State of South Carolina Policy Guidance and Training



Similar documents
State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training

How to Secure Your Environment

State of South Carolina Policy Guidance and Training

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

DIVISION OF INFORMATION SECURITY (DIS)

SERVER, DESKTOP AND PORTABLE SECURITY. September Version 3.0

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

HIPAA Security Alert

Ohio Supercomputer Center

Cyber Self Assessment

Miami University. Payment Card Data Security Policy

UF IT Risk Assessment Standard

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Secure Your Mobile Workplace

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Use of tablet devices in NHS environments: Good Practice Guideline

Security Management. Keeping the IT Security Administrator Busy

DSHS CA Security For Providers

Data Protection Act Bring your own device (BYOD)

Information Security Policy for Associates and Contractors

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Patch and Vulnerability Management Program

Critical Controls for Cyber Security.

trends and audit considerations

If you can't beat them - secure them

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Computer Security at Columbia College. Barak Zahavy April 2010

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents

Network Security for End Users in Health Care

This policy outlines different requirements for the use of PSDs based on the classification of information.

Bring Your Own Device (BYOD) and Mobile Device Management

Secure Endpoint Management. Presented by Kinette Crain and Brad Lewis

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

Smith College Information Security Risk Assessment Checklist

ONE Mail Direct for Mobile Devices

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Mobile devices risk management and data protection Fidel Santiago DPO meeting 8 May 2015

Network Security Policy

PimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure

Montclair State University. HIPAA Security Policy

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Healthcare to Go: Securing Mobile Healthcare Data

10 Smart Ideas for. Keeping Data Safe. From Hackers

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Other terms are defined in the Providence Privacy and Security Glossary

Data Security in a Mobile, Cloud-Based World

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Hands on, field experiences with BYOD. BYOD Seminar

Research Information Security Guideline

HIPAA Training for Staff and Volunteers

Overview of the HIPAA Security Rule

Virginia Commonwealth University School of Medicine Information Security Standard

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

HELPFUL TIPS: MOBILE DEVICE SECURITY

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

Mobile Device Management

How to Practice Safely in an era of Cybercrime and Privacy Fears

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Information Security Program Management Standard

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Challenges with Encryption. Assist Mobile Technology Workshop.

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Hengtian Information Security White Paper

STATE OF NEW JERSEY Security Controls Assessment Checklist

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Human Resource (HR) and Security Awareness v1.0 September 25, 2013

The Cloud App Visibility Blindspot

Keep Your Data Secure: Fighting Back With Flash

POSTAL REGULATORY COMMISSION

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Guideline on Safe BYOD Management

Identity Theft Prevention Committee Updates and Discussions: 3/15. Team,

Mobile Device Security Is there an app for that?

ISLAND COUNTY SECURITY POLICIES & PROCEDURES

Responsible Access and Use of Information Technology Resources and Services Policy

Regulations on Information Systems Security. I. General Provisions

Virginia Commonwealth University School of Medicine Information Security Standard

Telemedicine HIPAA/HITECH Privacy and Security

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

The BYOD Challenge. Noel A. Nazario Senior Manager, Ernst & Young. ISACA NCAC Emerging Technology Conference 20 November 2012

Transcription:

State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014

Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security Policy Risk Assessment Framework & Mobile Security Policy Deliverable Template Tips Next Steps 2

Questions & Follow-Up 3

Policy Workshop Q&As The following was discussed during the IT Risk Strategy policy workshop: Information Security Metrics Develop, Monitor and Report on key performance metrics: Adoption of security controls Adoption of policies/procedures Effectiveness of information security program Use S.M.A.R.T. metrics Third-Party Risk Management Conduct risk assessments Interconnection Security Agreements Information sharing with third parties 4

DIS Deliverable Dates: The following dates were established by DIS for compliance with the 13 State policies: June 30, 2014 Roles & Responsibilities Chart January 31, 2015 Policy Implementation Plan of Actions (all 13 policies) July 1, 2016 End compliance date 5

