The Commonwealth of Massachusetts
|
|
|
- Natalie Wilkins
- 9 years ago
- Views:
Transcription
1 A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS TEL. (617) NO T OFFICE OF THE STATE AUDITOR'S REPORT ON INFORMATION TECHNOLOGY-RELATED CONTROLS FOR VIRUS PROTECTION AT THE GROUP INSURANCE COMMISSION October 9, 2003 through August 23, 2004 OFFICIAL AUDIT REPORT JUNE 20, 2005
2 TABLE OF CONTENTS TABLE OF CONTENTS INTRODUCTION 1 AUDIT SCOPE, OBJECTIVES, AND METHODOLOGY 2 AUDIT CONCLUSION 5 AUDIT RESULTS 6 APPENDIX Agencies Visited Generally Accepted Management and Technical Control Practices Date of Virus Infection by Agency per ITD ITD s SAS Reported Security Alerts Information Technology Architecture and Enterprise Standards 18
3 INTRODUCTION INTRODUCTION The Group Insurance Commission (GIC) was established in 1955 as a quasi-independent state agency and was placed within the Executive Office for Administration and Finance by Chapter 32A, Section 3, of the Massachusetts General Laws. The Commission administers health insurance and other benefits for the Commonwealth s employees and retirees and their dependents and survivors. The Commission s services also cover housing and redevelopment authority personnel and retired municipal employees, including teachers. For certain governmental units, health coverage options include an indemnity plan, a preferred provider organization (PPO), and health maintenance organization (HMO) plans. The Group Insurance Commission is located in Boston, Massachusetts. The Commission s business operations are supported by an IT configuration consisting of a local area network (LAN) that is comprised of three file servers and sixty microcomputer workstations. The Commission s IT systems are connected to MAGNet, which is the Commonwealth of Massachusetts wide area network (WAN), and uses anti-virus software for scanning of the LAN servers and all individual microcomputer workstations. The Commission has two individuals in information technology positions who are responsible for the operation and security of IT systems
4 AUDIT SCOPE, OBJECTIVES, AND METHODOLOGY AUDIT SCOPE, OBJECTIVES, AND METHODOLOGY Audit Scope Our audit, which was conducted from August 9, 2004 through October 22, 2004, consisted of an examination of virus protection activities at the Group Insurance Commission for the period covering October 9, 2003 through August 23, Our examination focused on a review of controls related to policies, procedures and use of software tools to prevent and detect viruses and unauthorized intrusions, assess the level of risk of viruses, report on the occurrence of a potential virus, and to implement corrective measures. The audit was performed in conjunction with similar audits conducted at thirty-two other state agencies for the period covering October 2003 through January 2005 (see Appendix 1). Audit Objectives The primary objective of our audit was to determine whether the Commission s IT resources were adequately protected against virus attacks and malicious intrusions through appropriate preventive, detective, and corrective measures. Specifically, we sought to determine whether adequate policies and procedures were in place to inform and guide personnel in addressing virus protection and to determine whether appropriate software tools, such as anti-virus software, were used to prevent and detect computer viruses. In addition, we sought to determine whether appropriate risk management procedures and tools were in place to limit malicious intrusions and virus entry points and to address vulnerabilities that viruses could exploit. We also sought to determine whether appropriate policies and procedures were in place to respond to detected viruses. Lastly, we determined the extent to which virus protection-related efforts were documented and monitored. Audit Methodology Before initiating audit field work, we researched generally accepted management and technical control practices that addressed virus protection. We conducted preliminary research on various anti-virus software programs and their capabilities. We also researched the use of firewalls, intrusion detection systems, anti-adware and anti-spyware programs, patch management, alert notifications, and documentation of incident response and remediation efforts. Research was also performed on IT-related virus activities, including the history, creation, detection, and eradication of computer viruses. Our preaudit work included identifying standard procedures undertaken by the Commonwealth s Information Technology Division (ITD) to address virus protection and to support agencies in detecting and eliminating viruses. We developed survey questions and audit procedures based upon recommended - 2 -
