Information Security Policy version 2.0

Similar documents
King Faisal University

INFORMATION SYSTEMS. Revised: August 2013

ISO 27002:2013 Version Change Summary

ISO Controls and Objectives

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ISO27001 Controls and Objectives

INFORMATION TECHNOLOGY SECURITY STANDARDS

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

Information Shield Solution Matrix for CIP Security Standards

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

How To Manage Security On A Networked Computer System

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

INFORMATION SECURITY PROCEDURES

Security and Privacy Controls for Federal Information Systems and Organizations

Information Security Policies. Version 6.1

Domain 1 The Process of Auditing Information Systems

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Information security management systems Specification with guidance for use

I n f o r m a t i o n S e c u r i t y

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Service Children s Education

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Certified Information Systems Auditor (CISA)

Central Agency for Information Technology

Supplier Security Assessment Questionnaire

University of Sunderland Business Assurance Information Security Policy

Microsoft s Compliance Framework for Online Services

Information Security Management. Audit Check List

Music Recording Studio Security Program Security Assessment Version 1.1

Information security controls. Briefing for clients on Experian information security controls

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

University of Aberdeen Information Security Policy

Newcastle University Information Security Procedures Version 3

ISO COMPLIANCE WITH OBSERVEIT

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

This is a free 15 page sample. Access the full version online.

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Recent Researches in Electrical Engineering

Information Security: Business Assurance Guidelines

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Security Controls in Service Management

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

Does it state the management commitment and set out the organizational approach to managing information security?

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS

(Instructor-led; 3 Days)

State of Oregon. State of Oregon 1

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Mapping between the requirements of ISO/IEC 27001:2005 and ISO/IEC 27001:2013

Third Party Security Requirements Policy

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Supplier Information Security Addendum for GE Restricted Data

Cloud Security and Managing Use Risks

Services Providers. Ivan Soto

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Information Security Program

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors

Department of Information Technology Remote Access Audit Final Report. January promoting efficient & effective local government

Attachment A. Identification of Risks/Cybersecurity Governance

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

PII Compliance Guidelines

Cloud Security Trust Cisco to Protect Your Data

Information Security Awareness Training

How To Monitor A Municipality

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

<Insert Picture Here> How to protect sensitive data, challenges & risks

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

R345, Information Technology Resource Security 1

SRA International Managed Information Systems Internal Audit Report

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

Information Technology General Controls (ITGCs) 101

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security from a customer s perspective. Halogen s approach to security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

IT Audit in the Cloud

05.0 Application Development

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Information Security Policy. Chapter 12. Asset Management

HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE

Transcription:

http://kfu.edu.sa KING FAISAL UNIVERSITY Information Security Policy version 2.0 Prepared & Presented by: M. Shahul Hameed, MBA, M.Sc.IT, C\MA, CIA, PMP, CGEIT, CISA, CISM, ITSM(ITIL), ISO27001LA, Head of Quality Management Office, Deanship of IT Arabic Translated by: Ahmed Samir Morsy, BEng, PGSD CS, MCTS, MCT, MCSD, MCAD, MOS Assistant to Head of Quality Management Office, Deanship of IT

Table of Contents 1. Introduction 2. Information Security Framework 3. Information Assets Identification and Classification 4. Risk Assessment 5. Information Security Policy 6. Organization of Information Security Management in DIT 7. Asset Management Policy 8. Human Resources Security Policy 9. Physical and Environmental Security Policy 10. Communication & Operations Management Policy 11. Access Control Policy 12. Security Controls on Systems Acquisition, Development & Maintenance 13. Information Security Incident Management Policy 14. Business Continuity Management (BCM) Policy 15. Compliance Policy 16. Disciplinary Action and KFU Rights 17. Other Important Information Security Topics KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 2

