PSN IA conditions supporting guidance
|
|
|
- Magdalen Reeves
- 10 years ago
- Views:
Transcription
1 PSN IA conditions supporting guidance Guidance July 2012 version 1.4
2 Introduction This document provides guidance on achieving compliance with the PSN IA conditions (Ref [ST09]). The PSN IA conditions is a framework of controls that must be applied by any organisation wishing to connect and/or consume PSN services. These requirements are intended to provide a minimum set of baseline connection standards for all organisations. These minimum standards are essential to enable all organisations using this shared service to have confidence that risks are being appropriately managed. Context These controls are designed to reflect good practice that, for the most part, would be required by any organisation to show due diligence and prevent any claims of negligence against its senior management. They include controls that are intended to address the requirements of the following where appropriate: Data Protection Act (see BSI BIP 0012) Human Rights Act (Right to privacy) HMG Security Policy Framework Accountability of users (Computer Misuse Act also see BSI BIP 0008 and BS 10008) Risk management (See HMT Orange Book and ISO/IEC 27005) Corporate Governance (Audit commission Report on Corporate Governance in the Public Sector) Official Secrets Act (with regard to Protectively Marked information) ISO/IEC (Information Security Management System Requirements) Local Government Data Handling Procedures There is a significant amount of guidance available, CPNI Guidance, the CESG policy portfolio, ISO/IEC 27002, CobiT and various others, which are proven and respected. Organisations should refer to these when assessing whether the controls that they have implemented are adequate and cost-effective. Information Assurance is intended to support the organisation and enable business. Its purpose is to ensure that information is available to the right people when needed and to maintain the integrity of that information. This is a basic tenet of good operating practice. In general, where organisations are already following good practice, compliance with the IA Conditions should not lead to additional work or cost. If good practice is being followed then this can be reused to demonstrate IA Conditions compliance. However, if the customer does not implement the practices required by the PSN IA conditions as part of their existing approach then additional controls will expected to be implemented to gain PSN IA conditions compliance. There should be minimal need to implement additional controls unless Public Sector organisations are currently missing or are not adequate and justification for new or modified controls should be more than the need to meet PSN obligations. These controls
3 should help improve and maintain the overall Information Assurance and Risk Management of the Public Sector. Compliance with the IA conditions will help to provide confidence to the general public that they are handling their information in an appropriate and safe way. Definition In order for a customer to obtain PSN compliance the organisation must comply with the PSN Code of Connection (Ref [ST11] [FO01]). The code of connection incorporates several control objectives including aspects of governance, technical interoperability requirements, service management expectations and Information Assurance (IA) standards. This document provides Public Sector organisations with guidance on how to successfully comply with the IA requirements known as IA conditions. It is essential that the IA conditions are not seen as a simple tick sheet. The IA conditions are a risk management tool to be used by customers to enable the PSN team to understand the level of risk that a connecting organisation introduces to the PSN. Risks can be mitigated in a number of ways, and therefore the IA Condition controls are as outcome focussed as possible, enabling the customer to implement suitable and effective IA controls. Compliance with the IA conditions, as part of the CoCo is assessed by the PSN team in line with PSN Compliance document (Ref [ST09]) Intended Audience This document is to be used by an organisation aiming to achieve compliance with the IA conditions, which forms part of the PSN Code of Connection. This document provides additional context around the control statements and offers support in meeting the IA conditions control objectives. The IA conditions are provided for customers at operating between IL0 and IL3. The IA controls are identical at each impact level; however, the application of those controls may vary. Where appropriate, additional guidance is offered to distinguish how the application of those controls may vary. Updates This document and the IA conditions will be subject to review. The PSN Security Forum will review the IA conditions on an annual basis to refine existing controls sets, add new controls to address specific IA challenges and remove controls that are no longer relevant. To support updates it is expected that a roadmap will be developed to highlight the future direction of the IA conditions, for example to phase in additional controls. A roadmap will enable customers/organisations to understand the implications of future changes This document is under the configuration control of the PSN team, and will be changed in accordance with PSN Document Management and Change Control (ref [ST07])
4 How to apply the IA conditions IA conditions structure and scope The IA Conditions takes the form of a number of IA Controls divided into relevant subsections such as physical security or Incident Management. The IA Conditions are all mandatory unlike other Codes of Connection where there are often distinctions between Must and Should controls. It is for each connected organisation to display compliance against each condition, or to prove that a Condition is not appropriate or that the risks addressed by the condition are met by other mitigations. The PSN IA conditions have been created to specify minimum security requirements for organisations accessing PSN services, other requirements are not within scope. The organisation is required to effectively scope what is within the PSN and subject to the PSN Conditions. The IA conditions do not need to be in scope for equipment or people that do not access the PSN when separation of that activity is assured. This approach enables organisations to connect to and consume PSN services from an enclave where needed, rather than allowing access from across the entire ICT estate. Within scope, as a minimum any device, network, person or physical location that connects to or accesses PSN Services that are not already PSN Certified must be considered as targets for compliance. Control DIA.1 (Network Diagrams) should be used to highlight what areas are considered in or out of scope for the PSN IA conditions assessment. It is accepted that there are potentially cases where PSN services are accessed from PSN accredited and assured equipment in its totality. In this instance it is likely that the technical controls will already be applied and the organisation will only need to scope the physical and personnel security controls. Once the scope is clear the customer organisation will need to apply all of the controls within that scope. It is accepted that organisations may already have certain controls in place, or that they might not be applicable as the services are pre-approved and supplied through the PSN. Where this not applicability occurs supporting comments must be provided to explain the reason why. The Conditions are aligned with established good practice, and are broadly consistent with the controls detailed in ISO/IEC The IA Conditions request evidence in the form of policies or documents. These documents are named (e.g. removable media policy). The name of the document is not important; in order to be compliant an equivalent document with alternative name can be used. It is the outcome that matters, not the document name. Documentation being used as evidence should be referenced within the comments section of the IA Conditions. The following section provides further guidance on applying this individual IA Conditions.
