Infrastructure Information Security Assurance (ISA) Process
|
|
|
- Aubrey Fletcher
- 10 years ago
- Views:
Transcription
1 Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology in accordance with its Transformation Plan, this handbook establishes the process and guidance for the Postal Service information security assurance for major information technology (IT) infrastructure components. The process provides a framework for defining security requirements and controls, assessing risk, testing security solutions, and evaluating the security posture of Postal Service IT infrastructure to ensure that appropriate, cost-effective information security controls and processes are implemented. B. Distribution. This document is available on the Postal Service Intranet at C. Comments and Questions. Submit comments and questions to: CORPORATE INFORMATION SECURITY OFFICE UNITED STATES POSTAL SERVICE 4200 WAKE FOREST ROAD RALEIGH NC Comments may also be sent by to [email protected]. Use AS-805-B Infrastructure ISA Process in the subject header. D. Effective Date. This handbook is effective immediately. Robert L. Otto Vice President, Chief Technology Officer
2 Book Title Book Number
3 Contents Contents 1 Introduction About This Handbook Purpose of Infrastructure ISA Importance of Infrastructure ISA General Infrastructure Observations Roles and Responsibilities Chief Inspector Manager, Corporate Information Security Office Executive Sponsors Program Managers Accreditor Certifier Information Systems Security Officers Contracting Officers Business Partners Overview of Infrastructure ISA What The Infrastructure ISA Consists Of What the Infrastructure ISA Applies To Infrastructure ISA Phases, Activities, and Deliverables Frequency of the Infrastructure ISA Funding of the Infrastructure ISA The Infrastructure ISA Process Phase 1 Definition Objectives Deliverables Roles and Responsibilities Activities Hold Infrastructure ISA Meeting Review Documentation Develop High-Level Architectural Diagram Complete Infrastructure Requirements Determination Incorporate Information Security Requirements in SLAs and TPAs Update Project Plan March 2005 iii
4 Infrastructure Information Security Assurance (ISA) Process 4-2 Phase 2 Design and Integration Objectives Deliverables Roles and Responsibilities Activities Analyze Requirements and Identify Potential Security Controls Assess Risks Infrastructure Risk Assessment Infrastructure Risk Assessment Activities Infrastructure Risk Assessment Roles and Responsibilities Select/Design Security Controls General Selecting Security Controls Document Security Specifications Acquire, Build, and Integrate Information Security Controls Develop Infrastructure Security Plan General Infrastructure Security Plan Roles and Responsibilities Harden Information Resources Develop Standard Operating Procedures Reassess Threats, Vulnerabilities, and Risks Phase 3 Testing Objectives Deliverables Roles and Responsibilities Activities Develop Infrastructure Security Test and Evaluation Plan General Build Infrastructure Security Test and Evaluation Plan Conduct the Infrastructure Security Test and Evaluation Conduct Security Test Process Develop Infrastructure Security Test and Evaluation Report Conduct Operational Security Training Conduct Independent Reviews Resolve Outstanding Issues Phase 4 Evaluation Objectives Deliverables Roles and Responsibilities Activities Evaluate Infrastructure ISA Documentation iv Handbook AS-805-B
5 Contents Prepare Infrastructure ISA Evaluation Report Escalate Security Concerns or Certify Infrastructure Component Prepare Risk Mitigation Plan Escalate Security Concerns or Accredit Infrastructure Component Accept Residual Risk and Deploy Infrastructure Component Phase 5 Production Objectives Deliverable Roles and Responsibilities Activities Conduct Operations and Maintenance Re-initiate Infrastructure ISA as Required Reassess Risks Implement or Modify Security Controls Update Infrastructure ISA Documentation Package Dispose of Equipment and Media Retire Infrastructure Component Re-initiating The Infrastructure ISA Purpose When Re-ISA Is Required Process Requesting a Re-ISA Conducting a Re-ISA Phase 1, Definition Phase 2, Design and Integration Phase 3, Testing Phase 4, Evaluation Phase 5, Production March 2005 v
6 Infrastructure Information Security Assurance (ISA) Process Exhibits Exhibit 3-1 Infrastructure ISA Phases and Major Deliverables Exhibit 4-1 Phase 1, Definition Exhibit 4-2 Phase 2, Design and Integration Exhibit 4-3 Phase 3, Testing Exhibit 4-4 Phase 4, Evaluation Exhibit 4-5 Phase 5, Production Exhibit 4a Infrastructure ISA Templates vi Handbook AS-805-B
7 Introduction Introduction 1-1 About This Handbook This handbook contains a high-level description of the Postal Service infrastructure information security assurance (ISA) process, identifies the roles and responsibilities, and provides pointers to instructions and templates to complete each phase of the process. 1-2 Purpose of Infrastructure ISA Infrastructure ISA is the process the Postal Service uses to evaluate the protection of its infrastructure components so that risks associated with deployment can be appropriately managed throughout the life cycle of the infrastructure components. 1-3 Importance of Infrastructure ISA Infrastructure The underlying base or foundation for information resources including physical and cyber-based resources (i.e., facilities, network hardware and software, and environmental support services). The infrastructure components addressed in this handbook are major groupings or network segments that provide reusable and repeatable services for application systems. This process provides Postal Service infrastructure owners with a consistent method for making informed decisions on managing security risks related to their infrastructure. Benefits include the following: a. Protection of the integrity of the Postal Service brand. b. A structured view of the potential risks associated with infrastructure and the relationships among business partnerships. c. Documented implementation of information security controls and processes that protect Postal Service infrastructure. d. A secure platform to build protection measures for the confidentiality, integrity, and availability of Postal Service information resources. e. A secure platform to build protection measures for the privacy of employees and customers. f. Protection of Postal Service assets. g. Compliance with the intent of applicable federal laws and regulations. March
8 1-4 Infrastructure Information Security Assurance (ISA) Process 1-4 General Infrastructure Observations Security The condition achieved when designated information, equipment, personnel, processes, and facilities are protected against threats. Privacy is a key component of security. Privacy The protection afforded individuals from the collection, storage, and dissemination of information about themselves and possible compromises resulting from unauthorized release of that information. Infrastructure components are generally considered to be critical components of the Postal Service computing environment. Infrastructure components must generally be capable of processing sensitive information and applications. 2 Handbook AS-805-B
