1 Course: Information Security Management in e-governance Day 2 Session 3: Physical and Environmental Security
2 Agenda Introduction to physical and environmental infrastructure elements needed for supporting IT Infrastructure management Information security challenges and risks related to physical and environmental aspects surrounding information security systems Security considerations and solutions for securing physical and environmental aspects related to Information Systems Page 2
3 Physical Security: so what do you check? Physical access : Is there is any perimeter control for protecting against access? Is it regularly monitored or tested? Does access control exists to all entry points to the facilities? Is it effective? Are computer program, information / documentation, data and media under secure storage? Does a backup power supply exists that is capable of operating the computer systems, servers, air conditioning, heating and lighting? Are there comprehensive instructions or procedures to be followed in case of a physical and environmental threat? Slide 3
4 Physical Security: so what do you check? Fire : Are there adequate fire precautions in the facility including detectors, alarm systems etc? Are all the areas kept free of combustible material? Are all fire prevention and fire-fighting equipments regularly services and checked by their manufactures? Has the risks from storms and other natural disaster evaluated and catered for? Slide 4
5 Physical and Environmental Security Often, physical and environmental security is either overlooked or considered boring and dry Physical & Environmental security an important aspect of information security Physical penetration offers the hacker or malicious user access to sensitive data with less acumen making it tempting attack method. Physical security of Information systems means literally their physical protection. Physical threats can damage computer installations, data centers and computer networks e.g : s should not be lost because there is a flood in the basement Slide 5
6 Importance of Physical Security Most people focus on protecting logical systems (software that is running ) If you cannot protect the physical systems (computer hardware), you cannot protect the program and data running on the hardware Physical security deals with who has access to buildings, computer rooms, and the devices within them Protect sites from natural and man-made physical threats Slide 6
7 Physical Security Baseline Definitions Physical security involves measures undertaken to protect personnel, equipment and property against anticipated threats. Passive measures include the effective use of architecture, landscaping and lighting to achieve improved security by deterring, disrupting or mitigating potential threats. Active measures include the use of proven systems and technologies designed to deter, detect, report and react against threats.
8 Physical Security Baseline Definitions ISO role of physical security Protect the organization s assets by properly choosing a facility location, maintaining a security perimeter, implementing access control and protecting equipment. The physical security office is usually responsible for developing and enforcing appropriate physical security controls, in consultation with the computer security management, program and functional managers, and others, as appropriate. Physical security should address not only central computer installations, but also backup facilities and office environments. In the government, this office is often responsible for the processing of personnel background checks and security clearances. What is the impact of convergence (merging IT security and physical security) on this role and how does it play into the responsibilities for physical security risk assessments and action plans? Slide 8
9 Understand risks surrounding physical and environmental eco system Slide 9
10 Physical Security Threats Weather Tornadoes, hurricanes, floods, lire, snow, ice, heat, cold, humidity, etc. Fire/chemical Explosions, toxic waste/gases, smoke, fire Earth movement Earthquakes, mudslides Structural failure Building collapse because of snow or moving objects (cars, trucks, airplanes, etc.) Slide 10
11 Physical Security Threats (cont d.) Energy Loss of power, radiation, magnetic wave interference, etc. Biological Virus, bacteria, etc. Human Strikes, theft, sabotage, terrorism and war Slide 11
12 Impact to the business due to these risks Slide 12
13 Physical Security Compromise : Outcome Theft and fraud Loss of confidentiality Loss of privacy Loss of integrity Loss of availability Slide 13
14 Approach to Managing physical and environmental security Slide 14
15 If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or the physical Infrastructure!!! Slide 15
16 Physical Security Planning A physical security planning must address: - Crime and disruption protection through deterrence (fences, security guards, warning signs, etc.) - Reduction of damages through the use of delaying mechanisms (e.g., locks, security personnel, etc.) - Crime or disruption detection (e.g., smoke detectors, motion detectors, CCTV, etc.) - Incident assessment through response to incidents and determination of damage levels - Response procedures (fire suppression mechanisms, emergency response processes, etc.) 16
17 Physical and Environmental Security Policy Policy Sections The Physical and Environmental Security Policy consists of the followings Physical Security Environmental Security Power Supplies Cabling Security Physical Security of IT Infrastructure Clear Desk and Clear Screen..