5 Subject specific guidance DIA.x Network Diagrams An up to date high level/logical network diagram is fundamental to understand the connection environment. The high level diagram is not expected to include every last device, in fact the diagram can be conceptual, but is required to ensure that the scope of the connection is understood by the customer and anyone carrying out a compliance check. The customer environment may be very complex with a mixture of services being consumed some will be PSN branded services and others locally procured or implemented. The key aspects to be included are: - Service interaction, so it is clear which services the organisation is consuming and whether they are PSN or non PSN services. The outcome is to highlight where service interact or interoperate. - Context around onward connectivity. If the organisation has onward connections to systems/services/networks that are either PSN or non PSN networks. Onward connections may also include detail around where the gateway is positioned. - Any off shoring of systems and information, including any life support/maintenance connections - Third party connectivity [DIA.1] As a minimum the diagram will include: Organisational name, date of diagram, author, security domains/environments (e.g. RESTRICTED or IL3 Domain), local connections (with approximate numbers of users, PSN services, Non PSN Services, remote connections/access, all external and third party connections (with names of organisations, impact levels of connection, business reason for connection and boundaries of responsibility), location of security devices such as gateways (it is accepted that not all devices will be included but those that the customer may wish to highlight later in the various controls should be included), wireless network devices, infrastructure or connections that are off shored. It is not necessary for organisations to include the details of services and equipment that has already been accredited by the PSN, simply to show connections to them. Where appropriate, for larger and more complex configurations, it is not expected that every connected device be shown. A realistic level of abstraction can be employed for standard builds and configurations, to ensure clarity around connections, security domains and services. Abstraction should be used to make the diagram simpler to produce and review. It might be appropriate to group assets by business impact level or function. The diagram method itself is not stipulated, some organisation may consider using the IS1 modelling methodology (Ref [E3]) others a more technical diagram. Due to the level of detail required, this diagram may require protectively marking. [DIA.2] The customer understands that compliance of the IA Conditions allows them to use the PSN to share information across the PSN with other PSN connected organisation and consume PSN approved services. However customers are not permitted to expose non-psn approved services to the PSN unless these have been assured and offer protection to the rest of the PSN. An example might be the wider sharing of an organisational developed service such as an HR function from one customer to other PSN connecting customers. Any service delivery of this type will need to be in accordance with the PSN Compliance document (Ref [ST09]) that places
6 restrictions around the scale, scope and appropriateness of this type of service delivery. Any onward services will need to be included in scope of the PSN IA conditions submission for assessment. The actual assurance requirements may vary, and therefore it is recommended that any customer intending to offer services in line with the PSN Compliance document seeks advice from the PSN team. RIS.x Information Risk Management Risk Management is fundamental in enabling organisations to identify and mitigate risks appropriately. One of the fundamental tenets of the IA Conditions is that consuming organisations are operating under the principles of a risk managed regime. When performed correctly, Risk Management enables an organisation to understand a system, and the possible impacts that may result due to a risk being realised. This will allow for the application of appropriate risk mitigation techniques. [RIS.1] IA Conditions submissions shall include a description of the risk management process or methodology employed by the organisation. To comply with the IA Conditions organisations shall demonstrate that information security decisions should be risk based and the application of appropriate mitigations is appropriate to the risk. Where SPF compliance is mandated, HMG IA Standard No. 1 (IS1) Part 1 Technical Risk Assessment (Ref [E3]) should be used for Risk Assessment, and IS1 part 2 used as guidance for Risk Treatment (Ref [E3]). For organisations not subject to the SPF, IS1 remains relevant and should be consulted. Alternative methodologies may be appropriate. A register of information assets should be maintained to include identification of individual assets or groups of assets and specific ownership of those assets. Information classification and handling policies are defined to include legal requirements, sensitivity and criticality and an appropriate set of procedures are be developed and implemented to ensure that information assets are managed in line with these policies. [RIS.2] Organisations should also be able to explain the governance of the ICT system which they are connecting to the PSN. There should be an individual or committee at Board level that is responsible for accepting or rejecting risk balancing business requirements and advice from security staff. PHY.x Physical Security Whilst the majority of the PSN IA conditions focus on data protection and technical measures, assets that process and/or hold data also need protecting from physical compromise, theft or tamper. They should be located in a secure location that offers adequate protection.
7 Physical security of equipment should be included within the overall risk management process. The connecting organisation shall ensure that physical access to the buildings and rooms holding PSN equipment is commensurate with the data held and in accordance with the organisation s risk management approach. Departments should consider producing an Operational Requirements statement. Other sources of advice include: CPNI Physical Security Measures CPNI Guide to Producing Operational Requirements CPNI Good Practice Guide Telecoms Resilience CPNI Good Practice Guide Protecting Data Centres Security Policy Framework (Physical Security) CPNI documents can be found at the CPNI website ( under the Physical and Information Security headings. PER.x Personnel Security Personnel security measures help organisations manage the risk of staff or contractors exploiting their legitimate access to their premises, information and staff for unauthorised purposes. It is important to ensure that the users accessing data and those responsible for administering the systems have their identities and backgrounds verified to mitigate against the risk of employing people with a criminal background or those who do not have the necessary qualifications or experience for the job. These issues are not just resolved during the recruitment process; personnel security is a discipline which needs to be maintained throughout the whole period of employment. Included should also be a formal process for managing staff leaving the organisation. The Baseline Personnel Security Standard (BPSS) provides a level of assurance of the trustworthiness and integrity and probable reliability of prospective employees. It is closely aligned to recognised good practice such as BS7858. Personal security checks and monitoring should be ongoing processes, to help identify changes in behaviour and/or circumstance that may be of concern. Additional details can be found at the following: Cabinet Office Baseline Personnel Security Standard CPNI Website, covering topics such as: o Managing Contract Staff o Ongoing Personnel Security o Overseas Criminal Record Checks o Security Culture All staff that have access to PSN services or networks either directly or through an application presented to a lower classification domain are required to undergo the BPSS or equivalent check. A BPSS check involves verification of:
8 Identity. Employment history (past 3 years) Nationality and immigration status (including an entitlement to undertake the work in question) Criminal Record (unspent convictions only) It is strongly advised to engage your Human Resources department when implementing this control. Additional guidance on managing personnel security can be found at the CPNI public website. EDU.x User Education User education is a fundamental step in mitigating many of the threats to ICT systems. If users have not received sufficient training it is unlikely that they will understand and comply with all the restrictions and responsibilities which are placed upon them, or be in a position to identify anomalous activity. [EDU.1] User education should include the following: Ensuring all users have read and understood all user security requirements including the Organisational Security Operating Procedures (SyOps) and incident reporting processes. Legal restrictions and responsibilities (e.g. Data Protection) and business controls before access to information or services is granted. In addition users are expected to understand how their actions or inaction could affect an ICT system. Organisations should also provide details to the compliance team on the dissemination of updated security procedures and guidance for users that enable them to receive the latest available information in a timely manner. It is recommended that such procedures will frequently be distributed as part of a broader awareness strategy. [EDU.2] Suitable evidence to achieve compliance in this control will include the user being presented with an An Acceptable Use Policy. Users positively confirm their acceptance of the policy and that communications sent or received by means of the PSN may be intercepted or monitored. Some sample text for the customer organisations acceptable use policy can be found in Appendix A. It is accepted that many organisations already have similar user statements. The way in which the policy is implemented is at the organisation s discretion. It could be implemented via documentation, in soft or hard copy, or electronically (for instance by getting a user to verify they have read and accepted the organisation s policy by clicking on a box on their start up screen). However the policy is implemented, the Risk Manager will ensure that users of the PSN are fully aware of their responsibilities. The Risk Manager may also wish to seek advice from the relevant Human Resource and Legal advisors in their organisation.