5 AUDIT SCOPE, OBJECTIVES, AND METHODOLOGY control practices, including the use of software controls to identify and eliminate computer viruses. Our survey questionnaire incorporated questions that focused on management and technical control practices used to address virus protection. The survey was developed to serve as a high-level checklist for agencies in reviewing their status with respect to generally accepted virus protection policies and procedures. Our pre-audit work included gaining and recording an initial understanding of the Commission s mission and business objectives through Internet-based research. Our on-site audit work included verifying our initial understanding of the Commission s mission and business objectives and identifying the entity s IT environment and how IT resources were configured. To determine whether appropriate policies and procedures were in place to provide direction and guidance on addressing virus protection, we determined whether the Commission had identified the level of virus infection risk and established control mechanisms to mitigate the risk. We requested policies and procedures related to virus protection and other documentation regarding the use of anti-virus software. We reviewed and evaluated the Commission s stated policies and procedures regarding virus protection. We identified whether the Commission had access to MAGNet and were MassMail users, and extent to which anti-virus programs had been deployed and kept up to date. We interviewed the information technology personnel responsible for managing the IT environment to identify specific controls directed toward virus protection. We assessed the level of understanding of virus risks, use of anti-virus programs, and risk management and incident response procedures. With respect to protective measures, we determined whether the Commission s IT environment was subject to firewall protection, intrusion detection, and appropriate update and patch management procedures. Specifically, we ascertained whether the installed anti-virus software had been adequately maintained with the latest software and definition updates. We reviewed the Commission s experience regarding virus attacks and the steps taken to protect their IT environment. We determined whether the Commission had incident handling procedures to investigate, isolate, and eliminate viruses if detected on IT equipment. In addition to enquiring how the Commission may have been effected by viruses, we documented the use of software to detect, eradicate, and prevent viruses. We determined whether control practices were in place to support safe recoveries under business continuity procedures should a virus render systems inoperable and recovery procedures needed to be initiated. Our audit was conducted in accordance with Generally Accepted Government Auditing Standards (GAGAS) and industry auditing practices. The audit criteria used for our examinations were based on - 3 -
6 AUDIT SCOPE, OBJECTIVES, AND METHODOLOGY applicable control objectives and generally accepted IT control practices. Included in the report s Appendix is a list of generally accepted control practices for virus protection (see Appendix 2). In addition to generally accepted control practices, audit criteria for management control practices were drawn from CobiT. CobiT (Control Objectives for Information and Related Technology) is a generally applicable and accepted standard for information technology security and control. Virus Background And History A computer virus is man-made software used to infiltrate and attack a computer s operating system, applications, or data files. In most instances, the attack happens without the knowledge of the computer s owner, with the first indication that an attack has occurred when the computer either does not work or starts to perform incorrectly. The Group Insurance Commission relies heavily on information technology, including access to MAGNet, to help carry out its mission and business objectives. We note that over the last few years MAGNet has experienced infection from computer viruses from time to time. According to ITD there have been fifteen successful virus attacks in the fifteen-month period from October 2003 to December 2004 (see Appendix 3). To maintain a record of the viruses, ITD in 2003 created a software program called Security Alert System (SAS) which allows ITD to track and rank the virus threats with a threat level of low, medium, high, and critical. According to ITD s threat table, there were 42 tracked virus incidents between October 9, 2003 and January 5, 2005 (see Appendix 4). In order to protect the Commonwealth, ITD requires that agencies use anti-virus software; provides a downloadable copy of anti-virus software for agency use; maintains the SAS tracking program, a Help Desk, and firewalls; sends out alerts to IT personnel at state agencies; and monitors MAGNet so that agencies with virus infections are disconnected if necessary until the virus has been removed. ITD has also created policies that agencies are required to follow if they are to use ITD resources (see Appendix 5). To effectively reduce the risk of computer viruses and worms infiltrating an organization, a comprehensive and dynamic anti-virus program needs to be established. There are two major ways to prevent and detect viruses and worms that infect computers and network systems. The first is by having sound policies and procedures in place, and the second is by technical means, including anti-virus software. Both administrative controls and technical tools are required to effectively provide virus protection