9 Roles and Responsibilities Roles and Responsibilities This chapter defines the roles and responsibilities for the infrastructure ISA process. 2-1 Chief Inspector Certification The technical analysis that establishes the extent to which an application meets specified security requirements. The chief inspector is responsible for providing physical security as well as personnel clearance consultation and guidance during infrastructure implementation to assure that security concerns are addressed and that information and/or evidence that may be needed for an investigation is retained by the infrastructure owner. 2-2 Manager, Corporate Information Security Office Accreditation The management analysis that determines, from a business standpoint, whether implemented security controls satisfy specified security requirements and provide an acceptable level of risk. The manager, Corporate Information Security Office (CISO), is responsible for the following: a. Developing and maintaining the infrastructure ISA process. b. Managing the CISO support for the infrastructure ISA process. c. Appointing information systems security officers (ISSOs). d. Reviewing the infrastructure ISA documentation package and escalating security concerns or accrediting the infrastructure component. 2-3 Executive Sponsors IIA The process to identify the appropriate information security requirements to protect the infrastructure component based on the sensitivity and criticality of the hosted applications. Executive sponsors are responsible for the following: a. Ensuring the completion of all security-related tasks throughout the life cycle of an infrastructure component. b. Funding information security controls that satisfy the information security requirements and the documentation requirements associated with the infrastructure ISA process for infrastructure components under their purview. c. Implementing security controls that satisfy the security requirements defined in the infrastructure impact assessment (IIA). March
10 2-4 Infrastructure Information Security Assurance (ISA) Process d. Accepting any residual risk associated with deployment of the infrastructure component. e. Maintaining appropriate security during the production phase by ensuring the installation of operating system and security patches. 2-4 Program Managers Program managers for the infrastructure component development, acquisition, or integration are responsible for the following: a. Managing the development and implementation efforts for new infrastructure components, whether developed in-house, outsourced, or acquired. b. Incorporating the appropriate security controls in all infrastructure components, whether developed in-house, outsourced, or acquired, to satisfy the security requirements defined in the IIA. c. Completing the required infrastructure ISA documentation including high-level architectural diagram, security specifications, standard operating procedures, security plan, security test and evaluation plan, and security test and evaluation report. 2-5 Accreditor The manager, Corporate Information Security Office, functions as the accreditor and is responsible for the following: a. Reviewing the risk mitigation plan and supporting infrastructure ISA documentation package together with business requirements and relevant Postal Service issues. b. Escalating security concerns or preparing and signing an accreditation letter that makes one of the following recommendations: accepting the infrastructure component with its existing information security controls, requiring additional security controls with a timeline to implement, or deferring deployment until information security requirements can be met. c. Forwarding the accreditation letter and infrastructure ISA documentation package to the executive sponsor. 2-6 Certifier The manager, Information Security Assurance, functions as the certifier and is responsible for the following: a. Managing and providing guidance to the information systems security officers (ISSOs). b. Reviewing the infrastructure ISA evaluation report and the supporting infrastructure ISA documentation package. 4 Handbook AS-805-B
11 Roles and Responsibilities 2-9 c. Escalating security concerns or preparing and signing a certification letter. d. Forwarding the certification letter and infrastructure ISA documentation package to the accreditor. e. Maintaining an inventory of all infrastructure components that have completed the infrastructure ISA process. 2-7 Information Systems Security Officers Information systems security officers (ISSOs) are responsible for the following: a. Providing information security and infrastructure ISA guidance. b. Completing the IIA. c. Coordinating the completion of the infrastructure risk assessment. d. Reviewing the infrastructure ISA documentation and any independent reviews of the infrastructure components. e. Preparing the infrastructure ISA evaluation report. f. Forwarding the infrastructure ISA documentation package to the certifier. 2-8 Contracting Officers Contracting officers are responsible for the following: a. Ensuring that information technology contractors, vendors, and business partners are contractually obligated to abide by information security policies, standards, and procedures, including the infrastructure ISA. b. Ensuring that the security requirements are specified in the contractual agreements. 2-9 Business Partners Business partners developing or hosting infrastructure components for the Postal Service are responsible for the following: a. Abiding by Postal Service information security policies, regardless of where the infrastructure components are located or who operates them. b. Implementing and maintaining security controls to meet assurance level and contractual security requirements. c. Making necessary changes to security controls to reduce risk to an acceptable level as defined by Postal Service contract representatives. March
12 Infrastructure Information Security Assurance (ISA) Process This page intentionally left blank 6 Handbook AS-805-B
13 Overview of Infrastructure ISA Overview of Infrastructure ISA ISM-SDLC The procedures, practices, and guidelines governing the initiation, concept development, planning requirements analysis, design, development, integration and test, implementation, operations, maintenance, and disposition of information resources in the Postal Service system. Sensitivity The degree to which the Postal Service must protect the confidentiality and integrity of information. Levels of sensitivity are sensitive, business-controlled sensitivity, and nonsensitive. 3-1 What The Infrastructure ISA Consists Of The infrastructure ISA process consists of the following five interrelated phases that are conducted concurrently with the development and deployment of new infrastructure components (i.e., during the Integrated Solutions Methodology (ISM) System Development Lifecycle (SDLC): Phase 1 Definition. Phase 2 Design and Integration. Phase 3 Testing. Phase 4 Evaluation. Phase 5 Production. The infrastructure ISA process, located in Exhibit 3-1, documents the sensitivity and criticality of the hosted Postal Service applications, defines information security requirements, determines appropriate security controls and processes to satisfy the security and privacy requirements, tests the effectiveness of implemented security controls and processes, evaluates the threats and vulnerabilities associated with the infrastructure components and the risks associated with deployment, and culminates with certification. During the production phase, the infrastructure component is maintained with the appropriate security to manage the residual risk. The infrastructure ISA process is repeated every 3 years or as required to ensure the continuing security of the infrastructure component (see Chapter 5). 