Content Protection & Security Standard
|
|
|
- Toby Melton
- 10 years ago
- Views:
Transcription
1 Content Protection & Security Standard MANAGEMENT CONTROLS PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS BUSINESS RESILIENCE Content Protection & Security Program Revised March 2014
2 ABOUT THIS STANDARD... 4 The Audit Process... 5 How to use this Standard... 5 The Statement of Applicability... 6 Declination of Liability... 7 CF 1. MANAGEMENT CONTROLS... 8 CF 1.1. Documentation... 8 CF 1.2. Risk Management... 9 CF 1.3. Compliance CF 2. PERSONNEL AND RESOURCES CF 2.1. Personnel and Resources CF 2.2. Third-party Resources CF 3. ASSET MANAGEMENT CF 3.1. Administrative Controls CF 3.2. Control of Assets CF 3.3. Asset Receipt and Identification CF 3.4. Asset Handling and Transfer CF 3.5. Secure Asset Storage and Reconciliation Controls CF 3.6. Asset Re-call Procedures CF 3.7. Control of Blank Media Materials CF 3.8. Record Retention CF 3.9. Transportation of Assets CF Labeling and Packaging CF Destruction and Recycling CF 4. PHYSICAL SECURITY CF 4.1. Physical Security Management CF 4.2. Perimeter Security CF 4.3. Securing Internal Areas CF 4.4. Use of Guards CF 4.5. Searches CF 4.6. CCTV CF 4.7. Access Control Systems and Automated Technologies (AACS) CF 4.8. Intruder Detection Systems (IDS) CF 5. IT SECURITY CF 5.1. Information Security Management CF 5.2. Acceptable Use CF 5.3. Internet Usage CF Usage CF 5.5. System Administrator and Elevated Privilege User Accounts CF 5.6. System Basic User Accounts CF 5.7. Password Management CF 5.8. Authorizing Third-party Access to IT Systems CF 5.9. Removable Media CF Mobile Device Management CF Wireless Networks CF Incident Management CF Physical and Environmental Security Controls CF IT Asset Management CF Network Monitoring CF Access Controls CF Remote Access CF Change Management CF System Documentation CF External Networks CF Internal Networks Content Delivery & Security Association Page 2 of 66
3 CF File Transfer Management CF Firewall Management CF Vulnerability Management CF 6. TRAINING AND AWARENESS CF 6.1. Training and Awareness Needs CF 6.2. Basic Users and Elevated Privilege Users CF 6.3. Dedicated and Skilled IT Security Staff CF 6.4. Training Records CF 6.5. Personnel Participation CF 7. BUSINESS RESILIENCE CF 7.1. Business Continuity Plan (BCP) and Disaster Recovery Planning (DRP) Content Delivery & Security Association Page 3 of 66
4 ABOUT THIS STANDARD The goal of the CPS Standard is to secure media assets at all stages of the supply chain. This objective-based approach establishes seven frameworks of capability. CONTENT PROTECTION AND SECURITY STANDARD CF 1: MANAGEMENT CONTROLS CF 2: PERSONNEL AND RESOURCES CF 3: ASSET MANAGEMENT CF 4: PHYSICAL SECURITY CF 5: IT SECURITY CF 6: TRAINING AND AWARENESS CF 7: BUSINESS RESILIENCE The requirements defined within the Standard and its accompanying guidance form the basis of a Content Security Management System (CSMS). This consists of cohesive policies, processes and controls that are designed to assess, manage and minimize risk to an acceptable level, thereby ensuring the continued integrity of intellectual property, confidentiality and media asset security. In determining content protection requirements, CDSA have assessed industry specific risk, identified threats and current vulnerabilities that are encountered within the industry. This process has facilitated the formulation of a suite of security objectives to control and/or mitigate those risks, threats and vulnerabilities. These objectives provide the basis on which to define the auditable requirements for certification with the CDSA Content Protection and Security (CPS) program Content Delivery & Security Association Page 4 of 66
5 The Audit Process CDSA has provided this document and a Statement of Applicability (SoA) to enable your site to prepare for audit. A timeframe for an initial audit will be set followed by a further audit to be undertaken within six months. Thereafter audits follow every 12 months. Organizations with an existing certified site will not be required to undertake the six month surveillance audit. Your site will be evaluated against the requirements of this Standard relevant to your organisation. Controls that are not applicable will be agreed in advance of the audit using the Statement of Applicability. Your appointed CDSA Auditor will assist you with this process. Your site will receive certification if there are; zero non-compliances, or minor non-compliances accompanied by an agreed corrective action plan. Your site will not receive immediate certification if there is a major non-compliance observed. In the event that your site fails to achieve immediate certification we will work with you to agree a corrective plan. Once any major non-compliance has been adequately addressed and accepted by CDSA certification of your site can be awarded. A major non-compliance occurs where a significant threat to client media assets is identified and may include: a failure to meet a critical individual requirement, or an objective not being met as a result of systematic failure to meet the Standard. A minor non-compliance occurs where one or more requirements are not fulfilled but client media assets are not at risk.cdsa reserves the right to suspend certification until appropriate corrective actions are implemented, and CDSA reserves the right to publicly acknowledge certification suspension. How to use this Standard This document is vendor and technology neutral. In order to be consistent and communicate effectively this Standard utilizes the following terms: Content Protection Security: The preservation of confidential intellectual property and protection of media related assets, against all threats, whether internal or external, accidental or deliberate. Policy: Defines the authorized governance framework that an organisation will adhere to. Procedure: Defines the step-by-step instructions to be followed. Role: Job function or position assigned to a particular person based upon skills or competencies. Responsibility: What task/s an individual is required to fulfil. Schedule: A plan for performing work or achieving an objective Content Delivery & Security Association Page 5 of 66
6 The participant of the program is referred to as site notwithstanding that in many instances a site is part of a larger organization. The Statement of Applicability Certification to this Standard begins with the site completing an internal assessment against the CPS Standard requirements and the completion of a Statement of Applicability or SoA. The SoA sets out the requirements of this Standard and will be provided by your appointed CDSA Auditor. If you believe a requirement of this Standard is not applicable it must be justified, agreed and documented. If a requirement is applicable to your site but has not yet been implemented this should also be identified in order to assist the site to address any gaps or areas of development prior to the audit. For example the site may wish to record what is: o o o In progress A future project or; An accepted risk A Standard requirement not achieved, may be justified through detailing equivalent compensating controls that meet the same objective. A completed SoA is imperative because: It can be utilized by a site to determine readiness for CDSA evaluation, It can be utilized by a site to document and demonstrate equivalent methods by which an objective is met, but may differ from the defined requirements, It can be utilized by a site to document those requirements identified as not applicable within the environment under consideration, and It is used by the CDSA auditor to set the scope of the audit, including appropriate resources and duration. Within each section, a summary is provided to assist you with your preparation. Further guidance is available from your appointed CDSA auditor or Territory Director. The example below illustrates the layout of each section of the Standard Content Delivery & Security Association Page 6 of 66
7 Summary: Objective: An overview of the subject to be covered. What is to be achieved. The controls required to meet the objective. Evidence: A demonstration of compliance. Compliance Mapping: Reference to industry best practice or other industry Standard. Declination of Liability CDSA has made every effort to formulate a Standard that it believes helps sites reduce the likelihood of content loss or theft. However, a Standard, no matter its specificity or diligent application, cannot guarantee avoidance of a loss or claim. Therefore, CDSA is not liable for any loss or claim by a content owner, site or organization, or other party on account of this Standard, whether or not CDSA has issued a certificate of compliance Content Delivery & Security Association Page 7 of 66