7 T AUDIT CONCLUSION AUDIT CONCLUSION Although controls were in place at the Group Insurance Commission to address virus protection, certain controls needed to be strengthened to provide reasonable assurance that information technology resources would be adequately protected against known virus attacks through appropriate preventive, detective, and corrective measures. We found that the Commission was afforded a level of protection through the installation of anti-virus software and their reliance on Commonwealth s Information Technology Division s firewall and intrusion detection systems. Although the Commission s IT policies and procedures included statements concerning the use and capabilities of anti-virus software, the IT policies and procedures needed to be significantly enhanced to better inform and guide personnel in addressing virus protection and incident response procedures. We also found that the GIC had not documented a formal risk assessment regarding vulnerabilities of virus attacks or an evaluation of measures to mitigate such risks and address virus protection overall. As a result, the Commission lacked adequate documentation of vulnerability points or potential entry paths for viruses. With regard to incident handling, the Commission relies on ITD s assistance in identifying, isolating, and eliminating detected threats of intrusion. The Commission had not documented a risk assessment that included the impact of virus attacks on IT resources, nor included virus infection in business continuity planning as one of the possible scenarios that could render systems inoperable. From a business continuity planning perspective, the risk assessment efforts should include virus attacks as one of the potential risks to continued availability of automated systems. In addition, disaster recovery strategies need to consider what is required to mitigate further virus threats. Recovery procedures should require that all backup copies of data files and application and system programs, utilities and tools be scanned by anti-virus software as they are reinstalled. While anti-virus software logs the identification of virus activity and isolation and remediation efforts, documented status reports for predefined periods should be prepared for management review. Due to the evolution of virus programs and the nature of virus attacks, the risk of virus infection can not be absolutely eliminated even though entities may have generally-accepted virus protection and security controls in place
8 AUDIT RESULTS AUDIT RESULTS All IT equipment had up-to-date anti-virus software installed. The Commission s use of the corporate version of anti-virus software on all IT machines ensures that all files on all removable media, or files downloaded from the Internet, are scanned for viruses prior to installation or opening. According to the Commonwealth s Information Technology Division (ITD), one virus had infected the Commission over the period of October 2003 to July 28, 2004 (see Appendix 3). With respect to digital security, since the Commission s Internet gateway is through ITD as a client of the Commonwealth s wide area network, MAGNet, the GIC relies on ITD for firewall protection and intrusion detection capabilities for all connections to external or third-party entities. In addition, the Commission relies on ITD to provide virus and critical security alerts and to ensure that appropriate filtering and blocking capabilities are employed at the firewall level. Because the Commission has anti-virus software installed on all their servers and workstations, disks, CD s, or unknown files are scanned to detect viruses prior to opening. We found that the Commission s anti-virus software was configured to automatically obtain vendor-provided updates of definition files. We also found that the Commission used software to perform centralized monitoring and administration of their anti-virus software. We found that the Commission did not perform annual or periodic risk assessments to identify and reevaluate virus vulnerabilities. The periodic risk assessment, as a result of a virus attack or unauthorized intrusion, should identify all existing virus access points, determine whether there have been changes to the IT configuration requiring updates to installed IT resources and determine whether currently-installed anti-virus tools and procedures adequately meet virus protection objectives. Following a virus attack, the Commission should formally reevaluate virus protection, notification, and remediation measures in conjunction with ITD and determine whether changes to their virus protection measures are required. While users are made aware through notifications of virus risks and may be generally familiar with the risks posed by viruses, specific user training focused on virus protection and incident handling would benefit IT users. The training should reinforce the understanding of virus risks ands measures to mitigate the risk of infection. In addition, training should include guidelines for users to follow when considering whether to open or delete s with attachments that are from unknown or questionable sources. We found that the Commission had an internal policy and procedure memorandum, dated July 2004, regarding protection against computer viruses. Although the policy and procedure document states that viruses have long been recognized as threats to data and applications and provides an overview of certain - 6 -