3-2 What the Infrastructure ISA Applies To Criticality The degree to which the Postal Service must provide for continuous availability of information. Levels of criticality are critical, business-controlled criticality, and noncritical. The infrastructure ISA process applies to all infrastructure components sponsored by, developed for, or maintained or operated on behalf of the Postal Service, whether or not they are located at a Postal Service facility. The infrastructure ISA also applies to pilot and proof-of-concept projects. March
14 3-3 Infrastructure Information Security Assurance (ISA) Process 3-3 Infrastructure ISA Phases, Activities, and Deliverables Exhibit 3-1 depicts the five infrastructure ISA phases and the major activities and deliverables required during each phase. Certification The technical analysis that establishes the extent to which an application meets specified security requirements. 3-4 Frequency of the Infrastructure ISA The infrastructure ISA is performed at least every 3 years on an infrastructure component following its last certification or sooner if the infrastructure component undergoes significant change. See Chapter 5, Re-Initiating the Infrastructure ISA, for specific reasons. 3-5 Funding of the Infrastructure ISA Significant change A change that calls into question the security of an information resource and the accuracy of previous infrastructure ISA documentation. Funding for the infrastructure ISA process should be determined before development efforts begin and included as part of the overall development project funding. The scope and funding should be discussed with business partners and contractors before development begins, especially when the business partners must conduct some of the tasks associated with the infrastructure ISA process. 8 Handbook AS-805-B
15 Overview of Infrastructure ISA 3-5 Exhibit 3-1 Infrastructure ISA Phases and Major Deliverables March
16 Infrastructure Information Security Assurance (ISA) Process This page intentionally left blank 10 Handbook AS-805-B
17 The Infrastructure ISA Process The Infrastructure ISA Process This chapter describes each phase in the infrastructure ISA process. At the end of this chapter, Exhibit 4a provides a list of infrastructure ISA guidelines, templates, and related Web links. 4-1 Phase 1 Definition Phase 1 applies to infrastructure components sponsored by, developed for, or maintained or operated on behalf of the Postal Service, whether or not they are located at a Postal Service facility. It can be applied to new business partner initiatives. It begins when the manager CISO or the executive sponsor requests the initiation of the infrastructure ISA process. (See Exhibit 4-1, Phase 1.) Objectives Phase 1 objectives are as follows: a. Documenting the sensitivity and criticality of the applications hosted on the infrastructure component. b. Developing a high-level architecture diagram. c. Identifying connectivity requirements. d. Determining security requirements to mitigate risk based on the sensitivity, criticality, and the business needs of the Postal Service Deliverables The deliverables for Phase 1 are the following: a. A high-level architectural diagram. b. A completed IIA. c. The security requirements incorporated in the service level agreement (SLA) and trading partner agreement (TPA), if applicable. March
18 4-1.3 Infrastructure Information Security Assurance (ISA) Process Roles and Responsibilities Roles Executive sponsor Program manager ISSO Responsibilities Ensures completion of Phase 1 activities. Develops a high-level architectural diagram. Develops SLA and TPA if applicable. Provides guidance and consulting support. Coordinates the completion of the IIA Activities Hold Infrastructure ISA Meeting The ISSO assigned to the infrastructure component holds an infrastructure ISA meeting to discuss the proposed infrastructure component and its business requirements and the infrastructure ISA process. ISSOs are encouraged to pursue flexible and cost-effective communication approaches, such as teleconferencing or videoconferencing Review Documentation The ISSO reviews applicable infrastructure documentation. Some of the documentation could include the following: a. Original business needs statement, business case, request for proposal, and statement of work. b. SLAs, contracts, and project plans. c. Policies, procedures, and any other applicable documentation that may affect the infrastructure component Develop High-Level Architectural Diagram A high-level architectural diagram (e.g., hardware, communications, security devices, and interconnected resources) must be developed and submitted to the manager, Secure Infrastructure Services, for review and determination of the impact on the Postal Service infrastructure and the need for additional network security controls Complete Infrastructure Requirements Determination An IIA must be completed which includes the following steps: a. Documenting the sensitivity and criticality of the applications hosted on the infrastructure component. b. Engaging the Network Connectivity Review Board if necessary. c. Determining the information security requirements. 12 Handbook AS-805-B
19 The Infrastructure ISA Process Incorporate Information Security Requirements in SLAs and TPAs Information security requirements must be incorporated in SLAs and TPAs, if applicable. An SLA is developed for all infrastructure components, and a TPA is developed for all externally managed or developed infrastructure components Update Project Plan Once the IIA is completed, the Program Manager ensures that the project plan is revised to include integrating information security controls in the infrastructure component and the deliverables associated with the infrastructure ISA process. March
20 Infrastructure Information Security Assurance (ISA) Process Exhibit 4-1 Phase 1, Definition INPUT ACTIVITIES OUTPUT Proposals, Scope of Work, Business Case, Policies and Procedures Review Documentation and Begin Infrastructure Impact Assessment (IIA) Document Application Sensitivity and Criticality Application Designations Develope High-Level Architecture Diagram High-Level Architecture Diagram Define Security Requirements Security Requirements Complete IIA Sign IIA Infrastructure Impact Assessment Phase 2 Design and Integration 14 Handbook AS-805-B