8 CF 1. CF 1.1. MANAGEMENT CONTROLS Documentation Create a security policy manual and associated documentation. Communicate security policies, procedures/work instructions to staff. Ensure documents remain current and fit for purpose through a process of review. Management engagement and leadership to improve security culture. CF CF CF The site shall establish, implement and maintain a process to control documents and records that relate to its security management system. This process shall include methods for: management to approve documents prior to use, ensuring that document changes and current revisions are properly identified through an appropriate means, reviewing and updating documents periodically, ensuring documents are legible, identifiable, properly stored and maintained, ensuring current documents are available where needed, and preventing unintended use of obsolete documents. All such records and documentation shall be retained for a minimum of 3 years, except where specified otherwise. The site shall implement and maintain a security manual detailing policies, procedures, roles and responsibilities in conformance with the Content Protection Security Standard. The control documents shall specify operational procedures necessary for conformity Content Delivery & Security Association Page 8 of 66
9 CF 1.2. Risk Management Conduct a review of relevant business activities within each department identifying potential security related risks. Implement proportionate and effective controls to prioritize and mitigate risk. Manage risk within a process of continual review. CF CF CF CF CF CF Management shall define roles and responsibilities for risk assessment. The site shall document a Statement of Applicability that summarizes the controls in place and any exclusion from the CPS security requirements. Risk assessments shall be documented, describing each risk, analyzing its level of impact and assessing the likelihood of a security incident occurring. A methodology for risk assessment shall be provided. The risk register shall be maintained. Risk assessments shall be reviewed by senior management annually, following a security incident or before significant changes in business activity Content Delivery & Security Association Page 9 of 66
10 CF 1.3. Compliance To ensure the site meets the CPS Standard and any relevant legal, regulatory and contractual obligations. To provide a mechanism to achieve on-going compliance. CF CF CF CF Define and implement the procedures relating to the protection of media assets within a security management system. This shall include: security incident monitoring and response, corrective and preventive actions, internal audits, external CDSA audits, and review of security management system and its performance. The site shall establish, implement and maintain a procedure for security incident monitoring and response. This shall address: identifying the type of security incident (e.g., previously unidentified risk, failure to follow security procedures, security hardware failures, theft or loss of intellectual property or related media assets, or any other unusual situation possibly affecting security), gathering details and where necessary securing evidence of the security incident (e.g., date, time and location of incident, circumstances, persons involved, etc., and considering the need for specialist resources for incident handling and evidence gathering), investigating the security incident root causes, evaluating the impact of the actual or potential loss, initiating immediate response and recovery plans to mitigate loss and manage residual risk where necessary, and escalation procedures for incident reporting including client notification and regular updates. Corrective and preventive action processes shall: remove root causes and implement controls necessary to prevent reoccurrence, eliminate any potential for unauthorized release or access to content, ensure timely and effective response, ensure any response remains proportionate to the risk, and address any identified non-compliance, The site shall maintain and retain associated records for at least three years. Internal audit procedures shall ensure: the site complies with the CPS Standard and any legal, regulatory or contractual obligations, 2014 Content Delivery & Security Association Page 10 of 66
11 CF 1.3. CF CF Compliance internal audits are scheduled and performed at least once per year, no later than six months following the CDSA external audit, where practicable, persons carrying out the audit are independent of those responsible for the activity, results of the audits are recorded and published to allow those responsible to make corrective or preventive action, External audit shall be conducted according to the following: on successful completion of an initial external CPS audit the site shall be certified for a six-month period, following the initial six-month certification period a further external CPS audit shall be carried out and, if successful, the site shall be certified for a 12-month period, the site shall then undergo external CPS audits on an annual basis, certification periods run to the end of the month in which the audit was due, delayed audits are backdated, audits can be brought forward no more than one calendar month, and audits delayed longer than three months may result in removal from the certification process. Non-compliances detected during external audits are defined and managed as follows: a major non-compliance occurs when there is evidence that assets are placed at significant or long-term risk, additionally, a major non-compliance occurs when it is identified that there is a systemic failure to meet the requirements of the CPS program, where major non-compliances are found, the site shall not receive certification until it implements effective corrective actions and these have been thoroughly verified, possibly through a re-audit (all cases of systemic failure require a re-audit), a minor non-compliance is a non-systemic, non-fulfillment of an element of a clause of the requirements of the CPS program, where minor non-compliances are found the site shall have 30 days to submit a corrective action plan to the CDSA auditor, once the plan is agreed CDSA issues a certificate of compliance, CDSA reserves the right to suspend certification until appropriate corrective actions are implemented, and CDSA reserves the right to publicly acknowledge certification suspension Content Delivery & Security Association Page 11 of 66
12 CF 2. CF 2.1. PERSONNEL AND RESOURCES Personnel and Resources Mitigate the risk to content where personnel and resources are involved, including the engagement of contractors, consultants and third-party vendors. Ensure screening methods are appropriate and proportionate to personnel security risk. Provide adequate budget to support security objectives. CF CF CF CF Management shall appoint a CPS program manager who shall ensure that the security management system, its policies and procedures are established, implemented and maintained. Management shall define its organizational structure. Management shall assign roles and responsibilities to process owners, who effectively develop, implement and maintain security policies and procedures to secure assets and meet security objectives. The responsibilities and authorities of management involved in the security management system shall be defined and documented. The organization shall have policies for: recruiting and hiring practices, new hire background screening and periodic review, confidentiality agreements, job changes and reassignments, disciplinary actions against personnel, and personnel termination practices. Management shall take appropriate action to make arrangements for job changes, reassignments, and personnel terminations, including: asset and knowledge transfer and 2014 Content Delivery & Security Association Page 12 of 66
