ISMF Standard 141 - Endpoint protection

advertisement
ISMF
Standard 141
Endpoint Protection
OCIO/S4.6
Government standard on cyber security
Prepared by:
Version:
Date:
Office of the Chief Information Officer
v1.0
12 September 2014
ISMF Standard 141
GOVERNMENT STANDARD ON CYBER SECURITY
OCIO/S4.6 Endpoint Protection
Confidentiality:
Public
Audience:
Compliance:
Creator:
Mandate/Authority:
Original Authorisation Date:
Last Updated and Approved:
Issued:
Primary Contact:
Version:
1.0
Status:
Final
SA Government Agencies; Suppliers to SA Government
Mandatory
Office of the Chief Information Officer
Security and Risk Steering Committee
01 August 2014
01 August 2014
12 September 2014
Not Applicable
Security and Risk Assurance, Office of the Chief Information Officer,
Tel: +61 (8) 8463 4003
Coverage:
The South Australian public authorities required to adhere to this standard are defined in OCIO/F4.1 Government
framework on cyber security – Information Security Management Framework [ISMF].
This standard is intended for use by South Australian Government agencies and suppliers to Government whose
contractual obligations require them to comply with this document. Reliance upon this policy or standard by any
other person is entirely at their own risk and the Crown in the right of South Australia disclaims all responsibility or
liability to the extent permissible by law for any such reliance.
To attribute this material, cite the
Office of the Chief Information
Officer, Government of South
Australia, ISMF Standard 141.
This work is licensed under a Creative Commons Attribution 3.0 Australia
Licence
Copyright © South Australian Government, 2014.
Disclaimer
Endpoint Protection
OCIO/S4.6 version 1.0
Page 2 of 10
ISMF Standard 141
DOCUMENT TERMINOLOGY AND CONVENTIONS
The terms that are used in this document are to be interpreted as described in Internet
Engineering Task Force (IETF) RFC 2119 entitled “Key words for use in RFCs to Indicate
Requirement Levels”1. The RFC 2119 definitions are summarised in the table below.
Term
MUST
MUST NOT
This word, or the terms "REQUIRED" or "SHALL", means that the definition
is an absolute requirement of the specification.
This phrase, or the phrase “SHALL NOT”, means that is an absolute
prohibition of the specification.
SHOULD
This word, or the adjective "RECOMMENDED", means that there may exist
valid reasons in particular circumstances to ignore a particular item, but the
full implications must be understood and carefully weighed before choosing
a different course.
SHOULD NOT
This phrase, or the phrase "NOT RECOMMENDED" means that there may
exist valid reasons in particular circumstances when the particular
behaviour is acceptable or even useful, but the full implications should be
understood and the case carefully weighed before implementing any
behaviour described with this label.
MAY
1
Description
This word, or the adjective “OPTIONAL”, means that an item is truly
optional.
www.ietf.org/rfc/rfc2119.txt?number=2119
Endpoint Protection
OCIO/S4.6 version 1.0
Page 3 of 10
ISMF Standard 141
DOCUMENT CONTROL
Document location
Q:\SecurityRiskAssurance\Policy Development Sub-program\Policy and Standards\ISMF\ISMFv3.2\
Electronic records management information
File Folder Number: OCIO08/0073/0003 – Document Number: 8092515
Author(s)
Function / role
Jason Caley
Principal Policy Adviser, Security and Risk Assurance
Anthony Stevens
Senior Analyst, Security and Risk Assurance
Release details
Initial release accompanying issue of ISMF v3.2.0
Distributed to
Published to http://dpc.sa.gov.au/
Version
Date
1.0
September 2014
Version
Date
1.0
September 2014
CLASSIFICATION

