IT Heath Check Scoping guidance ALPHA DRAFT

Size: px
Start display at page:

Download "IT Heath Check Scoping guidance ALPHA DRAFT"

Transcription

1 IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014

2

3 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance Document Version Date: 10/11/2014 Reviewed By: Review Date: Version History Ver. No. Ver. Date Revised By Description Filename 0.1 Nov 2014 Mark Brett Initial draft ITHC Guidance Alpha Draft Page 3 of 14

4 Page 4 of 14

5 1. Table of Contents 1. Table of Contents Introduction Purpose and Scope Document Structure Requirements Service Providers Scope of Work Introduction We have suggested the principal test targets below. A generic modular network diagram should be developed, to test against each target. Location of Internal Network Testing Network Penetration Test Network Vulnerability Assessment Web Application Security Assessment Server Security Assessment Mobile Device Security Assessment Wireless Security Assessment Home Office / Small Office Assessment Deliverables High Level Network Schematic ITHC Reports Example Heat Map showing identified vulnerabilities, by control number from the ITHC report Annex A: References Annex B: Glossary and Abbreviations Page 5 of 14

6 2. Introduction 2.1. Purpose and Scope This document provides clarification and good practice guidance for performing IT Health Checks (ITHCs) at OFFICIAL for PSN. This includes expectations on ITHC service providers, their scope of work and the quality/structure of any deliverables produced as part of PSN compliance evidence. This will further assist the Corporate information Governance Group and support the remedial action plan (RAP). Furthermore this will greatly assist the PSNA compliance team to be able normalise and understand the ITHC reports received, which vary greatly in their content, style and value. The majority of Public Sector Networks are currently accredited to handle protectively marked information at OFFICIAL, but some customers may have a requirement to test their network at higher levels. This guidance apply to the ITHC testing at OFFICIAL, based around the ISO/IEC standard [8]. It is a technical standards document written under the PSN banner, and is intended to support compliance with the corresponding conditions contained in the PSN Code Template [1]. Consequently, the only baseline current requirements identified in this document are those currently contained in the PSN Code Template [1]. Moreover, it should be noted that this standard does not explicitly provide a description of any ITHC requirements for those organisations bound by the HMG Security Policy Framework (SPF) [2]; such organisations must still continue to comply with HMG IA Policy, including relevant controls from the Baseline Countermeasure Set (BCS) and supporting CESG guidance publications. Similarly, other community-specific requirements (e.g. IGSoC for NHS) should also be followed in those communities in addition to those defined in the PSN Code Template [1] Document Structure This document is structured as follows: Section 1 (this section) the introduction; Section 3 requirements and guidance for ITHC service providers; Section 4 requirements and guidance for ITHC scopes of work; Section 5 requirements and guidance for ITHC deliverables; Annex A the references cited in this document; Annex B abbreviations and glossary of terms; Page 6 of 14

7 3. Requirements The IT Health Check is more than a vulnerability scan, The check is to cover the scope of the consuming and connected network, clearly identifying and testing all relevant network equipment and facilities. This must cover the physical security aspects, equipment rooms, racks and offices, where the PSN is connected and consumed. The ITHC is required by the customer, to provide an overview highlighting deficiencies and those areas which require improvement. The ITHC is also required by GDS, as part of the IA Compliance documentation set. The ITHC is used by the PSN compliance team as an objective overview of the organisations physical and technical protection of the PSN connections and interfacing to the customers corporate network. The ITHC needs to cover the entire range of network segments which interface with the PSN, not just individual IP addresses. The scope of the ITHC, should be defined by the scope of the network diagram under control DIA.1. We need to clearly see ITHC results for all components on the diagram. CHE1. Requires that a technical vulnerability assessment, which covers all of the customer equipment, that means, the from the connection of the CPE (Customer Premises Equipment, to the PCs, laptop and mobile devices, all network equipment, interfacing between the PSN connected corporate network and ant web connections into the PSN connected network are all in scope. Any boundary devices (routers, gateways and firewalls at the boundary are in scope. Network equipment and devices on the other side of the boundary devices are out of scope. The diagram and ITHC need to clearly show the scope and exclusions. PSN IA conditions controls: Condition No. DIA DIA.1 CHE CHE.1 Subject Network Diagrams & Scope Network Diagrams & Scope Compliance Checking Compliance Checking Obligation A high level logical network schematic shall be provided to accompany this IA Conditions document. The diagram shall be used to describe the scope for the IA Conditions it is therefore important to include where possible the following information: - Diagrammatical representation of services and functionality in place including defining which ones are PSN services and those that are not. - Onward connectivity including remote access services and connectivity overseas/offshore -Gateway/boundaries functionality - Third party connectivity Organisations shall implement an annual programme of IT Health Checks to validate equipment not provided as part of a PSN service that interacts with PSN services. Page 7 of 14