9 RES.x Incident Response Incident Response procedures are crucial for the management, monitoring and resolution of security incidents. Effective incident response procedures can help identify and contain anomalies and assist with recovery from them. Finally, developed Incident Response procedures will assist an organisation to identify recurring or related incidents, though incident recording and review. Organisations will have an Incident Response policy in place that includes: Security Incident Monitoring and Alerting Security Incident reporting Security Incident classification Defined roles and responsibilities for Incident Management. Procedures for escalating Incidents to the PSN team. Post incident review For HMG it is a requirement of the SPF (MR 12) that all security incidents be reported to an appropriate departmental security authority and GovCertUK. It is likely that most organisations will not have a specific Incident Response policy for PSN, but have generic policies which are applicable to their PSN connected equipment and services. The guidance below gives additional advice on the reporting of security incidents and Incident Management: GovCertUK Web pages (reporting an incident) CINRAS - IA Standard 4 Supplement 11. WARPS (Warning, Advice and Reporting Points). Details can be found at the WARPS website. CPNI Technical Note 01/2005 An introduction to Forensic Readiness Planning CESG Implementation Guide 18 Forensic Readiness Planning CESG Good Practice Guide 18 Forensic Readiness FIRST - Forum of Incident Response and Security Teams. Details can be found at the FIRST website. CESG Good Practice Guide No. 24 Security Incident Management Cabinet Office Guidance on notification of breaches of a classified nature Cabinet Office: Reporting of data breaches of an unclassified nature CON.x Configuration The PSN does not stipulate a specific configuration requirement; it expects that the organisation will develop internal policies that demonstrate how their risks are being managed. A well configured network will be security hardened to minimise services that may be exploited by an attacker. Configuration control is essential to ensure unauthorised changes cannot take place or are detected. Whilst best practice IA guidance encourages minimal services and software, it is recognised that actual configuration will be designed to enable business functions. However, it is important that the risks of running certain software configurations or services be fully understood and managed.
10 [CON.1] Organisations should apply lockdown policies for network connected equipment. Where lockdown advice is not available for a particular product or platform, the vendor should be consulted. Any policy is expected to highlight how risks are being managed. IL3 Note: It is recommended that the GAP (Government Assurance Pack) lockdown should be deployed to Windows clients that are being used at IL 3 and above. GAP is a best practice framework developed by CESG for configuring and securing Windows client operating systems. The purpose of the GAP lockdown is to improve the default security configuration in windows and provide mitigations against malicious software, remote attackers and hostile users which are the three principal sources of security threat to computer systems in high-value security environments. For networks that are operating at IL 2 and below, it is recommended that industry best practice such as Microsoft s SSLF and software restriction policies such as AppLocker should be applied. In a server environment the threat from the standard user is mitigated as standard users should not have regular access to the server OS. Instead, it is usually the case that the Server is accessed for Administration and would require Administrator credentials this would bypass a lot of traditional lockdown features. In order to lockdown a server environment it is recommended that a secure configuration such as Microsoft s SSLF is applied as well as following best practice such as removing and restricting programs and services that are not required for business use. Where appropriate, build images should be created to ensure a known configuration is deployed. [CON.2] [CON.3] In order to achieve effective configuration control Public Sector organisations will consider what limitations are required on software usage. Permitting users to install software that is not controlled will bring risk to the connected organisation and the PSN. The risks of allowing the use of unsupported, non corporate standard and/or unofficial software should be managed. Risk management should consider that allowing this software may prove difficult to keep up to date and vulnerabilities left un-patched. All security settings should be documented and understood, and any deviations approved. Where changes are necessary, a detailed and rigorous change control procedure should be followed to ensure all changes are fully documented and approved. Restricting changes to the configuration of equipment should include procedural and technical measures. Users should be instructed as to the risks or non-standard software, and restrictions should be clearly stated within the user SyOps. Deviations from standard configurations, and unauthorised changes should be detected, either through monitoring, file integrity checking, regular reviews or IT Health Checks. Where possible, the latest versions of software, service packs and updates should be used at the earliest opportunity. These should include the latest security updates. Older versions of software may be out of support, and security updates may not be available. [CON.4] Privileged accounts should only be used for activity that requires that level of privilege. Many attacks enable an attacker to run code in the context of the currently logged in user. If that user account is privileged, the impact is higher. An attacker, having gained a foothold within a network, will seek out privileged accounts. If these accounts are poorly controlled, the attacker s task becomes easier. [CON.5] Active content is data that requires some sort of execution during rendering so that it can be displayed properly. Examples include JavaScript, Adobe Flash and Microsoft Office Macros. Access to this sort of content should be restricted if it is not required.