Confidentiality
Description
Circulation limit
PUBLIC-I2-A1
No harm could be caused to an organisation or
individual and no unfair advantage could be
given to any entity and no violation would occur
to somebody’s right to privacy. Integrity 2 with
low availability requirements.
Unrestricted access.
Endpoint Protection
OCIO/S4.6 version 1.0
Page 4 of 10
ISMF Standard 141
TABLE OF CONTENTS
1.
AUTHORITY .................................................................................................. 6
2.
CONTEXT ...................................................................................................... 6
2.1.
2.2.
Background ................................................................................................. 6
History ......................................................................................................... 6
3.
SCOPE .......................................................................................................... 7
4.
TERMS AND ABBREVIATIONS ................................................................... 7
4.1.
5.
IMPLEMENTATION ....................................................................................... 9
5.1.
5.2.
6.
Terms ........................................................................................................... 7
ISMF Standard 141 ...................................................................................... 9
Business Controls ...................................................................................... 9
REFERENCES AND LINKS .........................................................................10
Endpoint Protection
OCIO/S4.6 version 1.0
Page 5 of 10
ISMF Standard 141
1. AUTHORITY
This document states the standard of the Government of South Australia with respect to endpoint
protection. Implementation of this standard supports the objectives of ISMF Policy Statement 18.
Policy Statement 18
Responsible Parties shall undertake an active role in protecting information assets
from exposure to malicious software and scripts including but not limited to:
implementing controls to prevent and restrict the proliferation of virus and trojan
software, educating personnel in the risks associated with the use and/or introduction
of unauthorised software products, and, where appropriate, introducing custom
controls to detect or prevent its introduction.
2. CONTEXT
2.1.
Background
Dependence on information systems and services means agencies are more vulnerable to security
threats. The interconnecting of public and private networks and sharing of information resources
increases the difficulty of achieving access control.
Reliance on technical means alone to provide comprehensive security is unrealistic – it needs to be
supported by appropriate management of Information Assets. Generally, the weakest point in any
information system is where the operating environment is accessible to users – typically via an
endpoint. Protecting these endpoints requires a combination of technology controls (both hardware
and software), comprehensive policies which outline users’ responsibilities, and ongoing education to
ensure users (and Business Owners) are aware of the risks, and the threats.
2.2.
History
This standard has no direct predecessors. It is an evolution and replacement of the former
Threat Protection Standard (OCIO/S6.8.1 Technology Threat Protection – Infrastructure Threat
Protection Software Standard). Shifting technology emphasis from centralised computing and
traditional client-server desktop environments to mobile devices (e.g. tablets, smartphones,
portable PCs) has led to a requirement to consider endpoints in a variety of situations.
This standard brings to the fore a number of protection measures which are derived from and
described within the ISO/IEC 27002 code of practice.
Endpoint Protection
OCIO/S4.6 version 1.0
Page 6 of 10
ISMF Standard 141
3. SCOPE
This standard encompasses all Government of South Australia data and information.
The ISMF and all security Bulletins, Notifications and standards issued under it shall apply,
unless otherwise advised, to all bodies that are:
o
South Australian Government public sector agencies (as defined in the Public Sector Act
2009), that is, administrative units, bodies corporate, statutory authorities, and
instrumentalities of the Crown. Public sector agencies are herein referred to as
“Agencies”; OR
o
Suppliers to the South Australian Government or its Agencies that have contractual
conditions which require compliance to the ISMF as described in section 2.1 of the ISMF
The ISMF and all security Bulletins, Notifications and standards issued under it shall apply to:
o
o
All information processed, stored or communicated by ICT equipment, where that
information is either:

Official Information of the South Australian Government or its Agencies; or

Information of which the South Australian Government or any of its Agencies has
custody2

