Virginia Commonwealth University Information Security Standard Scope: This standard is applicable to all VCU faculty, staff, students, contractors, business partners, and IT service providers. Approval Date: 6/3/2009: Approved by Senior Vice President for Finance and Administration and Provost Effective Date: July 1, 2009 Compliance Date: January 1, 2010 Authority: VCU Information Security Officer Review Frequency: Annually, or as needed Information Security Standard Date: June 3, 2009 Table of Contents 1. Introduction ............................................................................................................................. 3 1.1. Intent ............................................................................................................................... 3 1.2. Information Security Roles and Responsibilities ............................................................ 4 1.3. Information Security Program Compliance .................................................................... 8 1.4. Exceptions to Information Security Requirements ......................................................... 9 2. Risk Management ................................................................................................................. 10 2.1. Business Impact Analysis ............................................................................................. 10 2.2. IT System and Data Sensitivity Classification.............................................................. 11 2.3. Sensitive IT Systems Inventory and Definition ............................................................ 12 2.4. Risk Assessment ........................................................................................................... 12 2.5. IT Security Audits ......................................................................................................... 13 3. IT Contingency Planning ...................................................................................................... 13 3.1. Continuity of Operations Planning ............................................................................... 13 3.2. IT Disaster Recovery Planning ..................................................................................... 14 3.3. IT System and Data Backup and Restoration ............................................................... 15 4. IT Systems Security .............................................................................................................. 16 4.1. IT System Security Plans .............................................................................................. 16 4.2. IT System Hardening .................................................................................................... 17 4.3. IT Systems Interoperability Security ............................................................................ 17 4.4. Malicious Code Protection ............................................................................................ 18 4.5. IT Systems Development Life Cycle Security.............................................................. 20 5. Logical Access Control ......................................................................................................... 22 5.1. Account Management ................................................................................................... 22 5.2. Password Management ................................................................................................. 24 5.3. Remote Access .............................................................................................................. 25 6. Data Protection...................................................................................................................... 26 6.1. Data Storage Media Protection ..................................................................................... 26 6.2. Encryption ..................................................................................................................... 27 7. Physical Security................................................................................................................... 27 7.1. IT Systems .................................................................................................................... 28 7.2. Human, Natural, and Environmental Risks .................................................................. 28 7.3. Environmental Controls ................................................................................................ 28 7.4. Unauthorized Personnel ................................................................................................ 28 7.5. IT infrastructure Components ....................................................................................... 28 8. Personnel Security ................................................................................................................ 28 8.1. Access Determination and Control ............................................................................... 28 8.2. Information Security Awareness and Training ............................................................. 29 8.3. Acceptable Use ............................................................................................................. 30 8.4. Email Communication .................................................................................................. 31 9. Threat Management .............................................................................................................. 31 9.1. Threat Detection............................................................................................................ 32 9.2. IT Security Monitoring and Logging ............................................................................ 32 9.3. Information Security Incident Handling ....................................................................... 33 Page 2 of 49 Information Security Standard Date: June 3, 2009 9.4. Data Breach Notification .............................................................................................. 34 10. IT Asset Management ........................................................................................................... 36 10.1. IT Asset Control ............................................................................................................ 37 10.2. Software License Management ..................................................................................... 37 10.3. Configuration Management and Change Control ......................................................... 37 11. Appendix A - Glossary of Information Security Definitions................................................ 38 12. Appendix B - Glossary of Information Security Definitions ................................................ 47 13. Appendix C - Information Security Policy and Standard Exception Request Form ............ 48 1. Introduction 1.1. Intent The intent of the Information Security Standard is to establish the baseline for information security controls that include, but are not limited to, the requirements of applicable state and federal statutes, as well as ISO 27002. These controls will provide protection of Virginia Commonwealth University (VCU) information systems and data. This Standard defines the minimum acceptable level of information security for VCU, and VCU must implement an information security program that complies with this Standard, in order to provide adequate protection of VCU’s information systems and data, commensurate with sensitivity and risk. The VCU Information Security Program consists of the following components: Risk Management IT Contingency Planning IT Systems Security Logical Access Control Data Protection Facilities Security Personnel Security Threat Management IT Asset Management These components provide the organizational framework for this Standard. This Standard recognizes that VCU may procure IT equipment, systems and services covered by this Standard from third parties. In such instances, VCU remains accountable for maintaining compliance with this Standard and VCU must enforce Page 3 of 49 Information Security Standard Date: June 3, 2009 these compliance requirements through documented agreements with third party providers. 1.2. Information Security Roles and Responsibilities This section defines the key information security roles and responsibilities included in the VCU Information Security Program. Individuals may be assigned multiple roles as long as there is adequate separation of duties, there is adequate protection against fraud, and it does not lead to a conflict of interests. The roles are President, Chief Information Officer, Information Security Officer, Privacy Officer, Authoritative Unit Head, System Owner, Data Owner, System Administrator, Data Custodian, Information Technology Professional and Information System User. 1.2.1. President The President is ultimately responsible for the security of VCU’s information systems and data. The President’s security responsibilities include the following: 1.2.2. Designate an Information Security Officer (ISO) for VCU and identify that individual to appropriate state and federal agencies. Determine the optimal place of the information security function within the VCU hierarchy. Ensure the resources and environment to enable employees to carry out their responsibilities for securing information systems and data. Chief Information Officer The Chief Information Officer (CIO) has operational responsibilities for the University’s information security program. The CIO’s security responsibilities include the following: Oversee a VCU information security program that is sufficient to protect the agency’s information systems and that is documented and effectively communicated. Establish a program of information security safeguards. Ensure that information security awareness and training programs are available to students, faculty and staff. Approve requests for exceptions to VCU’s information security standards based on risk, costs and compensating controls. Page 4 of 49 Information Security Standard 1.2.3. Date: June 3, 2009 Information Security Officer (ISO) The ISO is responsible for developing and managing VCU’s information security program. The ISO’s duties are as follows: 1.2.4. Develop and manage a VCU information security program that meets or exceeds the requirements of VCU information security policies and standards in a manner commensurate with risk. Verify and validate that all VCU IT systems and data are classified for sensitivity. Develop and maintain an information security awareness and training program for VCU faculty, staff, students, contractors, business partners, and IT service providers. Implement and maintain the appropriate balance of protective, detective and corrective controls for VCU IT systems commensurate with data sensitivity, risk and systems criticality. Authoritative Unit Head An authoritative unit head is a dean or equivalent administrative officer (e.g. associate vice president/provost). The authoritative unit head has responsibility for the security of data, systems and technology under their direct management control. Authoritative unit heads may receive advice and input from the CIO and ISO regarding security issues but ultimately must manage their data and technology in accordance with these standards commensurate with risk and cost. 1.2.5. Privacy Officer VCU must have a specified Privacy Officer if required by law or regulation, such as the Health Insurance Portability and Accountability Act (HIPAA), and may choose to have one where not required. Otherwise these responsibilities are carried out by the ISO. The Privacy Officer provides guidance on: The requirements of state and federal Privacy laws. Disclosure of and access to sensitive data. Security and protection requirements in conjunction with IT systems when there is some overlap among sensitivity, disclosure, privacy, and security issues. Page 5 of 49 Information Security Standard 1.2.6. Date: June 3, 2009 System Owner The System Owner is the VCU manager responsible for operation and maintenance of a VCU IT system. With respect to information security, the System Owner’s responsibilities include the following: 1.2.7. Require that all IT system users complete required information security awareness and training activities prior to, or as soon as practicable after, receiving access to the system, and no less than annually, thereafter. Manage system risk and developing any additional information security policies and procedures required to protect the system in a manner commensurate with risk. Maintain compliance with VCU information security policies and standards in all IT system activities. Maintain compliance with requirements specified by Data Owners for the handling of data processed by the system. Designate a System Administrator for the system. Data Owner The Data Owner is the VCU manager responsible for the policy and practice decisions regarding data, and is responsible for the following: 1.2.8. Evaluate and classify sensitivity of the data. Define protection requirements for the data based on the sensitivity of the data, any legal or regulatory requirements, and business needs. Communicate data protection requirements to the System Owner. Define requirements for access to the data. System Administrator The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner, and/or Data Custodian. The System Administrator assists VCU management in the day-to-day administration of a VCU IT system, and implements security controls and other requirements of the VCU information security program on an IT system for which the System Administrator has been assigned responsibility. Page 6 of 49 Information Security Standard 1.2.9. Date: June 3, 2009 Data Custodian The Data Custodian is an individual or organization in physical or logical possession of data for Data Owners. The Data Custodian is responsible for the following: Protect the data in their possession from unauthorized access, alteration, destruction, or usage. Establish, monitor, and operate IT systems in a manner consistent with VCU information security policies and standards. Provide Data Owners with reports, when necessary and applicable. 1.2.10. Information Technology Professional Information technology professionals are employees in faculty or classified positions who have responsibility for managing or supporting data or information technology programs and activities in an academic or administrative unit. IT professionals are responsible for the following: Read, understand and comply with VCU information security standards and requirements. Ensure that data, systems and technology in their area complies with VCU information security standards and requirements. Interpret VCU information security standards and provide advice and guidance to end users in their area regarding appropriate information security practices. Report breaches of information security, actual or suspected, to the VCU Information Security Officer. 1.2.11. Information System User All users of VCU information systems, including faculty, staff, students, contractors, business partners, and IT service providers are responsible for the following: Read and comply with VCU information security program requirements. Report breaches of information security, actual or suspected, to the VCU Information Security Officer. Take reasonable and prudent steps to protect the security of IT systems and data to which they have access. Page 7 of 49 Information Security Standard 1.3. Date: June 3, 2009 Information Security Program Compliance In order to provide adequate protection of VCU’s information systems and data, compliance with information security policies, standards and procedures is critical. 1.3.1. Accountability All information system users are responsible for complying with VCU information security standards. Individuals and academic/administrative units will be held accountable for non-compliance with information security policies, standards, procedures and initiatives. The authoritative unit head has responsibility for the proper application of information security standards for information systems and data under their immediate management control. Information technology professionals are responsible for knowing and understanding information security standards and practice and how to apply them to the technology and data under their or their users’ authority. When appropriate and warranted, an academic/administrative unit may be required to pay fees, charges, fines and expenses incurred or resulting from or related to non-compliance for which the academic/administrative unit is deemed in whole or in part responsible. 1.3.2. Authority The ISO has the authority to perform or delegate the performance of risk assessments, audits, security scans and spot checks of all academic/administrative units, their IT resources, non-IT information resources and physical locations. The ISO has the authority to remove systems, suspend logical access, suspend physical access, monitor traffic, disable network service and take other action to eliminate threats to information resources and data or if there is failure to comply with requirements and requests. Unless there is threat of imminent exposure or loss of data or the disruption of critical services, the ISO will consult with the CIO and authoritative unit head prior to taking these actions. 1.3.3. Corrective Actions and Sanctions Appropriate sanctions will be imposed for non-compliance with information security policies, standards, procedures and initiatives. Sanctions will be commensurate with the actual and potential risk to information systems and data, the individual or academic/administrative unit’s role, the individual or academic/administrative unit’s history of non-compliance and the circumstances of the non-compliance. Page 8 of 49 Information Security Standard Date: June 3, 2009 Violations of Information Security policies, standards, procedures and initiatives may result in action up to and including termination of employment, services or relationship with VCU. Violations of local, state, federal or other laws and regulations will be reported to the appropriate, respective authorities. Corrective actions and sanctions available include, but are not limited to: 1.3.4. Requirement to bring individual or unit into compliance Mandating of corrective action Requirement to obtain appropriate training Temporary or permanent revocation of user accounts or logical access Temporary or permanent revocation of physical access Loss of access to data Confiscation of equipment Notification of supervisors and reporting to the Department of Assurance Services Personnel actions including counseling, written notices, and disciplinary actions including suspension, transfer or demotion, and termination Reporting Issues or Incidents Violations of information security policies, standards, procedures and initiatives should be reported to the ISO. The ISO, in consultation with the CIO and authoritative unit head, will develop a corrective action plan and proposed sanctions based on actual or potential damage or risk to VCU technology and data. The authoritative unit head is responsible for implementing the corrective action plan and sanctions. 1.4. Exceptions to Information Security Requirements Exceptions to this Standard require the approval of the Information Security Officer. For each exception, the requesting academic/administrative unit shall document: The business or technical need The scope and extent Mitigating safeguards Authoritative Unit Head approval Page 9 of 49 Information Security Standard Date: June 3, 2009 If the Information Security Officer denies a request for an exception to this Standard, the academic/administrative unit requesting the exception may appeal the denial to the VCU Chief Information Officer through the Information Security Officer. The form that academic/administrative units must use to document such exception requests is included as the Appendix to this document. 2. Risk Management Risk Management delineates the steps necessary to identify, analyze, prioritize, and mitigate risks that could compromise IT systems. This section defines requirements in the following areas: Business Impact Analysis IT System and Data Sensitivity Classification Sensitive IT System Inventory and Definition Risk Assessment IT Security Audits 2.1. Business Impact Analysis Business Impact Analysis (BIA) delineates the steps necessary for VCU to identify its business functions, identify VCU business functions that are essential to its mission, and identify the resources that are required to support these essential VCU business functions. VCU should create a single BIA which both meets the requirements of this Standard and the requirements specified by the Virginia Department of Emergency Management (VDEM) in VDEM’s Continuity of Operation Planning Manual. VCU shall: Page 10 of 49 Information Security Standard 2.2. Date: June 3, 2009 2.1.1. Require the participation of System Owners and Data Owners in the development of VCU’s BIA. 2.1.2. Identify VCU business functions and classify each function according to how essential it is based on the potential impact on VCU's mission if there was disruption or degradation of the function. 2.1.3. Identify dependent functions. Determine and document any additional functions on which each essential business function depends, classifying them as essential. 2.1.4. Determine and document the required Recovery Time Objectives (RTO) for each essential business function, based on VCU goals and objectives. 2.1.5. Determine and document the Recovery Point Objectives (RPO) for each essential business function. 2.1.6. Identify the IT resources that support each essential business function. 2.1.7. Use the IT information documented in the BIA report as a primary input to IT System and Data Sensitivity Classification (Section 2.2), Risk Assessment (Section 2.4), and IT Contingency Planning (Section 3). 2.1.8. Conduct periodic review and revision of VCU’s BIA, as needed, but at least once every three years. IT System and Data Sensitivity Classification IT System and Data Sensitivity Classification requirements identify the steps necessary to classify IT systems and data according to their sensitivity with respect to the following three criteria: Confidentiality, which addresses sensitivity to unauthorized disclosure Integrity, which addresses sensitivity to unauthorized modification Availability, which addresses sensitivity to outages. Sensitive Data is any data of which the compromise with respect to confidentiality, integrity, and/or availability could have a material adverse effect on VCU interests, the conduct of VCU programs, or the privacy to which individuals are entitled. Data sensitivity is directly proportional to the materiality of a compromise of the data with respect to these criteria. VCU must classify each IT system by sensitivity according to the most sensitive data that the IT system stores, processes, or transmits. Page 11 of 49 Information Security Standard 2.3. Date: June 3, 2009 2.2.1. The System Owner shall identify the type(s) of data handled by each VCU IT system for which they have been designated System Owner. 2.2.2. The System Owner, in consultation with Data Owners, shall determine whether each type of data is also subject to other regulatory requirements. 2.2.3. The System Owner shall determine the level of potential damages to VCU of a compromise of confidentiality, integrity or availability of each type of data handled by the IT system, and classify the sensitivity of the data accordingly. 2.2.4. The System Owner shall classify the IT system as sensitive if any type of data handled by the IT system has a sensitivity of high on any of the criteria of confidentiality, integrity, or availability. 2.2.5. The System Owner shall review the IT system and data classifications with the Authoritative Unit Head and obtain Authoritative Unit Head approval of these classifications. 