13 CF 2.1. CF CF CF CF Personnel and Resources reassignment and/or revocation of both internal and external access rights. Management shall ensure that areas of responsibility are separated where necessary to reduce opportunities for unauthorized modification and misuse of information or services. Management shall identify and ensure the availability of adequate budget for mandated security requirements. Management shall identify any other resources (other than financial) that may be of benefit to the security management system and/or managing security risks. Management shall ensure that appropriate Service Level Agreements (SLAs) and contractual obligations are agreed, implemented and reviewed regularly Content Delivery & Security Association Page 13 of 66
14 CF 2.2. Third-party Resources Minimize the risk to assets entrusted to, under control of or accessed by contractors, consultants and third-party vendors CF The site shall have policies and procedures for the contracting and engagement of any third-party resources. Policy and processes for third-parties shall conform to relevant CDSA requirements. As a minimum this shall include: background screening and due diligence, third-party recruitment hiring and termination, third-party insurance consistent with that of the site, confidentiality and non-disclosure agreements, documented supplier risk assessment, acceptance of independent audit/review, and documented annually performed internal audit. signed acceptance and acknowledgement of individual requirements and compliance to security policies. Documents shall be retained for a period of three years Content Delivery & Security Association Page 14 of 66
15 CF 3. CF 3.1. ASSET MANAGEMENT Administrative Controls Ensure that roles and responsibilities for asset management and security are established and have been clearly communicated. Ensure a consistent approach when handling assets using a process of risk assessment. Provide a secure, efficient and effective operating system for all assets. Ensure security requirements in accordance with legal, regulatory and contractual requirements are met. Maintain documented policy and process for digital IP and other commercial assets. CF CF CF CF CF CF CF CF Management shall define specific roles and the responsibilities for each stage of asset handling. This may include: receipt and identification of incoming assets, asset identification and traceability, asset handling, asset storage, and transport of outgoing assets. Such policies shall ensure the security of physical assets, analog and digital recordings, removable drives, including reference copies, temporary storage devices for digital files and permanent storage devices including backups of content. Personnel shall acknowledge an understanding and acceptance of their specific role. Management shall assign a risk category for each asset based on type of content being handled, i.e., high value, pre-release, back catalog, etc, Each risk category shall have assigned specific security requirements. Each asset handling procedure shall be documented to ensure a consistent approach. Access to computer systems and storage locations for digital assets shall be properly administered to prevent unauthorized access. Access to asset locations shall be reviewed regularly. Documents shall be retained for a minimum of three years Content Delivery & Security Association Page 15 of 66
16 CF 3.2. Control of Assets Implement, operate and maintain an accurate asset management system that is capable of audit. CF CF CF The site shall introduce an asset management system which may be either electronic or paper-based. The system shall be capable of providing an auditable chain of custody, identifying the location and time/date of creation, movement or destruction. Records shall be retained for a minimum period of three years Content Delivery & Security Association Page 16 of 66
17 CF 3.3. Asset Receipt and Identification Implement, operate and maintain accurate records for asset receipt and future identification. CF CF Document a process for recording unique reference identification for assets at the point of receipt. All assets shall be uniquely identified and registered on the asset management system upon arrival. This can include use of bar code or other unique identification Content Delivery & Security Association Page 17 of 66
18 CF 3.4. Asset Handling and Transfer Implement, operate and maintain an effective process for asset tracking. Maintain accurate records of all asset movement that are capable of audit. CF CF CF Document an asset transfer process that demonstrates how assets are transferred and traced on-site and, where applicable, off-site at third-party vendor locations. Document an asset handling process that details the security requirements necessary to ensure the integrity and security of assets. Ensure all asset movement is recorded, auditable and reviewed throughout the assets chain of custody Content Delivery & Security Association Page 18 of 66
19 CF 3.5. Secure Asset Storage and Reconciliation Controls Maintain accurate records for asset storage and movement. Ensure asset integrity and security is being maintained. CF CF CF CF CF CF CF The site shall allocate assets to secure locations identified within the site security plan. Locations shall be subject to enhanced security controls to ensure access is only permissible to authorized personnel. The site shall establish and implement a cyclic count policy for stored assets. Where possible, personnel independent of the asset management process shall carry out cyclic counts. Management shall periodically review cyclic counts procedures and results. Discrepancies shall be investigated and reviewed by management. A process for client notification and escalation shall be documented Content Delivery & Security Association Page 19 of 66
20 CF 3.6. Asset Re-call Procedures Prevent assets from being retained outside secure storage locations any longer than is necessary. Reduce opportunity for theft and prevent assets from being left unattended. Provide a mechanism whereby escalation procedures can be implemented, including commencement of checks, controls, investigation and client notification. CF CF CF CF CF The site shall adopt a procedure for asset recall, identifying criteria for items according to risk assessment. Where an asset cannot be accounted for, a person responsible for the activity shall conduct an initial investigation to recover the item. The results of any investigation shall be documented and reported to line management. Rectification, corrective or disciplinary action shall be considered to avoid future incidents. Should an asset remain missing beyond an initial investigation, further inquiry shall be commenced using a person independent of the activity. A policy and procedure for escalation and client notification shall be in place. Policy and procedures must be compliant with any service level agreement or contractual requirement Content Delivery & Security Association Page 20 of 66
21 CF 3.7. Control of Blank Media Materials Treat raw materials as an asset. Document, implement and maintain secure processes for controlling raw material. CF CF CF CF Document an asset identification process for all blank media arriving on site. Ensure all blank media is and logged in upon arrival. Whenever possible, the blank media shall be uniquely identified. This can be either by use of barcode or another unique identifier. Ensure all blank media is stored in a secure location and access restricted to authorized personnel. Document an authorization and tracking process for signing out all blank media for use Content Delivery & Security Association Page 21 of 66
22 CF 3.8. Record Retention Retain accurate and detailed asset management records to enable and assist audit and investigation. CF CF CF The site shall establish a policy and procedure for record retention. As a minimum, this shall include all asset receipt/dispatch records, manufacturing process documentation and asset tracking records. The site shall ensure that all records are retained for a minimum period of three years. Where samples are retained for quality purposes or in compliance with other certification programs; these shall also be retained for a minimum period of three years Content Delivery & Security Association Page 22 of 66