11 Additional Advice can often be obtained from the following: CESG GAP FAQ CESG Using Windows in High Security Environments NSA Security Configuration Guides NIST - Security Configuration Guides CHE.x Compliance Checking It is extremely important to ensure that the operating systems, software and hardware are configured securely when they are installed and that they are patched regularly. As new vulnerabilities are being discovered by security researchers on a daily basis, and these are quickly used by attackers to attack systems, it is important to regularly review the security configuration to ensure that configuration and patching levels remain sufficient. This is particularly important for PSN connected organisations that if compromised, may be used by an attacker to onwardly attack other PSN connected organisations. An IT Health Check (ITHC) will help identify known vulnerabilities that an attacker may attempt to use to gain access to a system. An ITHC will use many of the attack techniques that a Hacker may use, and provides a more thorough evaluation of security than a vulnerability assessment. It is important to understand the scope of this control. Compliance with this control does not mean organisation will be required to carry out ITHC on all devices. The important angle is that the organisation has an effective programme of ITHC in place that focuses on devices that connect to PSN equipment or consume PSN services. For large scale infrastructures it is expected that the ITHC programme will not always cover all devices annually but it is assumed that the scope of annual IT Health Checks will be cycled appropriately, It is important to utilise experienced, impartial and suitably qualified security consultants for testing PSN connected equipment. These assessments may be supported by periodic validation by internal staff. Cross checking the results of an ITHC against a baseline and previous assessments is one way to gain assurance that network security has not degraded over time, and that previously identified issues have been addressed. It is important that all ITHC and vulnerability scans are correlated with the information available from Audit logs. This is to ensure that the activity generated by the tools used during the scans, many of which may also be used by hackers, are adequately recorded. Organisations should analyse the results from the ITHC, to understand the risks associated with the identified issues. Where remedial work is required, an action plan should be developed (or added to the risk treatment plan) to ensure appropriate mitigations are deployed. ITHC are required on a regular basis due to the changing nature of vulnerabilities and threats. In addition, the organisation itself may need to change the testing scope to focus on particular areas of concern. Assurance of ITHC services can be obtained by using a company that is a member of CHECK or of a scheme such as CREST and TIGER that has a professional body. Details of CHECK approved providers can be found on the CESG website. Other bodies have their own websites
12 IL3 Note: For IL3 consumers, it is expected that IT Health Check s will be conducted by a CHECK approved service provider. PAT.x Patch Management New vulnerabilities in software and firmware are reported on a daily basis, by customers and Security Researchers who are constantly seeking them out. The time taken for exploits to be developed from these vulnerabilities is ever reducing and security updates, which aim to fix them, should be applied as soon as is reasonably possible. A patch management policy sets out the principles behind applying patch updates. It should include details on prioritisation, testing, application, monitoring and scheduling. The policy should also include provision for the application of high priority security updates, for example ones that are released by the vendor to address issues which are actively being exploited by attackers. It is important to note that the patching policy includes details for the application of all security updates, which is for all network devices and applications, and not just for the operating system. It is strongly recommended that all patches be tested before application. Whilst vendors endeavour to test patches to ensure that they have no negative effect, it is up to individual customers to test all patches against their own configuration and software build. Software that is no longer supported will become vulnerable, as patches will not be developed for known vulnerabilities. Supported alternatives should be used where available. Where supported software is not available a risk assessment should be undertaken and mitigating measures undertaken. Additional guidance can be found in the following: NIST - Procedures for Handling Security Patches NIST - SP Creating a Patch and Vulnerability Management Programme CESG Good Practice Guide 20 ICT Service Management: Security Considerations ACC.x Access Control Access to services should be for named individuals only, and be supported by a sufficiently robust access control policy that will include authentication requirements. In developing the policy it should be noted that weak passwords may be guessed or broken by an attacker, and poor password management may lead to a number of issues such as passwords being written down, or passwords being reset without user identification. It is therefore expected that a holistic approach to access control be implemented. As part of an access control policy, the organisation should consider whether/how to restrict access to information by individuals that do not have a business requirement for accessing a system and its data. It is imperative that user accounts are unique to enable the tracking of specific activity to named individuals. This supports the overarching PSN Situational Awareness requirements. The use of
13 shared user accounts for access to a particular system or application should only be permitted where there is a clear business requirement. This is usually where a particular job role requires a generic account. The organisation will demonstrate clear and auditable processes are in place to track such usage. The use of shared accounts may cause issues with accountability and the audit of user actions. For all PSN connected organisations, the following technical measures should be considered as part of their password policy. This list is not necessarily prescriptive but would represent a password policy in line with good practice: A minimum of seven characters; Use a complex character set that has at least one non-alphabetic character Changed a minimum of every 90 days Not reused within 20 password changes Procedural measures should be in place to ensure: The user does not use any part of their individual account name The user does not reveal their password to anyone The user does not write down or display their password in their work area or any other place. Organisations working at IL3 should follow the guidance linked below: CESG Implementation Guide no. 3 User Authentication Systems HMG IA Standard No. 7 (IS7) Authentication of Internal Users of ICT Systems Handling Government Information (Ref [E3]). BOU.x Boundary Controls/Gateways Whilst connections between systems are a required aspect of many business activities, the passing of data between systems poses risks such as the import of malicious software, or the leakage of confidential information. This is most critical when implementing a gateway to a lower security domain. The lower security domain may not have sufficient risk management in place that a higher security domain may demand. For example it may have a less rigid removable media policy, or onward connections not appropriate for a higher security domain. In this way the lower security domain may become compromised, and lead to onward compromise of any connected system including the system in the higher security domain. Controls need implementing on the automatic forwarding of to ensure protectively marked s are not forwarded to an unaccredited or private network. [BOU.1] [BOU.2] [BOU.3] All services offered to external parties should be documented, and assessed in terms of risk, to allow appropriate mitigations to be employed. This includes connections to PSN, and non-psn services. [BOU.4] All services traversing network boundaries should be kept to a minimum to those necessary for business functions only. This reduces the opportunities for exploitation or misconfiguration that may be available to an attacker. [BOU.5] All services to less trusted networks, i.e. those outside of the PSN, should pass through a content-aware proxy server, or be subject to content scanning to detect malicious activity and
