FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS



Similar documents
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

CTR System Report FISMA

Office of Inspector General

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

TABLE OF CONTENTS Information Systems Security Handbook Information Systems Security program elements. 7

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

FSIS DIRECTIVE

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Minimum Security Requirements for Federal Information and Information Systems

Information Security for Managers

Data Management Policies. Sage ERP Online

APHIS INTERNET USE AND SECURITY POLICY

VA Office of Inspector General

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

POSTAL REGULATORY COMMISSION

Information Resources Security Guidelines

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

EPA Classification No.: CIO P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: Review Date: 08/06/2015

VA Office of Inspector General

BPA Policy Cyber Security Program

Final Audit Report -- CAUTION --

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook REV4.1

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES

Information Security and Privacy Policy Handbook

Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS

HHS Information System Security Controls Catalog V 1.0

PBGC Information Security Policy

NARA s Information Security Program. OIG Audit Report No October 27, 2014

Information Security for IT Administrators

HIPAA Information Security Overview

Review of the SEC s Systems Certification and Accreditation Process

2012 FISMA Executive Summary Report

Office of Inspector General

Publication 805-A Revision: Certification and Accreditation

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Legislative Language

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

Risk Management Guide for Information Technology Systems. NIST SP Overview

DIVISION OF INFORMATION SECURITY (DIS)

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

DOJ F INFORMATION TECHNOLOGY SECURITY. Assistant Attorney General for Administration FOREWORD

GAO INFORMATION SECURITY. FBI Needs to Address Weaknesses in Critical Network

a GAO GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program

INFORMATION TECHNOLOGY POLICY

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Department of Veterans Affairs VA Handbook Information Security Program

2014 Audit of the Board s Information Security Program

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

Audit of the Department of State Information Security Program

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

How To Audit The Mint'S Information Technology

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

United States Department of Agriculture. Office of Inspector General

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

STATE OF NEW JERSEY Security Controls Assessment Checklist

MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15

NOTICE: This publication is available at:

Information Security Program Management Standard

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM

2.0 ROLES AND RESPONSIBILITIES

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

Compliance Risk Management IT Governance Assurance

John Essner, CISO Office of Information Technology State of New Jersey

Appendix A: Rules of Behavior for VA Employees

NASA OFFICE OF INSPECTOR GENERAL

United States Antarctic Program Information Resource Management Directive The USAP Information Security Program

Transcription:

TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2 What is the scope of this chapter? 7.3 What are the authorities for this chapter? 7.4 Who has responsibilities for this program? - Senior Leadership: o Director o Assistant Director Resources and Technology Management o Regional Directors - Security Program Leadership: o Chief Security Officer o Regional Technology Security Managers o System Security Managers - System Owners - Supervisors of End Users - System End Users 7.5 What are the standards and requirements the Service has developed to manage the information security program? - Access Control - Awareness and Training - Audit and Accountability - Certification, Accreditation, and Security Assessments - Configuration Management - Contingency Planning - Identification and Authentication - Incident Response - Maintenance - Media Protection - Physical and Environmental Protection - Planning - Personnel Security - Risk Assessment - System and Services Acquisition - System and Communications Protection - System and Integrity - Program Management 7.6 Can employees get a waiver of information security control requirements for an information system? 7.7 Who can you contact for additional information? 06/01/10

7.1 What is the purpose of this chapter? A. This chapter: (1) Documents security policies supporting relevant Federal laws, regulations, and policies at the Service; (2) Provides a basis for the information security program; (3) Supplements the Department of the Interior s Technology (DOI IT) Security Policy Handbook; (4) Is equivalent or more stringent than the Department s policy and standards; (5) Documents the roles and responsibilities of Service personnel supporting the program; (6) Designates the major control families associated with information security and defines high-level requirements for those domains; and (7) Includes specific guidance related to the control families. B. We will document any deviations from the DOI IT Security Policy Handbook. If a Service policy is less stringent than a Departmental policy, and no documented exception exists, the more stringent Departmental policy is the standard for the Service. 7.2 What is the scope of this chapter? This chapter is applicable to the personnel, contractors, and volunteers who use, operate, plan, secure, and maintain Service-owned information systems. 7.3 What are the authorities for this chapter? In addition to the authorities below, you can review the Department s Cyber Security Division Policy & Guidelines Web site for a more comprehensive list of relevant laws, regulations, and policies. A. Federal information Security Management Act of 2002 (Public Law 107-347). B. Clinger-Cohen Act (Public Law 104-106). C. Office of Management and Budget (OMB) Circular A-130, Management of Federal Resources. D. Computer Fraud and Abuse Act of 1986 (Public Law 99-474). E. Executive Order 13231, Critical Infrastructure Protection in the Age. F. OMB Circular A-11, Preparation, Submission, and Execution of the Budget; Section 53, Technology and E-Government. G. Presidential Decision Directive 63, Critical Infrastructure Protection. H. The Department of the Interior Technology Security Policy Handbook. 7.4 Who has responsibilities for this program? A. Senior Leadership: Table 7-1 lists the responsibilities of the Service s senior leadership.