9 AUDIT RESULTS virus protection procedures, the document should be expanded to more adequately address virus protection. In addition, the memorandum needs to be amended to more accurately indicate all potential sources of virus infection. Specifically, the document states that the only places where a virus could live would be on files that staff place on portable media or in files that they store in their private or shared file volumes on the network server.... The statement should be modified to identify all other sources for viruses, such as through Internet-based sites or files. The document, although somewhat true, ignores the insidious stealthy nature of viruses that can infect a network without staff placing or storing any file anywhere. In addition, we found that the Commission did not have documented incident response procedures to follow should IT resources be infected. The Commission s policies should be expanded to address risk assessment, user guidance, testing of proposed software on stand-alone machines, ensuring that anti-virus software is installed prior to application programs and data files when restoring systems, and incident response procedures. Once the policies and procedures have been enhanced, appropriate training should be conducted to ensure an adequate level of user awareness is attained. The policies should include an employee-signed agreement acknowledging the proper use of IT resources with a list of acceptable and not acceptable usage of IT systems. We found that status reports have not been prepared for management review regarding virus protection efforts or virus activity. While virus protection efforts appear to be logged, documented status reports should be prepared for management review. Recommendation: We recommend that the Commission s virus policies and procedures be enhanced to provide a more detailed explanation of the specific steps to be followed for the successful prevention, detection, and correction of virus events and unauthorized intrusion (see Appendix 2). Specifically the policies need to require that up-to-date anti-virus software be installed and that appropriate procedures be in place to identify and eliminate detected viruses. The policies should require that no portable drive, including floppy disks, CDs, DVDs, or USBs, or any other portable electronic media shall be connected to a workstation or server on the network that is not running an up-to-date version of anti-virus software. The policies should require that access to the Internet from the Commission s LAN-based environment use only approved Internet gateways. We recommend that the policies strictly prohibit the creation of computer viruses through the intentional writing, producing, generating, copying, propagating or attempting to introduce any computer code designed to self-replicate, damage, or otherwise hinder the performance of any IT resources
10 AUDIT RESULTS We recommend that the Commission establish a standard procedure to ensure that vendor-provided updates, designated or determined to be critical updates, should be deployed in a timely manner after testing on a stand-alone machine, or review with ITD, as to the applicability or integrity of the update. We recommend that the IT personnel determine, in conjunction with ITD, whether notified alerts apply to the Commission s IT environment and, if applicable, appropriate steps should be followed, such as determining whether IT resources have been infected and informing users of the virus threat. IT personnel should determine whether appropriate vendor-provided downloads should be obtained for possible remedial action. We recommend that the Commission benchmark their IT-related policies against those of ITD and assign responsibility for evaluating, updating, and monitoring compliance to ensure that the policies are in sync with each other For example, a review of policies would help ensure compliance with the requirement that instant messaging not be allowed within MAGNet. In addition, virus protection policies and procedures should be benchmarked against generally accepted control practices to further ensure the adequacy of virus protection efforts. We recommend that incident response policies and procedures be documented. Such policies and procedures should emphasize preventing security breaches through containment and eradication of the infection or problem. The procedures would include notification to ITD s Help Desk of a possible virus infection, guidelines for disconnecting IT resources from the internal network, and identifying and removal of suspected virus. The guidelines should require that if a new threat has been reported, the computer workstation should