Policy Workshops Overview & Timeline 6

Activities Agencies TO DOs Policy Workshop: Timeline January DRAFT For Discussion Purposes Only Objective: Conduct bi-weekly policy workshops with selected agencies to review information security policies, address implementation challenges, risks and assist on gap analysis and action plans with the Agency-designated policy champions. March April May June July August April Policy: Policies: Policies: Policies: Policies: Policy: Asset Management Data Protection & Privacy Access Control Information System Acquisition, Development, Maintenance Threat and Vulnerability Management Business Continuity Management IT Risk Strategy Mobile Security HR & Security Awareness Physical & Environmental Security Facilitate bi-weekly Agency group workshops Review statewide policies Address key policy implementation challenges Conduct mini-gap analysis Discuss policy implementation plans Review Statewide policies and conduct mini-gap analysis Actively participate in breakout groups to discuss gaps and implementation challenges Identify remediation strategies and policy implementation plans 7

Policy Overview: Mobile Security Policy 8

Mobile Security: Key Requirements Mobile Security Device Identification Agency shall only allow portable media devices that are procured and assigned by the authorized Agency department. Agency shall only use portable media devices that can be sanitized and remotely wiped / erased. Access Control for Mobile Devices Agency shall develop the following for mobile devices sanctioned by it: Usage restrictions; Configuration requirements; Connection requirements; and Implementation guidance 9

Mobile Security: Key Requirements Mobile Security Access Control for Mobile Devices (continued) Agency shall establish and maintain a list of approved mobile devices. Agency shall utilize an approved encryption mechanism for mobile devices. Agency shall secure all mobile devices by enabling passwords or Personal Identification Number (PIN) and also enable timeout/ locking features. Agency shall develop a process for users to notify designated personnel when mobile devices are lost or stolen. Agency shall maintain the capability to remotely wipe mobile devices in the event of their theft 10

Mobile Security: Key Requirements Mobile Security Access Control for Mobile Devices (continued) Agency shall centrally manage (e.g. maintain an admin group) the installation of updates to operating systems, (mobile) applications, and security patches. In addition, the agency shall test the vendor recommended patches and update system firmware, OS and applications based on test results. Agency shall establish guidelines for the storage and transmission of information on portable media devices (e.g. scanning for malicious code) Agency shall delete sensitive and confidential information from the mobile devices prior to disposal 11

Mobile Security: Key Requirements Mobile Security Access Agreements Agency personnel shall sign appropriate access agreements prior to receiving the device. The physical security of the device shall be the responsibility of the individual receiving the device. Media Protection Procedures Agency shall protect information system media until the media is destroyed or sanitized. Media Storage Agency shall ensure that only secure portable storage devices (e.g., encrypted flash drives) are utilized as removable media. 12

Mobile Security: Key Requirements Removable Media Security Media Transport Agency shall utilize encryption mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas. Media Sanitization Agency shall sanitize removable digital and non-digital media prior to disposal. 13

Mobile Security: Key Requirements Portable Computing Devices Access Control for Mobile Devices Agency shall maintain mechanisms (e.g. tools) to automatically update and prevent viruses on portable computing devices. Unauthorized software shall not be installed on laptops and/or other portable computing devices without receiving authorized business case approval. Agency shall place asset tags on portable computing devices. Agency shall disable peer-to-peer wireless connections on all portable computing devices, including laptops. 14

Risk Assessment Framework & Mobile Security Policy 15

Risk Assessment Framework The Risk Assessment Framework, based on the National Institute of Standards and Technology (NIST 800-53), was used as the basis to assess risk across the State Agencies using the fifteen (15) security domains (noted below): Information Security Risk Dashboard Risk Governance Risk Control Activities Information & Communications Monitoring & Reporting Governance IT Risk Strategy Asset Management Business Continuity Management Communications Strategy IT Compliance IT Risk Management Change Management Data Protection & Privacy IS Acquisition Dev. & Maintenance Identity & Access Management Physical & Environmental Security Human Resource IT Security Security Operations Threat & Vulnerability Mgmt 16