8 4. Service Providers It is not necessary for an ITHC testing organisation to be CHECK approved to perform an ITHC OFFICIAL ICT infrastructure. However, PSN has an expectation that such organisations should deploy testers who are CREST or TIGER SCHEME accredited, with have a proven track record in this field. We would also urge organisations to seek example reports to ensure that the scope, format and deliverables will be suitable for meeting the PSN IA Conditions at OFFICIAL. They should be able to demonstrate this through reference sites and redacted customer reports. We would recommend; Clear executive summary. Clearly annotated network diagram (provided by the customer per control DIA1.), this will have the 10 ToI s listed and colour coded annotation showing: RED: Deficient AMBER: Deficient but simple fix GREEN: Compliant. Clearly prioritised list of deficiencies with a non-technical explanation. (RED/AMBER) Clear diagrams to and charts to support the customer and the PSN Compliance team in GDS. A remedial action plan to meet the deficiencies (RED/AMBER). We do not consider output from automated testing tools, without a clear business led explanation to be sufficient or appropriate. CREST: TIGERSCHEME: Page 8 of 14

9 5. Scope of Work 5.1. Introduction The requirement is to meet the relevant controls detailed in the PSN IA Requirements pertaining to services at OFFICIAL. The ITHC will include an external penetration test for all Internet facing IP addresses and internal network hosts. We recognise each customer site has a different network infrastructure and varying requirements, so that it will be necessary to construct a modular pricing structure which will be based on the elements of the Scope of Work 5.2. We have suggested the principal test targets below. A generic modular network diagram should be developed, to test against each target. Location of Internal Network Testing Internal network testing should be completed from within the client s principal locations, and also, where specified from Public Access locations such as Libraries, contact centres etc. The principal Targets of Interest (ToI) for testing should include: ToI1 External Firewall, Gateway and Boundary Security Assessment ToI2 External Network Penetration Test (websites, access control, remote access, VPN Servers, DMZ servers) ToI3 Onsite Network Penetration Test (Intranet, gateways, router and firewall access. access control) ToI4 Operating System Assessment (Patching, configuration and malware protection), of key servers affecting PSN services and network. ToI5 Mobile Device Security Assessment ToI6 SSL VPN Assessment ToI7 Wireless Infrastructure Assessment ToI8 IDS/IDP Assessment ToI9 Application Security Assessment (including websites and Intranets/Extranets) ToI10 Physical security assessment server room and network equipment racks Network Penetration Test This will be conducted from outside the client s network, with the intention of assessing the vulnerabilities which an unauthenticated attacker could use to penetrate the network. Typically, this will be on the public facing elements of the network, e.g. web servers. Remote access gateway and wireless networks Network Vulnerability Assessment This Assessment will identify the vulnerabilities within the client organisation s internal network and is typically conducted from within the Local Area Network or Wide Area Network. It will incorporate Page 9 of 14

10 both manual and automated security testing techniques to identify vulnerabilities within desktops, servers and network infrastructure, which could be exploited from within the organisation. The Network Vulnerability Assessment, will also report, where appropriate, on the organisation s firewalled connection to the Public Services Network (PSN), IA Conditions especially in relation to remote, home and mobile connections Web Application Security Assessment This will measure the resilience of an application to withstand attack from unauthorised users and the potential for valid users to abuse their privileges and access rights. This must include all websites, which draw their data and responses from infrastructure within the PSN ITHC scope Server Security Assessment The Server Security Assessment will provide information as to the resilience of a server system to withstand attack from unauthorised users and the potential for valid users to abuse their privileges and access rights. This will also include the configuration and server patching regime Mobile Device Security Assessment This will establish the resilience of mobile devices which connect to the client network, i.e. authentication, resident applications and security software, to withstand attack from unauthorised users and the potential for valid users to abuse their privileges and access rights. The organisations policy covering mobile device usage and access to the PSN network and services should be included Wireless Security Assessment This will assess the client network s wireless infrastructure to identify potential vulnerabilities within the wireless network, and therefore any internal wired networks, against unauthorised access, whilst maintaining appropriate access control for authorised users Home Office / Small Office Assessment This will assess the suitability and security vulnerabilities of access to the client network from home offices and small remote locations, typically using ADSL. This will include checking the policy and the patching regime for end point devices. Page 10 of 14