2.2.6. The ISO shall verify and validate that all VCU IT systems and data have been classified for sensitivity. 2.2.7. The ISO shall communicate approved IT system and data classifications to System Owners, Data Owners, and end-users. 2.2.8. The ISO shall require that VCU prohibit posting any data classified as sensitive with respect to confidentiality on a publicly accessible medium. 2.2.9. The ISO shall use the information documented in the sensitivity classification as a primary input to the Risk Assessment process (Section 2.4). Sensitive IT Systems Inventory and Definition Sensitive IT System Inventory and Definition requirements identify the steps in listing and marking the boundaries of sensitive IT systems in order to provide cost-effective, risk-based security protection for IT systems and for VCU as a whole. VCU shall: 2.4. 2.3.1. Document each sensitive IT system owned by VCU, including its ownership and boundaries, and update the documentation as changes occur. 2.3.2. Assign a System Owner, Data Owner(s), and System Administrator(s) for each VCU-owned sensitive IT system. 2.3.3. Maintain updated network diagrams. Risk Assessment Risk Assessment requirements delineate the steps VCU must take for each IT system classified as sensitive to: Identify potential threats to an IT system and the environment in which it operates Page 12 of 49 Information Security Standard Date: June 3, 2009 Determine the likelihood that threats will materialize Identify and evaluate vulnerabilities Determine the loss impact if one or more vulnerabilities are exploited by a potential threat For each IT system classified as sensitive, VCU shall: 2.5. 2.4.1. Conduct a formal Risk Assessment of the IT system, as needed, but not less than once every three years. 2.4.2. Conduct an annual self-assessment to determine the continued validity of the formal Risk Assessment. 2.4.3. Prepare a report of each Risk Assessment that includes, at a minimum, identification of all vulnerabilities discovered during the assessment, and an executive summary, including major findings and risk mitigation recommendations. IT Security Audits IT Security Audit requirements define the steps necessary to assess whether IT security controls implemented to mitigate risks are adequate and effective. For each IT system classified as sensitive, VCU shall: 2.5.1. Require that the IT systems undergo an IT Security Audit as required by and in accordance with the current version of the Commonwealth of Virginia IT Security Audit Standard. 2.5.2. Assign an individual to be responsible for managing IT Security Audits. 3. IT Contingency Planning IT Contingency Planning delineates the steps necessary to plan for and execute recovery and restoration of IT systems and data if an event occurs that renders the IT systems and/or data unavailable. Requirements are defined in the following three areas: Continuity of Operations Planning Disaster Recovery Planning IT System Backup and Restoration 3.1. Continuity of Operations Planning COV Continuity of Operations Planning requirements are defined by VDEM. This section addresses only the Continuity of Operations Planning requirements for IT systems and data. VCU should consult the Continuity of Operations Planning Manual Page 13 of 49 Information Security Standard Date: June 3, 2009 published by VDEM for non-IT related requirements that address all essential business functions. VCU’s overall Continuity of Operations Plan (COOP) should include the manual processing procedures for critical functions that users can follow until the agency restores operations, as appropriate. These Continuity of Operations Planning requirements identify the steps necessary to provide continuity for essential VCU IT systems and data through the development, implementation, exercise, and maintenance of the IT component of Continuity of Operations Plans. VCU shall: 3.2. 3.1.1. Designate an employee to collaborate with the VCU Continuity of Operations Plan (COOP) coordinator as the focal point for IT aspects of COOP and related Disaster Recovery planning activities. 3.1.2. Based on BIA and RA results, develop VCU COOP IT-related documentation which identifies: Essential business functions that require restoration and the Recovery Time Objective (RTO) for each Recovery requirements for IT systems and data needed to support the essential business functions Personnel contact information and incident notification procedures 3.1.3. Require an annual exercise (or more often as necessary) of IT COOP components to assess their adequacy and effectiveness. 3.1.4. Require review and revision of IT COOP components following the exercise (and at other times as necessary). IT Disaster Recovery Planning IT Disaster Recovery Planning is the component of Continuity of Operations Planning that identifies the steps necessary to provide for restoring essential business functions on a schedule that support agency mission requirements. These steps lead to the creation of an IT Disaster Recovery Plan (DRP). VCU shall: Page 14 of 49 Information Security Standard 3.3. Date: June 3, 2009 3.2.1. Based on the COOP, develop and maintain an IT DRP, which supports the restoration of essential business functions. 3.2.2. Require approval of the IT DRP by the Senior VP of Finance and Administration. 3.2.3. Require periodic review, reassessment, testing, and revision of the IT DRP to reflect changes in essential business functions, services, IT system hardware and software, and personnel. 3.2.4. Establish communication methods to support IT system users’ local and remote access to IT systems, as necessary. IT System and Data Backup and Restoration IT System and Data Backup and Restoration requirements identify the steps necessary to protect the availability and integrity of VCU data documented in backup and restoration plans. For every IT system identified as sensitive, VCU shall implement backup and restoration plans to support restoration of systems and data in accordance with VCU requirements. At a minimum, these plans shall address the following: Page 15 of 49 Information Security Standard Date: June 3, 2009 3.3.1. Ensure secure off-site storage for backup media. 3.3.2. Require storage of off-site backup media in a location that is geographically/separate and distinct from the primary location. 3.3.3. Restrict performance of backups to authorized personnel. 3.3.4. Require review of backup logs after the completion of each backup job to verify successful completion. 3.3.5. Require a system’s backup schedules be approved by its System Owner. 3.3.6. Require a system’s emergency backup and operations restoration plans be approved by the System Owner. 3.3.7. Require protection of any backup media that is physically or logically sent off-site or shipped by the United States Postal Service or any commercial carrier. 3.3.8. Require authorization and logging of deposits and withdrawals of all media that is stored off-site. 3.3.9. Require retention of the data handled by an IT system in accordance with the VCU’s records retention policy. 3.3.10. Ensure management of electronic information in such a way that it can be produced in a timely and complete manner when necessary, such as during a legal discovery proceeding. 4. IT Systems Security IT Systems Security requirements delineate steps to protect IT systems in the following five areas: IT System Security Plans IT System Hardening IT Systems Interoperability Security Malicious Code Protection IT Systems Development Life Cycle 4.1. IT System Security Plans IT System Security Plans document the security controls required to demonstrate adequate protection of IT systems against IT security risks. Each System Owner of a sensitive IT system shall: Page 16 of 49 Information Security Standard 4.1.1. 4.2. Date: June 3, 2009 Document an IT System Security Plan for the IT system based on the results of the risk assessment. This documentation shall: Include a description of all IT existing and planned IT security controls for the IT system, including a schedule for implementing planned controls. Include a description of how these controls provide adequate mitigation of risks to which the IT system is subject. 4.1.2. Submit the IT System Security Plan to the ISO for approval. 4.1.3. Plan and document additional IT security controls for the IT system if the ISO disapproves the IT System Security Plan, and resubmit the IT System Security Plan to the ISO for approval. 4.1.4. Update the IT System Security Plan every three years, or more often if necessary, and resubmit the IT System Security Plan to the ISO for approval. IT System Hardening IT System Hardening requirements delineate technical security controls to protect IT systems against IT security vulnerabilities. VCU shall: 4.3. 4.2.1. Identify, document, and apply appropriate baseline security configurations to VCU IT systems, regardless of their sensitivity. 4.2.2. Identify, document, and apply more restrictive security configurations for sensitive VCU IT systems, as necessary. 4.2.3. Maintain records that document the application of baseline security configurations. 4.2.4. Review and revise all security configuration standards annually, or more frequently, as needed. 4.2.5. Reapply all security configurations to VCU-owned IT systems, as appropriate, when the IT system undergoes a material change, such as an operating system upgrade. 4.2.6. Require periodic vulnerability scanning of IT systems in a manner commensurate with sensitivity and risk, to verify whether security configurations are in place and if they are functioning effectively. 4.2.7. Modify individual IT system configurations or baseline security configuration standards, as appropriate, to improve their effectiveness based on the results of vulnerability scanning. IT Systems Interoperability Security Page 17 of 49 Information Security Standard Date: June 3, 2009 IT System Interoperability Security requirements identify steps to protect data shared with other IT systems. For every sensitive VCU-owned IT system, VCU shall require: 4.3.1. 4.4. The System Owner, in consultation with the Data Owner, document IT systems with which data is shared. This documentation shall include: The types of shared data The direction(s) of data flow Contact information for the organization that owns the IT system with which data is shared, including the System Owner and the System Administrator 4.3.2. The System Owners of the IT systems which share data develop a written agreement that delineates IT security requirements for each interconnected IT system and for each type of data shared. 4.3.3. The System Owners of the IT systems that share data inform one another regarding other IT systems with which their IT systems interconnect or share data, and inform one another prior to establishing any additional interconnections or data sharing. 4.3.4. The written agreement specifies if and how the shared data will be stored on each IT system. 4.3.5. The written agreement specifies that System Owners of the IT systems that share data acknowledge and agree to abide with any legal requirements (such as HIPAA, FERPA, GLBA, etc.) regarding handling, protection, and disclosure of the shared data. 4.3.6. The written agreement maintains each Data Owner’s authority to approve access to the shared data. 4.3.7. The System Owners approve and enforce the agreement. Malicious Code Protection VCU shall: Page 18 of 49 Information Security Standard Date: June 3, 2009 4.4.1. Prohibit all IT system users from intentionally developing or experimenting with malicious programs (including, but not limited to viruses, worms, Trojans, spyware and keystroke loggers), with the exception of VCU information security staff, VCU Information Systems faculty, VCU Information Systems students, VCU Computer Science faculty, and VCU Computer Science faculty students. 4.4.2. Prohibit all IT system users from knowingly propagating malicious programs. 4.4.3. Provide malicious program detection, protection, eradication, logging, and reporting capabilities. 4.4.4. Provide malicious code protection mechanisms on VCU-owned IT systems where feasible for all IT system users. 