be disconnected, and if a solution has yet to be made available, the Commission should continue to keep the workstation disconnected from the network, until corrective action can be taken. From an administrative perspective, we recommend that Commission implement an acceptable use policy for IT users. The acceptable use policy would require that employees acknowledge receipt of lists of acceptable and non acceptable uses of technology and understanding by signature of all IT user policies, which would include among other responsibilities, virus protection. With respect to virus protection, we recommend that an appropriate level of formal training be provided to the Commission s staff to ensure that users have an adequate understanding of anti-virus policy, the risks of computer viruses, indications of infected machines, and notification and incident response procedures. Training should include user responsibilities to install critical security updates for which notification of the availability of the updates has been distributed or pushed to their microcomputer workstations. We recommended policy should include that installation of critical security updates only occur after application testing on stand-alone computers
11 AUDIT RESULTS We also recommend that the Commission consider installing anti-adware and anti-spyware software as part of their security and control strategy. Auditee Response: The information contained within the report, and the recommendations made, will be incorporated into my overall assessment and review of the Group Insurance Commission s information technology policy and procedures. Some of the recommendations contained within the draft, such as: installation of anti-adware and anti-spyware software; user education; and formulation of an acceptable use policy are currently underway. Other recommendations, including the use of CobiT as a standard for security and control, are duly noted and will be included in the agency s information technology plan. Auditor s Reply: We are pleased with the Commission s plan to implement the recommendations from our report
12 APPENDIX APPENDIX 1 Agencies Visited Name Architectural Access Board Bureau of State Buildings Commission Against Discrimination Commission for the Deaf and Hard of Hearing Department of Fish and Game Department of Revenue Department of Social Services Developmental Disabilities Administration Disabled Persons Protection Commission Division of Career Services and Unemployment George Fingold Library Group Insurance Commission Human Resources Division Information Technology Division Legislative Information Services Massachusetts Highway Department Massachusetts Hospital School Massachusetts Office of Travel and Tourism Massachusetts Office on Disability Massachusetts Rehabilitation Commission Massachusetts State Lottery Commission Massachusetts Turnpike Authority Merit Rating Board Municipal Police Training Committee Newton Housing Authority Office of Child Care Services Office of Inspector General Office of Professional Licensure Registry of Motor Vehicles State Ethics Commission Teachers Retirement Board University of Massachusetts Boston Victim and Witness Assistance Board
13 APPENDIX APPENDIX 2 Generally Accepted Management and Technical Control Practices for Virus Protection Control Administrative Controls Management Control Practices Organizational policies should address virus protection. The virus protection policies should be documented and formally reviewed and approved and should include the following requirements: To effectively reduce the risk of computer viruses and worms infiltrating an organization, a comprehensive and dynamic antivirus program needs to be established. There are two major ways to prevent and detect viruses and worms that infect computers and network systems. The first is by having sound policies and procedures in place, and the second is by technical means, including antivirus software. Neither is effective without the other. All IT equipment, such as microcomputer workstations, laptops, and servers, must have up-to-date anti virus software installed. All IT-related equipment upon which a virus could execute or propagate should be subject to anti-virus software. Virus scanning software should be installed at the workstation, LAN, WAN and Mail Server levels. For all possible Internet gateways, access should be obtained through a firewall. IT equipment that connects to the Internet must be behind a firewall. Prohibit access to the Internet or external networks through modems or by wireless. Access to the Internet should only be through approved Internet gateways. All updates should be reviewed or tested prior to installation. Appropriate incident response procedures should be in place to guide entity personnel in identifying, quarantining and eradicating IT viruses. Type of Control Corrective Applies to All IT environments
