day to day operational tasks within the TRA and VA processes. To initiate the VA, please contact OCIO-PMO@gov.nl.ca. How to Prepare There are several tasks that must be completed before hands-on VA testing can begin. The PMO is responsible for overseeing these tasks and determining when a system is ready to start the VA. Failure to complete these tasks will delay project timelines moving forward. These tasks include: Task Responsible Accountable Infrastructure Readiness Technical Architect (EAG) *Project Manager Application Readiness *Project Team *Project Manager Freeze on Changes ( Blackout ) *Project Team *Project Manager Statement of Work PMO PMO Purchase Order PMO PMO Vendor on-site access PMO PMO * For systems not coming through the SDLC, the Team Lead /Support Team would be responsible. Important: There will be a freeze on changes (i.e. Blackout ) to the system beginning 5 days prior to the start of the VA. The following documentation must be provided to the vendor prior to starting the VA: Detailed Architecture Design (DAD); Network diagram (Visio); Firewall rules (PMO will provide); User manuals and other system documentation (e.g., technical guides, document handling procedures, policies, processes and procedures, etc ) When the PMO has determined that the system is ready to proceed, the vendor will begin hands-on VA testing. The definition of ready is that the system is ready to go live and no other changes are required. If, for example, features need to be added or items still require configuring, then the system is not ready and the VA cannot begin. For an overview diagram of the VA timeline, see Appendix D. Page 13 of 23

14 Conduct VA Completion of the VA is the responsibility of the independent security vendor hired to do the assessment and contains the following components: 1. Hands-on VA Testing 2. Analysis 3. Draft VA Report 4. Re-test (where applicable) 5. Final VA Report After completion of the hands on portion of the assessment (i.e. that period of time where the vendor is using automated and manual processes to identify vulnerabilities in the system), the vendor will assess, document and prioritize identified vulnerabilities and remediation in the draft VA Report. While the draft VA Report may not be available until three weeks after the start of the VA, the Project team will be advised of all major issues upon completion of testing and can begin remediation once the blackout (freeze on changes) period has been lifted. If the VA is conducted against an existing system, any mitigation would have to take place before the system goes back online or via established Change Management processes at a later time. DELIVERABLE: Vulnerability Assessment Report (DRAFT) Owner: Independent Security Vendor (not OCIO) Mitigation The PMO will review the Draft VA Report and forward the recommendations to the Project team for mitigation. The PMO will oversee all mitigation efforts but completion of mitigation activities is the responsibility of the Project team, who must document all mitigation efforts in the Vulnerability Assessment (VA) Report Response (DOC10406/2008). If follow-up with other branches is required to ensure completion of mitigation efforts, the Project Manager is responsible for facilitating those discussions and following through on completion of those activities. A focused re-test of the specific items identified in the draft VA Report may be required, at the discretion of the PMO. Important: Only changes specific to VA mitigation are allowed after the Blackout has been lifted. Changes not related to the remediation of identified VA items are not allowed. DELIVERABLE: Vulnerability Assessment (VA) Report Response Owner: Project Manager Deviations The IM Branch will review the Vulnerability Assessment (VA) Report Response and document any item that is not mitigated at the time of Go Live as a Deviation in the Deviations Summary and Sign- Off Report. All branches, via their Branch IP Lead will be required to sign off on the Deviations prior to Go Live to indicate approval to proceed. The Director of Information Protection, IM Branch, will have final sign off of the Deviations after approval from the branches and has the authority to refuse sign off of the Deviations even after branch approval is received, if the Director determines the risk is unacceptable to OCIO. Important: Items that are scheduled for a change window, but not yet implemented, at the time the Deviations are signed must still be documented as Deviations. DELIVERABLE: Deviation Summary and Sign-Off Report Owner: Page 14 of 23