18 Physical Security - Standards Computer and Communication Rooms
19 Physical Security Standards Visitors and Third Parties Visitors and third parties should be only allowed entry to computer and communication rooms for authorised and specific purposes only. Visitors and third parties should not be permitted unsupervised access to computer and communication rooms. This arrangement should exclude employees of outsourcing agencies who are responsible for owning or operating an information processing facility. The date and time of entry and departure of visitors and third parties and the purpose of visit should be recorded in a visitor s log. The date and time of entry and departure and the purpose of entry of authorised personnel (including employees of outsourcing agencies) outside normal business hours or assigned hours of work should be recorded in a log.
20 Physical Security Standards Identification Badges All authorised personnel and visitors should be required to wear some form of visible identification (e.g. employee identification badges, visitor badges) within computer and communication rooms. Visitor badges should be of a different colour from employee Identification badges. Personnel should be encouraged to question unescorted strangers not wearing visible identification. Reconciliation of badges issued to visitors and third parties should be done at the end of each day.
21 Physical Security Standards Identification Badges Its the responsibility of each employee or third parties, who has been issued an identification badge to immediately report lost or stolen badges. The original identification badge should be taken back wherever possible (e.g. broken, damaged cards) while issuing a duplicate card. Identification badges should be returned by an employee, when retired or terminated, and by personnel of outsourcing agencies at the end of the contract. Identification badges taken from retired or terminated employees should be destroyed in a controlled manner.
22 Physical Security Standards Information Storage Media All information storage media (e.g. hard disks, floppy disks, magnetic tapes and CD-ROMs) containing sensitive or confidential data should be physically secured, when not in use. Physical access to magnetic tape, disk and documentation libraries should be restricted to authorised personnel based on job responsibilities. Back-up media should be stored in fire resistant safes or cabinets. Any personal information storage media like cartridge tapes, DAT drives, floppy drives should not be allowed to brought inside computer and communication rooms. Any storage media (floppy drives, CDs, DAT tapes) should not be allowed out of Government premises without adequate clearances from HODs/Security Officers.
23 Physical Security - Standards Offsite Facilities Fall back equipment and back-up media should be stored at a safe distance (e.g. an offsite location) to avoid damage from a disaster at the main site. The physical and environmental safeguards available at the off-site location should provide the same level of security, at a minimum, as at the primary site.
24 Physical Security - Standards Security Instructions Long term contractors, consultants and business associates should be issued instructions on the security requirements of the site. Security Inspections Security inspections should be made regularly. The inspection should cover functionality and administration.
25 Physical Security Standards Major Data Centres The following physical security controls should be followed for major data centres in addition to the standards mentioned above: Major data centres and facilities housing sensitive or critical systems should be clearly separated from other areas. Access should be restricted through use of electronic door locks and authentication mechanisms like biometrics, swipe cards or other form of electronic cards, which should require both card and a personal code or characteristic.
26 Physical Security Standards Major Data Centres The electronic door locks should be equipped on doors that should automatically close and which should set off an audible alarm when they are kept open beyond a certain period of time. The doors should be equipped with burglar alarms. The electronic door locks should support anti pass back mechanism (i.e. disallow entry for more than one time, unless an exit is recorded in the system), remote locking and unlocking. There should be audible alarm for attempted unauthorised entry
27 Physical Security Standards Major Data Centres Electronic door locks should not be deactivated without prior permission unless needed for situations like emergency evacuation in case of fire. Deactivation of electronic door locks should be documented. Access to the security software, which validates and records the swipes or electronic card access, should be restricted to authorised individuals.
28 Physical Security Standards Major Data Centres The Data center and access within the facility should be monitored 24 hours a day through the use of people manning the center, CCTV and alarm systems. The cameras should be located at strategic points. The video surveillance recording should be retained for a minimum period of atleast 7 days for possible future playback. The Systems Security Administrator should review access rights on a quarterly basis. Security inspections should be made regularly and at least within every 6 months. The inspection routine should include access control, alarm systems and burglar protection. The inspection should cover functionality and administration.
