INFORMATION SECURITY OVERVIEW
|
|
|
- Grace Joseph
- 10 years ago
- Views:
Transcription
1 INFORMATION SECURITY OVERVIEW December 2003
2 TABLE OF CONTENTS 1 INTRODUCTION SECURITY POLICY HIGHLIGHTS INFORMATION SECURITY POLICY RECAP NETWORK POLICY RECAP COMPUTER ASSETS TERMS AND DEFINITIONS ABBREVIATIONS AND ACRONYMS INFORMATION SECURITY OVERVIEW PURPOSE SCOPE APPLICABILITY INFORMATION TECHNOLOGY SECURITY CONTENT INFORMATION SECURITY CONTENT NETWORK SECURITY CONTENT SECURITY POLICY RESPONSIBILITIES PHYSICAL SECURITY OVERVIEW PURPOSE SCOPE APPLICABILITY PHYSICAL SECURITY CONTENT PHYSICAL SECURITY RESPONSIBILITIES SECURITY ENFORCEMENT COMMENTS AND SUGGESTIONS Information Technology Security Overview Rel: December 01,2003 Page i
3 1 INTRODUCTION This is the Information Security Overview document within the State of Hawaii Information Technology Standards (IT Standards) developed by the Department of Accounting and General Services (DAGS), (ICSD). The IT Standards is a publication of the State of Hawaii, Executive Branch. It contains policies, responsibilities, and guidelines pertaining to computer assets under the operational control of DAGS. 1.1 Security Policy Highlights This section provides a recap of the Information Security and Network Security policies. This document is designed to be a quick reference to present the intent of these policies. For the comprehensive details of the policies, refer to IT Standards 08.01, Information Security and 08.04, Network Security Information Security Policy Recap A User must have his own Logon-ID and password to access information. Logon-ID/Password is to be used only by the person to whom it is assigned. Passwords will expire on a regular basis. Users will be logged off for terminal inactivity. Remote dial-in/dial-out access requires prior approval. Logon-IDs that are not used will be deleted. Production files are not allowed to be used for testing. Files downloaded and install diskettes must be scanned for viruses. Systems for internal use by State employees will be protected by a firewall. The Owner is the agency that specifies the information content. The Owner determines the sensitivity of information and who can access it. Access to information is contingent upon compliance with security policies. Identification and authentication of users is required to grant access via the Internet to systems that are for internal use by State personnel. Approval is required for Users and Information to pass through the Network. Network and computer User activity are monitored, logged, and audited. Information Technology Security Overview Page 1
4 Information entering the Network is inspected to ensure security Network Policy Recap Network equipment that belongs to ICSD will be managed by ICSD, even though it is physically housed at an agency site. ICSD issues, controls, and manages Network addresses, configurations, and facilities. An agency must use its assigned address to traverse the Network. ICSD is responsible for Network equipment up to the media termination. Agency responsibility starts at cables at its site that connect the Agency to the Network. Previously assigned addresses may be relinquished to ICSD in order to use the Network to access the Internet. The ICSD Administrator is the approving authority for granting Internet access from devices within the Network. Access to the Internet originating from within the Network must go through the Network firewall. 1.2 Computer Assets The following types of security for computer assets are addressed: a. Security for assets stored in electronic files housed in mainframe computers, mini-computers, servers, personal computers, and computer networks. b. Physical security for computer hardware, associated equipment, and facilities used to process, store, manipulate, and transmit information. c. Security for Network equipment and associated software used for the transport of or access to information. This includes the security of electronic messages and communications. 1.3 Terms and Definitions The definitions for the terms such as "policy," "procedure," "standard," "convention" and "guideline" are contained in IT Standards Number 01.01, Standards for Writing Manuals. Information Technology Security Overview Page 2
5 For ease of reference, some of the more prevalent terms used in the Information Security Standards documents are listed below. Agency. A department, office, commission, board, or other identifiable entity within the organizational structure of the State. Central site. The primary location at which the mainframe computer and minicomputer hardware is housed and application information is processed. Currently this is in the Kalanimoku Building, 1151 Punchbowl Street, Honolulu, Hawaii. Computer system. The computer hardware and associated operating software that are used for the processing, storing, accessing, and manipulation of data and other information. Information assets. Information stored as data, image, text, video, or voice. Software used to process such information. Components and technologies within State or vendor supplied information processing equipment, terminals, computer systems, application systems, networks, supporting facilities, and information processing services. Logon-ID. The identification code that is used to grant access to computer systems or information is referred to by various names throughout the Information Technology industry. Among these are: the "User Identification Code" (UID), the user "Logon-Identification" (Logon-Id, Logon-ID, logon or ID), and "Accessor ID" (ACID). All these terms are considered synonymous. For simplicity and clarity, hereafter, the term Logon-ID is used to designate the identification code for accessing information on a computer system. Network. The hardware and associated software that is managed by or under the control of ICSD. The Network is used to transport and to access information. It is also used for electronic messaging and communication within, between, and among agencies. To distinguish between the generic use of the word network, the term begins with a capitol "N" when used in reference to the equipment or processes mentioned above. System. Unless otherwise specified, "system" refers to the application software, programs, and support documentation designed for the manipulation of information or data for specific areas such as tax, accounting, inventory, budgeting, etc. Virtual Local Area Network or Virtual Private Network. A network comprised of parts which are located in two or more physically separate locations and which uses communication lines external to Information Technology Security Overview Page 3
