Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
|
|
|
- Dominick Wilson
- 9 years ago
- Views:
Transcription
1 Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft-
2 Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page 2 of 11
3 Contents Version Control Preamble Terms and definitions Purpose Scope References User Account Management Procedure User Registration Management User Registration Modification/Changes User De-registration Review of User Access Privilege Management User Responsibilities Password Usage User password management Monitoring of access user activities Exceptions for Non-Compliant Systems and/or Users Enforcement Consequences of Non-Compliance Policy Review Implementation Page 3 of 11
4 1. Preamble ICT user accounts are one of the primary mechanisms that protect potentially sensitive MLM network and information resources from unauthorized use. While accounts administration and monitoring are not the most secured way of protecting information and information systems, constructing secure ICT user accounts and ensuring proper password management is essential. Poor ICT user account management and protection can allow both the dissemination of information to undesirable parties and unauthorized access to MLM network resources. 2. Terms and definitions Account Holder / User: Any person granted an ICT user account with the Department Accountability: ensuring that the actions of an entity/individual may be traced uniquely to that entity/individual, who may then be held responsible for that action Authentication: establishing the validity of a claimed entity/verification of the identity of an individual or application Availability: being accessible and useable upon demand by an authorised entity Confidentiality: the principle that information is not made available or disclosed to unauthorised individuals, entities or processes Identification and authentication: functions to establish and verify the validity of the claimed identity of a user Information and communication systems: applications and systems to support the business, utilising information technology as an enabler or tool Information Technology: any equipment or interconnected system or subsystem of equipment, that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission or reception of vocal, pictorial, textual and numerical data or information Integrity: the inherent quality of protection that maintains the accuracy of entities of an information and communication system and ensures that the entities are not altered or destroyed in an unauthorised manner Monitoring: performance measurement to ensure the confidentiality, availability and integrity of operational systems and information Password: confidential authentication information composed of a string of characters Page 4 of 11
5 Remote access: the access of remote users to corporate IT services by means of telephone lines or 3G data card through a gateway/computing that is performed at a location that is distant from a central site, over a network connection User: Any person using any of the Department s Information Technology Facilities ICT network user account: An authorised user account, provided to a user, to be used solely by that user, for the purpose of accessing services as granted to that user account VPN: Virtual Private Network ISO: Information Security Officer MLM: Musina Local Municipality CGICTFP: Corporate Governance ICT Framework Policy 3. Purpose The purpose of this policy is to establish a standard for the administration of computing accounts that facilitate access or changes to MLM. An account, at minimum, consists of a user ID and a password; supplying account information will usually grant access to some set of services and resources. This policy establishes standards for issuing accounts, creating password values, and managing accounts. 4. Scope This policy is applicable to those responsible for the management of ICT network user accounts or access to shared information or network devices. This policy covers MLM accounts as well as those managed centrally. 5. References 1.1 ISO Minimum Information Security Standards 1.3 Protection of Information Act 1.4 International Standard for Risk Assessment 1.5 COBIT Audit Framework Page 5 of 11
6 6. User Account Management Procedure All user accounts used to logon to MLM ICT network and information resources shall be protected with strong passwords. Furthermore, passwords must be changed regularly to avoid unauthorised access to information and information systems. Passwords that are not managed properly are at risk of accidental disclosure overtime. See attached approved MLM policy on Password management. 7. User Registration Management Accounts that access MLM ICT network and information resources require prudent oversight. The following security precautions should be part of account management: 7.1 User Registration The line managers of MLM shall make decisions regarding access to their respective data (e.g., the Registrar will determine who has access to registration data, and what kind of access each user has). Account setup and modification shall require the signature of the requestor's supervisor The identity of users shall be authenticated before providing them with account and password details. If an automated process is used, then the account holder should be asked to provide several information items that in totality could only be known by the account holder. In addition, it is highly recommended that stricter levels of authentication (such as face-to-face) be used for those accounts with privileged access (e.g., user accounts used for do not require an identity validation process as thorough as for those user accounts that can be used to modify department budgets) Passwords for new accounts shall NOT be ed to remote users UNLESS the is encrypted The date when the account was issued shall be recorded in an audit log All managers of accounts(i.e IT DEPARTMENT officials) with privileged access to all MLM user accounts shall sign a Confidentiality Agreement that is kept in the department file under the care of a Human Resources representative or liaison When establishing accounts, standard security principles of least required access to perform a function shall always be used, where administratively feasible. For example, a root or administrative privileged account must not be used when a non-privileged account will do. Page 6 of 11
