Uploaded by fandajnr

Vulnerability Manage 20240103 122521

advertisement
Vulnerability Management Policy
Vulnerability Management Policy
Version: 1
1
V1 – 17/04/2021
Vulnerability Management Policy
Document Control
Version History
Version No
1.0
Date
17/04/2021
Remarks
Created Document
Author
Sunder Singh (YouCloud)
Reviewer/s
Date
19/04/2021
27/02/2022
27/02/2023
Name
Paul Pease
Andrew Beitz
Paul Pease
Andrew Beitz
Paul Pease
Andrew Beitz
Position & Location
Head of Compliance & Licensing
CIO/CTO
Technology & Compliance
COO/CTO
Technology & Compliance
COO/CTO
Name
Stanley Hancock
Stanley Hancock
Stanley Hancock
Position & Location
CEO, Brisbane
CEO, Brisbane
CEO, Brisbane
Name
Position & Location
Approver/s
Date
19/04/2021
27/02/2022
27/02/2023
Distribution
Copy No
2
V1 – 17/04/2021
Vulnerability Management Policy
Table of Contents
Purpose.................................................................................................................................................... 4
Scope ....................................................................................................................................................... 4
Policy ...................................................................................................................................................... 4
Responsibilities ....................................................................................................................................... 5
Policy Control ......................................................................................................................................... 5
3
V1 – 17/04/2021
Vulnerability Management Policy
Purpose
This document is to provide a common set of requirements to protect the Touch2Pay IT Infrastructure
and other information assets from exploitation of security vulnerabilities.
Scope
This policy applies to all system component running various software and applications of Touch2Pay
Pty Ltd.
Policy
Touch2Pay will act to protect the integrity of its software applications and its other information assets
against the introduction of malicious code (malware).
Periodic Vulnerability assessment of its information assets, network equipment’s and applications
must be conducted and all issues found during the assessment will be resolved in the timeframe
defined for each items severity/risk rating.
On a quarterly basis Internal and External security testing of the devices in the cardholder
environment are conducted. Scans are repeated until acceptable results are obtained.
Vulnerability scans will be executed using services and/or tools listed on the PCI Approved Scanning
Vendors list.
Any major change in the IT environment must be followed by vulnerability assessment and
penetration testing to the setup. These penetration tests conducted on Annual basis:
•
•
Network Layer Penetration Tests
Application Layer Penetration Tests
The Penetration tests must be carried out either by Third party organization specialized in Security
Testing or by specialised internal resource.
If segmentation is used, penetration testing will be performed on segmentation controls at least every
6-months and after any changes to segmentation controls/methods.
Wireless Network scan are performed using on quarterly basis. The methods used to conduct the
wireless scans should be adequate and capable of at least identifying the following:
•
•
•
WLAN cards inserted into system components
Portable wireless devices connected to system components (for example, by USB, etc.)
Wireless devices attached to a network port or network device
System File Integrity Monitoring must be done on all critical servers in production environment and
servers storing Cardholder information.
The IT Team must visit popular website sources such as SANS.org, CERT.org and CISecurity.org to
identify any other patches or modifications to the systems in use to make them more reliable and
secure.
Identified vulnerabilities for Touch2Pay assets are to be prioritised on a risk basis, i.e. by Impact and
Probability.
Touch2Pay must establish the following timeline requirements for reacting to notifications of relevant
vulnerabilities:
4
V1 – 17/04/2021
Vulnerability Management Policy
Severity/Impact
Priority
Urgent
Critical
High
Medium
5
4
3
2
Response Timeframe
3-Days
1-Week
1-Week
1-Month
Note: Critical or Major risk systems are treated ahead of other systems.
All vulnerabilities that fall into the high impact category must be assessed for seriousness and
required controls (patching; turning off/removing services affected by the vulnerability; adapting or
adding access controls; increased monitoring; awareness raising).
If the vulnerabilities are high impact and high probability then the required controls must be
performed through the Change Management process or else through the Incident Response Plan.
Available patches must be risk assessed, taking into account the balance between risks in installing
and not installing, before the final decision as to necessary controls can be made.
Patches must be tested prior to implementation on the production environment.
Responsibilities
The Information Security team is responsible for monitoring vulnerabilities and vendor releases of
patches and fixes.
The IT infrastructure, network and application administrators are responsible for installing operational
software updates, patches and fixes on the operational systems.
The Application Owners are responsible for testing operational software updates and new
implementations.
The Information Security team will discuss with the IT teams any incidents that have been occurred,
including the vulnerabilities, information additional controls are in place, what outstanding issues
there are, and how the picture has changed since the previous scan.
Policy Control
The Information Security team is the owner of this document and is responsible for ensuring that this
policy document is reviewed at least annually, and any modifications are communicated to all relevant
stakeholders in a timely manner.
5
V1 – 17/04/2021
Download