21 The Infrastructure ISA Process Phase 2 Design and Integration Phase 2 identifies security controls and processes which will satisfy the security requirements defined during Phase 1. (See Exhibit 4-2, Phase 2.) Objectives Phase 2 objectives are as follows: a. Identifying security controls and processes for security requirements defined during Phase 1. b. Selecting security controls on their ability to meet security requirements and provide a cost-effective security solution. c. Identifying the risks associated with the infrastructure component Deliverables The deliverables for this phase are the following: a. Infrastructure risk assessment. b. Security specifications. c. Infrastructure security plan. d. Standard operating procedures Roles and Responsibilities Roles Executive sponsor Program manager ISSO Responsibilities Ensures completion of Phase 2 activities. Develops infrastructure security specifications, standard operating procedures, and security plan. Provides guidance and consulting support. Coordinates the completion of the infrastructure risk assessment. Note: If the projected dates of delivery of the deliverables change, the project plan should be amended and the ISSO should be notified of the changes Activities Analyze Requirements and Identify Potential Security Controls Analyze security requirements established for the infrastructure and identify potential security controls in light of business requirements, Postal Service policies, and cost versus benefit of the various control options. March
22 Infrastructure Information Security Assurance (ISA) Process Assess Risks Risks depend on the configuration of the infrastructure and the implementation environment. An infrastructure risk assessment must be completed Infrastructure Risk Assessment The infrastructure risk assessment is an ongoing process designed to minimize risk to infrastructure components by identifying additional security controls (i.e., beyond those initially established) to be deployed that are commensurate with the relative values of the assets to be protected, the vulnerabilities associated with those assets, and threats to those assets Infrastructure Risk Assessment Activities An infrastructure risk assessment will do the following: a. Identify general administrative data and assets. b. Identify possible threats that could adversely affect the infrastructure. c. Identify security vulnerabilities that could be exploited by threat events affecting the infrastructure. d. Analyze implemented and planned controls against requirements. e. Identify the probability that a vulnerability may be exploited. f. Identify the adverse impact resulting from a successful exploitation of a vulnerability. g. Determine the overall risk to the infrastructure. h. Identify possible additional mitigating controls that, if applied, could be expected to mitigate the risks identified for the infrastructure. i. Document the overall risk status of the infrastructure Infrastructure Risk Assessment Roles and Responsibilities Roles Executive sponsor Program manager ISSO Responsibilities Ensures completion of infrastructure risk assessment for infrastructure components under their purview. Provides personnel and financial resources to support risk assessment activities. Accepts any residual risk associated with infrastructure. Works with the ISSO to complete the risk assessment. Provides guidance on applicability of threats or vulnerabilities and appropriate choice of countermeasures. Coordinates the completion of the risk assessment Select/Design Security Controls General Security controls must be selected to satisfy the security requirements identified in the IIA during Phase 1 and to mitigate the risks identified in the infrastructure risk assessment. Multiple information security controls may be needed to satisfy a particular information security requirement, or one control may satisfy more than one information security requirement. 16 Handbook AS-805-B
23 The Infrastructure ISA Process Selecting Security Controls Information security controls are selected based on their capability to be implemented in the infrastructure, a cost-benefit analysis of the controls, business needs, and compatibility with other Postal Service security controls and processes. Circumstances peculiar to the infrastructure, changes in technologies, and the discovery of new vulnerabilities in what had been considered safe products may lead to additional security controls Document Security Specifications The security specifications must be documented for use in the acquisition of information security products and services or their development Acquire, Build, and Integrate Information Security Controls The development team acquires, builds, and integrates the information security controls and processes and keeps the ISSO informed of their progress Develop Infrastructure Security Plan General An infrastructure security plan must be developed. The security plan is a blueprint for protecting the infrastructure component in the production environment. It describes all information security controls and processes that have been implemented or planned and delineates responsibilities and expected behavior of all individuals who access the application Infrastructure Security Plan Roles and Responsibilities Roles Executive sponsor Program manager ISSO Development team Responsibilities Provides personnel and financial resources to support development of an infrastructure security plan. Completes the infrastructure security plan. Provides guidance and consulting support. Implements specific security controls and processes and keeps Program Manager and ISSO informed of progress Harden Information Resources The infrastructure must be hardened to meet or exceed the requirements documented in Postal Service hardening standards. Hardening refers to the process of implementing additional software, hardware, or physical security controls Develop Standard Operating Procedures Standard operating procedures must be developed to handle the operating support required for the infrastructure. These procedures cover such topics as separation of duties, manual processes, and report distribution. March
24 Infrastructure Information Security Assurance (ISA) Process Reassess Threats, Vulnerabilities, and Risks As development or integration proceeds, requirements may change. Planned security controls and processes may be less effective than what is needed when the entire computing environment is considered or may be unable to be implemented because of costs, supporting resources, or available technology. Such changes may affect the risk to the infrastructure. The infrastructure risk assessment should be updated as required. 18 Handbook AS-805-B
25 The Infrastructure ISA Process Exhibit 4-2 Phase 2, Design and Integration INPUT ACTIVITIES OUTPUT Phase 1 Definition Infrastructure Impact Assessment (IIA) Analyze Requirements, Identify Possible Controls, and Begin Risk Assessment Select/Design Security Controls and Processes and Document Security Specifications Security Specifications Acquire/Build/Integrate Security Controls Security Plan Develop Security Plan and Standard Operating Procedures Standard Operating Pro- Procedures Reassess Threats, Vulnerabilities, Risks, and Residual Risk Risk Assessment Phase 3 Testing March