1- Introduction (1/2) With the increasing speed of new technology strategies and stakeholders expectations, protection of information assets has become paramount, and subject to have continuous improvement in light of industry standard best practices concerning information security. This framework and policy, including the sub policies, procedures and guidelines apply to all KFU community that includes employees, contractors, consultants, temporaries, faculty, students and all others who have been given access to the KFU information systems as well as all other access to any third party information systems that are connected through KFU network. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 3

1- Introduction (2/2) The owner and responsible party for the management of this policy is the Dean of Information Technology. Information Security Manager (ISM) will be the primary contact point on the implementation and maintenance efforts of the KFU. Head of Quality Management Office of the Deanship of IT will assume the role of the ISM, until a specific assignment is made by the dean and the Quality Management Office shall be the coordinator in establishing this policy as well as supporting the monitoring and control of its effectiveness for meeting the business requirements. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 4

Table of Contents 2. Information Security Framework KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 5

2- Information Security Framework (1/2) This policy manual has been prepared in light of best practices, which are considered as prudent control measures for safety and security of information and related technology. Policy Framework Information Security Governance Information Security Baseline Information Security Governance Committee Information Security Governance Committee Members Information Security Management Processes (ISMS) Deliverables of the Information Security Management Process Information Security Governance Committee Meetings & Proceedings KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 6

IMPLEMENT AUTHORIZE ENFORCEMENT ONGOING ASSESSMENT IDENTIFY 2- Information Security Framework (2/2) Identify: Principles and Policies Standards Guidelines and Procedures Principles Authorize: Enforcement Controlled Environment Policies Implement: Authorized courses of action Security Controls Awareness Programs Standards, Guidelines and Procedures Enforcement: Technical controls Penalty clauses Security incident reporting Follow-up Ongoing Assessment: Respond to change due to business models change, new technologies Respond to change due to regulatory compliance requirements Respond to change due to availability of improved control measures against increasing risks, based on cost-benefit analysis and business demands.

Table of Contents 3. Information Assets Identification and Classification KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 8

3- Information Assets Identification and Classification Information Assets Database All definable piece of information, stored in any manner which is recognized as valuable to the organization is to be considered as information assets. A project plan to be prepared for building or improving / enhancing any existing tool for the configuration management of all information assets. In the absence of a sophisticated information management tool for CMDB (Configuration Management Data Base), during the interim period, any office automation tool such as excel or access database could be used in order to collect the information assets list as updated with all classification parameters. Information Classification and Protection Requirement General ( PUBLIC ) Proprietary ( FOR INTERNAL USE ) Restricted ( PRIVATE ) Secret ( CONFIDENTIAL ) KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 9

Table of Contents 4. Risk Assessment KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 10

4- Risk Assessment Risk assessment process assess potential business impact, evaluating threats and vulnerabilities and selecting appropriate controls to meet the business requirement for information security in a system in a cost effective manner. Quality Management Office of the Deanship of IT (QMO) has been assigned with responsibility for leading the coordination with Operational Risk Specialists and Auditors in all such activities relating to risk assessment and risk management process. All departments and deanships should identify a coordinator for their organization and ensure all communications between their organization and Quality Management Office of the DIT. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 11

Table of Contents 5. Information Security Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 12

5- Information Security Policy (1/3) Information Security Objectives To ensure awareness of information security to all users at least annually once or within two months of their joining the KFU. To perform Risk Assessment and Business Impact Analysis for all critical information assets at least once in two years and also prior to each major changes to any critical information assets. To publish periodical report to the Information Security Governance Committee with regard to the status of information security of the KFU. To ensure updating of centralized inventory of all IT assets across the KFU before being issued or implemented. To ensure implementation of cost-effective controls in order to protect the information assets and provide effective and efficient monitoring and control procedures for evaluating the implementation and maintenance of information security policy across the KFU. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 13

5- Information Security Policy (2/3) Approval of Policies and procedures All policies on Information Security should be approved by the President or Vice President for Studies, Development, and Community Services, based on the recommendations of the Dean of Information Technology and the Information Security Governance committee resolution. All procedures and guidelines, including sub policies relating to the approved policies established for the purpose of implementing and maintaining the main information security framework and policies shall be approved by the Dean of Information Technology, based on the recommendation by ISM. Revision of Policies and Procedures This policy will be fully reviewed at least once in 2 years in order to reflect the new risks and changes to the business environment. It will be amended between full reviews if regulatory, control, or organizational development warrants a change in the policy. Suggestions for improving the content of this policy should be addressed to shahul@kfu.edu.sa (Head of QMO of the Deanship of IT).