4.4.5. Require malicious program protection that: Eliminates or quarantines malicious programs that it detects Provides an alert notification Automatically and periodically runs scans on memory and storage devices Automatically scans all files retrieved through a network connection, modem connection, or from an input storage device Allows only authorized personnel to modify program settings Maintains a log of protection activities Page 19 of 49 Information Security Standard Date: June 3, 2009 4.4.6. Provide the ability to eliminate or quarantine malicious programs in email messages and file attachments as they attempt to enter VCU’s email system. 4.4.7. Provide the ability for automatic download of definition files for malicious code protection programs whenever new files become available, and propagate the new files to all devices protected by the malicious code protection program. 4.4.8. Require all forms of malicious code protection to start automatically upon system boot. 4.4.9. Provide network designs that allow malicious code to be detected and removed or quarantined. 4.4.10. Provide procedures that instruct administrators and IT system users on how to respond to malicious program attacks, including shutdown, restoration, notification, and reporting requirements. 4.4.11. Require use of only new media or sanitized media for making copies of software for distribution. 4.4.12. Prohibit the use of common use workstations and desktops (e.g., training rooms) to create distribution media. 4.4.13. Establish Operating System (OS) update schedules commensurate with sensitivity and risk. 4.5. IT Systems Development Life Cycle Security IT Systems Development Life Cycle Security requirements document the securityrelated activities that must occur in each phase of the development life cycle for VCUowned IT application systems. 4.5.1. Incorporate IT security requirements in each phase of the life cycle, as well as for each substantial modification after initial implementation. 4.5.2. Project Initiation VCU shall: Perform an initial risk analysis based on system requirements and business objectives to provide high-level security guidelines for the system developers, including classification of the type and sensitivity of data that will be stored, processed or transmitted. Obtain data owner approval for collection and maintenance of sensitive data before incorporating such collection and maintenance in IT system requirements. Develop an initial IT System Security Plan (Section 4.1) that documents the existing and planned IT security controls that will provide adequate risk mitigation. Page 20 of 49 Information Security Standard 4.5.3. 4.5.4. Date: June 3, 2009 If the data classification identifies the system as sensitive, conduct a risk assessment prior to beginning development. Project Definition and Development Identify, develop, and document IT security requirements for the IT system during the Project Definition and Development phase. Adhere to the following programming practices, commensurate with sensitivity and risk: Input Validation – Validate input from all sources, testing for both expected and unexpected input and using whitelist input validation where practical. Default Deny – Access control should be based on specific permission rather than exclusion. Least Privilege – All processes should be performed with the least set of privileges required to complete the process. Quality Assurance – Penetration testing, fuzz testing or source code auditing should be used to identify and reduce software vulnerabilities. Verify that the IT system development process designs, develops, and implements IT security controls (including authentication, user access, logging and encryption) that meet the IT security requirements in the design specifications. Update the initial IT System Security Plan to document the IT security controls included in the design of the IT system to provide adequate protection against IT security risks. Implementation Host applications on servers that are compliant with the VCU requirements for IT system hardening (Section 4.2). Develop and execute IT security evaluation procedures to validate and verify that the IT security controls are working properly and are effective. Document results. Conduct a risk assessment (Section 2.4) to assess the risk level of the IT application system as implemented. Update the IT System Security Plan to document the IT security controls included in the IT system as implemented to provide adequate protection against IT security risks, and comply with the other requirements of Section 4.1. Applications classified as sensitive shall have vulnerability assessments performed on the applications and supporting server infrastructure at least annually and when significant changes have been made to the applications or to supporting server infrastructure. Page 21 of 49 Information Security Standard 4.5.5. Date: June 3, 2009 Disposition Require retention of the data handled by an IT system in accordance with the VCU’s records retention policy prior to disposing of the IT system. Verify the disposal of hardware and software in accordance with the current version of the Commonwealth of Virginia Removal of Commonwealth Data from Surplus Computer Hard Drives and Electronic Media Standard. 5. Logical Access Control Logical Access Control requirements delineate the steps necessary to protect IT systems and data by verifying and validating that users are who they say they are and that they are permitted to use the IT systems and data they are attempting to access. Users are accountable for any activity on the system performed with the use of their account. Requirements are defined in the following three areas: Account Management Password Management Remote Access 5.1. Account Management Account Management requirements identify those steps necessary to formalize the process of requesting, granting, administering, and terminating accounts. VCU should apply these Account Management practices to all accounts on IT systems, including accounts used by vendors and third parties. The requirements below distinguish between internal and customer-facing IT systems. Internal IT systems are designed and intended for use only by VCU employees, contractors, and business partners; customer-facing IT systems are designed and intended for use by VCU customers and by members of the public. VCU employees, contractors, and business partners may also use customer-facing IT systems. VCU shall document formal account management practices for requesting, granting, administering, and terminating accounts. At a minimum, these practices shall include the following components: 5.1.1. For all internal and customer-facing systems: Grant IT system users’ access to IT systems and data based on the principle of least privilege. Define authentication and authorization requirements, based on sensitivity and risk. Page 22 of 49 Information Security Standard 5.1.2. Date: June 3, 2009 Establish policies and procedures for approving and terminating authorization to IT systems, commensurate with sensitivity and risk. Require that the System Owner determine authorization requirements for remote access that meet the protection requirements defined by the Data Owner(s). Establish policies and procedures for approvals of emergency or temporary access to all sensitive IT systems. Review all IT system users’ accounts to assess the continued need for the accounts, at a frequency commensurate with sensitivity and risk. Notify the System Administrator when IT system user accounts are no longer required, or when an IT system user’s access level requirements change. Prohibit the use of guest and shared accounts on sensitive IT systems, where practical, or implement mechanisms to uniquely identify individuals associated with all user sessions. Disable an account with access to sensitive systems automatically if it is not used for a predefined period. Disable unneeded accounts and retain such accounts in a disabled state in accordance with VCU’s records retention policy. Configure applications to clear cached data and temporary files upon exit of the application or logoff of the system as applicable. Associate access levels with group membership, where practicable, and require that every IT system user account be a member of at least one user group. Require that the System Owner and the System Administrator investigate any unusual IT system access activities and that the System Owner approve changes to access level authorizations. Require that System Administrators have both an administrative account and at least one user account and require that administrators use their administrative accounts only when performing tasks that require administrative privileges. Limit Local Administrator rights, or the equivalent on non-Microsoft Windows-based IT systems, by requiring that such rights granted by the Authoritative Unit Head only to authorized individuals. Require that at least two individuals have administrative accounts to each IT system, to provide continuity of operations. For internal systems: Require a documented request from the user or user’s supervisor to establish an account on any internal IT system. Page 23 of 49 Information Security Standard 5.1.3. 5.2. Date: June 3, 2009 For a position in which a background check is required, complete any VCU-required background check before establishing accounts, or as soon as practicable thereafter. Require confirmation of the account request and approval by the IT system user’s supervisor and approval by the System Owner to establish accounts for sensitive IT systems. Require secure delivery of access credentials to the user based on information already on file. Notify supervisors, Human Resources, and the System Administrator in a timely manner about termination, transfer of employees and contractors with access rights to internal IT systems and data. For customer-facing systems: Require secure delivery of access credentials to users of all customerfacing IT systems. Require confirmation of the user’s request for access credentials based on information already on file prior to delivery of the access credentials to users of sensitive, customer-facing IT systems. Password Management Password Management requirements specify the means for password use to protect IT systems and data. VCU shall document formal password management practices. At a minimum, these practices shall include the following components: 5.2.1. Prohibit sharing of passwords on all accounts. 5.2.2. Require a unique password on all accounts on sensitive IT systems. 5.2.3. Require passwords on mobile devices issued by VCU, such as PDAs and smart phones. For mobile phones, use a PIN of at least 4 digits. 5.2.4. Require password complexity consisting of the following password requirements: The password must be at least 7 characters long. The password must contain at least one uppercase letter, one lowercase letter and one numeric character. Page 24 of 49 Information Security Standard Date: June 3, 2009 5.2.5. Require that default passwords be changed immediately after installation. 5.2.6. Require IT system users to maintain exclusive control and use of their passwords, to protect them from inadvertent disclosure to others. 5.2.7. Configure sensitive IT systems to allow users to change their password at will. 5.2.8. Require users of sensitive IT systems to include network systems to change their passwords after a period of no greater than 365 days. 5.2.9. Require that IT system users immediately change their passwords and notify the ISO if they suspect their passwords have been compromised. 5.2.10. Maintain the last 5 passwords used in the password history files to prevent the reuse of the same passwords, commensurate with sensitivity and risk. 5.2.11. Provide a unique initial password for each new user of sensitive IT systems, deliver the initial password to the IT system user in a secure and confidential manner, and require that the IT system user change the initial password upon the first login attempt. 