6 the network to establish communication between the parts. At the time when communication is established, software is invoked to secure the communication so that the parts function as if they are physically located at one site. 1.4 Abbreviations and Acronyms CSL Computer Security Liaison DAGS Department of Accounting and General Services H.A.R. Hawaii Administrative Rules HRS Hawaii Revised Statutes ICSD, DAGS IT Information Technology PC Personal Computer PSB Production Services Branch of ICSD, DAGS SEC System Security Section of ICSD, DAGS SSB Systems Services Branch of ICSD, DAGS TSB Telecommunication Services Branch of ICSD, DAGS VLAN Virtual Local Area Network VPN Virtual Private Network 2 INFORMATION SECURITY OVERVIEW IT Standards pertaining to security address the issues needed to safeguard, protect, and secure the State's information assets. 2.1 Purpose IT Standards security documents define the position of DAGS regarding the security of information, programs, software, and files stored in computers or transiting the networks for which DAGS is responsible. It is the intent of the IT Security Standards to: a. Define the roles and responsibilities of user and IT; b. Establish the minimum security requirements for the protection of the State's information assets; c. Prevent the misuse and loss of information assets; d. Formulate the basis for audits and self-assessment; Information Technology Security Overview Page 4
7 e. Preserve the State's management options and legal remedies for asset loss or misuse. 2.2 Scope The IT security policies, standards and procedures presented in these IT Standards apply to all information assets and services under the jurisdiction or control of ICSD, including product support, field support and process control. 2.3 Applicability The IT Security Standards apply to: a. Any person responsible for analyzing, designing, developing, implementing, and/or maintaining application systems or programs; b. Any person responsible for analyzing, designing, developing, installing, implementing, and/or maintaining computer operating systems software, support programs, and networks; c. Any user of the State information processing hardware, software, networks, facilities, or resources; d. Any owner or user of the State's information assets; e. Any individual making inquiry only access of the State's information assets; f. Any vendor that supplies computer and/or related services to the State; g. Any person who is responsible for developing, implementing, or maintaining data processing standards, procedures, conventions, or guidelines. 2.4 Information Technology Security Content The IT Standards security documents contain the basic policy statements that must be followed when designing, developing, and implementing electronic solutions that manipulate, make available, or access information assets to satisfy the needs of the State or the mandates of the Executive, Judiciary, and Legislative branches of the State government. Information Technology Security Overview Page 5
8 The IT Standards that address IT security comprise Chapter 8 of the IT Standards. These Standards address acceptable use, information security, physical security, personal computer security, and network security Information Security Content IT Standards, Information Security provides the standards that are necessary to ensure the security and integrity of software, programs, and information which passes through or is housed on PCs, servers, networks, mini-computers, and mainframe computers. The areas of responsibility defined for ensuring the security of the State's information assets are listed below. These areas are covered in detail in IT Standards 08.02, Information Security. The areas are: 1. Owner 2. Computer Security Liaison 3. Custodian 4. User 5. Security Administrator IT Standards also provides the security policies that will be followed when designing systems and requesting access to computer resources that are under the administrative control of ICSD Network Security Content IT Standards 08.04, Network Security, provides the policies, standards and procedures that are necessary to ensure the physical security and integrity of network hardware, equipment, and software. IT Standards also provides the physical security procedures that will be followed when individuals use computer resources that are under the administrative control of ICSD. 2.5 Security Policy Responsibilities ICSD is tasked with encouraging user friendly access to electronically stored information assets by providing connectivity between computer systems and networks. ICSD must also provide sufficient security to safeguard information Information Technology Security Overview Page 6
9 assets and prevent actual and/or potential security breaches of the information resources under its protection. ICSD System Security Section (SEC) is responsible to develop, define, recommend, establish, implement, review, maintain, and enforce policies, standards and procedures relating to IT security for information assets under the control of DAGS. The SEC Chief is the Security Administrator for ICSD. ICSD Production Services Branch (PSB) is responsible to develop, define, recommend, establish, implement, review, maintain, and enforce policies, standards and procedures relating to central site physical security for information assets under the control of DAGS. The PSB Chief is the Physical Security Administrator for ICSD. ICSD Telecommunication Services Branch (TSB) is responsible to develop, define, recommend, establish, implement, review, maintain, and enforce policies, standards and procedures relating to Network security for information assets under the control or jurisdiction of DAGS. The TSB Chief is the Network Security Administrator for ICSD. Each individual who has access to information on a State computer system is responsible to actively support and comply with the security policies, standards and procedures that are established for the protection of the State's information assets. 3 PHYSICAL SECURITY OVERVIEW IT Standards, Physical Security addresses issues needed to physically safeguard, protect, and secure both IT personnel and tangible computer assets. Physical computer assets include computer hardware and associated equipment, such as, mainframe computers, mini-computers, servers, personal computers, terminals, workstations, networks, connectivity and peripheral equipment, removable storage media, hard copies of documentation, and support facilities. 3.1 Purpose The physical security IT Standards documents present the written references which define the position of DAGS regarding the security of physical equipment, computers, associated hardware, and resources for which DAGS is responsible. Information Technology Security Overview Page 7
10 It is the intent of the physical security IT Standards to: a. Define the roles and responsibilities of User and IT personnel; b. Establish the minimum requirements for the protection of the State's physical assets as they relate to the misuse or loss of computer hardware or equipment; c. Formulate the basis for audits and self-assessment; d. Preserve the State's management options and legal remedies for asset loss or misuse. 3.2 Scope The physical security IT Standards documents provide the policies, standards and procedures that will be followed by individuals who use, service and/or maintain the State's information processing hardware, equipment, facilities, and/or resources. 3.3 Applicability The physical security policies, standards and procedures apply to: a. All physical computer assets that support business activities, including product support, field support and process control; b. All owners and users of the State's computer and information assets; c. All individuals making inquiry only access which uses or is made through State owned equipment; d. All State vendor suppliers of computer hardware and/or equipment. The State's computer hardware and equipment include, but are not limited to, vendor supplied information processing equipment; work stations and terminals; personal computers; mainframe computer systems and mini-computer systems; servers; supporting peripheral equipment such as tape drives, disk drives, CD ROM drives and printers; networking routers, switches, hubs and connectivity equipment; and processing facilities. Information Technology Security Overview Page 8
11 3.4 Physical Security Content The physical security IT Standards documents contain the basic policy statements that will be followed when designing, developing and implementing electronic solutions that will access or use computer assets to satisfy the needs of the State or the mandates of the Executive or Legislative branches of the State government. Specifically, the physical security IT Standards documents provide the policies, standards and procedures that are necessary to ensure the physical security and integrity of computer hardware and equipment as specified in Section 2, Information Security Overview, of this document. The physical security IT Standards documents provide the physical security procedures that will be followed when individuals use computer resources that are at the central site or are under the administrative control of ICSD. 3.5 Physical Security Responsibilities ICSD must provide sufficient security to safeguard computer hardware, equipment, and resources; and to prevent actual and/or potential loss of physical resources under its protection. ICSD Production Services Branch (PSB) is responsible to develop, define, recommend, establish, implement, review, maintain, and enforce policies and procedures relating to physical access to computer hardware, servers, PCs, workstations, terminals, printers, and other equipment physically located at the central computer center site. Each of the other ICSD branches is responsible to implement, review, recommend, maintain, and enforce policies and procedures relating to physical access to computer hardware, servers, PCs, workstations, terminals, printers, network equipment and other equipment physically located in its areas or under its jurisdiction. Each individual who has the ability to access equipment or facilities is responsible to actively support and comply with the physical security policies and procedures that are established for the protection of the State's computer assets and resources. Information Technology Security Overview Page 9
12 4 SECURITY ENFORCEMENT Access to mainframe computers, mini-computers, servers, networks and information assets is contingent upon compliance with security policies, guidelines, procedures, and standards. Users who do not comply are subject to protective measures taken to ensure the security of the State's IT resources. Intrusions, unauthorized access, or misuse of the State's computer or Network resources may be pursued with legal action. Violation(s) of information security, physical security, or network security policies may be grounds for suspension or revocation of access and use privileges. Violation(s) of information security, physical security, or network security policies may cause DAGS to recommend that further disciplinary actions be made to the appropriate appointing authority. Such recommendations may include dismissal. 5 COMMENTS AND SUGGESTIONS Any State of Hawaii document, reference manual or users guide mentioned in this document are available through the departmental user agency data processing coordinator (DP Coordinator). Standards are also accessible on-line by clicking on Information Technology Standards on the ICSD home page at: Statewide Forms are accessible on-line by clicking on Forms Central on the Government in Hawaii home page at: Comments, recommendations, proposals, or suggestions regarding the contents of this document may be sent either via to [email protected] or in writing to: Project Planning and Management Office 1151 Punchbowl Street, B10 Honolulu, Hawaii Information Technology Security Overview Page 10
PERSONAL COMPUTER SECURITY
PERSONAL COMPUTER SECURITY April 2001 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 PC INFORMATION SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 PC INFORMATION SECURITY RESPONSIBILITIES...
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Information Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
Policy on the Security of Informational Assets
Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
Computer Security Policy (Interim)
Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH
HIPAA Security Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH What is this? Federal Regulations August 21, 1996 HIPAA Became Law October 16, 2003 Transaction Codes and Identifiers
Judiciary Judicial Information Systems
Audit Report Judiciary Judicial Information Systems November 2008 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up correspondence
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private
1. Policy Overview The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private Network (VPN) connections to the University of Dammam network. 1.1. Purpose University
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Sample Policies for Internet Use, Email and Computer Screensavers
Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