23 CF 3.9. Transportation of Assets Achieve secure transfer of assets between sites. CF CF CF CF CF CF CF CF The site shall establish policy and procedures for the secure transportation of assets. Assets must be prevented from leaving a site until all checks and authorities for shipment have been met. Policy and procedures shall set out a minimum security standard for vehicles and driver conduct. Policy and procedures shall determine when and how vehicles shall be sealed prior to shipping, according to documented risk assessment and client contractual obligations. For high profile loads, requirements for additional guarding and vehicle tracking shall be considered as part of a documented risk assessment. Driver policy and procedure shall prevent unsecure and unattended parking. Third-party couriers or haulers shall be subject to a written Service Level Agreement and carry sufficient liability insurance to cover client losses in the event of the theft or loss of a high profile release. There shall be a documented policy that ensures visiting drivers do not enter the premises, or, where necessary, are escorted at all times Content Delivery & Security Association Page 23 of 66
24 CF Labeling and Packaging Achieve secure transfer of assets between sites. CF CF The site shall implement and maintain a documented policy and procedures for the labeling and packaging of all assets leaving the site. Client specific requirements must be taken into consideration. Inconsistent, differentiating use of packaging and title-based identification shall be avoided. Where possible, details shall be restricted to order number, unique reference numbering, quantity and destination Content Delivery & Security Association Page 24 of 66
25 CF Destruction and Recycling Secure assets in segregated containers and monitor locations while awaiting destruction. Securely destroy and recycle assets using a reliable and auditable process. CF CF CF CF CF CF CF CF CF The site shall implement and maintain documented policy and procedures for destruction and recycling. Processes shall ensure that assets are rendered unusable and/or securely stored within suitable locked containers while in production and manufacturing environments. Containers shall be transferred for destruction on a frequent basis. The long-term retention of assets awaiting destruction must be avoided. While awaiting secure destruction, assets must be securely stored and monitored. In the case of optical disc manufacturing, molded reject discs used in print set-up processes must be rendered unusable by a client-approved method. Storage containers for rejected items awaiting destruction shall be clearly marked to avoid mistaken identity. Detailed records shall be maintained for all assets destroyed, detailing the number, weight, date and time of destruction. A certificate of destruction must be made available for clients wishing formal conformation. Records must be retained for a minimum of three years. Where on-site grinders are used, they shall be monitored by CCTV. Where destruction or recycling is performed by third-parties, a Service Level Agreement must be in place ensuring the above requirements are met. Third-parties shall provide certificates of destruction to confirm that all assets have been destroyed in accordance the above requirements Content Delivery & Security Association Page 25 of 66
26 CF 4. CF 4.1. PHYSICAL SECURITY Physical Security Management Document within a security plan what physical security controls are in place and how these are monitored to safeguard designated critical, sensitive and operational assets. Document within a security plan how authorized and unauthorized physical access to perimeter and internal secure areas are prevented, monitored and managed. Document within a security plan how physical access controls protect specific locations where client media assets are located CF CF CF CF The site shall establish and communicate a physical security plan. The plan shall demonstrate that risk to personnel, media assets and the physical environment have been properly considered and that controls are in place to reduce risks to an acceptable level. As a minimum, the plan shall provide policy and procedures for: site access, authorization and denial to include pedestrians and vehicles, visitors, contractors and employees, segregation of all operational areas where assets, including blank material, are received, handled, manufactured, stored and dispatched, site monitoring and patrol procedures, incident prevention, detection and response, The plan shall consider the security controls needed to mitigate environmental risks as part of risk assessment Content Delivery & Security Association Page 26 of 66
27 CF 4.2. Perimeter Security Physically secure the site perimeter using appropriate, proportionate and effective controls and boundaries. CF CF CF The site shall detail policies and procedures for controlling the site perimeter within a site security plan. The site shall demonstrate its capability to secure the physical perimeter. The site shall be protected by a continuous physical barrier that is monitored and inspected regularly. All entry and exit points shall be secured and monitored using appropriate means to ensure only authorized access is permitted Content Delivery & Security Association Page 27 of 66
28 CF 4.3. Securing Internal Areas Ensure the internal security of a site, and identify requirements for high security zones. Monitor, secure and control access to internal areas where media assets are located, stored, handled or produced. CF CF CF CF CF CF CF CF CF CF CF The site shall implement and maintain policies and procedures for accessing, monitoring and controlling internal locations and secure areas. The site shall provide clear delineation of controlled and secure areas. Creation of each zone shall be risk assessed against the activity being undertaken, media asset value, perceived threats or vulnerabilities and environmental protection. The site shall control access to buildings. Internal areas containing media assets shall be segregated, secured and monitored to prevent unauthorized access. Segregated secure areas must be subject to access control and monitoring. The level of physical controls required shall be risk assessed against the activity being undertaken, media asset value, perceived threats or vulnerabilities and environmental protection. Access to assets shall only be permitted where there is a legitimate business need. Sites shall ensure that security controls provide prevention, detection and responses to security incidents. Authorized access to secure internal areas for personnel shall be established according to their roles and responsibilities. The possession and use of personal photographic, recording, storage and audio devices shall be controlled or prohibited when operating or visiting secure internal areas. The site shall implement and maintain policies and procedures for visitor access. To include details of registration, search policy and escorted access to secure locations Content Delivery & Security Association Page 28 of 66
29 CF 4.4. Use of Guards Ensure the integrity and security of the physical site by the use of guards. CF CF CF The site shall implement and maintain policies and procedures of guarding duties including the creation, management and audit of site assignment instructions. The site shall establish effective processes to deal with perceived threats, including response and reporting plans. Where third-parties are used, requirements set out in CF 2 shall be followed Content Delivery & Security Association Page 29 of 66
30 CF 4.5. Searches Deter and detect the theft or misappropriation of media assets. CF CF CF CF The site shall implement and maintain policies and procedures for searching that include all persons leaving a designated secure area. A process for escalating a positive search and recording search details shall be adopted. Searches shall be both random and for cause with a recommended minimum of 20 percent exiting personnel being subjected to the search criteria. The extent of searches may be limited to legal and regulatory controls, but where possible must include the removal of outer wear, the emptying of pockets, bag inspection, and the use of a hand held metallic detector. CF Searches of vehicles shall be implemented where personal vehicles are allowed within controlled and secured areas as defined in CF 4.3. CF A record of searches shall be retained for a minimum period of 90 days Content Delivery & Security Association Page 30 of 66