7 7.2 Modification/Changes The identity of users shall be authenticated before providing them with User account and password details. In addition, it is required that stricter levels of authentication (such as face-to-face) be used for those accounts with privileged access A Request of reset password form that can be accessible on the intranet website shall be used for password reset Whenever possible, passkeys shall be used to authenticate a user when resetting a password or activating a guest account, and should comply with the above standards. Passkeys provide one-time access to a system or application and require the user to change to a password of their choice upon initial login. Where passkeys are not feasible, pre-expired passwords shall be used. 7.3 User De-registration IT DEPARTMENT shall issue a unique ICT user account to each individual authorised to access the MLM network and information resources. IT DEPARTMENT is also responsible for the prompt deactivation of accounts when necessary, i.e., accounts for terminated individuals shall be removed/disabled/revoked from any computing system at the end of the individual's employment or when continued access is no longer required; and, the accounts of transferred individuals may require removal/disabling to ensure changes in access privileges are appropriate to the change in job function or location. 8. Review of User Access 8.1 All accounts shall be reviewed at least annually by IT DEPARTMENT official to ensure that access and account privileges are commensurate with job function, need-to-know, and employment status. The ISO may also conduct periodic reviews for any system connected to the MLM network. 8.2 All guest accounts (for those who are not official users of the MLM) with access to MLM network resources shall contain an expiration date of one year or the work completion date, whichever occurs first. All guest accounts must be sponsored by the appropriate authorised member of the administrative entity managing the resource. 9. Privilege Management 9.1 For access to sensitive information managed by a department, account management shall comply with the standards outlined above. In addition, naming conventions must not cause contention with centrally managed addresses or usernames. Should the potential for Page 7 of 11
8 contention arise, the applicable system(s) shall not be connected to the campus network until a mutually satisfactory arrangement is reached. 9.2 Use of shared accounts shall not be allowed. However, in some situations, a provision to support the functionality of a process, system, device (such as servers, switchers or routers) or application may be made (e.g., management of file shares). Such exceptions will require documentation which justifies the need for a shared account; a copy of the documentation will be shared with ISO. 9.3 Each shared account must have a designated owner who is responsible for the management of access to that account. The owner is also responsible for the above mentioned documentation, which should include a list of individuals who have access to the shared account. The documentation must be available upon request for an audit or a security assessment. 10. User Responsibilities The cooperation of authorised users is essential for effective security. Users should be made aware of their responsibilities for making effective access controls particularly regarding the use of passwords and the security user equipment. 11. Password Usage 11.1 Passwords are a basic control in verifying a user s identity before access is granted to an information system or a service according to the user s authorisations. Each employee shall be responsible for all the actions performed with his/her password, even if it is demonstrated that an action was carried out by another individual using the user s password. Users should therefore follow good security practices in the selection and use of passwords and the following shall be kept in mind: Keep passwords confidential. Avoid keeping a record of passwords, e.g. hard copy or electronic file. Change passwords whenever there is any indication of possible system or password compromise. Compose passwords that are: Easy to remember Of sufficient minimum length Not based on anything somebody else could easily guess or obtain using personrelated information, e.g. names, telephone numbers, dates of birth, etc. Page 8 of 11
9 Not vulnerable to dictionary attacks (i.e. do not consist of words included in dictionaries) Free of consecutive, identical, all-numeric or all-alphabetic characters. Change passwords at regular intervals or based on the number of times access has been obtained. The passwords for privileged accounts should, however, be changed more frequently than normal passwords. Avoid the reuse or cycling of old passwords 12. User password management 12.1 The allocation of passwords shall be controlled through a formal management process and this process should include the following requirements as a minimum: Users shall be required to sign an undertaking to keep personal passwords confidential. This signed statement could also be included in the terms and conditions of employment. If users are required to maintain their own passwords, they shall be provided with a secure initial password, which they should be required to change immediately at first logon. Procedures shall be established to verify the identity of a user prior to providing the user with a new, replacement or temporary password. A secure procedure shall be followed when granting users temporary passwords and the use of unprotected (clear text) electronic mail messages should be avoided. Temporary passwords shall be unique and should conform to password standards. Users shall acknowledge receipt of passwords. Passwords shall never be stored on computer systems in an unprotected form. Default vendor passwords shall be replaced as soon as the installation of systems or software has been completed and use designated local administrator password. Where technically or administratively feasible, shared ID authentication shall not be permitted. Authentication shall occur external to an application, i.e., applications should NOT implement their own authentication mechanism. Instead, external authentication services shall be relied upon, provided by the host operating system, the web server, or the servlet container. [In general, applications programmers are not necessarily familiar with the techniques associated with security protocols, and may Page 9 of 11