29 Physical Security Standards Major Data Centres Third party vendors and consultants should be allowed supervised access only. This access needs to be authorised by the Systems Administrator. Personal information processing equipment like laptops should not be allowed inside a major data processing centre, unless authorised by the Chief Information Officer or the Systems Administrator, in the absence of the Chief Information Officer. An audit trail of all access should be securely maintained and reviewed on a daily basis.
30 Physical Security Standards Electronic Access Cards for Major Data Centres Electronic access cards should be issued to employees and personnel from outsourcing agencies in a controlled manner with approval from the Chief Information Officer or the Data Centre In-charge. Electronic access cards should be personal. In case if an electronic access card is lost or stolen, the concerned staff should immediately report to the Chief Information Officer or the Data Centre In-charge. The electronic access card, which has been reported lost, should be deactivated within 12 hours. The original electronic access card should be taken back wherever possible (e.g. broken, damaged cards) while issuing a duplicate card. Electronic access cards should be returned by an employee, when retired or terminated, and by personnel of outsourcing agencies at the end of the contract.
31 Physical Security Electronic Access Cards for Major Data Centres Electronic access cards should be returned by an employee, when retired or terminated, and by personnel of outsourcing agencies at the end of the contract. Non-returned electronic access cards of retired or terminated personnel (employees or staff from outsourcing agencies) should be deactivated immediately. Electronic access cards taken from retired or terminated employees should be destroyed or re-used in a controlled manner. The expiration period of electronic access cards issued to long-time third parties (e.g. employees of outsourcing agencies) should coincide with the end of the contract period.
32 CCTVs Def: A Television Transmission System That Uses Cameras to Transmit Pictures To Connected Monitors CCTV Levels: - Detection: The Ability to Detect the Presence of an Object - Recognition: The Ability to Determine the Type of Object (animal, blowing debris, crawling human) - Identification: The Ability to Determine the Object Details (person, large rabbit, small deer, tumbleweed) Remember: Monitoring Live Events is Preventive and Recording of Events is Detective 32
33 Environmental Security Appropriate controls should be established to ensure environmental exposures (fire, cyclones, water, temperature and humidity) are adequately controlled. Purpose & Objectives Environmental exposure to information systems is primarily due to naturally occurring events like cyclones, floods and water damage besides fire, temperature and humidity. The Environmental Security Policy defines the minimum controls, which should be in place to reduce exposure to these environmental threats.
34 Fire Safety Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers The most serious threat to the safety of the people who work in the organization is the possibility of fire Fires account for more property damage, personal injury, and death than any other threat It is imperative that physical security plans examine and implement strong measures to detect and respond to fires and fire hazards Slide 34
35 Fire Detection and Response Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers Fire suppression systems are devices installed and maintained to detect and respond to a fire They work to deny an environment of one of the three requirements for a fire to burn: heat, fuel, and oxygen - Water and water mist systems reduce the temperature and saturate some fuels to prevent ignition - Carbon dioxide systems rob fire of its oxygen - Soda acid systems deny fire its fuel, preventing spreading - Gas-based systems disrupt the fire s chemical reaction but leave enough oxygen for people to survive for a short time Slide 35
36 Fire Detection Cyclones Floods and Water Damage Fire Safety Environmental Security Major Data Centers Before a fire can be suppressed, it must be detected Fire detection systems fall into two general categories: manual and automatic Part of a complete fire safety program includes individuals that monitor the chaos of a fire evacuation to prevent an attacker accessing offices There are three basic types of fire detection systems: thermal detection, smoke detection, and flame detection Smoke detectors operate in one of three ways: photoelectric, ionization, and air-aspirating Slide 36