31 CF 4.6. Summary: CCTV CF 4.6 sets out the security requirements for the use of closed circuit television (CCTV). Industry standards for acceptable use and retention of images are to be used to assist immediate response and post-incident reporting. CCTV assists to protect: the perimeter boundary, internally controlled and/or designated secure areas, and physical and logical media assets. Correct use captures;: acts of criminality, and breaches of health and safety. CCTV locations extend, improve and corroborate other security systems such as: patrolling guards, intruder detection, and automated access control. As a guide images should be: fairly and lawfully processed, used for specific limited purposes such as the prevention and detection of crime, assessed as accurate, adequate, relevant but not excessive, retained only for as long as necessary and where law allows for 90 days minimum, processed in accordance with an individual s human rights, and kept secure and only accessible by those who have a business need. Protect premises, staff and media assets through the effective use of CCTV. CF CF CF Policy and procedural documentation for the use of CCTV shall be created, implemented and maintained. These documents shall be communicated to all relevant staff.. Images are to be retained for a minimum of 90 days and only accessed by persons with legitimate business need. Images shall be accurately time and date stamped Content Delivery & Security Association Page 31 of 66
32 CF 4.6. CF CF CF CF CF CCTV Monitoring shall be carried out using suitably qualified staff. Irrespective of deployment, sites shall consider local laws and regulation of deployed CCTV. There shall be suitable maintenance agreement or suitable internal arrangements for maintenance in place. CCTV systems shall be maintained in accordance with manufacturer s guidelines. Where third-parties are used, requirements set out in CF 2 shall be followed. Uninterrupted power supply (UPS) must extend to all security systems and sized appropriately for local conditions and business activities. Adequate lighting shall be maintained to ensure clarity of vision and recordings Content Delivery & Security Association Page 32 of 66
33 CF 4.7. Access Control Systems and Automated Technologies (AACS) Protect external and internal access to controlled and designated internal secure areas through the use of automated access control systems. CF CF CF The site shall implement and maintain policies for monitoring and controlling access control systems. The policy shall include situations of system failure, tampering or avoidance. Events and movements to sensitive areas shall be logged, available for immediate review, and retained for a minimum of three years. Systems shall be maintained in accordance with manufactures guidelines. Where third party services are used requirements set out in CF 2 shall be followed Content Delivery & Security Association Page 33 of 66
34 CF 4.8. Intruder Detection Systems (IDS) Detect the entry, or attempted entry of an intruder into a protected area. Identify the location of the intrusion and to signal an alarm on which to respond. CF CF CF CF CF CF CF The site shall implement and maintain policies for the use, monitoring and controlling of IDS. Where installed, sites shall ensure that systems are maintained and routinely tested. If maintained and tested by a third-party the site shall operate a service level agreement to ensure constant coverage. Access to the system shall be controlled in accordance with IT Security CF 5 requirements. The IDS shall have uninterrupted power supply. The IDS shall be monitored and responded to when activated. Event logs for the preceding 90 days shall be available for review Content Delivery & Security Association Page 34 of 66
35 CF 5. CF 5.1. IT SECURITY Information Security Management Establish a document framework for IT controls. CF CF CF CF CF 5.2. IT security policy shall be defined and published. Reference shall be made to the technical controls and practices employed to secure the enterprise information systems. IT security policy shall be agreed by management and subject to regular review. IT security policy shall define principles, standards and compliance requirements. Acceptable Use Provide a formal framework for acceptable system, network, and asset usage. Achieve a culture of responsible behavior at all levels of the organization when working with client assets. CF CF CF CF The site shall establish, implement and maintain an acceptable use policy for acceptable use of IT assets. The policy shall define rules pertaining to acceptable use and responsibilities of all users irrespective of association, i.e., employee, contractor, temporary staff, consultants and visitors. The policy shall define the disciplinary consequences of non-adherence to the acceptable use policy. The policy shall be communicated and a record maintained of the individual s understanding and acceptance of the content. CF 5.3. Internet Usage Provide a formal framework for acceptable Internet usage Content Delivery & Security Association Page 35 of 66
36 CF 5.3. Internet Usage Achieve a culture of responsible Internet usage at all levels of the organization. CF CF CF The site shall establish, implement and maintain an internet acceptable use policy. The policy shall include: individual responsibilities and accountability, what constitutes acceptable and unacceptable behavior actions required should inappropriate internet access or use be suspected, consequences of unacceptable Internet use, and training and awareness requirements. The policy shall be communicated and a record maintained of the individual s understanding and acceptance of the content Content Delivery & Security Association Page 36 of 66
37 CF Usage Provide a formal framework for acceptable usage. Achieve a culture of responsible usage at all levels of the organization. CF CF CF The site shall establish, implement and maintain an policy. The policy shall include: individual responsibilities and accountability, what constitutes acceptable and unacceptable behavior, formats approved for dissemination of information, actions required should an inappropriate or suspected malicious code be received, the consequences of unacceptable use, and training and awareness requirements The policy shall be communicated and a record maintained of the individual s understanding and acceptance of the content Content Delivery & Security Association Page 37 of 66
38 CF 5.5. System Administrator and Elevated Privilege User Accounts Define, control and securely manage persons with administrator/elevated privilege level access to network/systems and logical media assets CF CF CF CF A policy and procedure covering IT system administrative and elevated privilege activities shall be created and communicated to IT system users Default Admin accounts shall be renamed. Administrators and privilege users shall use basic user accounts for normal day-to-day activities such as and authorized Internet access with such usage prevented on their higher level accounts unless approved by management. No access is permitted for administrator accounts. CF Administrative and privilege user functions shall be approved by management and have individual account credentials to prevent compromise.. CF CF Administration account functions shall be monitored, logged and regularly audited within a segregation of duties and records retained for at least three years. A record should be made of a higher level user s training and acceptance of the policy Content Delivery & Security Association Page 38 of 66
39 CF 5.6. System Basic User Accounts Define, control and securely manage persons with basic user level access to network/systems and logical media assets. CF CF CF CF CF CF A policy and procedure covering IT system basic level users shall be created and communicated to IT system users. Users shall have individual user accounts controlled by username and password credentials. See 5.5 Password Management. Basic user accounts shall be configured to prohibit: Installing or uninstalling software or modifying security software (e.g., anti-virus, firewall etc.), adding functioning hardware to the local system, adding drivers to the system), modifying network aspects of the system (e.g., IP address, etc.), running any system/administrator/root type command, and changing account permissions or creating or deleting accounts, modifying network aspects of the system (e.g., IP address, etc.), User accounts shall be disabled prior to notification of termination. User accounts shall be reviewed on a regular basis on the principle of least privilage and to ensure that unauthorized accounts do not remain active. A record should be made of a IT system users training and acceptance of the policy Content Delivery & Security Association Page 39 of 66