14 APPENDIX Control Organizations should assess the requirements for having anti-virus software installed in IT equipment in addition to workstations, notebooks, servers and mainframes. Organizations should assess the need for software tools to scan, enhance access security, and push updates or patches to connected machines. Organizations should assess whether the installation of an IPS or IDS is warranted to provide enhanced security. Organizations should assess whether the installation of anti-adware and anti-spyware software is warranted to provide enhanced security. The acquisition of additional software tools should be based upon risk analysis, cost, and resource capabilities to support and use the software. Removable media, software or files downloaded from the Internet, or unknown files, should be scanned with anti-virus software prior to installing or opening. All users of computer equipment should be trained regarding the risks of computer viruses, indications of infected machines, and notification and incident response procedures. All security-related programs, such as firewall, intrusion prevention, intrusion detection, anti-virus and anti-spyware programs, should be maintained with the most recent vendor updates in a timely manner. Vendor-provided updates, designated or determined to be critical updates should be deployed in a timely manner after testing by the IT department or the security administrator. Entities having anti-virus software installed on their workstations, notebooks, and servers where IT resources are configured in LANs or WANs should ensure that centralized monitoring and administration of anti-virus software is in effect. An objective of centralized monitoring and administration of anti-virus software For LAN and WAN environments is to ensure that all IT resources upon which anti-virus software is installed have the most recent versions of the anti-virus software. Organizations should use software tools to the extent possible to determine whether IT resources have the most recent versions of anti-virus software installed when the resources log on. Organizations should consider implementing centralized capabilities to push software or updates. Type of Control Corrective Applies to All IT environments All IT environments All IT environments All staff All security programs All Windows OS All centralized control monitors All centralized control monitors
15 APPENDIX Control Security and LAN administrators should determine in a timely manner as to whether notified alerts apply to their entity s IT environment. If applicable, Security and LAN administrators should determine whether established incident response steps should be followed, whether users should be notified and provided with instruction, and whether assistance should be requested. Management should ensure that backup copies of security-related software, such as firewall, intrusion prevention, intrusion detection, antivirus and anti-spyware programs, are included with the backup copies of data files and application and system programs needed for the restoration of IT operations at an alternative processing site. All backup copies of data files and application and system programs, utilities and tools should be scanned by anti-virus software before use. When performing a full restoration of the system to recover from a virus attack, one should ensure that current anti-virus software is installed prior to installing data files and application software to enable appropriate scanning. Entities should perform periodic risk assessments to identify and reevaluate gateway vulnerabilities. The risk assessment should identify any existing virus and intrusion access points, determine whether there have been changes to the enterprise configuration requiring updates to installed IT resources or security-related software, and determine whether currentlyinstalled anti-virus tools and procedures adequately meet virus protection objectives. All reasonable steps should be taken to eliminate the sources of viruses. Recipients of s for which the sender is unknown should consider deleting the s without opening them. Only authorized software should be installed on IT systems. Management should inform the IT user community as to what has been designated as the enterprise s approved or authorized software. Installation of software obtained from external, non-agency sources should not be installed onto agency systems unless reviewed and approved by management. All software should be reviewed and tested on an isolated machine or environment before being installed on the entity s system. Incident response policies and procedures should emphasize preventing security breaches through containment and eradication of the infection or problem. Incident response procedures should include: planning and notification, identification and assessment of the problem, containment and quarantining of the problem, eradication of the problem, recovering from the incident, and the follow-up analysis. Incident response should never include retaliation. Type of Control Corrective Corrective Applies to If no LAN or administering console, users must update Security and LAN administrators All recording media All recording media All IT environments All users All users All IT administrators