14 policy violations. This includes , web and file transfer activities. Where traffic cannot be inspected (i.e. it is encrypted in transit) the organisation should demonstrate an understanding of the risk that this represents and consider alternative appropriate measures. This can help to prevent or detect for example, protocol tunnelling, unauthenticated users or programs accessing the network service, and makes it easier to spot egress of classified material to inappropriate destinations. The proxy can also provide logging facilities, and can help protect the network from certain types of buffer overflow attack. Proxy servers should consider the need to authenticate both the user and, where possible, the (internal) host with which they are communicating, for example, by IP address and all PSN bound should be routed to a PSN endorsed mail relay. Due to the fallibility of Anti Virus software, it is strongly recommended that products from different vendors be implemented at different points in the network, i.e. on the Gateway device and on the desktops. [BOU.6] White listing is an effective tool for limiting the file types that are permitted to cross the boundary. White listing specifies which file types or addresses are permissible. If managed correctly it can be effective, but is very restrictive on user activity. Black listing is also an appropriate consideration for gateways and boundaries. Black listing may specify which file types or addresses are not permissible. As such it is less restrictive and may require increased support due to the need to maintain the list of known bad addresses. It is important that all devices that together form the Security Boundary or Gateway are suitably configured. Advice on secure configuration should be obtained for all network connected devices, and this is most critical for those devices that have security functions between the PSN connected network and other security domains. Previous guidance on the configuration of Firewalls is still relevant for Boundary and Gateway protection, and all gateways are still expected to be assured by a suitable mechanism, depending upon risk and function. For reference, the recommended PSN firewall rule can be found within Appendix B. For More details, refer to: CESG Good Practice Guide 8 - Protecting External Connections to the Internet CESG Good Practice Guide 35 - Protecting an Internal ICT Network MED.x Removable Media Removable media provide a simple method of data import and export, and as such pose risks for unauthorised data transfer. Users frequently use removable media to support home working or data sharing. Such activity indirectly connects the trusted network with other networks for which there may be very little security consideration. Removable media is a mechanism frequently associated with the introduction of malicious software, and could lead to system compromise and potentially impact any connected networks such as the PSN. Where removable media is required, policies should be developed to provide user guidance and to manage the resultant risks. Removable media also exacerbates the problems of controlling and tracking sensitive data. Not only can the devices store large quantities of data, they are also easily lost.
15 Organisations shall be able to demonstrate an understanding of the risks being exposed when permitting removable media to be used with any ICT system. Procedural and technical controls should be considered. Removable media users should be instructed in the risks of using unauthorised media, the physical protection of media, the steps required to import data from the media i.e. Anti Virus scanning and the data that is permissible to be copied onto that media. Technical controls can include disabling devices e.g. through Group policy to disable USB, or through products that only allow the connection of authorised devices. MAL.x Malware Protection Malicious software (Malware) can affect the confidentiality, integrity and availability of data, for example malware can make sensitive data available to unauthorised persons for reading, modification and export, and it could lead to a loss of service. As PSN is a large scale shared service, any compromise can have a wide ranging impact. Once Malware has been imported to a system, it may onwardly infect other devices or serve as a jump point for an attacker to onwardly compromise other systems. All data imported to the organisation should be scanned for Malware, file verification and/or content that breaks the corporate policies or guidance. This will include and web traffic, data imported via removable media, or data originating from any other connected device or network. Options in this space include protocol checking, stateful firewalls, content analysis and the checking of encrypted content. It is crucial that all scanning software is kept up to date with the latest definitions that are available, with some Anti Virus vendors updating their products multiple times a day. All updates should be obtained from trusted sources only. Devices should be configured not to auto-run content from externally connected devices or media and to automatically virus scan media when it is connected. Malware protection is linked to configuration and patch management. By not running unnecessary services, the surface area of the device that may be compromised is reduced. The application of security updates will reduce the number of known vulnerabilities to which a device is subject. Where the configuration and patch levels of devices can be verified on a regular basis, for example to ensure that all patches are being deployed and any unauthorised changes are detected, additional assurance can be gained. [MAL.3] A Stand alone virus checker can be defined as a machine that has no direct connectivity to the operational network or systems. The sole purpose of this device to check removable media for malware and other content inspection as relevant before connecting the media to an operation network or system. The stand alone system should be managed to ensure that it is regularly subjected to updates. Ideally the stand alone system will have multiple methods for checking malware i.e. through the use of several ant-malware engines. The stand alone system will be expected to form part of the overall removable media/malware policy of the organisation. For More details, refer to: CESG Good Practice Guide 7 Protection from Malicious Code
16 MOB.x Mobile / Home Working Mobile working is fundamental to the modern workplace, and may be central to the organisation s Business continuity plans. However mobile devices allow trusted networks to be accessed from environments over which the organisation has little or no control e.g. public places. The devices themselves may be lost or stolen, data may be read by uncleared individuals for example via shoulder surfing, and the devices could be used to attack the internal network. CESG Good Practice Guide 10 gives advice about the risks and appropriate measures to manage remote working at a number of impact levels. Organisations are reminded that GPG10 (Ref [E5]) covers both technical and procedural guidance on remote working, and a purely technical remote working policy will not in itself be acceptable. A remote working policy needs creating and all users need to be aware of the guidance and restrictions which it contains. This should include personnel and physical security aspects of using devices to access protectively marked data from public places. For example it should include advice on the storage of the device, its usage, method of connection to the internal network, password policies and restrictions for its use overseas. Organisations should be able to specify minimum requirements for all remotely connected devices. As with any endpoint, mobile devices should run Anti Malware software and be securely configured, as described under Configuration (above). They should also run a personal firewall and all relevant security patches should be applied. In addition, these devices should employ appropriate encryption for data at rest and in transit. Details of suitable encryption standards can be found in Information Standard No. 4 (IS4) Management of Cryptographic Systems (Ref [E5]). The use of mobile devices to access PSN services from overseas changes the nature of the risks to which those devices may be exposed. Organisations should develop specific policies and guidance where overseas working is a requirement. IL3 Note: Devices used for remote and home working must implement appropriate encryption for data at rest and in transit in line with the SPF. Current requirements at IL3 require CESG Baseline approved products for encryption. All organisations should consider the appropriateness of encryption overseas and national legal restrictions. WIR.x Wireless Networks Many data thefts and compromises have occurred as a result of attackers gaining access to an internal network via a Wireless access point. The attacker is frequently located offsite; therefore they do not require physical access to the building containing the network which they wish to compromise. A related issue is the security of Wireless clients which may connect to untrusted access points. Once compromised, these clients can be used to attack and compromise the internal network.