40 CF 5.7. Password Management Ensure the site has appropriate and consistent password controls to deter unauthorized access to IT systems. CF CF CF CF CF CF CF CF The site shall establish, implement and maintain a password policy. Password format and complexity requirements must be established, set and monitored at administrator level. Password expiry time shall be defined. Criteria for re-use of passwords shall be defined. Separate passwords shall be used for administrator, privileged and basic user accounts. Education on password awareness shall be provided (also see CF 6 Training and Awareness). Password selection and quality definition of the policy shall include individual responsibilities and accountability including the consequence of policy breach. The policy shall be communicated and a record maintained of the individual s understanding and acceptance of the content Content Delivery & Security Association Page 40 of 66
41 CF 5.8. Authorizing Third-party Access to IT Systems To maintain integrity and security of IT systems/networks and logical media assets accessed by third-parties. CF CF CF CF CF CF A policy and procedure covering third party IT access shall be created and communicated to IT system users. This policy should require that such third party access be pre-authorized, documented, monitored and reviewed. Sites shall maintain third-party service legal agreements and review regularly for effectiveness. Third-parties shall be required to adhere to the sites IT security policies and procedures. The policy shall be communicated and a record retained of the companies acceptance and individuals acceptance and understanding of the content. All parties shall sign non-disclosure and confidentiality agreements. Agreements shall be specific to the activity undertaken Content Delivery & Security Association Page 41 of 66
42 CF 5.9. Removable Media To ensure sites have controls on removable media to prevent unauthorized removal from the site or introduction of threats to IT systems. CF CF CF CF CF CF CF CF The site shall establish, implement and maintain a removable media policy. The policy shall include individual responsibilities and accountability. Unauthorized or non-essential devices shall be prevented from accessing the network. Authorization criteria and a procedure shall be established. A list of authorized devices shall be maintained. Authorized devices shall be clearly identified and entered onto an asset register. Policy shall be aligned to an end point security solution and network access controls. Policy shall outline the consequences of any failure to comply Content Delivery & Security Association Page 42 of 66
43 CF Mobile Device Management Set a formal requirement for mobile device acceptable use. Achieve a culture of responsible behavior when working with mobile devices. CF CF CF CF CF CF CF CF CF CF CF CF The site shall establish, implement and maintain a mobile device acceptable use policy. The policy shall define rules pertaining to acceptable use and responsibilities of all users irrespective of association (i.e., employee, contractor or temporary staff). The policy shall ensure that client assets are not stored on mobile devices. Mobile devices shall be authorized for introduction to and removal from the site by a person responsible for system administration duties. Where guards are used to prevent the introduction or removal of storage devices from the site, such devices shall be visibly marked and an inventory list held by the guards to verify the device is authorized. All mobile devices shall be backed up on a regular basis to avoid loss of data. All mobile devices shall be protected with malware and firewall software where appropriate. Where technology exists, mobile devices shall be encrypted to prevent data migration if stolen or lost. Mobile phones shall be PIN locked on timeout. Mobile devices shall be password protected on timeout. Where an incorrect PIN is entered 5 times consecutively, this shall cause the device to lockout. Where technology exists, the site shall have the ability to remotely lock, wipe or find devices when a device is reported stolen or lost. Users shall sign adherence to policy Content Delivery & Security Association Page 43 of 66
44 CF Wireless Networks Secure wireless networks to prevent unauthorized access or loss of sensitive data. CF CF CF CF A policy and procedure covering site wireless networks shall be created and communicated to IT system users. No wireless access shall be allowed into production or replication networks. All wireless access shall be protected from unauthorized access. All wireless signals shall be protected from information interception. As a minimum, WPA2 shall be implemented between infrastructure and client Content Delivery & Security Association Page 44 of 66
45 CF Incident Management Ensure that sites can manage incidents effectively. CF CF CF CF A policy and procedure covering site incident management shall be created and communicated to IT system users, including the requirement to report all known or suspected incidents. The procedure should cover initial and extended triage and include methods for:: monitoring, detection, root cause analysis, incident categorization and prioritization. Roles and responsibilities shall be defined. The site shall manage and align the recovery from logical security incidents in line with CF 7 Business Resilience to include: Containment or quarantine, ethical evidence capture (in compliance with contractual, legal and regulatory requirements) removal, restoration, and corrective action Content Delivery & Security Association Page 45 of 66 CF 5.12
46 CF Physical and Environmental Security Controls Ensure data and logical media assets are physically controlled and secured. Ensure environmental conditions are managed. CF CF CF CF CF CF CF CF CF Sites shall establish adequate controls to physically protect and control access to servers, firewalls and data stores. Access shall only be given to authorized personnel based on a need to routinely access, visit, or work in the designated secure area. Details of visitors to the secure locations shall be documented giving time date and purpose for the visit. All visitors shall be escorted. In the case of shared services the physical access to servers shall be secured using secured cabinets. Keys and combinations shall be issued and retained by an appointed administrator. Data stores (especially backup stores) shall be protected from poor environmental conditions, which include dust, dirt, smoke and strong electromagnetic fields. These may include fire and heat sensors, fire suppression, air conditioning, temperature controls, raised flooring, fire-rated wall and doors, etc. Locations shall be inspected on a regular basis and subject to routine maintenance. Uninterrupted power supply shall extend to all security and environmental controls protecting servers and data stores, and sized appropriately for local conditions and business activities Content Delivery & Security Association Page 46 of 66
47 CF IT Asset Management Ensure the site has a register of all hardware, associated devices and software in use. Ensure that regular reviews of software use are undertaken. Ensure data from defective hardware is securely removed prior to any authorized repair. Ensure that redundant hardware and associated devices are disposed of properly in a secure manner that prevents data migration. CF CF CF CF CF CF CF CF CF CF There shall be a policy defined for the registration, management, use, repair and destruction of all hardware, associated devices and software. Individual responsibilities and accountability shall be defined. All assets and software shall be subject to an acceptance and authorization for use process. Authorized hardware and devices shall be clearly identified by visible marking through use of asset tags, bar codes or similar with the asset number entered onto the asset register. All associated software authorized for use on each IT asset shall be documented within the asset register including details of license keys to prove authenticity. The deployment of software on each workstation shall be reviewed on a regular basis by a person responsible for system administration to ensure that it has been authorized for use. Policy shall be aligned to an end point security solution and network access controls. There shall be an authorization for repair and disposal processes, controlled by a system administrator. Personnel shall not self-authorize removal from use, repair or destruction. Hardware and associated devices identified as being redundant shall have all stored data wiped or destroyed prior to repair or disposal. Records shall be maintained for a period of three years. Policy shall outline the consequence of a breach Content Delivery & Security Association Page 47 of 66