5- Information Security Policy (3/3) List of Policies, Procedures, Guidelines and Checklists The Quality Management Office of the Deanship of IT, will maintain the list of all the current and relevant policies, including sub policies, procedure and guidelines prepared by all IT departments and publish them in the DIT website. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 15

Table of Contents 6. Organization of Information Security Management in DIT KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 16

6- Organization of Information Security Management (1/2) KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 17

6- Organization of Information Security Management (2/2) Internal Organization Policy Management Commitment Information Security Coordinators Information Security Roles and Responsibilities Authorization process for Information processing facilities Confidentiality Agreements Contact with Authorities Contact with special interest groups Independent Review of Information Security External Parties Policy (www.mohe.gov.sa and other regulatory policies) KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 18

Table of Contents 7. Asset Management Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 19

7- Asset Management Policy Responsibility for Assets Inventory Control. Responsibility for Assets - Ownership of Assets. Responsibility for Assets Acceptable Use of Information Systems. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 20

Table of Contents 8. Human Resources Security Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 21

8- Human Resources Security Policy Prior to employment Roles and Responsibilities. Screening. Terms and conditions of employment. During Employment Management Responsibilities. Information Security Awareness Education and Training. Disciplinary process against a security breach. Hand-Over Procedures Termination or change of employment KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 22

Table of Contents 9. Physical and Environmental Security Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 23

9- Physical and Environmental Security Policy KFU has a Department of Security and Safety under its Administrations group of the organization structure. All policies and procedures for the KFU s security perimeter are governed by this department s policies, procedures, guidelines and circulars. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 24

Table of Contents 10. Communication & Operations Management Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 25

10- Communication & Operations Management Policy (1/5) Operational procedures and responsibilities Documented Operating Procedures. Change Management. Segregation of Duties. Separate Development, Test and Production facilities. Third-party Service Level Management Standard SLA s Service Level Agreement Security Controls, Service Definitions, Delivery Levels Checklists for ensuring controls KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 26

10- Communication & Operations Management Policy (2/5) Capacity Management. System planning and acceptance System Acceptance Criteria for development and testing. Protection against Malicious and Mobile code policy Detection, prevention, and recovery controls to protect against malicious code. Appropriate user awareness procedures. Authorized mobile code definition KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 27

10- Communication & Operations Management Policy (3/5) Backup and Recovery Policy Application system reference Data scope (folder) reference Backup/restore script/procedure identification Frequency of the backup and Recovery Point Objective (SOD/EOD etc.) Retention period Off-site location and tape library id etc. Network Security Management Policy General issues related to Communications and Network Security Network Security Architecture Network Infrastructure Management Network Infrastructure Monitoring Communications and Network Security Audit KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 28

10- Communication & Operations Management Policy (4/5) Handling of physical media Authorize to individual personnel Appropriate risk migration measures Media Handling Policy Policy for Information Exchange Information Exchange. Exchange Agreements. Transportation of Media. Electronic Messaging. Interfaces and interconnection of business information systems. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 29

10- Communication & Operations Management Policy (5/5) Electronic Commerce On-line transactions Public available information Electronic Commerce services policy Monitoring Use of Information Processing Facilities Policy Audit logging Monitoring system use Protection of log information Administrator and Operator logs Fault logging Clock synchronization KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 30

Table of Contents 11. Access Control Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 31