16 APPENDIX Control Entities should have access to alert information to ensure that they are aware of potential or new virus-driven risks and new critical security risks, either directly from a alert provider or by relying on a trusted source external to the entities. (Alerts may be obtained from a Commonwealth source, such as ITD) Infected computers with reported viruses without solutions require keeping the computer off the network until a solution is found. Following each virus attack, agencies should formally re-evaluate virus protection, notification, and remediation measures and procedures to promote sufficient understanding of the event and how it was resolved, and to determine whether changes to virus protection should be incorporated into contingency planning, notification, and remediation measures. End users should be administratively restricted from disabling or uninstalling anti-virus or security-related software. Policies should strictly prohibit the creation, copying, or propagating of computer viruses. Each user is responsible for the IT resources assigned to, or used by, them (computer and peripherals). When an infection due to malicious code is suspected, the user should immediately stop computing and follow the emergency procedure provided by management and/or the security officer. In addition he/she should inform the appropriate parties (security department, help desk, etc.) about the problem in order to mitigate consequences and probability of malicious code propagation within the organization. If the user is not able to follow the procedure, he/she should immediately power off the computer and call the appropriate party (security department, help desk, etc.) for assistance. Management should assign responsibility for evaluating, updating, and monitoring compliance with IT policies. Employees are required to acknowledge receipt and understanding of IT policies relating to their responsibilities for the integrity, security, use and availability of IT resources. Policies should be reviewed and approved by IT and entity management and be dated with appropriate version or tracking numbers included. Technical Controls All IT equipment, such as PCs, laptops, and servers must have up-todate anti-virus software installed. There should be a firewall for all possible Internet gateways. Type of Control Corrective Applies to All agencies All staff All staff All staff All users All users Administrators All users IT and entity management IT Administrators IT Administrators
17 APPENDIX Control Anti-adware and anti-spyware software should be used in addition to anti-virus software for protection of unauthorized intrusion. Ensure that insecure protocols are blocked by the firewall from external segments and the Internet. The use of Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) should be in concert with firewalls. No portable drive, including floppy disks, CDs, DVDs, or USBs, or any other portable electronic media shall be connected to a workstation or server on the network that is not running an up-to-date version of antivirus protection. All connections to external or third-party entities should be monitored and should pass through a firewall. To access the Internet from LAN or WAN environments, organizations should only use approved Internet gateways, such as those going through firewalls or by VPN. Security software should be maintained such that installed software is updated to ensure synchronization with the vendor s most recent versions and updates. Anti-virus and anti-spyware software should be configured to automatically (auto-update) obtain vendor-provided definition files identifying known viruses and spyware. ITD Requirements All agency IT equipment that connects to the Internet through MAGNet must be behind ITD s MAGNet-supported firewall protection. Firewalls should have virus-scanning software installed. All outside connections from vendors, contractors or other business partners must pass through the ITD-managed firewall. Management should ensure that appropriate filtering and blocking capabilities are employed at the firewall level, including: (a) Blocking all multi-part MIME messages at the gateway, (b) Discarding s containing files with extensions, that are affiliated with a virus. (c) Disallowing private that is separate and apart from an agency's primary system. Type of Control Standard Applies to All IT environments IT Administrators IT Administrators All workstations, LAN environment All MAGNet agencies LAN or WAN environment All security programs All Anti-virus software All IT environments All firewalls All MAGNet agencies All mail gateways
