Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit



Similar documents
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

University of Sunderland Business Assurance Information Security Policy

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Information security policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy

How To Protect Decd Information From Harm

NHS Business Services Authority Information Security Policy

Analysis One Code Desc. Transaction Amount. Fiscal Period

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

INFORMATION TECHNOLOGY SECURITY STANDARDS

Information Security Incident Management Policy September 2013

Security Controls What Works. Southside Virginia Community College: Security Awareness

How To Ensure Information Security In Nhs.Org.Uk

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

TRUST SECURITY MANAGEMENT POLICY

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Music Recording Studio Security Program Security Assessment Version 1.1

BS EN Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI

Information Governance Policy (incorporating IM&T Security)

Third Party Security Requirements Policy

Newcastle University Information Security Procedures Version 3

Domain 1 The Process of Auditing Information Systems

Dublin Institute of Technology IT Security Policy

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Information Security Policies. Version 6.1

ULH-IM&T-ISP06. Information Governance Board

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences

Information security controls. Briefing for clients on Experian information security controls

ISO27001 Controls and Objectives

Service Children s Education

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

An Introduction to Internal Audits

Security Control Standard

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Consumer ID Theft Total Costs

Rotherham CCG Network Security Policy V2.0

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

Walton Centre. Document Control. Document History Date Version Author Changes 01/10/ A Cobain

Remote Access Policy

<COMPANY> P01 - Information Security Policy

University of Liverpool

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template

Network Security Policy

How To Audit Health And Care Professions Council Security Arrangements

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

An Approach to Records Management Audit

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

NHS BLOOD AND TRANSPLANT MARCH 2009 RESPONDING EFFECTIVELY TO BLOOD DONOR FEEDBACK

In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including:

INFORMATION SECURITY California Maritime Academy

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

1. Introduction. 2. Performance against service levels 1 THE HIGHLAND COUNCIL. Agenda Item. Resources Committee 26 th March 2003 RES/43/03

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25

CCG: IG06: Records Management Policy and Strategy

University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

ISO Controls and Objectives

How To Ensure Network Security

Computing & Telecommunications Services Monthly Report March 2015

Information Governance Strategy

University of Liverpool

Business Continuity Policy and Business Continuity Management System

External Supplier Control Requirements

CHILDREN AND YOUNG PEOPLE'S PLAN: PLANNING AND PERFORMANCE MANAGEMENT STRATEGY

Mike Casey Director of IT

Health and Safety Improvement Program (Continuous Self- Assessment) CSA Guidelines. October, 2014

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

ISO/IEC Information Security Management. Securing your information assets Product Guide

NHS Commissioning Board: Information governance policy

P-01 Certification Procedure for QMS, EMS, EnMS & OHSAS. Procedure. Application, Audit and Certification

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Northern Grampians Shire Council FRAUD CONTROL PLAN

How To Assess A Critical Service Provider

Document Management Plan Preparation Guidelines

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

A practical guide to IT security

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

University of Aberdeen Information Security Policy

Policy: D9 Data Quality Policy

Request under the Freedom of Information Act 2000 (FOIA)

Transcription:

Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt

Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This Standard 3 Monitoring 4 Internal Audit 5 External Audit 6 Compliance 6.1 Responsibility 6.2 Review and Monitoring APPENDICES A Schedule of Internal Audits B Audit Finding Form C Audit Summary Form D Audit Report Template

Page 3 1. Introduction Information and information systems are important assets and it is essential to take all the necessary steps to ensure that they are at all times protected, available and accurate to support the operation and continued success of The Walton Centre The Walton Centre acknowledges that we must demonstrate to our stakeholders our commitment to, and delivery of, effective information governance. The aim of The Walton Centre s Security Policy, Standards is to maintain the quality, confidentiality, and availability of information stored, processed and communicated by and within The Walton Centre. These policies, standards, guidelines are used as part of the information security management system within The Walton Centre. The Walton Centre places great reliance upon the robust application of the policies and standards that make up the ISMS and has, therefore, developed processes to self assess compliance and for independent review, by its internal auditors. This standard applies to all staff, whether permanent, part-time or temporary with responsibilities defined below. 2. Responsibilities Within This Standard All employees using IT equipment, the internet or e-mail have responsibilities with regard to this standard. Particular responsibilities within the standard are defined as:- Review and Maintenance Approval Local adoption Compliance Monitoring Information Security Officer Information Security and Governance Group Line Managers (in scope) All Staff and Contractors (in scope) Information Security Officer Information Security Auditor