26 4-3 Infrastructure Information Security Assurance (ISA) Process 4-3 Phase 3 Testing Phase 3 focuses on testing the security controls and processes defined in the infrastructure security plan and implemented in Phase 2 to determine their effectiveness Objectives Determine effectiveness of security controls and processes defined in the infrastructure security plan and implemented in Phase 2. (See Exhibit 4-3, Phase 3.) Deliverables The deliverables in this phase are the following: a. Infrastructure security test and evaluation (ST&E) plan. b. Infrastructure ST&E report. c. Operational security training. d. Independent reviews Roles and Responsibilities Roles Executive sponsor Program manager ISSO Development team Responsibilities Ensures completion of Phase 3 activities. Coordinates the development of the infrastructure security test and evaluation plan. Coordinates the infrastructure security test and evaluation. Coordinates the security test and evaluation report preparation. Provides guidance and consulting support. Participates in security testing when possible. Coordinates any independent reviews. Designs test procedures and scripts to test specific security controls and processes. Tests the security controls and processes. Documents test results. Note: If the projected delivery dates of the infrastructure security test and evaluation plan, infrastructure security test and evaluation report, or independent reviews change, the project plan must be amended and the ISSO notified of the changes. 20 Handbook AS-805-B
27 The Infrastructure ISA Process Activities Develop Infrastructure Security Test and Evaluation Plan General The ST&E plan addresses the security testing to be conducted. If the ST&E plan is part of the overall system test plan, highlight or flag the security section for ease of review Build Infrastructure Security Test and Evaluation Plan All of the stakeholders should be consulted to determine the process by which the security test and evaluation is conducted. The infrastructure ST&E plan must: a. Address the security controls and processes described in the infrastructure security plan and the means by which those controls and processes will be tested. b. Define the security functionality (security control feature) to be tested for each security control implemented. c. Describe the actual testing to be performed for each control. Include applicable test scripts, scenarios, performance thresholds, and an indication of pass or fail for each control Conduct the Infrastructure Security Test and Evaluation Conduct Security Test Process The security test must be performed in accordance with the infrastructure ST&E plan to reduce the risk of false or faulty test results. If a modification to a control is required, the change should be reflected in the ST&E plan before the test is executed Develop Infrastructure Security Test and Evaluation Report Upon completion of the testing: a. The development team documents the test results in an infrastructure ST&E report and submits the findings to the executive sponsor. If the ST&E report is a part of the overall test report, highlight or flag the section addressing information security testing for ease of review. b. The executive sponsor, in collaboration with the ISSO and program manager, reviews the findings and determines whether the security controls and processes are adequate to protect the infrastructure component or whether modifications to the security controls and processes are warranted. If modifications are warranted, the infrastructure ST&E plan is amended and testing reinitiated Conduct Operational Security Training Users, system administrators, management, and other personnel must be trained on the correct use of the infrastructure component and its security safeguards. March
28 Infrastructure Information Security Assurance (ISA) Process Conduct Independent Reviews The following independent reviews may be required during Phase 3 to determine the effectiveness of the security controls and processes: a. Independent risk assessments. b. Independent penetration testing and vulnerability scans. c. Independent security test validations. These independent reviews are discussed in Handbook AS-805-A, Application Information Security Assurance (ISA) Process, Chapter 5, Independent Reviews Resolve Outstanding Issues Any outstanding issues must be resolved and the applicable infrastructure ISA Phase revisited before Phase 4, Evaluation, is initiated. 22 Handbook AS-805-B
29 The Infrastructure ISA Process Exhibit 4-3 Phase 3, Testing INPUT ACTIVITIES OUTPUT Phase 2 Design and Integration Security Plan and Risk Assessment Develop Security Test and Evaluation Plan Security Test and Evaluation Plan Conduct Security Tests and Develop Test Report Security Test and Evaluation Report Independent Reviews? YES Risk Assessment Test Validation Penetration Tests and Vulnerability Scans NO Outstanding Issues? YES Return to Applicable ISA Phase NO Phase 4 Evaluation March
30 4-4 Infrastructure Information Security Assurance (ISA) Process 4-4 Phase 4 Evaluation Phase 4 consists of those activities that culminate in certification and acceptance of risk of the infrastructure component. (See Exhibit 4-4, Phase 4.) Objectives The objectives of this phase are to certify and accept residual risk of the infrastructure component Deliverables The deliverables of this phase are the following: a. Infrastructure ISA evaluation report. b. Certification letter. c. Risk mitigation plan. d. Accreditation letter. e. Acceptance letter Roles and Responsibilities Roles ISSO Certifier Accreditor Executive sponsor Other stakeholders Responsibilities Evaluates infrastructure ISA documentation, prepares an infrastructure ISA evaluation report that details the findings, and forwards the infrastructure ISA documentation package to the certifier. Reviews the infrastructure ISA documentation package, makes the decision to escalate security concerns or prepares and signs a certification letter that summarizes the findings, reviews and updates the infrastructure risk assessment as required, prepares a risk mitigation plan for residual risks rated as medium or high, and forwards the infrastructure ISA documentation package to the accreditor. Reviews infrastructure ISA documentation package and makes the decision to escalate security concerns or prepares and signs an accreditation letter, and forwards the infrastructure ISA documentation letter to the executive sponsor. Provides personnel and financial resources for correcting deficiencies. Accepts any residual risk associated with deployment. Participate by responding on outstanding issues or providing advisory support. 24 Handbook AS-805-B
31 The Infrastructure ISA Process Activities Evaluate Infrastructure ISA Documentation The ISSO initiates the evaluation of infrastructure ISA documentation package early in the infrastructure ISA process. This enables the developers to be proactive in identifying and addressing information security concerns. The infrastructure ISA documentation package includes: a. IIA. b. Infrastructure security plan and supporting documentation. c. Infrastructure risk assessment. d. Infrastructure ST&E plan. e. Infrastructure ST&E report. f. Independent reviews, if applicable Prepare Infrastructure ISA Evaluation Report Upon completion of the evaluation, the ISSO prepares an infrastructure ISA evaluation report that details the results and forwards the infrastructure ISA documentation package to the certifier for review Escalate Security Concerns or Certify Infrastructure Component The certifier escalates security concerns or prepares and signs an infrastructure certification letter summarizing the findings Prepare Risk Mitigation Plan The certifier and program manager then review and update the infrastructure risk assessment completed in Phase 2 as required. For any residual risks rated as medium or high, a risk mitigation plan is prepared recommending whether the risks should be accepted, transferred, or further mitigated. The certifier forwards the infrastructure ISA documentation package to the accreditor for review Escalate Security Concerns or Accredit Infrastructure Component The accreditor reviews the infrastructure ISA documentation package and escalates security concerns or prepares and signs an accreditation letter. The accreditor submits the final package with recommendations to the executive sponsor Accept Residual Risk and Deploy Infrastructure Component The executive sponsor accepts any residual risk by preparing and signing an acceptance letter, deploys the infrastructure component into production, and files the infrastructure ISA documentation package. March
32 Infrastructure Information Security Assurance (ISA) Process Exhibit 4-4 Phase 4, Evaluation INPUT ACTIVITIES OUTPUT Phase 3 Testing IIA, Security Plan, Risk Assessment, Security Test and Evaluation Report Evaluate ISA Documents and Prepare ISA Evaluation Report and Certification Letter ISA Evaluation Report Review ISA Documents, Prepare and Sign Certification Letter Certification Letter Signed Certification Letter NO Return to Applicable ISA Phase YES Business Requirements, Postal Service Issues, and ISA Documents Analyze Documentation and Prepare Risk Mitigation Plan; and Prepare and Sign Accreditation Letter Risk Mitigation Plan Accreditation Letter Accept Residual Risk NO Return to Applicable ISA Phase YES Deploy Infrastructure Component File ISA Documentation Phase 5 Production 26 Handbook AS-805-B
33 The Infrastructure ISA Process Phase 5 Production Phase 5 encompasses activities that occur after the infrastructure component is deployed to the production environment and continue throughout the life cycle. (See Exhibit 4-5, Phase 5.) Objectives The objectives of this phase are to ensure protection of the infrastructure component after deployment and throughout its life cycle Deliverable The deliverable for this phase is revised infrastructure ISA documentation Roles and Responsibilities Roles Executive sponsor Program manager ISSO Responsibilities Ensures secure operations and maintenance of the infrastructure component, including latest security patches and releases. Determines whether changes are significant and ensures that the infrastructure ISA process is reinitiated as required. Retires infrastructure component when no longer needed. Reviews existing security controls to determine whether they are still sufficient and implements additional or modifies existing security controls as required. Ensures that the infrastructure ISA documentation package is kept current. Provides guidance and consulting support Activities Conduct Operations and Maintenance Operate the infrastructure component with the security controls, processes, and procedures in place as documented in the infrastructure security plan, ensuring that they remain fully functional and unaltered by maintenance procedures. Ensure that the latest security software patches and releases are installed. The infrastructure component must be under configuration control and all changes properly documented Re-initiate Infrastructure ISA as Required Re-initiate the infrastructure ISA every 3 years or if there is a significant change to the infrastructure component. Significant changes include a change to the level of criticality or sensitivity of hosted applications, a significant audit finding, or a significant security incident. Unresolved issues, new business requirements, new threats and vulnerabilities, operating environment changes, audit reports, and incidents must be appropriately addressed throughout the infrastructure component life cycle. Also, certain March
34 Infrastructure Information Security Assurance (ISA) Process changes to the infrastructure component or its environment as well as business considerations could affect the security of the infrastructure and may require a re-initiation of the infrastructure ISA process. (See Chapter 5, Re-Initiating the Infrastructure ISA.) Reassess Risks Reassess risk every 3 years and whenever major changes are made to the infrastructure component, a serious breach occurs, or audit findings regarding security are issued Implement or Modify Security Controls Monitor and test the security controls periodically and determine whether additional security controls need to be added or existing controls modified to properly secure the infrastructure component in the changing environment. If the infrastructure component security posture or controls change significantly, it is necessary to re-initiate the infrastructure ISA process Update Infrastructure ISA Documentation Package Keep the infrastructure ISA documentation package current throughout the infrastructure component life cycle process Dispose of Equipment and Media Postal Service hardware and media containing sensitive or business-controlled sensitivity information that is no longer needed must be completely erased (sanitized) or destroyed prior to disposal Retire Infrastructure Component The infrastructure component may eventually be retired. Upon determination that an infrastructure component has reached the end of its life cycle, the executive sponsor ensures all data is completely removed from the assets being retired and retires the infrastructure component in accordance with Handbook AS-805, Information Security. 28 Handbook AS-805-B
35 The Infrastructure ISA Process Exhibit 4-5 Phase 5, Production INPUT ACTIVITIES OUTPUT Phase 4 Evaluation Policies and Procedures, ISA Documentation, and Operations Documentation Operations and Maintenance Unresolved Issues, New Business Requirements, Residual Risk, Audits, and Incidents Significant Change? YES Return to Phase 1, Re-initiate ISA NO Reassess Risks Revised Risk Assessment Implement or Modify Security Controls If Necessary and Update ISA Documentation Revised ISA Documentation Retire System? YES Follow Policy and Procedures for System Retirement NO Continue with Operations March
36 Infrastructure Information Security Assurance (ISA) Process Exhibit 4a Infrastructure ISA Templates Template Name Applicability Purpose Infrastructure ISA Status Tracking Sheet Optional use. To record responsibility and schedule for completion for each infrastructure ISA product. Infrastructure Impact Assessment Infrastructure Security Plan Infrastructure Risk Assessment Independent Risk Assessment Report Infrastructure Security Test and Evaluation Plan Infrastructure Security Test and Evaluation Report Infrastructure ISA Evaluation Report For infrastructure components. For infrastructure components. For infrastructure components. May be recommended if infrastructure component is publicly accessible; developed, hosted, managed primarily by non-postal Service personnel; highly visible or has high impact. May be required at any time by VP/CTO or Mgr., CISO. For infrastructure components. For infrastructure components. For infrastructure components. To document sensitivity and criticality and to determine information security requirements for an infrastructure component. To create a blueprint for designing, building, and maintaining an infrastructure component that can be defended against threats and intruders, both internal and external. To identify assets at risk and their value and weaknesses and vulnerabilities, evaluate threats and vulnerabilities to determine risks, identify safeguards, analyze costs and benefits of safeguards, and document the residual risk. To provide a standard report format to document results of independent risk assessment, i.e., one conducted by an entity outside the development organization. To provide a framework for testing and evaluating the technical/nontechnical security controls/safeguards. To document the results of the testing and evaluation of technical/nontechnical security controls/safeguards. To document the ISSO evaluation of technical and nontechnical security features and other safeguards to establish extent to which an infrastructure component meets security requirements. Certification Letter For infrastructure components. For the certifier to recommend approval for an infrastructure component to operate in given operational concept and environment at a documented level of residual risk. Risk Mitigation Plan For infrastructure components where residual risk is High or Medium. To describe plan to mitigate residual risk, when such risk is High or Medium for infrastructure components and to provide a vehicle for the executive sponsor to accept the residual risk. Accreditation Letter For infrastructure components. For the accreditor to recommend one of the following: accepting the infrastructure component with its existing information security controls, requiring additional security controls with a timeline to implement, or deferring deployment until information security requirements can be met. Acceptance Letter For infrastructure components. For executive sponsor to accept residual risk. 30 Handbook AS-805-B
37 5-2 5 Re-initiating The Infrastructure ISA 5-1 Purpose The purpose of re-initiating the infrastructure ISA (Re-ISA) is to ensure that the following conditions are met: a. Existing security controls and processes for the infrastructure component are still in place and functioning correctly. b. Changes to the infrastructure component requiring new or modified security controls and processes are properly addressed. c. Security controls and processes are still appropriate based on organizational changes within the Postal Service. d. Security controls and processes are still appropriate based on the discovery of new vulnerabilities or how new technologies impact those controls. 5-2 When Re-ISA Is Required Re-ISA is required a minimum of every 3 years following the initial infrastructure ISA of the infrastructure component or for the following reasons: a. Significant change to the operating environment, business requirements, or the infrastructure component. Any change that adversely affects the security of the infrastructure component is a significant change. Significant changes include but are not limited to: (1) Higher criticality or sensitivity designation of a hosted application. (2) Change from one major operation system to another. (3) Change in the hosting location, such as from a Postal Service facility to an outsourced, non-postal Service location. (4) Change in the operating environment resulting from the discovery of a new vulnerability or threat that significantly alters the risk to the infrastructure component. March
38 5-3 Infrastructure Information Security Assurance (ISA) Process b. A significant information security incident that violates an explicit or implied security policy and compromises the integrity, availability, or confidentiality of a hosted application (e.g., a critical disruption or monetary loss, the unauthorized modification of sensitive or critical information, or the release of sensitive or business-controlled sensitivity information). c. Significant finding of an audit or other external assessment. d. A request by the VP/CTO; the manager, CISO; or the executive sponsor. 5-3 Process Requesting a Re-ISA Three years after an infrastructure component s ISA or for one of the other reasons previously covered, the manager, Information Security Assurance, requests a Re-ISA Conducting a Re-ISA The deliverables from Phases 1 and 2 of the initial infrastructure ISA process should be reviewed, updated as required, signed, and dated. The Re-ISA follows the initial infrastructure ISA process with the following exceptions Phase 1, Definition The following procedures are carried out under Phase 1 for the Re-ISA: a. The high-level architecture diagram is updated as required. b. The applications documented in the IIA are reviewed and updated in the IIA as required. c. The security and privacy requirements are updated as required for the infrastructure component Phase 2, Design and Integration The following procedures are carried out under Phase 2 for the Re-ISA: a. New or modified security and privacy controls and processes are identified to satisfy any new or modified security requirements. b. The new or modified security and privacy controls and processes are implemented. c. The existing infrastructure security plan, infrastructure risk assessment, and standard operating procedures are updated to reflect these changes. 32 Handbook AS-805-B
39 Phase 3, Testing The following procedures are carried out under Phase 3 for the Re-ISA: a. The infrastructure ST&E plan is updated as required. b. Security testing is conducted based on the updated ST&E plan to ensure that the new or modified security and privacy controls and processes are functional and provide the appropriate level of protection for the infrastructure component. c. The results of the security testing are documented in a ST&E report. d. The operational security training materials are updated as required Phase 4, Evaluation Phase 4 activities, focusing on the changes, are conducted as defined in Section Phase 5, Production Phase 5 activities are conducted as defined in Section March
40 Infrastructure Information Security Assurance (ISA) Process This page intentionally left blank 34 Handbook AS-805-B
Publication 805-A Revision: Certification and Accreditation
Postal Bulletin 22358 (3-7-13) Policies, Procedures, and Forms Updates Publication 805-A Revision: Certification and Accreditation Effective immediately, the January 2013 edition of Publication 805-A,
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
CITY UNIVERSITY OF HONG KONG. Information System Acquisition, PUBLIC Development and Maintenance Standard
CITY UNIVERSITY OF HONG KONG Development and Maintenance Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in
Information Technology Security Certification and Accreditation Guidelines
Information Technology Security Certification and Accreditation Guidelines September, 2008 Table of Contents EXECUTIVE SUMMARY... 3 1.0 INTRODUCTION... 5 1.1 Background... 5 1.2 Purpose... 5 1.3 Scope...