5.2.12. Require that forgotten initial passwords be replaced rather than reissued. 5.2.13. Prohibit group account IDs and shared passwords on sensitive IT systems, where practical, or implement mechanisms to uniquely identify individuals associated with all user sessions. 5.2.14. Prohibit the transmission and storage of passwords in clear text. 5.2.15. Limit access to files containing passwords to the IT system and its System Administrators. 5.2.16. Suppress the display of passwords on the screen as they are entered, where practical. 5.2.17. Implement a device screen saver lockout on VCU-owned devices after a maximum of 30 minutes of inactivity. 5.2.18. Determine and implement requirements for hardware passwords based on sensitivity and risk. 5.2.19. Document and store hardware passwords securely. 5.2.20. Implement procedures to handle lost or compromised passwords and/or tokens. 5.2.21. Require adherence to the VCU Password Standard. 5.3. Remote Access Remote Access requirements identify the steps necessary to provide for the secure use of remote access within the VCU enterprise network. Commensurate with sensitivity and risk, VCU shall: Page 25 of 49 Information Security Standard Date: June 3, 2009 5.3.1. Protect the security of all remote access to VCU’s sensitive IT systems and data by means of encryption, in a manner consistent with Section 6.2. Encryption is required for session initiation and all transmission of sensitive data. 5.3.2. Protect the security of remote file transfer of sensitive data to and from VCU IT systems by means of encryption, in a manner consistent with Section 6.2. 5.3.3. Document requirements for use of remote access and for remote access to sensitive data, based on VCU policies, standards, guidelines, and procedures. 6. Data Protection Data Protection requirements delineate the steps necessary to protect VCU data from improper or unauthorized disclosure. Requirements are defined in the following two areas: Data Storage Media Protection Encryption 6.1. Data Storage Media Protection Data Storage Media Protection requirements identify the steps necessary for the appropriate handling of stored data to protect the data from compromise. VCU shall document Data Storage Media protection practices. At a minimum, these practices must include the following components: 6.1.1. Define protection of stored sensitive data as the responsibility of the Data Owner. 6.1.2. Prohibit the storage of sensitive data on any non-network storage device or media, except for backup media, unless the data is encrypted and there is a written exception approved by the ISO that includes the following elements: The business or technical justification The scope, including quantification and duration (not to exceed one year) A description of all associated risks Identification of controls to mitigate the risks, one of which must be encryption Identification of any unmitigated risks Page 26 of 49 Information Security Standard 6.2. Date: June 3, 2009 6.1.3. Require logical and physical protection for all data storage media containing sensitive data, commensurate with sensitivity and risk. 6.1.4. Such media include, but are not limited to, USB drives, cell phones, personal digital assistants, desktops, laptops, and digital music players owned by employees, contractors, and students. 6.1.5. Prohibit the forwarding of unencrypted emails containing sensitive information to external accounts. 6.1.6. Restrict the pickup, receipt, transfer, and delivery of all data storage media containing sensitive data to authorized personnel. 6.1.7. Procedures must be implemented and documented to safeguard handling of all backup media containing sensitive data. Encryption of backup media shall be considered when the data is Personal Health Information (PHI), Personally Identifiable Information (PII), or Critical Infrastructure Information/Sensitive Security Information (CII/SII). Where encryption is not a viable option, mitigating controls and procedures must be implemented and documented. 6.1.8. Implement processes to sanitize data storage media prior to disposal or reuse. Encryption Encryption requirements provide a framework for selecting and implementing encryption controls to protect sensitive data. See Section 9.4 for notification requirements regarding a breach of unencrypted sensitive data. Commensurate with sensitivity and risk, VCU shall: 6.2.1. Define and document VCU practices for selecting and deploying encryption technologies and for the encryption of data. 6.2.2. Document encryption processes before implementing encryption. These processes must include the following components: 6.2.3. Instructions in VCU’s Information Security Incident Response Plan on how to respond when keys are compromised Requirements to generate all encryption keys through an approved encryption package and securely store the keys in the event of key loss due to unexpected circumstances Require encryption during transmission of data that is sensitive relative to confidentiality and integrity. 7. Physical Security Physical Security requirements identify the steps necessary to safeguard the physical facilities that house IT equipment, systems, services, and personnel. Page 27 of 49 Information Security Standard Date: June 3, 2009 Commensurate with sensitivity and risk, VCU shall document Physical Security practices. These practices must include the following components, at a minimum: 7.1. IT Systems Safeguard IT systems and data residing in static facilities (such as buildings), mobile facilities (such as computers mounted in vehicles), and portable facilities (such as mobile command centers). 7.2. Human, Natural, and Environmental Risks Design safeguards to protect against human, natural, and environmental risks. 7.3. Environmental Controls Require appropriate environmental controls such as electric power, heating, fire suppression, ventilation, air-conditioning and air purification, as required by the IT systems and data. 7.4. Unauthorized Personnel Protect against physical access by unauthorized personnel. 7.5. IT infrastructure Components Control physical access to essential computer hardware, wiring, displays, and networks by the principle of least privilege. 8. Personnel Security Personnel Security requirements delineate the steps necessary to restrict access to IT systems and data to those individuals who require such access as part of their job duties. Requirements are defined in the following four areas: Access Determination and Control Security Awareness and Training Acceptable Use Email Communications 8.1. Access Determination and Control Access Determination and Control requirements identify the steps necessary to restrict access to IT systems and data to authorized individuals. VCU shall document access determination and control practices for all sensitive agency IT systems and all third-party IT systems with which sensitive agency IT Page 28 of 49 Information Security Standard Date: June 3, 2009 systems interconnect. At a minimum, these practices shall include the following components: 8.2. 8.1.1. Perform background investigations of all internal IT System users commensurate with risks associated with access to sensitive IT systems or data as directed by VCU Human Resources. Existing users may be grandfathered under the policy and may not be required to have background investigations. 8.1.2. Require non-disclosure and security agreements for access to IT systems and data, based on sensitivity and risk. 8.1.3. Remove physical and logical access rights upon personnel transfer or termination, or when requirements for access no longer exist, as required in Section 5.1 and Section 7. 8.1.4. Establish termination and transfer practices that require return of VCU logical and physical assets that provide access to sensitive IT systems and data and the facilities that house them. 8.1.5. Disable physical and logical access rights upon suspension of personnel for greater than 1 day for disciplinary purposes, at request of personnel's supervisor. 8.1.6. Establish separation of duties in order to protect sensitive IT systems and data, or establish compensating controls when constraints or limitations of VCU prohibit a complete separation of duties, as directed by VCU Controller’s Office. 8.1.7. Explicitly grant physical and logical access to sensitive IT systems and data and the facilities that house them based on the principle of least privilege. Information Security Awareness and Training Information Security Awareness and Training requirements identify the steps necessary to provide system owners, system administrators, and users of systems and data with awareness of information security requirements and of their responsibilities to protect information systems and data. VCU shall: Page 29 of 49 Information Security Standard 8.2.1. Designate an individual who is responsible for all aspects of VCU’s information security awareness and training program including development, implementation, testing, training, monitoring attendance, and periodic updates. 8.2.2. Include any VCU-specific information security training requirements in the VCU information security awareness and training program. 8.2.3. Require that all IT system users, including employees and contractors, receive information security awareness training annually, or more often as necessary. 8.2.4. Provide additional role-based information security training commensurate with the level of expertise required for those employees, contractors, vendors, business partners, and third parties who manage, administer, operate, and design IT systems or have specific information security duties, as practicable and necessary. Include System Owners, Data Owners, System Administrators, IT Disaster Recovery Team members, and Information Security Incident Response Team members. 8.2.5. Implement processes to monitor and track completion of information security training. 8.2.6. Require information security training before (or as soon as practicable after) IT system users receive access rights to VCU’s IT systems, and in order to maintain these access rights. 8.2.7. Develop an information security training program so that each IT system user is aware of and understands the following concepts: 8.2.8. 8.3. Date: June 3, 2009 VCU's policy for protecting IT systems and data, with a particular emphasis on sensitive IT systems and data Prevention and detection of IT security incidents, including those caused by malicious code Proper disposal of data storage media Access controls, including creating and changing passwords and the need to keep them confidential VCU acceptable use policies VCU Remote Access policies Intellectual property rights, including software licensing and copyright issues Require documentation of IT system users’ acceptance of the VCU’s information security policies after receiving information security training. Acceptable Use Acceptable Use requirements identify the steps necessary to define acceptable and permitted use of IT systems. Page 30 of 49 Information Security Standard Date: June 3, 2009 VCU shall: 8.4. 8.3.1. Document a VCU acceptable use policy that at a minimum adheres to Virginia Department of Human Resource Management Policy 1.75 – Use of Internet and Electronic Communication Systems. Require documentation of IT system users’ acceptance of the VCU's acceptable use policy before, or as soon as practicable after, gaining access to VCU IT systems. VCU’s acceptable use policy is accessible at http://www.ts.vcu.edu/policies/computeruse.html. 8.3.2. Inform IT system users that VCU reserves the right (with or without cause) to monitor, access, and disclose all data created, sent, received, processed, or stored on VCU systems. 8.3.3. Limit Local Administrator rights, or the equivalent on non-Microsoft Windows-based IT systems, by requiring that such rights granted by the Authoritative Unit Head only to authorized individuals, as stated in Section 5.1.1, so as to prevent users from: Installing or using proprietary encryption hardware/software on VCUowned systems Tampering with security controls configured on their workstations Installing personal software on a VCU-owned system Adding hardware to, removing hardware from, or modifying hardware on a VCU system 8.3.4. Prohibit the use of copyrighted and licensed materials on VCU systems unless such usage complies with applicable intellectual property and fair use laws and the VCU Intellectual Properties Policy. 