Table 7-1: security responsibilities of senior leadership These Are responsible for (1) Director (a) Delegating responsibility for the overall direction, planning, development, and implementation of the information security program; (b) Serving as the Authorizing Official (formerly called the Designated Approval Authority) for certain Service information systems in accordance with the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37; and (c) Designating a Chief Officer (CIO). (2) Assistant Director Resources and Technology Management (IRTM) (a) Serving as the CIO for the Service; (b) Ensuring compliance with Federal information security requirements and the Department s Office of the Chief Officer (OCIO) directives; (c) Developing and maintaining a Servicewide information security program; (d) Developing and maintaining information security policies, procedures, and control techniques to address applicable requirements; (e) Ensuring information security control assessments and security authorizations required across the Service are accomplished in a timely and cost-effective manner; (f) Ensuring that information security considerations are integrated into acquisition and system life cycles; programming, planning, training, and budgeting cycles; and enterprise architectures; (g) Ensuring that the programs designate (in writing) System Security Managers to provide adequate security (see Tables 7-2 and 7-3); (h) Designating the Chief Security Officer (see Table 7-2); (i) Ensuring that employees, contractors, and volunteers receive security awareness briefings and role-based security training (see Table 7-3 for more information); and (3) Regional Directors (j) Authorizing the Service-level common controls. (a) Enforcing applicable information security policies and procedures; (b) Ensuring all Regional IT fiscal planning and acquisition for Service-managed information systems comply with information security policies and are integrated into the Capital Planning Investment Control process; (c) Consulting with the Chief Security Officer to designate a primary and an alternate Regional Technology Security Manager; and (d) Ensuring information system owners and information system managers are 06/01/10

Table 7-1: security responsibilities of senior leadership These Are responsible for assigned to information systems in their Regions. B. Security Program Leadership: Table 7-2 lists the responsibilities of the Service s information security program leadership. Table 7-2: security program leadership responsibilities These Are responsible for (1) Chief (a) Serving as the point of contact for all Service information security matters; Security Officer (CISO) [Also is the Division Chief, Assurance Division, IRTM] (b) Supporting the strategic information security program requirements, including: Planning and budgeting (Exhibit 300 and Exhibit 53 documents), Developing internal policy, Federal Security Management Act (FISMA) compliance, and Compliance with Departmental directives; (c) Monitoring the progress of the System Security Managers to ensure they meet program security requirements; (d) Working with the Office of the Inspector General (OIG) and incident response team; and (e) Overseeing the Servicewide implementation of information security policies, procedures, and guidelines. (2) Regional IT Security Managers (RITSM) (a) Serving as the points of contact and subject matter experts for Regional information security matters; (b) Working in coordination with Chief Technology Officers to implement, disseminate, and monitor Regional compliance with Service security policy and procedures; (c) Participating in Regional system development teams and telecommunications planning; (d) Coordinating the establishment of Regional common security controls and system security controls to protect information; (e) Working with program and IT employees to determine security categorization of information systems; (f) Planning security costs for Regional IT investments and systems; and (g) Participating in security initiatives including, but not limited to, computer investigations and forensics.

Table 7-2: security program leadership responsibilities These Are responsible for (3) System Security Managers (SSM) (a) Serving as points of contact for end users with security issues related to a specific information system(s); (b) Coordinating implementation of system security requirements by evaluating requirements and controls; (c) Reporting security costs as part of the Capital Planning and Investment Control process; (d) Updating the electronic inventory for system computers; (e) Assisting system owners and the Regional Technology Security Manager with contingency planning activities; and (f) Auditing application, system, and security logs for security threats, vulnerabilities, and suspicious activities in accordance with incident response procedures. C. System Owners, End Users, and their Supervisors: Table 7-3 lists the responsibilities of the Service s information system owners, end users, and their supervisors. Table 7-3: Responsibilities of information system owners, end users, and their supervisors These Are responsible for (1) (a) Ensuring that the information systems for which they are responsible System including systems that support the operations and assets of the Service and Owners those that other agencies, contractors, or other sources provide or manage are compliant with applicable Federal and Departmental guidance, including security requirements; (b) Ensuring contractors or employees conduct an information security assessment and authorization on information systems for which they are responsible and providing the necessary system-related documentation to the Branch of Compliance; (c) Assigning a System Security Manager for their information systems; (d) Ensuring that access to the information system is managed in accordance with Federal and Departmental policies; (e) Coordinating security control assessments and authorizations with the Branch of Compliance; and (2) Supervisors of End Users (f) Ensuring that the cost of security controls is explicitly identified as part of lifecycle planning of the overall system. (a) Ensuring that users under their supervision (including contractors and volunteers): Adhere to the information security policy and procedures in this 06/01/10