15 Close Out VA Process Close out of the VA process, as determined by the IM Branch, will occur when the Director of Information Protection signs off on the final VA Report. The Branch IP Lead for the branch that required the VA will sign off to indicate acceptance of the final VA Report and the Director of Information Protection, IM Branch, will sign off on the final VA Report to indicate completion of the VA process (DOC17943/2009). Once the final VA Report has been signed off by the Director of Information Protection, the VA will go from an active phase to a tracking phase. The IM Branch will track all VA Deviations and their status via the weekly Branch IP Leads meetings. Budget and Scheduling In most cases, projects can estimate the VA testing start date as 4-6 weeks before the anticipated Go Live date. Project Managers should initiate VA discussions with the PMO upon receipt of the Risk Assessment Workbook from the IM Branch, recommending a VA. The time required to complete the VA process will depend on the scope of the system being assessed in the VA. The PMO identifies three types of projects in terms of scheduling: New System Project Enhancement Project Pilot Project Costs associated with a VA completed within projects coming through the SDLC are a project responsibility. Costs associated with a VA completed outside of the SDLC are the responsibility of the branch requesting the VA Page 15 of 23

16 Overview: Risk-Based Decision Document A Risk-Based Decision Document provides a structured approach and decision making process to address information security risks within the OCIO. This process can be used to assess risk when more detailed assessments, such a TRA and VA, are not feasible due to time constraints or other factors. The Risk-Based Decision Document process is the responsibility of the IM Branch. Completion of a Risk-Based Decision Document will allow OCIO to document and justify the rationale for making a decision that may result in an increased level of risk to OCIO. This process, at a high level, documents the following as it relates to the risk: 1. Initial Threat Identification 2. Information Asset Sensitivity (i.e. Information Security Classification) 3. Risk Determination (i.e. Likelihood of Occurrence & Severity of Impact) 4. Recommendations & Controls For an overview of the Risk-Based Decision process, see Appendix E. Initiate Risk-Based Decision Document Process When to Engage A Risk-Based Decision Document may be requested from the IM Branch at any time, if a decision has been made which may result in an increased risk to OCIO. Requests for the Risk-Based Decision Document should be limited to situations where Executive within the Branch determines it necessary to formalize the decision-making process by documenting and justifying their rationale for making that decision. How to Engage A Risk-based Decision Document can be requested by any branch via the Branch IP Leads. Leads should formally submit requests (via ) to the. Only requests from the Leads will be accepted by the IM Branch. How to Prepare The Branch submitting the request will be required to identify a Prime Contact that will liaise with the IM Branch to facilitate completion of the Risk-Based Decision Document. The Prime will be expected to provide background, context and documentation about the risk being assessed and documented. Complete Risk-Based Decision Document Completion of the Risk-Based Decision Document deliverable is the responsibility of the IM Branch. However, most content within the document will be provided by the Prime Contact. Other subject matter experts may have to be consulted, as required (i.e., Enterprise Architecture Group, vendor, client, etc ). Important: This process will not be used to make a decision for a Branch it will only be completed to document the justification and rationale of a decision that has already been made by the requesting branch. Acceptance of Recommendations and Risk required by: Director (requesting branch) Director (any branch impacted by the recommendations and/or risk) Director of Information Protection Page 16 of 23

17 Approval of Risk-Based Decision Document required by: Executive Director (requesting branch) Executive Director (any branch impacted by the recommendations and/or risk) Executive Director (IM Branch) DELIVERABLE: Risk-Based Decision Document Owner: Information Management Branch (IP Division) Close Out Risk Based Decision Document Process Close out will occur when Executive Director approvals and signatures have been obtained and the document is filed in TRIM. Recommendations will be tracked by the IM Branch via the Branch IP Leads meetings. Budget and Scheduling As completion of a Risk-Based Decision Document is an internal process, there is no immediate cost associated with its completion. However, branches may have to adjust resource costs to ensure participation in required in assessment activities and discussions. In most cases, projects can expect to schedule 2 weeks from the time a request is initiated until the Risk-Based Decision Document is completed. Larger, more complex risk scenarios may have to allow for additional time. Risk Scenarios requiring immediate attention may be escalated, where required. Page 17 of 23