11- Access Control Policy (1/2) Access control policy. KFU requirements for access control User registration. User Access Management Privilege Management. Password Management. Periodical Review of User Access Rights. User Responsibilities toward access control policy Users must follow good security practices Users must ensure that unattended equipment has appropriate protection Users must be updated with Acceptable Use policy Information Access restriction. Sensitive system isolation. Network Access Control

11- Access Control Policy (2/2) Operating system access control Operating System security parameters Assessment of compensating controls User identifier and user authentication mechanism Single sign-on Application and information access control Information Access Restriction. Sensitive System Isolation. Mobile computing and Tele-working Mobile computing and communications. Tele-working (off-site computer usage). KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 33

Table of Contents 12. Security Controls on Systems Acquisition, Development & Maintenance KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 34

12- Security Controls on Systems Acquisition, Development & Maintenance (1/3) System Development and Life Cycle Methodology Security Requirements of Information Systems. System Development Life Cycle (SDLC) methodology. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 35

12- Security Controls on Systems Acquisition, Development & Maintenance (2/3) Correct Processing in Applications Data input validations Automated or integrated Verification of input sources Authenticity and protecting message integrity Cryptographic Controls Policy. Key Management. Cryptography and Key Management Security of System Files Operational Software. Protection of System Test Data. Access Control to Program Source Code. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 36

12- Security Controls on Systems Acquisition, Development & Maintenance (3/3) Security in development and support processes Change control procedures. Technical Review of Applications after operating system changes. Restrictions on changes to software packages. Information leakage. Outsourced software development. Technical Vulnerability Management. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 37

Table of Contents 13. Information Security Incident Management Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 38

13- Information Security Incident Management Policy Reporting information security events, Security events relating to operational risk should be reported to Information Security Governance Committee through the QMO of DIT. Reporting security weaknesses. Management responsibilities for ensuring quick, effective, and orderly response to information security incidents. Effective and efficient mechanism for learning from information security incidents. Collection of evidence in support of legal proceedings. Creation of appropriate awareness among all users periodically. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 39

Table of Contents 14. Business Continuity Management (BCM) Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 40

14- Business Continuity Management (BCM) Policy The information security aspects of business continuity management should be governed by a set of policies, procedures, guidelines and checklists and the same should include the following controls Developing & maintaining a managed process. Each deanship and departments of the KFU should ensure that BCM exists for them. All events that can cause interruptions to business processes should be identified, Business impact of these threats should be analyzed in consultation with the process owners and the asset owners/custodians in prioritizing for recovery and preparing the business continuity and recovery plans. Developing & implementing detailed plans and procedures. Maintaining a single framework of business continuity plans to ensure all plans are consistent. A designated person shall be nominated as the BCC (Business Continuity Coordinator, who is the owner of BC Plan and processes) for each critical deanship and/or departments. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 41

Table of Contents 15. Compliance Policy KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 42

15- Compliance Policy Compliance with Legal Requirements. Compliance with security policies and standards, and technical compliance. Information systems audit considerations. KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 43

Table of Contents 16. Disciplinary Action and KFU Rights KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 44

16- Disciplinary Action and KFU Rights Users responsibility for compliance with regulatory and KFU information security policy obligations. Protecting Evidence from Destruction. Disciplinary Action and Legal Issues. Intellectual Property Rights Deactivation of User Accounts / User Names Internet and E-mail Access Revocation Collection of Usage Statistics Communications Monitoring Enforcement KFU-DIT-ISP-Branding-v2.pptx Updated on:3/2/2013 Page: 45

Thank You شكرا لكم KING FAISAL UNIVERSITY Deanship of Information Technology جامعة الملك فيصل عمادة تقنية المعلومات Please contact: M. Shahul Hameed [shahul@kfu.edu.sa] for information - البريد االلكتروني: shahul@kfu.edu.sa لمزيد من المعلومات يرجى االتصال ب: محمد شاهول حميد