Table 7-3: Responsibilities of information system owners, end users, and their supervisors These Are responsible for chapter; Read the Acceptable Use Security Standard, system-specific rules of behavior, and complete a systems operation request before they can access the network; and Have the requisite information security clearance, training, and access levels appropriate to their duties; (b) Reporting employee, volunteer, and contractor transfers and separations that require removal from the system or a change in accounts to the RITSM in accordance with the exit clearance process in 223 FW 13 and 14; (c) Reporting incidents that may violate security policy and procedures to the RITSM; and (d) Developing position descriptions and performance standards that reference information security responsibilities. (3) System End Users (a) Completing the applicable access request form and abiding by all rules of behavior associated with an information system; (b) Reporting to their supervisors anything they think could be a breach or threat to system security; and (c) Completing annual information security training required by the Department. 7.5 What are the standards and requirements the Service has developed to manage the information security program? A. The Department s and the Service s Security control families and requirements are listed in Table 7-4 (NIST defines these control families). B. The Security Program s Branch of Compliance or Division of Assurance s Branch of Compliance publishes information security handbooks detailing specific role-based responsibilities on its Intranet site. Table 7-4: Security Control Families and Requirements Control Family Basic Requirements (1) Access Programs/Regions must ensure that: Control Processes exist to identify and authenticate users, and (2) Awareness and Training Appropriate permissions are assigned to the user or user group. Service employees must: Be aware of appropriate use, protection, and security of information; and Protect the confidentiality, integrity, and availability of information assets, resources, and systems from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Table 7-4: Security Control Families and Requirements Control Family Basic Requirements (3) Audit and Accountability Use appropriate tools to produce audit trails of user activities, program changes, and record and report program changes; and (4) Certification, Accreditation, and Security Assessments (5) Configuration Management (6) Contingency Planning Define a process of reviewing those trails to identify any suspicious activities. Annually assess the security controls of FISMA-reportable information systems, and Authorize operation of information systems every 3 years, or whenever the system undergoes significant change. Ensure that information systems comply with established baseline configurations, and Develop and maintain information security and component inventories, including hardware, software, and firmware. Establish and maintain test plans for emergency response, backup operations, and post-disaster recovery; and Test contingency plans at least annually in accordance with contingency planning guidance. (7) Identification and Identify information system users and processes or devices permitted to Authentication access system resources, and Authenticate (or verify) users or processes before system access is granted. (8) Incident Response Have an operational incident handling capability, and Track, document, and report incidents to appropriate organizational officials and authorities. (9) Maintenance Ensure that maintenance is performed periodically in accordance with manufacturer s recommendations, and Ensure that appropriate tools, techniques, and personnel are authorized to perform maintenance. (10) Media Protection (11) Physical and Environmental Protection Service employees must: Ensure that information system media (both paper and digital) is protected from loss, alteration, or theft; Limit access to information to authorized users; and Sanitize or destroy media before it is repurposed or disposed of. Limit physical access to information systems, equipment, and operating environments to authorized individuals; and Protect assets against unauthorized use, theft, environmental hazards, or inadvertent destruction. (12) Planning Employ processes to ensure the confidentiality, integrity, and availability of information; Maintain system security plans and update them at least annually; and Ensure that system security plans describe the security controls in place or planned for the information systems. 06/01/10

Table 7-4: Security Control Families and Requirements Control Family Basic Requirements (13) Personnel Programs/Regions must employ controls to ensure that: Security Personnel (including contractors and other service providers) are trustworthy and meet established security criteria for those positions; Access of separated employees, contractors, etc. is terminated promptly to prevent unauthorized or malicious access; and Develop formal sanctions for personnel failing to comply with organizational (14) Risk Assessment (15) System and Services Acquisition (16) System and Communications Protection (17) System and Integrity (18) Program Management security policies and procedures. Programs/Regions must ensure that: Risk assessments are conducted in accordance with applicable NIST guidance; Risk assessments are updated every 3 years, or whenever there are significant changes to an information system; and Periodic vulnerability scans of information systems are conducted. Programs/Regions must ensure that: Sufficient resources are allocated to protect information systems, System development life cycle processes incorporate information security considerations, Service networks employ software use and installation restrictions, and Third-party providers employ adequate security measures to protect outsourced information, applications, and services. Monitor, control, and protect organizational communications (i.e., information that our systems transmit or receive) at the external boundaries and key internal boundaries of those systems; and Employ architectural designs, software development techniques, and engineering principles that promote effective information security. Employ processes to identify, report, and correct information and information system flaws in a timely manner; and Protect information systems from malicious code or other vulnerabilities. The Service must ensure that: Appropriate processes and personnel exist to fund, identify, and track information security deficiencies; and Up-to-date Service guidance is published related to the protection of information technology resources. 7.6 Can employees get a waiver of information security control requirements for an information system? In some situations it is possible to get a waiver of a requirement(s). A. To get a permanent waiver of a requirement for an information system, the system owner must use the Department s Plan of Action and Milestone (POA&M) Process Standard. This process involves completing a form that explains the risk and why it s necessary or in the best interest of the Government not to meet the requirement. B. To get a temporary waiver or a waiver for a single component of an information system, system owners must use the Service s Security Control Waiver Form (available on the Intranet).

7.7 Who can you contact for additional information? If you have questions, comments, or concerns about information security or the content of this chapter, contact the Division of Assurance. Employees can send comments and questions to the Division through the Intranet by clicking here. Date: June 1, 2010 /sgd/ Jeffrey L. Underwood ACTING DEPUTY DIRECTOR 06/01/10