18 Appendix A: Lead Model Page 18 of 23

19 Appendix B: TRA Process Page 19 of 23

20 Appendix C: VA Process Page 20 of 23

21 Appendix D: VA Timeline Page 21 of 23

22 Appendix E: Risk-Based Decision Process Page 22 of 23

23 Appendix F: Functional Architecture (FA2) Page 23 of 23

Information Management and Protection Policy

Information Management and Protection Policy Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Information Technology Project Oversight Framework

Information Technology Project Oversight Framework i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11

More information

Governance of Evaluation, Proof of Concept and Pilot Projects

Governance of Evaluation, Proof of Concept and Pilot Projects Governance of Evaluation, Proof of Concept and Pilot Projects (OCIO) Government of Newfoundland & Labrador Prepared By: (PMO) Table of Contents 1.... 2 2. Definition of an Evaluation... 2 2.1 Example...

More information

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations. Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:

More information

Sound Transit Internal Audit Report - No. 2014-3

Sound Transit Internal Audit Report - No. 2014-3 Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

WEB APPLICATION SECURITY TESTING GUIDELINES

WEB APPLICATION SECURITY TESTING GUIDELINES WEB APPLICATION SECURITY TESTING GUIDELINES 1 These guidelines were developed to support the Web Application Security Standard. Please refer to this standard for additional information and/or clarification

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

National Information Assurance Certification and Accreditation Process (NIACAP)

National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT

More information

Project Management Reference Guide

Project Management Reference Guide Project Management Reference Guide Government of Newfoundland Labrador, 9/5/ 2 014 The purpose of this document is to provide a reference guide for Project Managers engaged in projects with the Office

More information

Gartner, Inc. DIR-SDD-2042

Gartner, Inc. DIR-SDD-2042 Texas Department of Information Resources STATEMENT OF WORK (SOW) FOR DELIVERABLES-BASED INFORMATION TECHNOLOGY SERVICES Identity & Access Management Analysis IT Assessment & Planning Gartner, Inc. DIR-SDD-2042

More information

Technical Competency Framework for Information Management (IM)

Technical Competency Framework for Information Management (IM) Technical Competency Framework for Information Management (IM) Office of the Chief Information Officer (OCIO) June 15, 2009 Table of contents IM Competency Framework...1 Competency 1: Information Management

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

PHASE 5: DESIGN PHASE

PHASE 5: DESIGN PHASE PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed

More information

Trim DOC6883/2008 Revision 03 Treasury Board Approval Not required for Guidelines. Mark Coffey

Trim DOC6883/2008 Revision 03 Treasury Board Approval Not required for Guidelines. Mark Coffey Document Title: Video Conference Guidelines Document Type: Guideline No. Of Pages 6 Scope: Government of Newfoundland and Labrador Trim DOC6883/2008 Revision 03 Treasury Board Approval Not required for

More information

Data Masking Best Practices

Data Masking Best Practices Data Masking Best Practices 1 Information Security Risk The risk that sensitive information becomes public 2 Information Security Risk Government systems store a huge amount of sensitive information Vital

More information

Project Charter and Scope Statement

Project Charter and Scope Statement Prepared by: Mike Schmidt Version: 1.0 Last Revision Date: April 14, 2010 Create Date: May 6, 2010 EXECUTIVE SUMMARY... 3 1 INTRODUCTION... 4 2 PROJECT OBJECTIVES... 4 2.1 MISSION... 4 2.2 OBJECTIVES...

