Corporate Information Security Policy (CISP) - Q-CERT

advertisement
Corporate Information
Security Policy (CISP)
Ver 1.0
“State Agency name here”
April 2010
Table of Contents
1 Introduction..................................................................................................................................... 3
2 General Policy ................................................................................................................................. 3
3 Governance ...................................................................................................................................... 4
4 Enforcement .................................................................................................................................... 5
Definitions & References
“Information System”
This is “State Agency’s” hardware (servers, workstations,
printers, scanners, etc.), software, network infrastructure and
the data stored/associated with them.
“Employee”
This refers to all staff, permanent or temporary, on contract or
employed by third parties and consultants that are providing
services to “State Agency”.
“IT Administration”
This refers to “IT Department”, who are responsible for “State
Agency’s” Information Systems.
“MUST/SHALL”
The statement is an absolute requirement.
“MUST NOT/SHALL NOT”
The statement is an absolute prohibition.
“MAY”
The statement is a truly optional requirement.
“SHOULD”
Use of this term indicates that there maybe valid reasons in
particular circumstances to ignore a particular item, but the
full implications must be understood and carefully weighed
before choosing a different course.
[IAP-GOV-INFA]
Government Information Assurance Manual, ictQATAR 2008
(Unclassified)
[IAP-GOV-DCLS]
Government Information Classification Policy, ictQATAR 2008
(Unclassified)
Corporate Information Security
Policy (CISP)
Classification: Internal
2
1
Introduction
The purpose of this policy is to define “State Agency’s” information security strategy
and demonstrate its commitment to implement the sustainable management of
information security to protect its information assets.
“State Agency” management has agreed to adopt a culture of information security in
its business activities. It has mandated the use of the Government Information
Assurance (GIA) framework as the guiding standard to achieve this objective.
1.1
Scope
This policy applies to all Employees and to all Information Systems including:
a. Those owned or leased by “State Agency”;
b. Those that are outsourced or hosted externally;
c. Those that provide services to our constituents, but are still under “State
Agency’s” responsibility.
2
General Policy
2.1
Information is “State Agency’s” key asset and needs to be suitably available and
protected, to allow us to achieve our strategic and national goals. “State Agency”
SHALL take all necessary steps to protect this information from internal, external,
deliberate or accidental threats.
2.2
To achieve this objective, this Corporate Information Security Policy (CISP) SHALL
act as the foundation for our efforts and provide strategic direction. It is based on
the following three principles:
2.3
2.4
 Confidentiality: Information is accessible only to those authorised to have
such access and unauthorized disclosure of sensitive information is prevented
 Integrity: safeguarding the accuracy and completeness of information and
processing methods and preventing its unauthorised change
 Availability: information and information systems are available for business
use when required
Our standard and baseline for information security within “State Agency” SHALL be
the Government Information Assurance (GIA) scheme [IAP-GOV-DCLS].
Information security policy, controls and procedures SHALL be documented as
follows:
Corporate
Information
Security Policy
State Agency's
Security Manual
Corporate Information Security
Policy (CISP)
Acceptable Usage
Policy
Business
Continuity and
Crisis Managment
Policy
Classification: Internal
Technical
Standards &
Procedures
3
a. This document, the Corporate Information Security Policy (CISP) is the
overarching information security policy;
b. The “State Agency” Security Manual specifies the adopted controls, and
hence documents the detailed security policy that “State Agency” has chosen
to mitigate the assessed risks in its Information Systems;
c. The Acceptable Usage Policy (AUP) provides the users of Information
Systems with clear guidelines on what is permitted/not permitted whilst
using these systems;
d. Continuity of business processes and the mechanism to deal with
interruptions to the business are detailed in the Business Continuity & Crisis
Management (BCCM) Policy;
e. Detailed security requirements for specific technologies and/or systems are
detailed in technical standards, which are used together with technical
procedures for the management and maintenance of systems’ security.
2.5
All Employees SHALL be provided with the AUP, to which they SHALL be obligated
as part of their employment with “State Agency”.
2.6
All Information Systems SHALL be compliant to the relevant requirements of the
CISP, the “State Agency” Security Manual, the BCCM policy and the appropriate
technical standards. Information Systems SHALL have documented Business
Continuity procedures inline with the BCCM policy, which are regularly tested for
effectiveness.
2.7
Adequate and appropriate security awareness programmes SHALL be conducted in
order to ensure that information security policies are understood and followed by
Employees and relevant stakeholders.
3
Governance
3.1
To achieve sustainable management of information security “State Agency” SHALL
appoint a permanent employee, who will fulfil the “State Agency’s” Security
Manager role, having the right levels of authority for the function.
3.2
The Security Manager is accountable for all information security related to “State
Agency’s” Information Systems.
3.3
The Security Manager SHALL have a direct reporting line to <<XXX ex. Director>>
and a functional/dotted reporting line to “State Agency’s” Executive Head.
3.4
The Security Manager is responsible for monitoring, enforcing and reviewing
Information Systems for compliance with information security policies, and
producing regular management reports on the status of information security within
the organisation. He is also responsible for ensuring information security policies
are regularly reviewed and updated as necessary.
3.5
The following departments within “State Agency” have specific roles to play in
maintaining information security within the organisation:
a. The Human Resource (HR) department is responsible for ensuring
Employees are aware of their obligations to Information Security and for
providing appropriate security orientation training for Employees;
Corporate Information Security
Policy (CISP)
Classification: Internal
4
b. “<<Facilities / Administration department>>” is responsible for ensuring
the Physical Security of “State Agency” owned, leased or operated properties;
c. <<IT Department>> is responsible for implementing the Information
Security policies for corporate Information Systems and will carry out daily
security operations;
d. <<Department XX>> is responsible for ensuring Information Systems are
monitored for security risks. Additionally <<Department XX>> will provide
support to the Security Manager, as needed, and will ensure that a third
party audit of Information Systems is conducted annually.
3.6
Divisional directors / managers SHALL be responsible for ensuring “State Agency’s”
information security policies are implemented and complied with for current and
future Information Systems under their management.
4
Enforcement
4.1
Any employee found to have violated this policy MAY be subject to disciplinary
action as per “State Agency’s” HR manual. This could include formal reprimands up
to and including termination of employment. Criminal activities MAY be forwarded
to appropriate law enforcement authorities within the State of Qatar.
XYZ
Executive Head “State Agency”
Dated:
Corporate Information Security
Policy (CISP)
Classification: Internal
5
Download