37 Fire Suppression Can be portable, manual, or automatic Portable extinguishers are rated by the type of fire: Class A: fires of ordinary combustible fuels Class B: fires fueled by combustible liquids or gases Class C: fires with energized electrical equipment Class D: fires fueled by combustible metals Fire Safety Cyclones Environmental Security Floods and Water Damage Installed systems apply suppressive agents, either sprinkler or gaseous systems Sprinkler systems are designed to apply liquid, usually water Major Data Centers In sprinkler systems, the organization can implement wet-pipe, drypipe, or pre-action systems Water mist sprinklers are the newest form of sprinkler systems and rely on microfine mists Slide 37
38 Water Sprinkler System Slide 38
39 Gaseous Emission Systems Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers Until recently there were only two types of systems - carbon dioxide and halon Carbon dioxide robs a fire of its oxygen supply Halon is a clean agent but has been classified as an ozone-depleting substance, and new installations are prohibited Alternative clean agents include the following: - FM Inergen - Carbon dioxide - FE-13 (trifluromethane) Slide 39
40 Environmental Security Standards Fire Prevention Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers All computer systems should be housed in an environment equipped with portable fire extinguishers. The fire extinguishers should be accessible in all areas. The distance to the nearest portable fire extinguisher should be a maximum of 25 metres. Fire safety equipment should be checked regularly in accordance with manufacturer's instructions. The test results should be documented. Hazardous and combustible materials should be stored at a safe distance from server rooms and other computer rooms. Computer supplies such as stationery should not be stored in server rooms. Comprehensive fire and emergency instructions should be displayed in prominent locations.
41 Environmental Security Cyclones Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers Computer and communication rooms in cyclone prone areas should be housed in buildings, which are resistant to cyclones e.g. use of permanent cyclone shutters for doors and windows, double doors, wind resistant roof sheathing etc. All computer systems should be moved away from windows or glass doors when a cyclone approaches, even if the windows or doors are covered. All computer systems should be located on a small interior room on the first floor in cyclone prone areas. This should ensure least impact of winds and floods. All computer equipment should be switched off or unplugged when a cyclone approaches to protect them from power surges.
42 Environmental Security Floods and Water Damage Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers All server rooms should be housed in an environment equipped with moisture detectors. Computer and communication rooms should not be located in areas susceptible to water seepage and flooding like the basement. Computer and communication rooms should be located in raised or elevated floors in flood prone areas. Adequate drainage provision should be provided to prevent water damage or flooding. Electrical equipment, which may have received water damage, should be checked and dried before being returned to service.
43 Environmental Security Major Data Centres Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers The following environmental controls should be followed for major data centres and for critical systems in addition to the standards mentioned above: Automatic fire suppression system, in combination with fire alarms, should be installed. Smoke detectors should supplement the fire suppression system. Smoke detectors should be placed above and below the ceiling tiles. The detectors should produce an audible alarm when activated. The surrounding walls should be non-combustible and resistant to fire for at least 60 minutes. All openings to these walls (doors, ventilation ducts, etc.) should be likewise rated at least 60 minutes. Curtains, desks, cabinets and other general office materials in the data centre should be fire resistant.
44 Environmental Security Major Data Centres Fire Safety Cyclones Environmental Security Floods and Water Damage Major Data Centers Data centres should be housed in buildings, which are resistant to cyclones. The following controls should be considered: Permanent cyclone shutters for doors and windows Double doors Wind resistant roof sheathing Data centres should be located on an interior room on the first floor in cyclone prone areas. This should ensure least impact of winds and floods. Information processing facilities should be equipped with water or moisture detectors. The detectors should produce an audible alarm, when activated. Data centres should be located in raised or elevated floors in flood prone areas.
45 Power Supplies Information processing equipment should be protected from power failures and other electrical anomalies. A suitable electrical supply should be provided that confirms to the equipment manufacturer s specifications. Purpose & Objectives Information processing equipment needs to be safeguarded from power failures and other electrical anomalies.
