OCIO/G4.37a Government guideline on cyber security ISMF Guideline 37a Critical Information Communications Technology BACKGROUND Information Communication Technology (ICT) underpins many of the Government of South Australia’s services that protect the lives and property of citizens and support the social and economic well being of the community. Understanding what ICT the South Australian Government has a critical reliance on assists in decision-making that contributes to the resilience and continuity of government services. Any ICT infrastructure that the Government has a critical reliance on may be considered State Government Critical ICT Infrastructure (SGCII) and must be managed appropriately. Agencies are required to identify any SGCII and provide this information to the Office of the Chief Information Officer (CIO). This guideline should be read in conjunction with ISMF Ruling 1 – Security Management Requirements for Critical ICT. GUIDANCE Agencies are responsible for providing the Office of the CIO with information related to the Critical Services they provide, including any ICT that underpins it. The desired outcome of the collected data is a single information resource that describes the relationships between the services delivered by the Government, the related ICT services and the underpinning ICT infrastructure. This single information resource will take the form of a SGCII Register managed by the Office of the CIO. The identification of SGCII will assist to: engage cost effective security controls; communicate appropriate service requirements and risk tolerances; and explain expectations of response and recovery to disruptive events. This understanding aids agencies and responsible authorities, such as the Office of the CIO, in minimising disruptions to the systems that aid the government in maintaining delivery of Essential and Important services to the State. The Department of the Premier and Cabinet (DPC) is the Control Agency for ICT Failure under the State’s emergency management arrangements. The Office of the CIO fulfils this role on behalf of DPC. The ICT Support Plan outlines how the Office of the CIO fulfils this role. Government guideline on cyber security Critical Information Communications Technology v1.2 Page 1 of 4 ISMF Guideline 37a TERMS Critical Infrastructure The South Australian Government defines critical Infrastructure as those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended period, will significantly impact on the social or economic well-being of the State, or affect the State’s contribution to national security or defence1. State Government Critical ICT Infrastructure (SGCII) SGCII is defined as ICT infrastructure upon which ‘Critical Services’ are delivered to the community. If the confidentiality, integrity or availability of this ICT infrastructure is lost then it could significantly impact on the social, or economic well-being of the State, the government, commercial entities or members of the public. Critical Services Critical Services are those services that, if compromised, would result in significant damage to the physical, social or economic wellbeing of the State. Critical Services are not typically ICT services, they are services that an agency delivers to the community on behalf of the Government. Critical Services can be categorised as either Essential or Important: o Essential Services Essential Services are those services (whether provided by a public or private undertaking) without which the safety, health or welfare of the community or a section of the community would be endangered or seriously prejudiced 2. Essential Services are directly related to: Continuity of executive government Directly combating identified threats Physical survival of the community o Important Services Important Services are those services that are directly related to the social, physical or economic safety and security of the State. 1 2 Government of South Australia Protective Security Policy South Australian Essential Services Act 1981 Government guideline on cyber security State Government Critical ICT Infrastructure v1.2 Page 2 of 4 ISMF Guideline 37a IDENTIFYING STATE GOVERNMENT CRITICAL ICT INFRASTRUCTURE Agencies have a responsibility to provide the Office of the CIO with information for inclusion in the SGCII Register. The workflow diagram below is designed to assist agencies in providing the relevant information to the Office of the CIO. STEP 1: IDENTIFY SERVICE - Identify a service that the agency delivers to the community on behalf of the Government. This is not likely to be an ICT service. (Agency Personnel Involved: Business Owner and Agency Security Executive) STEP 2A: ESSENTIAL SERVICE? - Is the service related to either continuity of executive government, directly combating identified threats, or the physical survival of the community? (Agency Personnel Involved: Business Owner and Agency Security Executive) YES NO STEP 2B: IMPORTANT SERVICE? - Is the service related to This service does meet the criteria of a Critical Service. Go to Step 3. the social, physical or economic safety and security of the State. YES (Agency Personnel Involved: Business Owner and Agency Security Executive) NO This service does not meet the criteria of a Critical Service. Return to Step 1. STEP 3: IDENTIFY CRITICAL ICT – Identify the application, system or ICT infrastructure that is relied upon to deliver the Critical Service (e.g. platform, location, contact person, suppliers). There may be multiple instances of ICT infrastructure per service and each piece of ICT infrastructure may also be used for multiple services. (Agency Personnel Involved: Business Owner, Agency Security Executive and IT Security Adviser) STEP 4: COMPLETE & SUBMIT REGISTER TEMPLATE - Complete the SGCII Register template (Click Here) including all relevant information and submit the template to the Office of the Chief Information Officer. Review submission annually, or an on event driven basis, and notify the Office of the CIO of any amendments. Contact: Security and Risk Assurance Phone: (08) 8463 4003 Government guideline on cyber security State Government Critical ICT Infrastructure v1.2 Page 3 of 4 ISMF Guideline 37a ADDITIONAL CONSIDERATIONS Registration of ICT as SGCII sets a baseline requirement against the Protective Security Management Framework and Information Security Management Framework (ISMF) for assurance activities. Further information on this can be found in ISMF Ruling 1 – Security Management Requirements for Critical ICT. Any ICT that is registered as SGCII may also need to be registered as State Critical Infrastructure. Management of State Critical Infrastructure is overseen by the Critical Infrastructure Support Group in South Australia Police (SAPOL). The Office of the CIO may provide information from the SGCII Register to SAPOL if it is deemed necessary. Registration of ICT as SGCII does not have an effect on any requirements for agencies to maintain their own business continuity management arrangements and business continuity plans. REFERENCES, LINKS & ADDITIONAL INFORMATION PC030 Government of South Australia Protective Security Management Framework [PSMF] OCIO/F4.1 Government of South Australia Information Security Management Framework [ISMF] OCIO/R4.1 ISMF Ruling 1 – Critical ICT Security Management Requirements State Emergency Management Plan This guideline does not aim to provide the reader with all of the responsibilities and obligations associated with Critical ICT. It is highly recommended that agencies review all related documents in their entirety. The individual requirements of agencies will have direct bearing on what measures are implemented to mitigate identified risk(s). ID OCIO_G4.37a Classification/DLM PUBLIC-I2-A1 Issued June 2012 (re-issued as ISMF Guideline 37a from Guideline 3 – February 2014) Authority Security and Risk Steering Committee Master document location Q:\SecurityRiskAssurance\Risk and ICT Infrastructure Protection\CIP\SGCII Guideline Records management File Folder: 2011/15123/01 - Document number: 5817495 Managed & maintained by Office of the Chief Information Officer Author Will Luker, Analyst Reviewer Sarah Mason CISM, CRISC Principal Risk Adviser, Security & Risk Assurance Compliance Discretionary Review date June 2015 To attribute this material, cite the Office of the Chief Information Officer, Government of South Australia, ISMF Guideline 37a. This work is licensed under a Creative Commons Attribution 3.0 Australia Licence Copyright © South Australian Government, 2014. Disclaimer