8.3.5. Prohibit the transmission of unencrypted sensitive data over the Internet. Either the data file or the data stream must be encrypted. Email Communication Email shall not be used to send sensitive data unless there is encryption. As stated in Section 6.2.3 of this Standard, encryption is required for the transmission of data that is sensitive relative to confidentiality and integrity. The ISO should consider and plan for the issue of agency email being intercepted, incorrectly addressed, or infected with a virus. An email disclaimer is a set of statements that are either pre-pended or appended to emails. These statements are frequently used to create awareness of how to treat the data in the email. An email disclaimer is not a substitute for judgment on what content to put into an email. 9. Threat Management Page 31 of 49 Information Security Standard Date: June 3, 2009 Threat Management delineates the steps necessary to protect IT systems and data by preparing for and responding to IT security incidents. Requirements are defined in the following four areas: Threat Detection IT Security Monitoring and Logging Information Security Incident Handling Data Breach Notification 9.1. Threat Detection Threat Detection requirements identify the practices for implementing intrusion detection and prevention. VCU shall document threat detection practices that include the following components, at a minimum: 9.1.1. Designate an individual responsible for VCU’s threat detection program, including planning, development, acquisition, implementation, testing, training, and maintenance. 9.2. 9.1.2. Conduct Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) log reviews to detect new attack patterns as quickly as practicable. 9.1.3. Develop and implement required mitigation measures based on the results of IDS and IPS log reviews. 9.1.4. Maintain regular communication with security research and coordination organizations, such as US CERT, to obtain information about new attack types, vulnerabilities, and mitigation measures. IT Security Monitoring and Logging IT Security Monitoring and Logging requirements identify the steps necessary to monitor and record IT system activity. Commensurate with sensitivity and risk, VCU shall, or shall require that its service provider, document IT security monitoring and logging practices that include the following components, at a minimum: Page 32 of 49 Information Security Standard 9.3. Date: June 3, 2009 9.2.1. Designate individuals responsible for the development and implementation of IT security logging capabilities, as well as detailed procedures for reviewing and administering the logs. 9.2.2. Commensurate with sensitivity and risk, enable logging on IT systems as appropriate. 9.2.3. Monitor IT system event logs in real time, correlate information with other automated tools, identifying suspicious activities, and provide alert notifications. 9.2.4. Document standards that specify the type of actions an IT system should take when a suspicious or apparent malicious activity is taking place. 9.2.5. Prohibit the use of keystroke logging, except when required for security investigations and approved in writing by the ISO. Information Security Incident Handling Information Security Incident Handling requirements identify the steps necessary to respond to suspected or known breaches to information security safeguards. VCU shall document information security incident handling practices that include the following components, at a minimum: Page 33 of 49 Information Security Standard 9.4. Date: June 3, 2009 9.3.1. Designate an Information Security Incident Response Team that includes personnel with appropriate expertise for responding to cyber attacks. 9.3.2. Identify controls to deter and defend against attacks to best minimize loss or theft of information and disruption of services. 9.3.3. Implement proactive measures based on cyber attacks to defend against new forms of attacks. 9.3.4. Establish information security incident categorization and prioritization based on the immediate and potential adverse effect of the information security incident and the sensitivity of affected IT systems and data. 9.3.5. Identify immediate mitigation procedures, including specific instructions, based on information security incident categorization level, on whether or not to shut down or disconnect affected IT systems. 9.3.6. Establish a process for reporting information security incidents to the Office of Attorney General in accordance with §18.2-186.6 of the Code of Virginia if it involves unencrypted or unredacted personal information that was or is reasonably believed to have been accessed and acquired by an unauthorized person and causes or is reasonably believed to have caused or have the potential to cause identity theft or another fraud to any resident of Virginia. 9.3.7. Establish requirements for internal VCU information security incident recording and reporting requirements, including a template for the incident report. 9.3.8. Establish procedures for information security incident investigation, preservation of evidence, and forensic analysis. 9.3.9. Report information security incidents only through channels that have not been compromised. Data Breach Notification To specify the notification requirements for VCU by identifying the triggering factors and necessary responses to unauthorized release of unencrypted sensitive information. VCU shall: 9.4.1. Identify all VCU systems, processes, and logical and physical data storage locations (whether held by the agency or a third party) that contain Personal Information which means the first name or first initial and last name in combination with and linked to any one or more of the following data elements, when the data elements are neither encrypted nor redacted: Social Security number Drivers license number or state identification card number issued in lieu of a driver’s license number Page 34 of 49 Information Security Standard Date: June 3, 2009 Financial account number, or credit card or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial accounts Other personal identifying information. “Redact” means alteration or truncation of data such that no more than the following are accessible as part of the information: Five digits of a Social Security number or The last four digits of a driver’s license number, state identification card number, or account number 9.4.2. Include provisions in any third party contracts requiring that the third party and third party subcontractors provide immediate notification to VCU of suspected breaches and report findings. 9.4.3. Provide appropriate notice to affected individuals upon the unauthorized release of unencrypted and/or un-redacted Personal Information by any mechanism, including, but not limited to: Theft or loss of digital media Theft or loss of physical hardcopy Security compromise of any system An individual or entity shall disclose the breach of the security of the system if encrypted information is accessed and acquired in an unencrypted form, or if the security breach involves a person with access to the encryption key. If a data custodian is the entity involved in the data breach they must alert the data owner so that the data owner can notify the affected individuals. VCU shall provide this notice without undue delay as soon as verification of the unauthorized release is confirmed, except as delineated in Section 9.4.8. 9.4.4. In the case of a computer found to be infected with malware capable of exposing data to unauthorized access and which is reasonably believed to have led to or have potentially led to the unauthorized access and acquisition of personal information, individuals that may have had their information exposed must be alerted in accordance with data breach rules. 9.4.5. Provide notification that consists of: A general description of what occurred and when The type of personal information that was involved What actions have been taken to protect the individual’s personal information from further unauthorized access Page 35 of 49 Information Security Standard 9.4.6. Date: June 3, 2009 A telephone number that the person may call for further information and assistance, if one exists What actions VCU recommends that the individual take, to include monitoring their credit reports and reviewing their account statements Provide this notification by one or more of the following methodologies, listed in order of preference: Written notice to the last known postal address in the records of the individual or entity Telephone notice Electronic notice Substitute notice by email, conspicuous posting of the notice on the website of VCU and notice to major statewide media if one of the following conditions is met: VCU demonstrates that the cost of providing notice will exceed $50,000 The affected class of Virginia residents to be notified exceeds 100,000 residents VCU doesn’t have sufficient contact information or legal consent to provide notice 9.4.7. In the event an individual or entity provides notice to more than 1,000 persons at one time pursuant to section E. of Code of Virginia, §18.2-186.6, the individual or entity shall notify, without unreasonable delay, the Office of the Attorney General and all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis, as defined in 15 U.S.C.§1681(a)(p), of the timing, distribution, and content of the notice. 9.4.8. Not provide notification immediately following verification of unauthorized data disclosure only if law-enforcement is notified and the law-enforcement agency determines and advises the individual or entity that the notice would impede a criminal or civil investigation, or homeland security or national security. Notice shall be made without unreasonable delay after the lawenforcement agency determines that the notification will no long impede the investigation or jeopardize national or homeland security. 10. IT Asset Management IT Asset Management delineates the steps necessary to protect IT systems and data by managing the IT assets themselves in a planned, organized, and secure fashion. Requirements are defined in the following three areas: IT Asset Control Software License Management Page 36 of 49 Information Security Standard Date: June 3, 2009 Configuration Management and Change Control 10.1. IT Asset Control IT Asset Control requirements identify the steps necessary to control and collect information about IT assets. Commensurate with sensitivity and risk, VCU shall document inventory management practices that address the following components, at a minimum: 10.1.1. Identify whether IT assets may be removed from premises that house IT systems and data, and if so, identify the controls over such removal. 10.1.2. Identify whether personal IT assets are allowed onto premises that house IT systems and data, and if so, identify the controls necessary to protect these IT systems and data. 10.1.3. Remove data from IT assets prior to disposal in accordance with the current version of the Commonwealth of Virginia Removal of Commonwealth Data from Surplus Computer Hard Drives and Electronic Media Standard. 10.1.4. Require creation and periodic review of a list of VCU hardware and software assets. 10.2. Software License Management Software License Management requirements identify the steps necessary to protect against use of computer software in violation of applicable laws. VCU shall document software license management practices that address the following components, at a minimum: 10.2.1. Prohibit the use of unauthorized software and software which is in violation of license agreements. 