46 Uninterruptible Power Supplies (UPSs) In case of power outage, a UPS is a backup power source for major computer systems There are four basic configurations of UPS: the standby ferroresonant standby line-interactive the true online Slide 46
47 Uninterruptible Power Supplies (UPSs) A standby or offline UPS is an offline battery backup that detects the interruption of power to the power equipment A ferroresonant standby UPS is still an offline UPS the ferroresonant transformer reduces power problems The line-interactive UPS is always connected to the output, so has a much faster response time and incorporates power conditioning and line filtering The true online UPS works in the opposite fashion to a standby UPS since the primary power source is the battery, with the power feed from the utility constantly recharging the batteries this model allows constant feed to the system, while completely eliminating power quality problems Slide 47
48 Emergency Shutoff One important aspect of power management in any environment is the need to be able to stop power immediately should the current represent a risk to human or machine safety Most computer rooms and wiring closets are equipped with an emergency power shutoff, which is usually a large red button, prominently placed to facilitate access, with an accident-proof cover to prevent unintentional use Slide 48
49 Power Supplies Power Supply Standards Uninterrupted Power Supply (UPS) should be used to support orderly close down or continuous running of information processing equipment. The UPS equipment should be checked at least once in 3 months in accordance with the manufacturer s recommendations. All buildings should have proper earthing to prevent electric surges.
50 Power Supply Standards Power-off Switches Two emergency power-off switches should be used, one in the computer room, and the other near, but outside, the computer room. This should facilitate rapid power-off in case of an emergency such as during a fire or emergency evacuation. The power-off switches should be clearly labelled, easily accessible but shielded to prevent accidental activation.
51 Power Supplies Major Data Centres The following controls should be followed for major data centres and for timesensitive systems Backup UPS equipment should be used to ensure continuous running of sensitive or critical systems in case the original UPS equipment fails. Back-up generators should be used to ensure continued processing for critical systems in case of power failure for a prolonged period.
52 Cabling Security Power and telecommunication cabling carrying data or supporting information services should be protected from interception or damage. Purpose & Objectives - Power and telecommunication cables that feed into the information processing facility are exposed to many environmental hazards like cyclones, floods, fire, lightning or cutting due to careless digging. - Cables carrying data or supporting information services should be protected from interception or damage to reduce the risk of power or communication failure.
53 Cabling Standards Power and telecommunication lines into information processing facilities should be underground, where possible, or subject to adequate alternative protection. Network cabling should be protected from unauthorised interception or damage due to environmental hazards e.g. by using conduit or by avoiding routes through public areas. Power cables should be separated from communication cables to prevent interference.
54 Cabling Standards Major Data Centres The following controls should be followed for major data centres and for sensitive or critical systems - Installation of armoured conduit and locked rooms or boxes at inspection and termination points - Use of alternate routings or transmission media
55 Physical Security of Laptops Policy Statement The physical security of laptops, as well as the security of the data residing in these systems, should be ensured. Purpose & Objectives Laptops and their related components (e.g. peripherals, disk drives) are highly vulnerable to unauthorised access or theft, thereby presenting unique risks in the areas of disclosure or destruction of proprietary information. Laptops should be physically secured at all times to prevent unauthorised access or theft.
56 Physical Security of Laptops Responsibility Employees to whom laptop computers are issued should be responsible for its safe custody. Physical Security Controls - All laptops should have a power-on password. - Laptops should not be left on the desk or in the work area or any other visible location overnight. It should be locked in a secure area at the end of the workday. - The laptop or case should not be left unattended in cars. - Laptops should not be left unattended in public places like an airport. Airport rest rooms and areas around telephones could be especially vulnerable locations.
57 Physical Security of Laptops Laptops should never be checked in as luggage, while travelling. It must always be hand carried in a briefcase or a laptop carrying case. Laptops should be locked inside luggage and kept out of sight, when left in hotel rooms. The concerned staff should file a police report immediately in the event a laptop is stolen. The staff should also notify the Systems Security Administrator and the Head of Department within one business day of the theft.
58 Additional Devices Any removable media devices, such as CD Writers, Zip drives and Tape drives, should not be added to individual laptops unless authorised by the Head of Department. Modems should not be added to individual laptops unless cleared and authorised by the Head of Department after consulting with the Chief Information Officer.
59 Clear Desk and Clear Screen A clear desk and a clear screen policy for information processing facilities should be adopted. Purpose & Objectives Information must be protected from unauthorised disclosure, modification or theft. A clear desk policy for papers and removable storage media and a clear screen policy should reduce the risks of unauthorised access, loss and damage during and outside normal working hours.