11 6. Deliverables 6.1. High Level Network Schematic As part of PSN compliance evidence, there should be a high level network schematic. This should contain enough detail to enable a compliance assessor to understand the customers network environment, which is either connected to or consuming a PSN connection or service. The scope of the diagram will be the PSN connected or consuming environment and the interfaces and inter-connected network boundaries. We would ask the ITHC report annotates the network diagram prepared as part of control DIA1. To show which components and ranges were tested and referenced against the findings to help the customer and the PSN Compliance Team ITHC Reports The ITHC is expected to produce the following: A colour annotated network heat map diagram showing the principal targets of interest (ToI), described previously and their determined status. This should be consistent with the High Level Network Schematic. An executive summary that gives a business level summary of the findings and their impact A technical summary that prioritises the key areas of risk found An analysis of the findings against relevant security good practice Details of all testing conducted and the tools and techniques used Detailed descriptions of findings for all vulnerabilities identified and an indicative level of risk to the client and/or system assessed along with recommended remedial action Additionally screenshots and tool outputs and other supporting evidence for each vulnerability could be included as an appendix to the report. Each component will then at the end of the test be colour coded to give an instant visual and numeric representation of the network as a heat map, to assist the SIRO and senior management in understanding the current network status, All outputs from testing tools are to be separately provided as annexes, not part of the main report. Page 11 of 14

12 7. Example Heat Map showing identified vulnerabilities, by control number from the ITHC report. Page 12 of 14

13 Annex A: References The following references are used in this document: [1] PSN Code Template for Code of Interconnection, Code of Practice, Code of Connection [2] HMG Security Policy Framework [3] PSN Operating Model [4] PSN Document Management and Change Control [5] PSN Compliance [6] PSN Security Model [7] HMG Information Assurance Standards No. 1 and 2 (IAS1&2), Information Risk Management [8] ISO/IEC 27001, Information Security Management Systems Requirements Page 13 of 14

14 Annex B: Glossary and Abbreviations CESG ITHC GCN GDS IA IAS ICT IGSoC IL ISMS ISO MOD NHS PSN The National Technical Authority for Information Assurance IT Health Check Government Conveyance Network Government Digital Service Information Assurance Information Assurance Standard Information and Communications Technology Information Governance Statement of Compliance Impact Level Information Security Management System International Standards Organisation Ministry of Defence National Health Service Public Services Network Page 14 of 14

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template G-Cloud Service Pan Government Security Accreditation Scope This form is intended for Suppliers of services on the G-Cloud to complete. Upon receipt, the G-Cloud Programme will check Section A, Reference

More information

PSN IA conditions supporting guidance

PSN IA conditions supporting guidance PSN IA conditions supporting guidance Guidance July 2012 version 1.4 Introduction This document provides guidance on achieving compliance with the PSN IA conditions (Ref [ST09]). The PSN IA conditions

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

DVLA ELISE GSi Closed User Group Code of Connection

DVLA ELISE GSi Closed User Group Code of Connection DVLA ELISE GSi Closed User Group Code of Connection Security Warning Notice The following handling instructions apply to this document: - Handle, use and transmit with care - Take basic precautions against

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

EA-ISP-012-Network Management Policy

EA-ISP-012-Network Management Policy Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:

More information

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition Service Definition (Q-D1) Penetration Testing Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies and controls

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

IT Security Testing Services

IT Security Testing Services Context Information Security T +44 (0)207 537 7515 W www.contextis.com E [email protected] IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions

More information

UNCLASSIFIED HMG IA Standard No. 1 Technical Risk Assessment

UNCLASSIFIED HMG IA Standard No. 1 Technical Risk Assessment October 2009 Issue No: 3.51 HMG IA Standard No. 1 HMG IA Standard No. 1, Issue: 3.51 October 2009 The copyright of this document is reserved and vested in the Crown. Intended Readership This Standard is

More information

Procurement Policy Note Use of Cyber Essentials Scheme certification

Procurement Policy Note Use of Cyber Essentials Scheme certification Procurement Policy Note Use of Cyber Essentials Scheme certification Action Note 09/14 25 September 2014 Issue 1. Government is taking steps to further reduce the levels of cyber security risk in its supply

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service) Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

UK Government IA Recent Changes and Update

UK Government IA Recent Changes and Update UK Government IA Recent Changes and Update INTRODUCTION Agenda Part 1 Government IA and Cyber Security Background Quick Threat Update UK Government Cyber Security Initiative Government Asset Control in

More information

C015 Certification Report

C015 Certification Report C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Network Security & Connection Policy

Network Security & Connection Policy Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services Document Control Information Status and reason for development Revised to reflect

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

G-Cloud IV Services Service Definition Accenture Cloud Security Services

G-Cloud IV Services Service Definition Accenture Cloud Security Services G-Cloud IV Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Capabilities... 5 5. Expected Outcomes...