17 CESG Manual Y gives guidance on how to configure a corporately managed Wi-Fi network and apply WPA2 encryption. At IL3 it is recommended that the customer s wireless network is a validated implementation of Manual Y. CESG Good Practice Guide 10 gives advice on other wireless technologies, such as Bluetooth and is a source of additional guidance on remote working. Network vulnerability scanning tools should be used to identify access points, and any unauthorised devices should be disabled immediately. OBF.x Network Obfuscation From the outside of a network, it can be very difficult to understand how to mount a successful attack. Any information that the network reveals about its hardware, software and configuration may be useful to an attacker. An attacker who knows very little about a network may have to attempt many different methods of probing and attacking to gain knowledge of and access to a network. This approach is quite obvious and may lead the detection of the attack. An attacker who has been able to passively obtain information about a network (information which has been released to external sources legitimately) will be in a better position to identify vulnerabilities and utilise attacks which will increase their chance of success and a lower the chance of them being detected. Consideration is to be given as to what information is released to external sources concerning the internal configuration of the network, the software used etc. This might be achieved by appropriate configuration of externally facing devices, to ensure they communicate with the minimum amount of information required. An example of which is Banner Grabbing ; a technique that attackers may employ to gather information about open services on a system. Once the attacker knows what software versions are running, they can identify any weaknesses. Many legitimate applications will communicate with cloud based services as part of their standard functionality, for example antivirus products. Departments should follow CESG guidance (Ref [E5]) on traffic collection and monitoring in order to minimise any adverse effect of these communication. PRO.x Protective Monitoring Protective Monitoring comprises three core processes: Accounting, Auditing and Monitoring of ICT systems. It is one of the most useful forms of detecting and understanding anomalous events. Without such analysis, malicious activity may go undetected, or it may be impossible to understand or resolve security events adequately. Protective Monitoring may encompass virtually every network device and application; however careful thought needs to be given to the volume of data produced and the analysis performed. [PRO.1] Detailed guidance for organisations implementing protective monitoring can be found within CESG Good Practice Guide No.13 (Protective Monitoring for HMG ICT Systems).
18 Where GPG13 (Ref [E5]) is used the protective monitoring applied be consistent with the relevant baseline countermeasures set from IA Standard 1 Part 2 and the Controls associated with the appropriate Recording Profile set out in CESG Good Practice Guide No.13. It is important that devices have enough storage space for the amount of logs that they are required to store. Depending upon the device or application, if log storage space is full it may either stop working or overwrite historic information. There are numerous tools that can assist with the processing and analysis of audit logs. It is recommended that some form of automatic processing occurs to improve the speed of analysis, and thus improve the efficiency of response. [PRO.2] The PSN team or a delegated authority may occasionally request logging information from an organisation connected to the PSN. Where legally acceptable and appropriate these should be made available to the PSN team. This will only ever be in connection with a serious incident one that almost certainly has had an impact on the connected organisation. In such a situation it is likely that this request would be part of assistance being provided to the organisation. Understanding and managing the use of IP addresses can help ensure appropriate routing of information, and reduce the chance of accidental information release. Static IP addresses can assist with protective monitoring and incident response as the identification of devices is more easily achieved and should be assigned for all devices where possible. It is accepted that this will not always be practical, and in these cases other methods of correctly attributing devices should be sought. For More details, refer to: CESG Good Practice Guide 13 - Protective Monitoring for HMG ICT Systems CESG Good Practice Guide 18 - Forensic Readiness PSN Protective Monitoring Guidance CHECK NAME to be produced. IL2/3 Note: The requirements within GPG13 (Ref [E5]) for IL2 and IL3 ICT systems differ. At IL2 GPG13 generally advises the application of the Baseline Control set, whereas at IL3 individual risks need assessing and appropriate controls implementing. GPG13 also details differing requirements for log retention, analysis and incident investigation at the two impact levels. EMA.x is frequently used as a method of delivering Malware, that is within the itself or an attachment, or to entice the recipient to click on a link that leads them to a website from which Malware is automatically downloaded. The richer the mail format, the more functionality that is available for an attacker to exploit. Users should be made aware of the need to consider what information is being released via outside of the organisation s network boundary. Requiring them to add protective markings to s will ensure they consider the content, and will assist with any technical solutions for monitoring that may be deployed. It is each organisation s responsibility to manage its data, and they should consider requiring users to add security labels consistent with the Government Protective Marking Scheme to any that
19 contains information attracting a protective marking, i.e. PROTECT or above. This will help to limit the likelihood of accidental release of sensitive information. Where a customer decides not to implement a labelling scheme or policy this should be done so as part of their overall risk management approach.