60 Clear Desk and Clear Screen General Standards Computer terminals and printers should not be left logged on, when unattended. Key locks, power-on and screensaver passwords, or other controls should be used to protect them when not in use. Computer media should be stored in suitable locked cabinets when not in use, especially after working hours. Incoming and outgoing mail points and unattended fax and telex machines should be protected from unauthorised use outside normal working hours. Photocopiers should be locked or protected from unauthorised use outside normal working hours. Top Secret, Secret and Confidential information and storage media should be locked (ideally in a fire-resistant safe or cabinet) when not required.
61 And finally.. Back Up your System Backing up your data should be a habit -Something you do automatically and consistently. Once you have completed a backup, Do not leave the backup media in the PC or even in your office. Store it in a Fire Proof media safe or an approved off-site location Safeguard your backup media. If that backup contains personal or confidential information, it should be protected and secured. Do not allow unauthorized access to your backup media. If you can t afford to lose it, then you can t afford NOT to back it up! Your PC, Your Data, Your Responsibility!!!
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
Physical and Environment IT Security Standards Author s Name: Jo Brown Author s Job Title: Head of Technical Services Division: Corporate Department: Technical Services Version Number: 1.0 Ratifying Committee:
Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
ARE YOU READY FOR A DISASTER? THE ROAD TO PHYSICAL SECURITY Dr. David A. Cook Stephen F. Austin State University email@example.com 1 Page 1 Critical Aspects of Security Physical Security Personnel Security
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
By: Katie Tucker, Sales Representative, Rolyn Companies, Inc Are you and your facility disaster ready? As reported by the Red Cross, as many as 40 percent of small businesses do not reopen after a major
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Physical Security Types of Threats Human Intrusion Attackers looking to perform some sort of damage or obtain useful information Natural Disasters* Fire Flood Earthquake/Seismic Vibrations Power Outages/Fluctuations
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Business Checklist for Severe Weather When faced with a hurricane watch or warning, flood warning or other impending potential natural disaster, refer to this checklist for guidelines on how to prepare
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection OSHA Office of Training and Education 1 Introduction Fires and explosions kill more than 200 and injure more than 5,000 workers
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
NASA IV & V ANNUAL WORKSHOP 202 The 4th International Workshop on Independent Verification & Validation of Software Disaster Recovery Planning Divya Krishnamoorthy Mailam Engineering College, Mailam. (Affiliated
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
HOW TO CREATE A VITAL RECORDS PROTECTION PLAN New York State Unified Court System Division of Court Operations Office of Records Management June 2003 TABLE OF CONTENTS Purpose of a Vital Records Protection
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
April 21, 2009 Dines Bjørner: MITS: Models of IT Security: 1 Models of IT Security Security Rules & Regulations: An Interpretation Dines Bjørner Fredsvej 11, DK 2840 Holte, Denmark Presented at Humboldt
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
Learning Outcomes Physical Security Information Security Dr Hans Georg Schaathun After this week, students should be able to identify threats and useful controls in the physical environment of an information
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology firstname.lastname@example.org Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
Business Continuity Planning Assessment www.cheshirefire.gov.uk Every business is at risk of disruption from a variety of threats, as well as fire, these threats can include flood, loss of power or even
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
CITY OF HOUSTON Office of Emergency Management October 2004 Emergency Management is responsible for coordinating the City of Houston s preparation for and response to emergency situations. Houston is exposed
WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such
Checklist for Residential Care Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole site YES or
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
Checklist for Educational Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole school YES or NO?
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility
Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act) The GLB Act training packet is part of the Information Security Awareness Training that must be completed by employees. Please visit
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:email@example.com Outline of Information Security Introduction Impact of information Need
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
FACILITY FIRE PREVENTION AND EMERGENCY PREPAREDNESS INSPECTION CHECKLIST Date of Inspection: Conducted by: Location: Reviewed by: Date of Review: Comments or additional corrective action taken as a result
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive