ISMF Guideline 21 – Media handling

advertisement

OCIO/G4.21

Government guideline on cyber security

ISMF Guideline 21

Media handling: Portable storage devices and electronic media

BACKGROUND

Digital information storage media use by public sector employees has grown significantly in recent years, e.g. through the availability of personal information storage and mobility devices such as

USB flash drive, laptops/notebooks, tablets and smartphones, and the increasing popularity of bring your own device arrangements.

Attributes such as ease of use, low cost and portability, are accompanied by a number of information security concerns related to their lifecycle management. Consequently, agencies must be aware of the risks associated with the use of these devices in order to ensure adequate cyber security considerations are made.

This guideline assists agencies in appropriately protecting these assets when used by their employees and suppliers. This guideline supports implementation of ISMF Policy Statement 21.

GUIDANCE

Agencies are responsible for developing and implementing procedures and practices to maintain adequate protection of information contained on devices with embedded storage, as well as dedicated portable storage devices like USB keys, flash drives and the like. These procedures and practices will need to consider the classification (or value and sensitivity) of the information to be stored on the device(s) as determined by the organisation . ‘Acceptable Use’ policies and procedures implemented in an agency are the direct outcome of the findings of a business impact assessment against identified risks.

Agencies are responsible for developing and implementing procedures in accordance with the requirements of the:

Protective Security Management Framework [ PSMF ]

Information Security Management Framework [ ISMF ]

The predominant ISMF standards relating to equipment with information storage capabilities are

ISMF Standards 59, 60, 101 and 131 respectively.

This guideline encompasses the development of practices and procedures for undertaking secure information management, recovery, sanitisation and/or disposal activities for storage devices and media.

ISMF Guideline 21

PRE-REQUISITE DOCUMENTS

The ISMF should be read in conjunction with this guideline. Implementing the guidance in this document may assist in meeting the requirements contained in the following ISMF Policy

Statements:

ISMF Policy Statement 21 (Media handling and security)

ISMF Policy Statement 11 (Cessation or change of employment)

ISMF Policy Statement 30 (Mobility)

MEDIA MANAGEMENT AND HANDLING

Office equipment often contains media which can store information for an indeterminate period

(e.g. electronic whiteboards, multi-function printers and USB flash drives). This convergence of technology makes security-related aspects of storage media handling increasingly complex.

This section provides guidance on important considerations for management of information storage media, especially when the media is used in conjunction with equipment that is kept or used away from a secured office environment.

Table 1 – Media management and handling

Applicability Guidance References

All classifications

Responsible Parties should define, document and implement formal processes and procedures, including approval authorities, for any activities related to the handling of digital storage media.

ISMF Standard 59

Responsible Parties should classify media to the level that is commensurate with the highest sensitivity or classification of the data that is or will be stored on the media. Responsible

Parties should consider the effect of aggregation of information at a lower sensitivity or classification (for example by storing it on a single type of media such as a portable hard drive or flash drive) which may result in an elevation of classification for that media.

ISMF Standard 11

ISMF Standard 56

Responsible Parties should define and follow formal procedures for the identification of media that is or has the potential to be used to store sensitive or above information. A register of such media should be maintained and made available for review and auditing purposes.

Sensitive and above

Responsible Parties should label Portable Storage Devices with a marking corresponding to the sensitivity or classification applicable to the information on the media. Non-textual protective markings that conform to a documented labelling scheme may be used if operational security reasons are not conducive to the use of textual labels.

ISMF Standard 9

ISMF Standard 20

Government guideline on cyber security

Media handling: Portable storage and electronic media v1.0

Page 2 of 5

ISMF Guideline 21

Applicability Guidance References

Responsible Parties should classify any media that is connected to a system at the same level as the system, unless the media connection or use is otherwise restricted to readonly mode.

Responsible Parties should protect information received from another Agency or other Australian jurisdiction according to the protective markings applied by the originating Agency or jurisdiction, regardless of media.

Media Handling section of the

Australian

Government ISM

ISMF Standard 19

SANITISATION OF MEDIA

When storage media is re-purposed or disused, considerations are needed regarding the process of removing any sensitive or classified information from its storage media (e.g. to reduce its classification level).

Residual digital data can remain intact, accessible or restorable even after a ‘format’ or ‘wipe’ of magnetic and optical media. This may lead to inadvertent disclosure of sensitive information should the storage media be used or released into an uncontrolled environment. The same is true of assets flagged for auction or general sale outside of government.

Table 2 – Sanitisation and disposal

Applicability

All classifications

Guidance References

Responsible Parties should define, document and implement formal processes and procedures, including approval authorities, for any activities to sanitise any reused digital information storage media, or destroy and dispose of any disused media commensurate with the sensitivity of the information contained on the media.