More information

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014 PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions

More information

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Penetration Testing. I.T. Security Specialists. Penetration Testing 1 Penetration I.T. Security Specialists ing 1 about us At Caretower, we help businesses to identify vulnerabilities within their security systems and provide an action plan to help prevent security breaches

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

93% of large organisations and 76% of small businesses

93% of large organisations and 76% of small businesses innersecurity INFORMATION SECURITY Information Security Services 93% of large organisations and 76% of small businesses suffered security breaches in the last year. * Cyber attackers were the main cause.

More information

SBL Integration, Capabilities, and Enablement in Defence [email protected]. 01347 812148 www.softbox.co.uk

SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk SBL Integration, Capabilities, and Enablement in Defence [email protected] 01347 812148 www.softbox.co.uk Contents Page 3 SBL Company Overview 4 SBL in Justice 5 SBL Apple Authorised Reseller 5 SBL

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS Issue 1.1 Crown Copyright 2015 All Rights Reserved 1 of 9 Document History Version Date Description 0.1 November 2012 Initial Draft Version

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

Digital Pathways. Penetration Testing

Digital Pathways. Penetration Testing Penetration Testing [email protected] Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine

More information

Reducing the Cyber Risk in 10 Critical Areas

Reducing the Cyber Risk in 10 Critical Areas Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning SCP.05.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Defence Cyber Protection Partnership Cyber Risks Profile Requirements Good Governance L.01 Define and assign information security relevant roles and responsibilities. L.02 Define and implement a policy that addresses information security risks within supplier relationships.

More information

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following

More information

How to gain accreditation for a G-Cloud Service

How to gain accreditation for a G-Cloud Service www.ascentor.co.uk How to gain accreditation for a G-Cloud Service Demystify the process As a registered supplier of G-Cloud services you will be keenly aware that getting onto the G-Cloud framework does

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 27033-1 Second edition 2015-08-15 Information technology Security techniques Network security Part 1: Overview and concepts Technologies de l information Techniques de sécurité

More information

Cyber Essentials KAMI VANIEA 2

Cyber Essentials KAMI VANIEA 2 Cyber Essentials DR. KAMI VANIEA KAMI VANIEA 2 First, the news Office of Personnel Management http://www.usatoday.com/story/news/politics/2015/06/23/op m-hack-senate-archuleta-hearing/29153773/ KAMI VANIEA

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT 26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Administración de Sistemas Informáticos en Red TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Computer Network Systems

More information

Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL. v2.0 March 2014

Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL. v2.0 March 2014 Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL v2.0 March 2014 This FAQ describes how risk management activities should be conducted for the new OFFICIAL classification.

More information

Thales Service Definition for NOC Services for Cloud

Thales Service Definition for NOC Services for Cloud Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

CenSus ICT Strategy (2012 2015)

CenSus ICT Strategy (2012 2015) CenSus ICT Strategy (2012 2015) Date: September 2012 Version: 5.0 Version Control Amendment History including Author: Version Date Author / Amendment History 1.0 Draft 30 th August 2012 Graham Crossingham

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

RISK MANAGEMENT AND ACCREDITATION OF INFORMATION SYSTEMS ALSO RELEASED AS HMG INFOSEC STANDARD NO. 2

RISK MANAGEMENT AND ACCREDITATION OF INFORMATION SYSTEMS ALSO RELEASED AS HMG INFOSEC STANDARD NO. 2 RISK MANAGEMENT AND ACCREDITATION OF INFORMATION SYSTEMS ALSO RELEASED AS HMG INFOSEC STANDARD NO. 2 AUGUST 2005 This paper was previously published by the National Infrastructure Security Co-ordination

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Guideline for department and agency implementation of the Information Security Penetration Testing standard SEC/STD/03.

Guideline for department and agency implementation of the Information Security Penetration Testing standard SEC/STD/03. Information Security Penetration testing Guideline Guideline for department and agency implementation of the Information Security Penetration Testing standard SEC/STD/03. Keywords: Information security

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

Accessing and sending data securely across security domains

Accessing and sending data securely across security domains In this White Paper Connectivity is good. Secure connectivity is essential. This white paper by Thales UK explains how Thales Gateway Services protect the exchange of data across security domains. It discusses

More information

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Payment Card Industry (PCI) Penetration Testing Standard

Payment Card Industry (PCI) Penetration Testing Standard Payment Card Industry (PCI) Penetration Testing Standard Issued Date: 14 May 2015 Effective Date: 14 May 2015 Purpose This standard outlines penetration-testing requirements for the university's Payment

More information

New Systems and Services Security Guidance

New Systems and Services Security Guidance New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances 122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015

More information

Data Network Security Policy

Data Network Security Policy Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005

More information

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach

More information