10.3. Configuration Management and Change Control Configuration Management and Change Control requirements identify the steps necessary to document and monitor the configuration of IT systems, and to control changes to these items during their lifecycles. VCU shall, or shall require that its service provider, document configuration management and change control practices so that changes to the IT environment do not compromise IT security controls. Page 37 of 49 Information Security Standard Date: June 3, 2009 11. Appendix A - Glossary of Information Security Definitions Academic Instruction and Research Systems: Those systems used by institutions of higher education for the purpose of providing instruction to students and/or by students and/or faculty for the purpose of conducting research. Access: The ability to use, modify or affect an IT system or to gain entry to a physical area or location. Accountability: The association of each log-on ID with one and only one user, so that the user can always be tracked while using an IT system, providing the ability to know which user performed what system activities. Alert: Notification that an event has occurred or may occur. Application: A computer program or set of programs that meet a defined set of business needs. Application System: An interconnected set of IT resources under the same direct management control that meets a defined set of business needs. Asset: Any software, data, hardware, administrative, physical, communications, or personnel resource. Assurance: Measurement of confidence in a control or activity. Attack: An attempt to bypass security controls on an IT system in order to compromise the data. Audit: An independent review and examination of records and activities to test for adequacy of controls, measure compliance with established policies and operational procedures, and recommend changes to controls, policies, or procedures. Authentication: The process of verifying an identity of a user to determine the right to access specific types of data or IT system. Authorization: The process of granting access to data or IT system by designated authority after proper identification and authentication. Availability: Protection of IT systems and data so that they are accessible to authorized users when needed without interference or obstruction. Backup: The process of producing a reserve copy of software or electronic files as a precaution in case the primary copy is damaged or lost. Business Continuity Plan: A set of processes and procedures to recover an organization’s essential business functions in a manner and on a schedule to provide for the ongoing viability of the organization if a disruption to normal operations occurs. Baseline Security Configuration: The minimum set of security controls that must be implemented on all IT systems of a particular type. Page 38 of 49 Information Security Standard Date: June 3, 2009 Business Function: A collection of related structural activities that produce something of value to the organization, its stakeholders or its customers. Business Impact Analysis (BIA): The process of determining the potential consequences of a disruption or degradation of business functions. Change Control: A management process to provide control and traceability for all changes made to an application system or IT system. Commonwealth of Virginia (COV): The government of the Commonwealth of Virginia, and its agencies and departments. Confidentiality: The protection of data from unauthorized disclosure to individuals or IT systems. Configuration Management: A formal process for authorizing and tracking all changes to an IT system during its life cycle. Continuity of Operations Planning: The process of developing plans and procedures to continue the performance of essential business functions in the event of a business interruption or threat of interruption. Continuity of Operations Plan (COOP): A set of documented procedures developed to provide for the continuance of essential business functions during an emergency. Credential: Information, such as a user ID and password passed from and IT system or IT system user to an IT system to establish access rights. Cryptography: The process of transforming plain text into cipher text, and cipher text into plain text. Customer-Facing IT System: An IT system designed and intended for by external agency customers and or by the public. COV employees, contractors, and business partners may also use such systems. See also IT System and Internal IT System. Data: An arrangement of numbers, characters, and/or images that represent concepts symbolically. Database: A collection of logically related data (and a description of this data), designed to meet the information needs of an organization. Data Classification: A process of categorizing data according to its sensitivity. Data Custodian: An individual or organization in physical or logical possession of data for Data Owners. Data Custodians are responsible for protecting the data in their possession from unauthorized access, alteration, destruction, or usage and for providing and administering general controls, such as back-up and recovery systems. Data Owner: A VCU Manager, designated by the VCU President or Information Security Officer, who is responsible for the policy and practice decisions regarding data. For business data, the individual may be called a business owner of the data. Page 39 of 49 Information Security Standard Date: June 3, 2009 Data Security: Data Security refers to those practices, technologies, and/or services used to apply security appropriately to data. Digital Certificate: An electronic document attached to a file that certifies the file is from the organization it claims to be from and has not been modified from the original format. Digital Signature: A number that uniquely identifies the sender of a message and proves the message is unchanged since transmission. Disaster Recovery Plan (DRP): A set of documented procedures that identify the steps to restore essential business functions on a schedule that supports agency mission requirements. Data Storage Media: A device used to store IT data. Examples of data storage media include floppy disks, fixed disks, CD-ROMs, and USB flash drives. Electronic Information: Any information stored in a format that enables it to be read, processed, manipulated, or transmitted by an IT system. Encryption: The process or the means of converting original data to an unintelligible form so it cannot be read by unauthorized users. Essential Business Function: A business function is essential if disruption or degradation of the function prevents the agency from performing its mission as described in the agency mission statement. Evaluation: Procedures used in the analysis of security mechanisms to determine their effectiveness and to support or refute specific system weaknesses. Firewall: Traffic-controlling gateway that controls access, traffic, and services between two networks or network segments, one trusted and the other untrusted. Function: A purpose, process, or role. Fuzz Testing: This is a software testing technique that provides random data ("fuzz") to the inputs of a program. If the program fails (for example, by crashing, or by failing built-in code assertions), the defects can be noted. Group: A named collection of IT system users; created for convenience when stating authorization policy. Group-based Access: Authorization to use an IT system and/or data based on membership in a group. Harden: The process of implementing software, hardware, or physical security controls to mitigate risk associated with COV infrastructure and/or sensitive IT systems and data. Identification: The process of associating a user with a unique user ID or login ID. Information: Data organized in a manner to enable their interpretation. Information Security: The protection afforded to IT systems and data in any format, in order to preserve their availability, integrity, and confidentiality. Page 40 of 49 Information Security Standard Date: June 3, 2009 Information Security Incident: An adverse event or situation, whether intentional or accidental, that poses a threat to the integrity, availability, or confidentiality of an IT system or data in any format. Information Security Incident Response Team: An organization within VCU constituted to monitor information security threats and prepare for and respond to attacks. Information Security Officer (ISO): The individual designated by the VCU President to be responsible for the development, implementation, oversight, and maintenance of VCU’s information security program. Information Security Policy: A statement of the information Security objectives of VCU, and what employees, contractors, vendors, business partners, and third parties of VCU must do to achieve these objectives. Information Security Program: A collection of security processes, standards, rules, and procedures that represents the implementation of VCU’s security policy. Information Security Requirements: The types and levels of protection necessary to adequately secure an IT system or data in any format. Information Security Standards: Detailed statements of how employees, contractors, vendors, business partners, and third parties of VCU must comply with VCU’s Information Security policy. Information Technology (IT): Telecommunications, automated data processing, databases, the Internet, management information systems, and related information, equipment, goods, and services. Information Technology (IT) Assurance: Measures that protect and defend information and IT systems by providing for their availability, integrity, authentication, confidentiality, and non-repudiation. Information Technology (IT) Contingency Planning: The component of Continuity of Operations Planning that prepares for continuity and/or recovery of an organization’s IT systems and data that support its essential business functions in the event of a business interruption or threat of interruption. Information Technology (IT) Security Audit: The examination and assessment of the adequacy of IT system controls and compliance with established IT security policy and procedures. Information Technology (IT) Security Breach: The violation of an explicit or implied security policy that compromises the integrity, availability, or confidentiality of an IT system. Information Technology (IT) Security Controls: The protection mechanisms prescribed to meet the security requirements specified for an IT system. Information Technology (IT) Security Logging: Chronological recording of system activities sufficient to enable the reconstruction, review, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to its final results. Information Technology (IT) System: An interconnected set of IT resources under the same direct management control. Page 41 of 49 Information Security Standard Date: June 3, 2009 Information Technology (IT) System Users: As used in this document, a term that includes VCU employees, contractors, vendors, third-party providers, and any other authorized users of IT systems, applications, telecommunication networks, data, and related resources. Integrity: The protection of data or IT system from intentional or accidental unauthorized modification. Internal IT System: An IT system designed and intended for use only by VCU employees, students, contractors, and business partners. Internet: An external worldwide public data network using Internet protocols to which VCU can establish connections. Intranet: A trusted multi-function (data, voice, video, image, facsimile, etc.) private digital network using Internet protocols, which can be developed, operated and maintained for the conduct of VCU business. Intrusion Detection: A method of monitoring traffic on the network to detect break-ins or break-in attempts, either manually or via software expert systems. Intrusion Detection Systems (IDS): Software that detects an attack on a network or computer system. A Network IDS (NIDS) is designed to support multiple hosts, whereas a Host IDS (HIDS) is set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack. Intrusion Prevention Systems (IPS): Software