20 Example Acceptable Use Statements I understand and agree to comply with the security rules of my organisation. For the avoidance of doubt, the security rules relating to secure and IT systems usage include: I acknowledge that my use of the PSN may be monitored and/or recorded for lawful purposes; I agree to be responsible for any use by me of the PSN using my unique user credentials (user ID and password, access token or other mechanism as provided) and address; I will not use a colleague's credentials to access the PSN and will equally ensure that my credentials are not shared and are protected against misuse; I will protect such credentials at least to the same level of Protective Marking as the information they may be used to access, (in particular, I will not write down or share my password other than for the purposes of placing a secured copy in a secure location at my employer s premises); I will not attempt to access any computer system that I have not been given explicit permission to access; I will not attempt to access the PSN other than from IT systems and locations which I have been explicitly authorised to use for this purpose; I will not transmit information via the PSN that I know, suspect or have been advised is of a higher level of sensitivity than my PSN domain is designed to carry; I will not transmit information via the PSN that I know or suspect to be unacceptable within the context and purpose for which it is being communicated; I will not make false claims or denials relating to my use of the PSN (e.g. falsely denying that an had been sent or received); I will protect any material, whatever the sensitivity or protective marking, sent, received, stored or processed by me via the PSN to the same level as I would paper copies of similar material; I will not send information marked RESTRICTED or above over public networks such as the Internet unless approved encryption has been applied to it; I will always check that the recipients of messages are correct so that potentially sensitive or protectively marked information is not accidentally released into the public domain; I will not auto-forward from my PSN account to any non-psn account; I will disclose information received via the PSN only on a need to know basis; I will not forward or disclose any sensitive or protectively marked material received via the PSN unless the recipient(s) can be trusted to handle the material securely according to its sensitivity and forwarding is via a suitably secure communication channel;
21 I will seek to prevent inadvertent disclosure of sensitive or protectively marked information by avoiding being overlooked when working, by taking care when printing information received via the PSN (e.g. by using printers in secure locations or collecting printouts immediately they are printed, checking that there is no interleaving of printouts, etc.) and by carefully checking the distribution list for any material to be transmitted; I will securely store or destroy any printed material; I will not leave my computer unattended in such a state as to risk unauthorised disclosure of information sent or received via the PSN (this might be by closing the e- mail program, logging-off from the computer, activating a password-protected screensaver, etc., so as to require a user logon for activation); and Where my organisation has implemented other measures to prevent unauthorised viewing of information displayed on IT systems (such as an inactivity timeout that causes the screen to be blanked or to display a screensaver or similar, requiring a user logon for reactivation), then I will not attempt to disable such protection; I will make myself familiar with the security policies, procedures and any special instructions that relate to the PSN; I will inform my manager immediately if I detect, suspect or witness an incident that may be a breach of security; I will not knowingly attempt to bypass or subvert system security controls or to use them for any purpose other than that intended; I will not remove equipment or information from my employer s premises without appropriate approval; I will take precautions to protect all computer media and portable computers when carrying them outside my organisations premises (e.g. not leaving a laptop unattended or on display in a car such that it would encourage an opportunist thief); I will not knowingly introduce viruses, Trojan horses or other malware into the system or PSN; I will not disable anti-virus protection provided at my computer; I will comply with the Data Protection Act 1998 and any other legal, statutory or contractual obligations that my employer informs me are relevant; and If I am about to leave my employer, I will inform my manager prior to departure of any important information held in my account.
22 Recommended firewall rule set From To Protocol Action Comment Your proxy/nat PSN PSN Your mail servers Your DNS Server(s) Your NTP servers PSN Your applications/web servers Your mail servers PSN PSN DNS servers PSN NTP Servers HTTP (TCP/80) HTTP (TCP/8080) HTTPS (TCP/443) HTTP (TCP/80) HTTPS (TCP/443) SMTP (TCP/25) SMTP (TCP/25) DNS (UDP/53) DNS (TCP/53) Allow Allow Allow Allow Allow Enable outbound access to applications within the PSN using HTTP & HTTPS Enable inbound requests from the PSN to your Web Servers/ Applications Enable inbound from PSN Enable outbound from your network to the PSN Allow queries to the PSN DNS servers NTP (UDP/123) Allow Allow queries to PSN NTP servers Any Any Any Block Default rule for all other traffic.
23 IA conditions mapped against GSi CoCo Network schematic GSi IL2 GSi IL3 PSN Organisation commitment statement confirms that a schematic is provided. Accreditation Accreditation statement - approved security policy, a security management process and security operating procedures Governance Physical security Personnel security User education Incident response Secure configuration Unauthorised software Configuration control Least privilege Active content Executable content Compliance checking Cover sheet Risk owner identified Organisation and accreditation statements - SIRO and accreditor endorse the CoCo 1.1 Hosts and network equipment in secure accommodation 6.3 BPSS for all users who have regular access to RESTRICTED 2.1 Training and awareness 2.2 AUP Process to manage and report 4.1 Hardware and software Accreditation statement - accredited for RESTRICTED, a full RMADS in accordance with SPF and relevant HMG and CESG IA Standards. Cover sheet SIRO identified Organisation and accreditation statements - SIRO and accreditor endorse the CoCo 1.1 Hosts and network equipment in secure accommodation commensurate with protecting assets carrying the protective marking of RESTRICTED 6.3 BPSS for all users 6.4 RECOMMEND SC for some roles 4.1 Hardware and software 4.5 RECOMMEND GAP DIA.1 High level / logical network schematic accompany the IA Conditions document. RIS.1 Risk management and standards based approach to assurance RIS.2 Board level responsibility for information risk identified PHY.1 Equipment has physical security commensurate with the function. PHY.2 Access to buildings and rooms containing equipment and terminals is secured. PER.1 BPSS for all users EDU.1 Training and awareness EDU.2 AUP RES.1 RES.3 Process to manage and report CON.1 Hardware and software CON.1 Recommend GAP 4.2 Execution prevented CON.2 Execution prevented 4.3 Required CON.3 Required 18.1 Web browser and web enabled applications 18.2 ActiveX, 18.3 Active content, 18.5 Java virtual machine, 20.1 Macros RECOMMEND that all are disabled 21.2 RECOMMEND that automatic execution of content is not allowed 21.3 RECOMMEND that executable attachments to are not allowed 5.1 Annual ITHC 5.1 Annual ITHC 5.2 Use CHECK CON.4 User accounts CON.5 Within the context of risk management CON.6 Run with the user s active consent and within the organisation s control CHE.1 Annual ITHC