48 CF Network Monitoring Ensure networks are monitored effectively. CF CF The site shall enable logging on all systems handling digital assets and develop a process to protect logs from change, review logs regularly and define a system to report findings and investigate anomalies. The logging shall include information relating to events and changes to security hardware and software and provide enough detail to allow effective investigation. Controls shall be enabled to warn personnel responsible for system administration of any IDS/IPS suspicious activity Content Delivery & Security Association Page 48 of 66
49 CF Access Controls Effectively manage access controls. CF CF CF CF CF A policy and procedure covering user access controls shall be created and communicated to IT system users. The site shall establish and configure effective security technologies safeguarding sensitive data. Authorization permissions should follow mandatory access controls (MAC), discretionary access controls (DAC) and or role-based access controls (RBAC). Workstations shall be configured to lock out after a defined period of inactivity. Controls shall be reviewed regularly Content Delivery & Security Association Page 49 of 66
50 CF Remote Access Establish effective controls to secure remote access requirements. CF CF CF CF CF CF A policy and procedure covering remote access controls shall be created and communicated to IT system users. Sites shall establish mandatory access controls (MAC), discretionary access controls (DAC) and or role-based access controls (RBAC) to determine ownership and accountability for files and data. Controls should prevent remote access through third-party web applications, e.g., Outlook Web Access. Controls shall deny remote access through third- party applications, e.g.: PCAnywhere, Log-Me-In, Windows Remote Assistance, and non-encrypted remote desktop. Where remote tele-working is approved, a minimum two-factor authorization VPN shall be established. Controls should be reviewed regularly to ensure they continue to deliver the necessary security Content Delivery & Security Association Page 50 of 66
51 CF Change Management Effectively manage change within the site s networks. CF CF CF A policy and procedure managing changes to IT systems and application software shall be created and communicated to IT system users. The policy should ensure that all changes to IT systems undergo a formal prior impact assessment, formal review and approval from stakeholders. It should include a method for recording significant changes, planning and testing of changes and communication of changes to relevant persons. Fallback procedures must be documented to mitigate the risk of unsuccessful changes Content Delivery & Security Association Page 51 of 66
52 CF System Documentation Effectively document systems architecture of the site s networks. CF CF CF CF A policy and procedure covering IT system architecture documentation shall be created This procedure shall detail the recording and presenting network landscapes This policy shall express security consideration and controls of such IT system information to prevent inappropriate exposure of possible vulnerabilities. A network landscape diagram shall be produced and held under secure conditions to prevent exposure of possible vulnerabilities Content Delivery & Security Association Page 52 of 66
53 CF External Networks Maintain the security of external networks. CF CF CF All external content bearing network segments shall be monitored for anomalies. All external connections shall be recorded and assessed based against business requirements and reviewed regularly. Logs shall be retained for a minimum of 12 months Content Delivery & Security Association Page 53 of 66
54 CF Internal Networks Maintain the security of internal networks. Ensure segregation of administrative functions CF CF CF CF CF All internal content bearing network segments shall be mapped and secured from unauthorized access. All production, development and general network segments shall be segregated from each other. Production segments shall have no direct connection to the Internet. All network segments transporting content shall be monitored for anomalies. Administration functions shall be adequately segregated to protect client assets Content Delivery & Security Association Page 54 of 66
55 CF File Transfer Management Ensure effective file transfer methodologies and encryption. CF CF CF CF CF CF CF A policy and procedure covering File Transfer Management shall be created and communicated to IT system users. This should include a full understanding of each connection and a procedure for recording access to, or authorization for release of each employed technology Where key delivery messages (KDMs) are used, they shall be time specific and valid only for a specific destination device. Where relevant, production and hosting environments shall provide verification of the file integrity using hash comparisons or equivalent. Any encryption used should be in line with best industry practice and should use/hold a valid certificate issued by a recognized authority. Security incidents should be recorded and investigated. (See CF 5.10 Incident Management) The technology and controls used should be subject to regular review. Sites shall establish internal audits for transfer of media Content Delivery & Security Association Page 55 of 66
56 CF Firewall Management Ensure effective firewall management. CF CF CF CF CF CF A policy and procedure covering Firewall Management shall be created. All connections from outside the site (or larger corporate network) shall be controlled by a correctly configured firewall. Application level firewalls must track both internal and external traffic. Firewalls shall be configured to an agreed firewall policy as a minimum default setting to Deny All. Sites should establish an agreed state table for management of IP address ranges and port controls. Firewalls must be capable of rejecting packets based on the state table. Automatic alerts shall be sent to the systems administrator when a firewall configuration changes or re-boots and if necessary investigated 2014 Content Delivery & Security Association Page 56 of 66
57 CF Vulnerability Management Ensure effective anti-virus is installed and maintained. Ensure that vulnerabilities are reduced by regular security updating. Ensure that server and system configuration back-ups are available in the event of an unplanned incident. Ensure that data maintains integrity and confidentiality in the event of a loss of services. CF CF CF CF CF CF CF CF CF CF CF CF CF CF An anti-virus policy shall be documented and implemented. All servers and workstations shall be protected or exceptions to deployment shall be justified. Where exceptions to anti-virus deployment have been made, alternative methods for protection must be defined. Anti-virus software shall be updated at least weekly on workstations and daily on servers. Anti-virus shall not be capable of being disabled by basic users. Anti-virus shall perform on access scanning and scheduled background scanning at least monthly on workstations and weekly on servers. Anti-virus shall, as minimum, quarantine suspicious files. There shall be a documented patching regime for servers, workstations and security barriers. All servers and workstations shall be patched at least quarterly; security barriers shall be patched at least monthly. All justifications for non-patching must be documented, justified and where appropriate alternative mitigating controls implemented, for example where manufacturer software support is no longer available. All public facing and internal servers shall be base-lined, their configuration defined, recorded and backed-up to external storage media, stored under secure conditions. All unnecessary services shall be removed or disabled from all servers. Public facing servers shall not have any internal facing credentials stored. Internal facing servers shall not have access to the internet. Client data and sensitive/valuable company data shall be backed up off site on a regular basis to ensure availability of data in the event of an unplanned incident. The site shall provide evidence of vulnerability assessment and shall consider an appropriate level of testing to be applied according to documented risk assessment Content Delivery & Security Association Page 57 of 66