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015
Cybersecurity Risk Management Activities Instructions Fiscal Year 2015 An effective risk management program and compliance with the Federal Information Security Management Act (FISMA) requires the U.S.
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
From Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter
Pennsylvania State System of Higher Education California University of Pennsylvania UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter Version [1.0] 1/29/2013 Revision History
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
Parcel Readiness Product Tracking and Reporting System Controls
Parcel Readiness Product Tracking and Reporting System Controls Audit Report Report Number IT-AR-5-002 December 6, 204 The Postal Service needs to improve its process for managing and securing the PTR
Software Development Processes
Software Development Processes Audit Report Report Number IT-AR-15-006 July 13, 2015 Highlights The Postal Service does not consistently manage software development risk. Background Organizations spend
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
FINAL Version 1.0 June 25, 2014
CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland 21244-1850 Risk Management Handbook Volume III Standard 7.2 FINAL Version 1.0
Security Testing and Vulnerability Management Process. e-governance
Security Testing and Vulnerability Management Process for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Standard Operating Procedure Information Security Compliance Requirements under the cabig Program
Page 1 of 9 Pages Standard Operating Procedure Information Security Compliance Requirements under the cabig Program This cover sheet controls the layout and components of the entire document. Issued Date:
Information Technology Project Oversight Framework
i This Page Intentionally Left Blank i Table of Contents SECTION 1: INTRODUCTION AND OVERVIEW...1 SECTION 2: PROJECT CLASSIFICATION FOR OVERSIGHT...7 SECTION 3: DEPARTMENT PROJECT MANAGEMENT REQUIREMENTS...11
IT Security Risk Management: A Lifecycle Approach
Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach ITSG-33 November 2012 Foreword The of is an unclassified publication issued under the authority of the Chief,
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
28400 POLICY IT SECURITY MANAGEMENT
Version: 2.2 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. The objective of this policy is to provide direction and support for IT
INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN
10/25/2012 TECHNOLOGY SERVICES INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN Procedure Name: LIT Risk Management Information Technology Plan ver 2.31.docx Risk Management Plan Issue Date: TBD Procedure Owner:
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
General HIPAA Implementation FAQ
General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,
Security Patch Management
The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.40 December 30, 1997 SUBJECT: DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ASD(C3I) References: (a) DoD Directive
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients
Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients Network Test Labs Inc. Head Office 170 422 Richards Street, Vancouver BC, V6B 2Z4 E-mail: [email protected]
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
1 Introduction: Corporate Information Security... 1
Contents 1 Introduction: Corporate Information Security......................... 1 1-1 Purpose................................................................. 1 1-2 Scope...................................................................
Information Security for IT Administrators
Fiscal Year 2015 Information Security for IT Administrators Introduction Safeguarding the HHS Mission Information Security Program Management Enterprise Performance Life Cycle Enterprise Performance Life
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
PHASE 5: DESIGN PHASE
PHASE 5: DESIGN PHASE During the Design Phase, the system is designed to satisfy the requirements identified in the previous phases. The requirements identified in the Requirements Analysis Phase are transformed
CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE August 25, 2009 Version
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Hardware Inventory Management Greater Boston District
Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Migration Planning Guidance (Draft)
Financial Management Line of Business Migration Planning Guidance (Draft) Section 1.1 Overview The purpose of the Migration Planning Guidance document is to help agencies prepare for, and manage, a migration
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data 1 Table of Contents Executive Summary... 3 Template
Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet
Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Commercial Solutions for Classified (CSfC) Customer Handbook Version 1.1
Commercial Solutions for Classified (CSfC) Customer Handbook Version 1.1 This page is intentionally left blank. ii Table of Contents I. Introduction... 1 II. Purpose... 1 III. Audience... 1 IV. CSfC Artifacts
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
FHFA. Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME)
FHFA Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a more
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities
Office of Audits and Evaluations Report No. AUD-13-007 The FDIC s Controls over Business Unit- Led Application Development Activities September 2013 Executive Summary The FDIC s Controls over Business