24 Patch management Removable media GSi IL2 GSi IL3 PSN 14.1, 14.2 Patching policy PAT.1, PAT.2 Patching policy exists and is applied exists and is applied 6.1 Each user has a ACC.1 Associate all activity with unique userid a unique user identifier 6.2 Sufficiently complex 6.2 HMG policy ACC.2 Access control policy that passwords compliant passwords manages risks 6.5 File system access 6.5 File system access control control 16.2 Connection to lower domains appropriate controls 16.4 Connection to higher domains formal assurance 8.2 EAL4 firewall between organisation and third parties. RECOMMEND that it is different to the firewall between organisation and GSi. 8.3 Configuration of firewall between organisation and GSi 17.4 RECOMMEND protocol checking by proxy servers 19.2 Content analysis of all traffic including virus check and attachments at gateway and host 19.3 RECOMMEND gateway and host use different content analysis software 21.4 RECOMMEND encrypted files not sent by RECOMMEND attachments and extensions validated 19.4 RECOMMEND white list of allowed attachment file types 15.1 RECOMMEND access disabled 15.2 RECOMMEND handle in accordance with HMG policy 16.2 Connection to lower domains appropriate controls (slightly different wording) 16.4 Connection to higher domains formal assurance 8.2 EAL4 firewall between organisation and third parties. Different to firewall between organisation and GSi RECOMMEND access disabled 15.2 Handle in accordance with HMG policy BOU.1 Assured mechanism between different impact level domains BOU.2 Assured gateway between PSN and non-psn BOU.3 Effective mechanism between same impact level domains BOU.4 Minimise services between domains BOU.5 Content analysis of all traffic between PSN and non- PSN including virus check and attachments at gateway and host BOU.6 White list of allowed attachment file types MED.1 Policy must be within the context of risk management
25 Wireless networks Network obfuscation GSi IL2 GSi IL3 PSN 17.4 RECOMMEND protocol checking by proxy servers 18.4 RECOMMEND https is disabled MAL.1 Identify malware and vulnerability exploiting code at the gateway. End point equivalent when encrypted 19.2 Content analysis of all traffic including virus check and attachments at gateway and host 19.1 Identify and isolate MAL.2 Identify and isolate malicious software 19.5 Content analysis for removable media 10.1 Operate in accordance with HMG policy and guidance 10.4 Only connect from official / managed devices 10.3 PED in accordance with CESG guidance 10.5 Personal firewall 10.6 Two factor authentication 10.2 Encryption to protect data at rest and in transit. CAPS, other CESG approval for RESTRICTED, or FIPS In accordance with Manual Y or other approved encryption. Include in ITHC 12.1 Minimise details of internal network structure, components and security tools and techniques that are passed outside the organisation 12.2 NAT 12.3 RECOMMEND PAT 13.1 Protective monitoring controls in accordance with GPG13. Apply GPG 13 Baseline Control Set Encryption to protect data at rest and in transit. CAPS or other CESG approval for RESTRICTED 13.1 Protective monitoring controls in accordance with GPG13. Apply GPG 13 Baseline Control Set 3 malicious software MAL.3 Content analysis and AV scan of removable media; ideally on a stand alone virus checker i.e. a machine that s sole purpose is to check removable media for malicious content and is isolated form, the main network/infrastructure. MOB.1 Operate in accordance with the organisation's remote / mobile working policy. MOB.2 Appropriate control and management of the technical environment. MOB.3 Organisational lockdown and configuration management policies for mobile / remote devices. MOB.4 Two factor authentication MOB.5 Encryption to protect data at rest and in transit with a suitable level of assurance. WIR.1 Policy in line with public sector guidance. OBF.1 Minimise details of internal network structure, components and security tools and techniques that are passed outside the organisation PRO.1 Protective monitoring controls commensurate to environment and data processing requirements. Good practice guidance in GPG13.
26 GSi IL2 GSi IL3 PSN 13.2 Audit logs available to assist in investigations and access control monitoring 13.4 Provide logs on request 13.3 Logs maintained for a minimum of six months 13.5 Common time source; GSi time source preferred 23.1 The mail client or user adds security labels to each that carries a protective marking of PROTECT or higher 4.4 RECOMMEND static ARP and DNS 5.3 RECOMMEND quarterly scan for vulnerabilities 5.4 RECOMMEND configuration checks 7.1 RFC 1918 compliant IP addresses 7.2 Static IP addresses for servers 8.1 EAL4 firewall between organisation and the GSi 8.4 GPS approval for changes to GSi firewall configuration IDS 16.3 Refer to GPS for access to other domains via PSI 17.1 Http and smtp via a proxy server RECOMMEND for IL2, MUST for IL RECOMMEND proxy servers authenticate hosts 17.3 Proxy servers ensure users are authenticated and access controls enforced 20.2 RECOMMEND macro security set to high 21.1 RECOMMEND HTML disabled for not auto forwarded outside GSi domain Mail server controls no use of GSi address as a source address by other organisations RECOMMEND for IL2, MUST for IL3 PRO.2 Subject to legal constraints, provide information and make available audit logs PRO.3 Within legal constraints retain audit logs for a minimum of six months. PRO.4 Consistent time source synchronised across all devices. The time source applied shall support effective log analysis and be from the time source of their PSN Service Provider. PRO.5 Possible to match server activity to a specific server. EMA.1 s and attachments labelled to highlight the sensitivity and value that the information has to the data owner. Where appropriate labelling shall be in line with the Government Protective Marking Scheme
27 References Note The PSN Universal Reference Sheet provides additional information regarding the products referenced in this document. The Reference Sheet can be found in the Resources and Documentation section of the website. Please note the exceptions listed below. E3 E3 E3 E3 E5 E5 HMG Information Assurance Standard No. 1, Technical Risk Assessment, Part 1, Issue 3.6, October 2010 (NPM). ^ HMG Information Assurance Standard No. 1, Technical Risk Assessment, Part 2, Issue 3.6, October 2010 (NPM). ^ HMG Information Assurance Standard No. 4, Comsec and Cryptography, Management of Cryptographic Systems, Issue 4.0, October (UK RESTRICTED). ^ HMG Information Assurance Standard No. 7, Authentication of Internal Users of ICT Systems Handling Government Information, Issue 1.0, October 2010 (NPM). ^ CESG Good Practice Guide No.10 - Remote Working - Issue 2.0, April 2010 (UK RESTRICTED). ^ CESG Good Practice Guide No Protective Monitoring for HMG ICT Systems, Issue 1.5, August 2010 (NPM). ^ ^ Available from - CESG Information Assurance Portfolio website or by contacting [email protected]. Access can be requested by contacting [email protected], it should be known that there might be distribution restrictions
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
DVLA ELISE GSi Closed User Group Code of Connection
DVLA ELISE GSi Closed User Group Code of Connection Security Warning Notice The following handling instructions apply to this document: - Handle, use and transmit with care - Take basic precautions against
IT Heath Check Scoping guidance ALPHA DRAFT
IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
Reducing the Cyber Risk in 10 Critical Areas
Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved
18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Information System Audit Guide
Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V
October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
How to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme avecto.com Contents Introduction to the scheme 2 Boundary firewalls and internet gateways 3 Secure configuration
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures
SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