58 CF 6. CF 6.1. TRAINING AND AWARENESS Training and Awareness Needs Ensure all personnel are trained and made aware of security requirements. CF CF CF CF CF CF The site shall establish a policy to ensure that security training is effectively delivered. Awareness of site security measures and requirements shall be provided. Security training and awareness shall be made available to all and shall be provided as required according to role and responsibility. As a minimum, security awareness shall be delivered to all new starters, contractors and temporary staff, and thereafter delivered annually to maintain such awareness. Specific security requirements of the CPS Standard, legal, regulatory and contractual obligations shall be identified, reviewed and incorporated into a structured training program. The site shall ensure that records of attendance are maintained Content Delivery & Security Association Page 58 of 66
59 CF 6.2. Basic Users and Elevated Privilege Users Ensure all personnel are trained and made aware of IT security requirements and current risks operating in a media IT environment. CF CF CF CF All users with access to physical or digital assets shall undergo initial education and annual IT and digital security refresher training of minimum 30 minutes duration. User training shall cover: current internet security threats, good password selection, use and storage, identifying and responding to social engineering and phishing attacks, acceptable use of , use and benefits of encryption, safe and responsible web browsing and social networking, use and benefits of anti-virus, protecting, sharing, storing and destroying data, securing the desktop, securing the laptop, mobile device security, Wi-Fi security and encryption, working remotely, and home networking and personal computer use. Users must be aware of site policies and procedures for IT security relevant to their role. Users must also be aware of the current risks when operating in a media IT environment. Elevated privilege users/administrators must receive both basic and specialist training specific to the added responsibilities they hold. This may include the attendance of external training programs. Administration training shall consider the following: Physical Security: basic principles of physical security, use and management of authorized access controls, use and management of CCTV, 2014 Content Delivery & Security Association Page 59 of 66
60 CF 6.2. Basic Users and Elevated Privilege Users management of intrusion detection, use and management of environmental controls, and log capture and retention. Operating Systems and Device Management: installing devices on the LAN, optimizing devices, controlling access across the LAN to the device, backup and storing configuration files, auditing device configuration secure remote management of a device, patching and device update, installing the operating system from a reliable source, optimizing operating system performance, controlling access across the LAN to the platform, adding users, controlling user access (e.g., temporary, power or root level), limiting user access (permissions and profiles), restricting times of access, controlling account expiry, and patching the operating system. Network Security: protocol stack and IPv4 limitations, confidentiality, integrity and availability (CIA) security concepts, defining vulnerability, defining an exploit and how they can affect the organization s network, understanding the importance of patching, controlling access across the LAN to assets/data/information, backup and storing data securely, 2014 Content Delivery & Security Association Page 60 of 66
61 CF 6.2. Basic Users and Elevated Privilege Users basic auditing of network security, use of applications (e.g., nmap and Nessus) to assist identification of common configuration and security issues, reporting, recording and correcting security issues, network scanning and legal implications, and achieving network defense in depth, providing the understanding of how to control access to public services, harden servers and secure the internal network. Use and application of complementary technologies to increase security, such as: intrusion detection systems (IDS), intrusion prevention systems (IPS), firewalls, threat management tools, wireless attack detection systems, network access control, anti-virus management, secure web proxy devices, secure mail proxy devices, multi-factor identification, multi-factor authentication, and encryption. Firewall Configuration: selecting and installing a firewall, identifying and adding rules necessary for secure configuration, controlled access across the LAN to the device, backup and storing configuration files, auditing the configuration of the device, and managing secure remote access. Wireless Configuration: installing the device, optimizing and controlling the power of the device for the environment, 2014 Content Delivery & Security Association Page 61 of 66
62 CF 6.2. Basic Users and Elevated Privilege Users controlling access across the LAN to the device, backup and storing configuration files, implementing security on the device WPA WPA2, implementing structure or enterprise (RADIUS), auditing wireless configuration, and managing secure remote access Secure Asset Disposal Policy: tracking items sent for disposal, log retention hard disk drive destruction Content Delivery & Security Association Page 62 of 66
63 CF 6.3. Dedicated and Skilled IT Security Staff Ensure sites consider the training requirements for skilled security staff and where feasible appoint a dedicated IT security role. CF CF CF The site shall provide specific IT security training to support administrative functions. The site must consider the feasibility of a dedicated IT security role independent of the network support team. The decision not to appoint a dedicated IT security role must be evidenced by management Content Delivery & Security Association Page 63 of 66
64 CF 6.4. Training Records Design and produce a security policy manual and associated documentation. Communicate all security policies, procedures and work instructions to staff. Ensure documents remain current and fit for purpose through a process of review. CF CF Records of security training shall be maintained and retained for a minimum of three years. Records shall include details of training package content, name of the instructor, and dates of training and results of any examinations or assessments Content Delivery & Security Association Page 64 of 66
65 CF 6.5. Personnel Participation Develop a responsible and secure culture and provide opportunity to participate in improving site security. CF CF Management shall encourage employee participation in the content security management system, including security process planning and implementation, the detection of security breaches and the identification of improvement opportunities where appropriate. Management shall provide methods for employees to report security issues without fear of retribution Content Delivery & Security Association Page 65 of 66
66 CF 7. CF 7.1. BUSINESS RESILIENCE Business Continuity Plan (BCP) and Disaster Recovery Planning (DRP) To ensure the confidentiality, integrity and availability of client assets are maintained in the event of an unexpected or significant disaster, event or emergency. To minimize the impact on clients in the event of an unexpected or significant disaster, event or emergency. CF CF CF CF CF CF CF A BCP and DRP shall be established and published. Sites shall identify a role to manage BCP and DRP activities. Policy and plans shall be communicated to all employees. The BCP and DRP shall include: A documented Business Impact Analysis identifying Maximum Periods of Tolerable Disruption (MPTD) and Recovery Time Objectives (RTO s) likely physical, technical and human scenarios, critical systems and processes, key individuals and critical assets, high level stages and outlined plans to secure assets, stabilize and recover operations, links to CF 1.2 Risk Management. The site shall establish regular reviews of BCP and DRP plans and processes. The site shall establish effective methods for testing these plans. Sites shall document findings of reviews and tests, and update the plan accordingly Content Delivery & Security Association Page 66 of 66
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Security Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
APEC Private Sector. Supply Chain Security Guidelines
APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities
Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
1 Introduction 2. 2 Document Disclaimer 2
Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