that prevents an attack on a network or computer system. An IPS is a significant step beyond an IDS (intrusion detection system), because it stops the attack from damaging or retrieving data. Whereas an IDS passively monitors traffic by sniffing packets off of a switch port, an IPS resides inline like a firewall, intercepting and forwarding packets. It can thus block attacks in real time. Key: A sequence of data used in cryptography to encrypt or decrypt information. Least Privilege: The minimum level of data, functions, and capabilities necessary to perform a user’s duties. Logon ID: An identification code (normally a group of numbers, letters, and special characters) assigned to a particular user that identifies the user to the IT system. Malicious Code: Harmful code (such as viruses and worms) introduced into a program or file for the purpose of contaminating, damaging, or destroying IT systems and/or data. Malicious code includes viruses, Trojan horses, trap doors, worms, spyware, and counterfeit computer instructions (executables). Management Control: A set of mechanisms designed to manage organizations to achieve desired objectives. Monitoring: Listening, viewing, or recording digital transmissions, electromagnetic radiation, sound, and visual signals. Non-repudiation: A characteristic of a message that validates that the message was sent by a particular organization or individual, and cannot be refuted. Page 42 of 49 Information Security Standard Date: June 3, 2009 Off-site Storage: The process of storing vital records in a facility that is physically remote from the primary site. To qualify as off-site, the facility should be geographically/separately and distinct from the primary site and offer environmental and physical access protection. Operational Controls: IT security measures implemented through processes and procedures. Operational Risk: The possibility of loss from events related to technology and infrastructure failure, from business interruptions, from staff related problems and from external events such as regulatory changes. Password: A unique string of characters that, in conjunction with a logon ID, authenticates a user’s identity. Penetration testing: A penetration test is a method of evaluating the security computer system or network simulating an attack by a malicious user. Personal Digital Assistant (PDA): A digital device, which can include the functionality of a computer, a cellular telephone, a music player and a camera. Personal Identification Number (PIN): A short sequence of digits used as a password. Personal Information: All information that describes, locates or indexes anything about an individual including his real or personal property holdings derived from tax returns, and his education, financial transactions, medical history, ancestry, religion, political ideology, criminal or employment record, or that affords a basis for inferring personal characteristics, such as finger and voice prints, photographs, or things done by or to such individual; and the record of his presence, registration, or membership in an organization or activity, or admission to an institution. "Personal information" shall not include routine information maintained for the purpose of internal office administration whose use could not be such as to affect adversely any data subject nor does the term include real estate assessment information. Code of Virginia § 2.2-3801. Personally Identifiable Information (PII): Any piece of information that can potentially be used to uniquely identify, contact, or locate a single person. Personnel: All VCU employees, contractors, and subcontractors, both permanent and temporary. Phishing: A form of criminal activity characterized by attempts to acquire sensitive information fraudulently, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication. Privacy: The rights and desires of an individual to limit the disclosure of individual information to others. Privacy Officer: The privacy officer, if required by statute (such as HIPAA) provides guidance on the requirements of state and federal Privacy laws; disclosure of and access to sensitive data; and security and protection requirements in conjunction with the IT system when there is some overlap among sensitivity, disclosure, privacy, and security issues. Public web site: A public web site is the most visible and readily accessible to the average Web user. A site on the Web that is accessible by anyone with a Web browser and access to the Internet. Page 43 of 49 Information Security Standard Date: June 3, 2009 Recovery: Activities beyond the initial crisis period of an emergency or disaster that are designed to return IT systems and/or data to normal operating status. Residual Risk: The portion of risk that remains after security measures have been applied. Restoration: Activities designed to return damaged facilities and equipment to an operational status. Risk: The possibility of loss or injury based on the likelihood that an event will occur and the amount of harm that could result. Risk Assessment (RA): The process of identifying and evaluating risks so as to assess their potential impact. Risk Management: Identification and implementation of IT security controls in order to reduce risks to an acceptable level. Risk Mitigation: The continuous process of minimizing risk by applying security measures commensurate with sensitivity and risk. Role-based Access Control: A type of access control in which IT system users receive access to the IT systems and data based on their positions or roles in an organization. Roles and Responsibility: Roles represent a distinct set of operations and responsibilities required to perform some particular function that an individual may be assigned. Roles may differ from the individual’s business title. This document contains the roles and responsibilities associated with implementing information security. Recovery Point Objective (RPO): The measurement of the point in time to which data must be restored in order to resume processing transactions. Directly related to the amount of data that can be lost between the point of recovery and the time of the last data backup. Recovery Time Objective (RTO): The period of time in which systems, applications or functions must be recovered after an outage. Secure: A state that provides adequate protection of IT systems and data against compromise, commensurate with sensitivity and risk. Sensitivity: A measurement of adverse affect on VCU interests, the conduct of agency programs, or the privacy to which individuals are entitled that compromise of IT systems and data with respect to confidentiality, integrity, and/or availability could cause.. IT systems and data are sensitive in direct proportion to the materiality of the adverse effect caused by their compromise. Sensitivity Classification: The process of determining whether and to what degree IT systems and data are sensitive. Separation of Duties: Assignment of responsibilities such that no one individual or function has control of an entire process. It is a technique for maintaining and monitoring accountability and responsibility for IT systems and data. Shared Accounts: A logon ID or account utilized by more than one entity. Page 44 of 49 Information Security Standard Date: June 3, 2009 Source Code Auditing: A software (source) code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions. It is an integral part of the defensive programming paradigm, which attempts to reduce errors before the software is released. Spyware: A category of malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. State: See Commonwealth of Virginia (COV). Support System: An interconnected set of IT resources under the same direct management control that shares common functionality and provides services to other systems. System: See Information Technology (IT) System. System Administrator: An analyst, engineer, or consultant who implements, manages, and/or operates a system at the direction of the System Owner, Data Owner, and/or Data Custodian. System Owner: A VCU Manager, designated by the VCU President or Information Security Officer, who is responsible for the operation and maintenance of a VCU IT system. Technical Controls: IT security measures implemented through technical software or hardware. Third-Party Provider: A company or individual that supplies IT equipment, systems, or services to VCU. Threat: Any circumstance or event (human, physical, or environmental) with the potential to cause harm to an IT system in the form of destruction, disclosure, adverse modification of data, and/or denial of service by exploiting vulnerability. Token: A small tangible object that contains a built-in microprocessor utilized to store and process information for authentication. Trojan Horse: A malicious program that is disguised as or embedded within legitimate software. Trusted System or Network: An IT system or network that is recognized automatically as reliable, truthful, and accurate, without continual validation or testing. Universal Serial Bus (USB): A standard for connecting devices. Untrusted: Characterized by absence of trusted status. Assumed to be unreliable, untruthful, and inaccurate unless proven otherwise. USB Flash Drive: A small, lightweight, removable and rewritable data storage device. User ID: A unique symbol or character string that is used by an IT system to identify a specific user. See Logon ID. Page 45 of 49 Information Security Standard Date: June 3, 2009 Virginia Department of Emergency Management (VDEM): A COV department that protects the lives and property of Virginia's citizens from emergencies and disasters by coordinating the state's emergency preparedness, mitigation, response, and recovery efforts. Version Control: A management process that provides traceability of updates to operating systems and supporting software. Virus: See Malicious Code. Vital Record: A document, regardless of media, which, if damaged or destroyed, would disrupt business operations. Vulnerability: A condition or weakness in security procedures, technical controls, or operational processes that exposes the system to loss or harm. Vulnerability Assessment: A process by which system vulnerabilities are identified and have their importance quantified. Workstation: A terminal, computer, or other discrete resource that allows personnel to access and use IT resources. Page 46 of 49 Information Security Standard Date: June 3, 2009 12. Appendix B - Glossary of Information Security Definitions BIA: Business Impact Analysis DHRM: Department of Human Resource Management DRP: Disaster Recovery Plan FTP: File Transfer Protocol HIPAA: Health Insurance Portability and Accountability Act IDS: Intrusion Detection Systems IPS: Intrusion Prevention Systems ISO: Information Security Officer PCI: Payment Card Industry PDA: Personal Digital Assistant PII: Personally Identifiable Information PIN: Personal Identification Number RA: Risk Assessment RPO: Recovery Point Objective RTO: Recovery Time Objective SDLC: Systems Development Life Cycle VDEM: Virginia Department of Emergency Management Page 47 of 49 Information Security Standard Date: June 3, 2009 13. Appendix C - Information Security Policy and Standard Exception Request Form Unit Name: Authoritative Unit Head: Requirement to which an exception is requested: Date: 1. Provide the business or technical justification: 2. Describe the scope, including quantification and requested duration (not to exceed 1 year): 3. Describe all associated risks: 4. Identify the controls to mitigate the risks: 5. Identify any unmitigated risks: By submitting this form, the Authoritative Unit Head acknowledges that they have evaluated the business issues associated with this request and accepts any and all associated risks as being reasonable under the circumstances. VCU Information Security Officer (ISO) Use Only Approval: Comments: Date: Page 48 of 49 Information Security Standard Date: June 3, 2009 VCU Chief Information Officer (CIO) Use Only (Used for Appeal) Approval: Comments: Date: Page 49 of 49