More information

Senior Systems Analyst. Interpersonal Skills Physical Effort Concentration Complexity

Senior Systems Analyst. Interpersonal Skills Physical Effort Concentration Complexity Job Class Profile: Senior Systems Analyst Pay Level: CG-42 Point Band: 994-1037 Accountability & Decision Making Development and Leadership Environmental Working Conditions Factor Knowledge Interpersonal

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3 POLICY TITLE: Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June 12-2010 Approved By / Date: Final Draft reviewed

More information

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History

More information

Concept of Operations for Line of Business Initiatives

Concept of Operations for Line of Business Initiatives Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY INTENT: 1. To ensure due diligence and consistency is followed in the solicitation, selection, contract

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

CMS Information Security Risk Assessment (RA) Methodology

CMS Information Security Risk Assessment (RA) Methodology DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)

More information

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263

July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67

More information

Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview

Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview 1/1 Table of Contents 1. Introduction...3 2. Executive Summary...4 3. Program Definition...5 3.1. Program

More information

UF Risk IT Assessment Guidelines

UF Risk IT Assessment Guidelines Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

E-Mail Policy. Government of Newfoundland and Labrador (GNL)

E-Mail Policy. Government of Newfoundland and Labrador (GNL) Document Title: E-Mail Policy Document Type: Policy No. Of Pages 6 Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 26 Treasury Board Approval ( # ) TBM2009-298

More information

Facilities Portfolio Management Tool

Facilities Portfolio Management Tool 2016 Facilities Portfolio Management Tool Project Charter Budget- Facilities Oversight Office of Financial Management 4/10/2016 CONTENTS Overview... 2 Purpose Statement... 2 Background... 2 Goals & Objectives...

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Interim Threat / Risk Assessment. Student E- Communications Outsourcing Project

Interim Threat / Risk Assessment. Student E- Communications Outsourcing Project Interim Threat / Risk Assessment Student E- Communications Outsourcing Project Martin Loeffler Information Security, I+TS Creation Date: Version 1.0 June 24, 2010 Last Updated: Version 2.0 July 6, 2010

More information

Information Security Classification

Information Security Classification i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

CMS Policy for Configuration Management

CMS Policy for Configuration Management Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION

More information

Infrastructure Information Security Assurance (ISA) Process

Infrastructure Information Security Assurance (ISA) Process Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

System/Data Requirements Definition Analysis and Design

System/Data Requirements Definition Analysis and Design EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Information Technology Security Certification and Accreditation Guidelines

Information Technology Security Certification and Accreditation Guidelines Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

SMITHSONIAN INSTITUTION

SMITHSONIAN INSTITUTION SMITHSONIAN INSTITUTION FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA) 2012 INDEPENDENT EVALUATION REPORT TABLE OF CONTENTS PURPOSE 1 BACKGROUND 1 OBJECTIVES, SCOPE, AND METHODOLOGY 2 SUMMARY OF RESULTS

More information

Guidelines for Best Practices in Data Management Roles and Responsibilities

Guidelines for Best Practices in Data Management Roles and Responsibilities Guidelines for Best Practices in Data Management Roles and Responsibilities September 2010 Data Architecture Advisory Committee A subcommittee of Information Architecture & Standards Branch Table of Contents

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM

More information

Performance Audit E-Service Systems Security

Performance Audit E-Service Systems Security Performance Audit E-Service Systems Security October 2009 City Auditor s Office City of Kansas City, Missouri 15-2008 October 21, 2009 Honorable Mayor and Members of the City Council: This performance

More information

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis

More information

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN 10/25/2012 TECHNOLOGY SERVICES INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN Procedure Name: LIT Risk Management Information Technology Plan ver 2.31.docx Risk Management Plan Issue Date: TBD Procedure Owner:

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

Information security risk management using ISO/IEC 27005:2008

Information security risk management using ISO/IEC 27005:2008 Information security risk management using ISO/IEC 27005:2008 Hervé Cholez / Sébastien Pineau Centre de Recherche Public Henri Tudor herve.cholez@tudor.lu sebastien.pineau@tudor.lu March, 29 th 2011 1