Mobile Security Policy: Risks & Remediation Strategies Risk assessments conducted with State Agencies uncovered a number of risks in environments with inadequately implemented Access Control Policy and procedures. Remediation strategies were created to help Agencies address gaps and implement necessary safeguards. Examples Overall Risks Identified Gaps Remediation Strategies 17 Data breach due to loss of devices Misuse of agency mobile devices Data leaks though removable media Formal documented mobile device policies and procedures do not exist. Lack of controls over mobile devices such as laptops, mobile phones (for remote wipe. Data encryption, authentication, data storage etc.) Inadequate protection against removable media devices such as USBs, CDs, DVDs, external hard disks etc. Lack of encryption in the portable devices used to transfer agency data such as unencrypted disk drives (including hard disks), USBs etc. Establish a formalized policy and procedures for mobile devices. Establish formal technical controls around lap tops and mobile phones (for remote wipe, data encryption, authentication, data storage, etc. Disable the use of generic removable media by disabling USB ports, CD/DVD drives on agency devices. Employ disk encryption mechanisms for laptops and other portable devices. Restrict use of portable media devices such as USBs, CDs, DVDs to only agency permitted encrypted devices.

Mobile Security Policy: Challenges & Remediation Strategies for All Agencies DRAFT For Discussion Purposes Only Sample Challenges Examples Potential Solutions Control of Mobile Devices Implementation of a Mobile Device Management (MDM) solution to any mobile device handling agency data including email. Use of agency issued devices only as opposed to BYOD (Bring Your Own Device) Restriction on the device type or model or operating system (such as restricting agency devices to ios as opposed to any generic systems) Security awareness and training for employees Misuse of agency devices Security awareness and training for employees Use of MDM with Data Loss Prevention (DLP) capabilities to detect misuse or loss of data from devices Sandboxing of agency applications and agency data present in mobile devices Control of Removable Media Disable the use portable/removable media devices on agency endpoints and servers Promote the use of encrypted disk drives such as encrypted USB keys, CDs, DVDs etc. Use of whole/full disk encryption on the agency portable devices such as laptops, mobile devices etc. 18

Deliverable Template Tips 19

Gap Analysis: Tips & Guidance Be DETAILED!! Consider using Partial to answer questions The Comments column should be used to document current environment and notes For identifying and finalizing gaps: Consider both process and documentation gaps separately (and document both types) Gaps should be detailed enough to read and understand independently when transferred to the implementation plans You can have multiple gaps per question Consider using Gap Analyses as a process improvement exercise as well The Gap Analyses are meant to be filled out once as a point in time exercise Not all gaps will be identified with a No response 20

Policy Implementation Plan of Action: Tips & Guidance Implementation Plans are meant to be living, breathing documents (even through the July 1, 2016 implementation date). Copy finalized gaps from Gap Analyses directly to Current Gaps column Consider using long, medium and short-term implementation strategies There should be multiple, detailed bullets once an implementation strategy is finalized. Recommendations: Documentation gaps should be separated (different lines) from process gaps. Merge rows (where applicable) or transfer implementation plan to Excel Identify unique due dates for each bullet of the strategy A sample, short-term strategy could be as simple as Waiting for State solution for Patch Management (your detailed strategy to close the gap would be identified after the DIS/DTO has announced the available solution). 21

Next Steps 22

Next Steps 1. Develop or update Agency s InfoSec policies to align with published State policies 2. Conduct Policy Gap Analysis 3. Develop Policy Implementation Plan of Action 4. Develop processes to enable the implementation of InfoSec Policies 5. Promote Agency-wide InfoSec policies awareness 6. Coordinate with DIS on training and guidance 23