Responsible Parties should ensure that specified processes and procedures for sanitisation activities observe the requirements for the disposal of Official Records in accordance with section 23(1) of the State Records Act 1997 .

ISMF Standard 60

ISMF Standard 45

ISMF Standard 60

Responsible Parties should only undertake sanitisation and disposal activities using approved equipment, techniques, and procedures in alignment with the requirements described in the

Media Security section (pages 135 to 151 Australian

Government ISM) .

Media Handling section of the

Australian

Government ISM

Responsible Parties should track and document media

Sanitisation actions, and periodically review and verify

Sanitisation equipment/procedures for correct operation and performance.

Media Handling section of the

Australian

Government ISM

Government guideline on cyber security

Media handling: Portable storage and electronic media v1.0

Page 3 of 5

ISMF Guideline 21

Applicability Guidance

Sensitive and above

Responsible Parties should consider adhere to the guidance provided in the Australian Government ISM with respect to sanitisation and/or disposal of assets prior to reallocating returned equipment to other personnel or for other functions.

Responsible Parties should consider destroying digital media if sanitisation attempts fail, cannot be verified, are not cost effective, or if the media type is not suited to sanitisation.

Third party suppliers engaged in sanitisation or disposal activities should be bound to the provisions of the ISMS by means of contractual conditions with respect to handling sensitive or security classified information.

References

Media Handling section of the

Australian

Government ISM

ISMF Standard 45

ISMF Standard 14

ISMF Standard 23

Responsible Parties should ensure that all personnel, including third-party providers, involved in digital media sanitisation and destruction hold security clearances commensurate with the sensitivity and classification of the information contained on the media.

ISMF Standard 14

Responsible Parties should keep and manage logs and records pertaining to the sanitisation and disposal of information assets for review and audit purposes.

ISMF Standard 60

ADDITIONAL CONSIDERATIONS

 The ‘need-to-know’ principle must be maintained. Personnel accessing or using official information and other information assets away from the office must treat those resources with the same level of care and discretion as if working in their usual environment. Particular care should be taken when communicating in public locations. (see ISMF Standard 68)

Portable storage devices and mobility devices should not be connected to any official networks without approval. If approval for connection is given, then network authentication credentials should not be cached locally on the device.

Further information on this topic is available from the US National Institute of Standards and

Technology ( NIST ) and the Australian Government Australian Signals Directorate ( ASD ).

This guideline does not aim to provide the reader with all of the responsibilities and obligations associated with media handling and security of storage devices. It is merely an overview of the information provided in applicable government cyber security policy, applicable governance frameworks and the resources and utilities available at the time of publication. It is highly recommended that agencies review these documents in their entirety. The individual requirements of agencies will have direct bearing on what measures are implemented to mitigate identified risk(s).

Government guideline on cyber security

Media handling: Portable storage and electronic media v1.0

Page 4 of 5

ISMF Guideline 21

REFERENCES, LINKS & ADDITIONAL INFORMATION

1. OCIO/F4.1 Government of South Australia Information Security Management Framework

[ISMF] , Government of South Australia, Adelaide

2. PC030 Government of South Australia Protective Security Management Framework [PSMF] ,

Department of the Premier and Cabinet, Government of South Australia, Adelaide

3. Australian Government Protective Security Policy Framework [PSPF] , AttorneyGeneral’s

Department, Australian Government, Canberra.

4. Australian Government Information Security Manual 2013 , Australian Signals Directorate,

Australian Government, Canberra.

5. Guidelines for Media Sanitisation , National Institute of Standards and Technology (NIST)

ID

Classification/DLM

Issued

Authority

Master document location

Records management

Managed & maintained by

Author(s)

Reviewer

Compliance

Next review date

OCIO_G4.21

PUBLIC-I1-A1

February 2014

State Chief Information Security Officer

Q:\SecurityRiskAssurance\Policy Development Sub-program\Policy and

Standards\ISMF\v3.2\ISMFguidelines\ISMFguideline21(media handling).docx

File Folder: 2011/15123/01 - Document number: 8348773

Office of the Chief Information Officer

Christian Bertram

CEA, MSIT,

Enterprise Architect

Jason Caley

CISM, MACS (CP), IP3P, CRISC, CEA

, Principal Policy Adviser

Jason Caley

CISM, MACS (CP), IP3P, CRISC, CEA

, Principal Policy Adviser

Discretionary

February 2016

To attribute this material, cite the

Office of the Chief Information

Officer , Government of South

Australia, ISMF Guideline 21.

This work is licensed under a Creative Commons Attribution 3.0 Australia Licence

Copyright

© South Australian Government,

2014.

Disclaimer

Download