18 APPENDIX APPENDIX 3 Date of Virus Infection by Agency per ITD Virus Infection Date 12/28/04 12/15/04 11/19/04 11/19/04 10/29/04 7/8/04 2/25/04 3/22/04 5/1/04 6/30/04 1/23/04 1/27/04 12/22/03 10/31/03 10/9/03 Agency Name Virus Randex.CCF Erkez.D@mm Sober.I@MM Beagle.AV@m Femot.Worm korgo.q Spybot Netsky.C Netsky.P Sasser Slammer Mydoom Randex Mimail Welchia Architectural Access Board Bureau of State Office Buildings Y Y Y Y Y Commission Against Discrimination Y Commission for the Deaf and Hard of Hearing Y Y Y Department of Fish and Game Department of Revenue Department of Social Services Y Y Y Y Developmental Disabilities Administration Y Disabled Persons Protection Commission Y Y Division of Career Services & Unemployment Assistance George Fingold State Library Group Insurance Commission Y Human Resources Division Y Y Information Technology Division Y Y Y Y Y Y Legislative Information Services Y Massachusetts Highway Department Y Y Y Y Massachusetts Hospital School Massachusetts Office of Travel and Tourism Massachusetts Office on Disability Y Y Massachusetts Rehabilitation Commission Y Y Y Y Y Massachusetts State Lottery Commission Y Massachusetts Turnpike Authority Merit Rating Board Municipal Police Training Committee Y Y Y Newton Housing Authority Office of Child Care Services Y Y Y Office of Inspector General Office of Professional Licensure Registry of Motor Vehicles Y Y Y Y State Ethics Commission Teachers Retirement Board Y University of Massachusetts Boston Victim and Witness Assistance Board Y Y The system does not record all instances of virus activity. The viruses recorded on the ITD SAS system are based upon viruses detected through scanning or through notification from individual agencies
19 APPENDIX APPENDIX 4 ITD s SAS Reported Security Alerts Severity Date Name High 01/05/05 W32.Randex.SQ Medium 12/14/04 W32.Erkez.D@mm High 12/01/04 Critical Vulnerability in Microsoft Internet Explorer Medium 11/19/04 W32.Sober.I@mm Medium 10/29/04 W32.Beagle.AV@mm Low 10/04/04 W32.Bagz@mm High 08/16/04 W32.Mydoom.Q@mm Medium 08/10/04 W32.Beagle.AO@mm High 07/26/04 W32.Myddom.M@mm High 07/15/04 W32.Beagle.AB@mm High 07/08/04 New W32.Sasser.Worm Low 06/25/04 JS.Scob.Trojan High 06/02/04 W32.Korgo.R Medium 05/14/04 Dabber Medium 05/14/04 Multiple Vulnerabilities in Symantec Client Firewall Products High 05/01/04 W32.Sasser.Worm High 04/26/04 W32.Beagle.W@mm High 04/21/04 W32.Netsky.Y@mm High 04/16/04 W32.Gaobot.AAY High 04/16/04 W32.Gaobot.AAY Medium 03/29/04 W32.Netsky.Q@mm Medium 03/26/04 W32.Beagle.U@mm Medium 03/24/04 W32.Netsky.P@mm from 3/22/2004 Medium 03/18/04 W32.Beagle.Q@mm Medium 03/08/04 W32.Sober.D@mm Medium 03/03/04 W32.Beagle.J@mm High 03/01/04 W32.Beagle.E@mm High 03/01/04 W32.Netsky.D@mm High 02/25/04 W32.Netsky.C@mm Medium 02/24/04 W32.Mydoom.F@mm High 02/19/04 W32.Netsky.B@mm High 02/17/04 W32.Beagle.B@mm also Known as W32.Alua@mm Microsoft Security Bulletin MS ASN.1 Vulnerability Critical 02/11/04 Could Allow Code Execution Medium 01/15/04 1/27/04 W32/Mydoom@MM, WORM_MIMAIL.R YS OCSCIC Cyber Security Advisory Re: Cisco PIX Medium 12/18/03 vulnerabilities Medium 11/18/03 W32.Mimail.J@mm Medium 11/13/03 New Microsoft Security Bulliten Medium 11/06/03 Oracle Application Server SQL Injection Vulnerability Medium 10/31/03 W32.Mimail.C@mm Medium 10/16/03 Windows New Security Bulletins Medium 10/09/03 W32.Welchia.Worm Medium 10/06/03 Cumulative Patch for Internet Explorer (828750) APPENDIX
20 APPENDIX Information Technology Architecture and Enterprise Standards Virus detection is identified in ITD s Information Technology Architecture and Enterprise Standards as: Virus scanning software must be installed at the Workstation, LAN, WAN and Mail Server levels. ITD also has virus-scanning software at the firewalls. The software must be configured to: o Periodically scan all files that are stored on physically and logically connected disk drives attached to the computer o Automatically scan any file that is copied onto a disk drive from an external source including floppy disks and CD ROM disks o Automatically scan any file that is opened by an application such as a word processing or spreadsheet application. Virus scanning software and virus signatures must be kept current by incorporating the vendor's most recent versions. Software with auto-update capabilities is strongly recommended. Norton Anti Virus Corporate Edition is recommended. Virus Detection
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
University System of Maryland University of Maryland, College Park Division of Information Technology
Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
University of Massachusetts Medical School's Data Center Relocation For the period July 1, 2008 through August 31, 2010
` Official Audit Report Issued September 30, 2011 University of Massachusetts Medical School's Data Center Relocation For the period July 1, 2008 through August 31, 2010 State House Room 230 Boston, MA
Security Policy for External Customers
1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
Best Practices for DeltaV Cyber- Security
January 2013 Page 1 Best Practices for DeltaV Cyber- Security This document describes best practices will help you maintain a cyber-secure DeltaV digital automation system. www.deltav.com January 2013
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
CIT End User Device Policy
Version 1.0 Information Systems Security Office Center for Information Technology National Institutes of Health U.S. Department of Health and Human Services January 4, 2011 Version Number Release Date
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Hardware and Software Security
Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