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

The Gateway Review Process

The Gateway Review Process The Gateway Review Process The Gateway Review Process examines programs and projects at key decision points. It aims to provide timely advice to the Senior Responsible Owner (SRO) as the person responsible

More information

Four Top Emagined Security Services

Four Top Emagined Security Services Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security

More information

June 25, 2013. Ministry of Health Security enhancement roadmap

June 25, 2013. Ministry of Health Security enhancement roadmap June 25, 2013 Ministry of Health Security enhancement roadmap Table of contents Enhancement roadmap overview... 1 Introduction... 1 Objectives and scope... 1 Approach... 2 Summary of recommended enhancement

More information

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015 Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

Digital Advisory Services Professional Service Description Network Assessment

Digital Advisory Services Professional Service Description Network Assessment Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,

More information

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History

More information

General HIPAA Implementation FAQ

General HIPAA Implementation FAQ General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,

More information

Privacy and Security Incident Management Protocol

Privacy and Security Incident Management Protocol Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated health information that enables sound policy and effective

More information

RFP Attachment C Classifications

RFP Attachment C Classifications RFP 1. Applications IT Architect Analyzes and designs the architecture for software applications and enhancements, including the appropriate application of frameworks and design patterns and the interrelationships

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

GUIDELINE RECORDS AND INFORMATION INVENTORY

GUIDELINE RECORDS AND INFORMATION INVENTORY Government of Newfoundland and Labrador Office of the Chief Information Officer Information Management Branch GUIDELINE RECORDS AND INFORMATION INVENTORY Guideline (Definition): OCIO Guidelines derive

More information

IT Baseline Management Policy. Table of Contents

IT Baseline Management Policy. Table of Contents Table of Contents 1. INTRODUCTION... 1 1.1 Purpose... 2 1.2 Scope and Applicability... 2 1.3 Compliance, Enforcement, and Exceptions... 3 1.4 Authority... 3 2. ROLES, RESPONSIBILITIES, AND GOVERNANCE...

More information

Risk Management Policy

Risk Management Policy Risk Management Policy Responsible Officer Author Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date effective from December 2008 Date last amended December 2012

More information

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Recommendations for the PIA. Process for Enterprise Services Bus. Development Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by

More information

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna

More information

TTC AUDIT COMMITTEE REPORT NO.

TTC AUDIT COMMITTEE REPORT NO. Form Revised: February 2005 TTC AUDIT COMMITTEE REPORT NO. MEETING DATE: April 30, 2012 SUBJECT: INTERNAL AUDIT INFORMATION TECHNOLOGY SERVICES DEPARTMENT - CLIENT SERVICES INFORMATION ITEM RECOMMENDATION

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Information Protection Readiness for Securing Personal Information

Information Protection Readiness for Securing Personal Information for Securing Personal Information Information Protection Readiness for Securing Personal Information May 23, 2014 Office of the City Auditor The Office of the City Auditor conducted this project in accordance

More information

M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General

M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Cal Poly Information Security Program

Cal Poly Information Security Program Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data

More information

Request for Proposal HIPAA Security Risk and Vulnerability Assessment

Request for Proposal HIPAA Security Risk and Vulnerability Assessment Request for Proposal HIPAA Security Risk and Vulnerability Assessment May 1, 2016 First Choice Community Healthcare Timeline The following Timeline has been defined to efficiently solicit multiple competitive

More information

Information Technology Governance Overview and Charter

Information Technology Governance Overview and Charter Information Technology Governance Overview and Charter Prepared by: Project #: Date submitted Document version: IT Governance Charter v03.05.2012 1.0 48.0 - Page 1 of 34 Document History Version Date Author

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of

More information

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards

More information

Data Protection Breach Reporting Procedure

Data Protection Breach Reporting Procedure Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: August 2001 LETTER NO.: 01-CU-11 TO: SUBJ: ENCL: Federally Insured Credit Unions Electronic Data

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information