Page 4 3. Monitoring 3.1 Context Auditing, by its nature, is based on samples and random checks and, while providing valuable assurances to the Board, it does not take away the Trust s responsibility to self manage, ensuring compliance with its Information Security Management System as well as legal and regulatory requirements (examples of applicable legislation are included within the ISMS s Incident Reporting Standard). To this end the Trust reserves the right to monitor the activity of individual in appropriate circumstances acknowledging the legal requirements and restraints applicable. In determining the need for and appropriateness of monitoring due reference has been made to the Information Commissioner s Monitoring at Work Guidance, The Human Rights Act and the Regulation of Investigatory Powers Act. In particular, the Regulation of Investigatory Powers Act (2000) permits monitoring and recording of employees electronic communications (including telephone communications) for the following reasons: Establishing the existence of facts Investigating or detecting unauthorised use of the system Preventing or detecting crime Ascertaining or demonstrating standards which are achieved or ought to be achieved by persons using the system (quality control and training) In the interests of national security Ascertaining compliance with regulatory or self-regulatory practices or procedures Ensuring the effective operation of the system.

Page 5 In addition communications may be monitored (but not recorded) for the purpose of checking whether those communications are relevant to the purpose of the Trust s business, and the employees position with the Trust. 3.2 Impact Assessment Having due regard to the sensitivities related to patient and Trust information and the need to demonstrate to the public our determined efforts to ensure effective information governance it the opinion of the Trust that it is appropriate that it retain s the right to monitor information flows within as well as into and out of the Trust. The Trust is aware that monitoring is a sensitive issue and it seeks to minimise any adverse impacts through effective consultation and communication with staff. All of the Trust s Information Security Standards will reflect the right to monitor and these rights will also be included within contracts of employments and confidentiality undertakings. 3.3 Examples of monitoring While not intended to be exhaustive or all inclusive, the list below provides examples of the monitoring which the Trust does or may wish to undertake:- Examining logs of web sites visited to ensure appropriateness Using internet filtering software to block and report on inappropriate internet access attempts Scanning of e-mail for inappropriate content Randomly opening e-mails or listening to voice-mails for evidence of inappropriate practice Monitoring of telephone logs for evidence of inappropriate contacts e.g. premium rate numbers Use of CCTV (closed circuit television) to ensure no breach of standards.

Page 6 While a number of the above, e.g. internet logs, internet filtering and e-mail scanning, may be routinely in place others may be invoked as and when a concern of needs arises. 4. Internal Audit 4.1. Policy Statement It is the policy of the Trust that all aspects of the its Information Security Management System (ISMS), be subject to an internal review at least once every 12 months. This will help ensure that not only policies and procedures are being applied but that new best practice can be gathered and applied. 4.2 Process 4.2.1 Overview This audit process is undertaken by Trust staff and is distinct to audit work undertaken by its internal auditors. It is undertaken in discussion with staff members in the area under review, identifying whether existing procedures are complied with and at the same time identifying whether the procedures are adequate. This will involve observing work in progress as well as sampling previous records. The auditor(s) will also gauge overall security awareness of the staff members interviewed. Audit Checklists will be used, an for guidance only and will not limit the enquiries of an auditor who is following the audit trail. In addition the Audit Checklists may be used to record relevant information during the course of the audit. 4.2.2 Reporting Audit Findings Findings will be recorded and subsequently will be classified by the auditor, as either a recommendation or as an observation. This will be recorded on an audit finding form. (See Appendix B) and summarized on the audit summary form (See appendix C)

Page 7 The Auditor will ensure that each recommendation has a unique identification number (the audit number followed by a second sequential number). This information will be added to the Internal Audit log. The Department Manager will sign to accept the recommendation. At the end of the audit the Auditor will generate an Audit Report (template at Appendix D). This Report will consist of any Audit Checklists and notes, copies of any observations, copies of any recommendations, if applicable, a summary of the audit findings and a front page. The front page will detail the Area/Function audited, the unique audit number, the date and time the audit was carried out, the auditor(s), auditee(s) and a list of attachments. An urgent Recommendation indicates that an aspect of the ISMS is either not defined or not being adhered to in any way and hence a risk to the business. Such a recommendation would need to be addressed as a matter of urgency. The Auditor may also see fit to raise an Observation which is not a firm recommendation but rather a suggestion for improvement. Upon the next visit, the Auditor will expect the observation to have been taken on board (if appropriate) thus signifying ongoing improvement to the ISMS. Any non-site specific observations will be shared with other sites. 4.2.3 Following Up Corrective Actions Once the Information Security Officer has received the completed non-conformities the Audit Summary From is then updated to show when follow up review is required. The purpose of this verification (follow up) audit is to ensure that the defined corrective actions have been successfully implemented and are effective. The auditor who raised the original recommendation normally conducts this audit. Once objective evidence has been found confirming the successful implementation and effectiveness of the actions, the recommendation will be closed and signed off by the auditor and the department representative. The Information Security Officer will review the recommendation and authorise its closure.