10 inadvertently create security holes. Security services available from these external environments are much more likely to provide a high level of security. Role-based access controls should be used whenever feasible, in order to support changes in staff or assigned duties. 13. Monitoring of access user activities 13.1 Those responsible for access to systems/applications/servers, etc. protected by high-level super-passwords (or the equivalent) shall have proper auditable procedures in place to maintain custody of those "shared secrets" in the event of an emergency and/or should the super-password holder becomes unavailable These documented procedures, which shall be appropriately secured, should delineate how these passwords are logically or physically accessed as well as who in the "chain of command" becomes responsible for access to and/or reset of the password Activities done by the default account user (i.e. Guest, administrator, owner and root) should be monitored on a daily basis All account logs shall be monitored weekly and administrator must sign log reports After three failed attempts of login a user account will be disabled and the user has to follow the process of password reset. Failed attempts shall be logged unless the log information includes password information 13.6 All inactive accounts for 3 months shall be disabled and it will be activated after a user follows the user account modification/changes All accounts that are inactive for 7 months shall be deleted from the systems 13.8 Accounts shall be monitored and reviewed 13.9 Password change events shall be recorded in an audit log and signed off by Manager ICT Security. 14. Exceptions for Non-Compliant Systems and/or Users Individuals that are unable to comply with the MLM Account Management Policy must request an exemption from IT DEPARTMENT. IT DEPARTMENT will process the request for final approval via the policy exceptions review. If after review, there is still disagreement over a decision, it may be appealed to the Manager of the IT DEPARTMENT. The decision of the Manager of the IT DEPARTMENT will be final. Page 10 of 11
11 15. Enforcement IT DEPARTMENT is responsible for enforcing this policy and continuously ensuring monitoring and compliance. 16. Consequences of Non-Compliance Non-compliance of this policy may lead to disciplinary actions, legal liability as well as dismissal. 17. Policy Review This policy shall be reviewed according to the CGICTFP. 18. Implementation This policy comes into effect from the date of approval. Page 11 of 11
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Informatics Policy. Information Governance. Network Account and Password Management Policy
Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY Contents ICT CHANGE MANAGEMENT...1 POLICY...1 1. Preamble...3 2. Terms and definitions...3 3. Purpose...4 4. Objective of this Policy...4 5. References
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
REVIEWED ICT CHANGE MANAGEMENT POLICY
LI_M_POPO PROVINCIAL GOVERNMENT ~EP.j8L-C OF SO;_;-H.'\FR1C.... DEPARTMENT OF CO-OPERATIVE GOVERNANCE. HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT CHANGE MANAGEMENT POLICY Version: 2 Table of
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
The City of New York
The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope
Password Standards Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
IT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Password Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.
DRAFT 6.1 Information Systems Passwords OVERVIEW Passwords are an important aspect of information security. They are the front line of protection for user accounts. A poorly chosen password may result
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private
1. Policy Overview The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private Network (VPN) connections to the University of Dammam network. 1.1. Purpose University
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Business Internet Banking Agreement Effective November 12, 2012
Business Internet Banking Agreement Effective November 12, 2012 PRINT AND RETAIN THIS FOR YOUR RECORDS 1. AGREEMENT This Agreement is a contract that establishes the rules that cover your electronic access
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Network Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
IT Operations User Access Management Policies
1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-
c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy.
Responsible Office: Chief Information Officer Pages of these Procedures 1 of 5 Procedures of Policy No. (2) - 1. User Access Management a) User Registration The User ID Registration Procedure governs the
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
IOM Data Privacy and Accuracy Policy
IOM Data Privacy and Accuracy Policy 1 Overview 2 Collection of information 2.1 Anonymous browsing 2.2 Candidate profile and application to vacancies 2.3 Accuracy of information 3 Use of information collected
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Guidance for Industry Computerized Systems Used in Clinical Investigations
Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