Page 8 Date: 01/10/ 2004 5. External Assurance The Walton Centre senior managers and board require, in order to meets it corporate governance and NHS reporting requirements, independent assurance that its information security processes are robust and that the policies, standards and procedures are appropriate to business need. In simple terms these requirements can be described thus :- Adequacy Effectiveness This process would aim to ensure that policies, standards and procedures are fit for purpose in their design. At this level audit work would aim to provide assurance that such policies, standards and procedures have been robustly and effectively applied within The Walton Centre In order to ensure that The Walton Centre board can obtain appropriate assurances it is essential that sufficient audit resources are assigned to the review process. On an annual basis the Director of Finance, in conjunction with the Internal Audit function will assess the assurance requirements for the following year and will allocate appropriate time within the internal audit plan. Reports by the internal audit function which related to information security will, initially be reported to the Head of IT and the Director of Finance. They will subsequently be issued to the Information Security Forum, where appropriate, for action. 6. Compliance 6.1 Responsibility It is the responsibility of all users to ensure that they have read, understood and abide by this standard. 6.2 Review and Monitoring The Walton Centre has in place routines to regularly audit compliance with this and other standards.

Page 9 APPENDI A: SCHEDULE OF INTERNAL ISMS AUDITS ISMS Document Title APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR Section Risk Management Schedule reference ISMS 01 Information Security Management Policy Security Policy ISMS 04 Asset Inventory ISMS 05 Risk Assessment / Risk Management Plan ISMS 06 Business Continuity Plan Recovery Options for Hosts Recovery Options for Network Interfaces Recovery Options for Network Services Recovery Options for Accommodation Recovery Options for Media Network Resilience Equipment Failure Protection ISMS 07 Document Control SS 01 Security Responsibilities Security Education & Training Security Infrastructure SS 02 Personnel Security Personnel SS 03 Asset Management Object Re-use Hardware Maintenance Controls Software Maintenance Controls Document / Media Controls SS 04 Risk Assessment SS 05 Third Party Relationships

Page 10 ISMS Document Title Section Risk Management Schedule reference SS 06 Physical and Environmental Room / Zone Physical Security Physical Network Protection Theft Protection Physical Equipment Protection Fire Protection Water Protection Natural Disaster Protection Environmental Protection SS 07 Access and Authentication (Physical) SS 08 Access and Authentication (Network) Identification & Authentication Logical Access Control Software Integrity Customer Authorisation Network Access Controls SS 09 Acceptable Use Content Scanning Anti-spamming Controls SS 10 Encryption SS 11 Change Control Security Testing Software Change Control System Administration Controls Hardware Maintenance Controls Software Maintenance Controls SS 12a Incident Reporting SS 12b Incident Response (Legal & Forensics) SS 12c Incident Response (Operational) APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR

Page 11 ISMS Document Title Section Risk Management Schedule reference SS 13 Anti Virus and Housekeeping Protection Against Malicious Software Mobile Code Protection Back-up of Data SS 14 Remote Working Mobile Computing & Teleworking SS 15 Network Management Accounting Audit Network Security Management Vulnerability Analysis Intrusion Detection Quality of Network Services Operations Controls User Control Capacity Planning SS 16 Business Continuity Business Continuity Planning SS 17 Monitoring & Audit SS 18 Communications Security of Routing Tables Wireless LAN Security Message Security Protection Against DoS Attacks Data Integrity Over Networks APR MAY JUN JUL AUG SEP OCT NOV DEC JAN FEB MAR Walton Centre For Neurology & Neurosurgery

Page 12 APPENDI B: AUDIT FINDING FORM AUDIT REF DATE AREA AUDITOR FINDING No FINDING / OBSERVATION (delete as appropriate) PRIORITY: NORMAL / URGENT ACTION REQUIRED ACTION BY (officer) ACTION DATE SIGNED BY AUDITEE FOLLOW UP CLOSED BY CLOSED DATE SIGNED BY AUDITOR

Page 13 APPENDI C: AUDIT SUMMARY FORM AUDIT REF DATE AREA AUDITOR FINDING NO AUDITEE ACTION DATE FOLLOWED UP DATE CLOSED DATE

Page 14 APPENDI D: AUDIT REPORT TEMPLATE ISMS Audit Report Auditor: Date: Audit Area: Audit Ref: [Click here and type name] [Click here and type name] [Click here and type name] [Click here and type name] 1. Scope and Objective The audit undertaken aimed to assess the Trust s compliance with its internal Information Security Management System and thus with the requirements of BS7799. This particular review focused on the following elements of the ISMS:- xx xx 2. Summary of Findings / Observations The audit identified xx non-conformances of which xx were considered to be of an urgent nature. These findings are summarised below:- FINDING REF ISSUE

Page 15 In addition, there were xx observation raised which are summarised below:- FINDING REF ISSUE 3. Conclusion / Opinion Having assessed the findings arising from the review it is apparent that the ISMS has / has not (delete) been consistently applied and that there is on-going compliance with the requirements of BS7799 / compliance with BS7799 cannot be assured.