Information as described above which Suppliers that have contractual conditions
that require compliance to the ISMF as described in section 2.1 of the ISMF hold
on behalf of the South Australian Government or any its Agencies
Anything that acts upon an ICT asset, including creating, controlling, validating, and
otherwise managing the ICT asset throughout the lifecycle of the asset.
4. TERMS AND ABBREVIATIONS
4.1.
Terms
“Responsible Party” is used in two contexts within the ISMF. These are:
2
o
An Agency – the internal to government body that retains ultimate responsibility for all
aspects covered by the Information Security Management Framework [ISMF] as it
relates to a particular agency and its information assets.
o
A Supplier – an external to government entity that is typically responsible for compliance
with the ISMF by way of a contractual agreement that contains clauses requiring security
of Agency information and the regulation of access to an Agency’s information assets.
The term “Supplier” shall be read as “Suppliers who are subject to contractual conditions
that require them to comply with the ISMF” unless another intention is apparent.
Note the definition of “custody” in the ISMF differs from State Records’ interpretation.
Endpoint Protection
OCIO/S4.6 version 1.0
Page 7 of 10
ISMF Standard 141
When a Supplier has contracted with the State, the provisions of the ISMF will apply to the
Supplier either:
o
under the terms of a Purchasing Agreement for whole of Government contracts and
associated Customer Agreements; or
o
by way of an individual contract with an Agency whereby the Agency has specified the
parts of its Information Security Management System [ISMS] for which compliance is
sought.
It should be noted that Agency Chief Executives retain ultimate accountability for all security
matters within their agencies. The application of the ISMF to a Supplier via a contract with the
State or Agency shall not absolve the Agency from these obligations and responsibilities.
“Responsible Parties” includes both Agencies and Suppliers who are subject to contractual
conditions that require them to comply with the ISMF. Where any ambiguity arises between
these entities in relation to adherence to the ISMF, the Agency Controls implemented in the
Customer Agreement shall prevail (i.e. The Agency remains the default party and the Customer
Agreement is used as the vehicle for setting the scope and requirements for the Supplier to
comply with either the entirety of the ISMF or part(s) thereof. The Customer Agreement may
also introduce additional Agency-specific controls and policies that the Supplier must comply
with).
“Business Owner” represents the person or group that is ultimately responsible for an
information asset. This person or group is distinct from an information custodian, who may take
responsibility for the ongoing management of the information (such as a CIO or system
administrator). Individual business units should own business critical information, rather than
information technology or information security departments (they are custodians, not owners).
The manager of the business unit responsible for the creation of any information and / or the
business unit directly impacted by the loss of the information is usually the Business Owner. A
Business Owner or group of Business Owners must be identified for each information asset.
“Endpoint” means any device that is the final interface at the edge of a network and directly
used, managed or accessed by a person or persons. These devices may include desktop PCs,
laptops, tablets, smartphones, point of sale terminals, thin-client terminals, etc.
“Endpoint Protection” refers to the security measures implemented for user accessible
devices at the edge of a network that may contain, or provide access to, information for an end
user.
Endpoint Protection
OCIO/S4.6 version 1.0
Page 8 of 10
ISMF Standard 141
5. IMPLEMENTATION
5.1. ISMF Standard 141
Agencies must establish and maintain security measures that ensure proportionate protection of
Endpoint devices relative to the confidentiality, integrity and availability classification of information
being accessed or processed on such devices.
5.2. Business Controls
The following general guidance applies regardless of the classification levels of the information
assets:
S141.1
Responsible Parties shall deploy and maintain appropriate anti-virus/anti-malware
solutions encompassing Endpoint devices (ISMF Standards 54 and 55)
S141.2
Responsible Parties shall maintain the operating system and installed applications with
relevant patches as provided by the manufacturer (ISMF Standard 121, Control S134.3)
S141.3
Responsible Parties should establish procedures for the granting and revocation of
administrative privileges while discouraging their use unless explicitly required (ISMF
Standard 78)
S141.4
Agencies should consider implementing application whitelisting, to prevent the use of
applications that are not sanctioned by the business, have not been adequately tested or
are not required by the user to perform their duties (Control S54.1)
S141.5
Agencies should remove or otherwise disable non-essential software and functionality that
are not required by the user (e.g. autorun, IPv6). Such measures should also take into
account browser and web navigation plug-ins. (e.g. Java, Shockwave, Flash etc.) (ISMF
Standard 54)
S141.6
Agencies shall establish specific controls to prevent unauthorised access to mobility
devices (ISMF Standard 101)
S141.7
Responsible Parties should consider additional controls for unattended equipment (ISMF
Standard 82)
S141.8
Responsible Parties shall implement session/inactivity timeouts on all Endpoint devices
(ISMF Standard 97).
Additional controls based on DLMs and protective markings
CLASSIFICATION
[P] Protected
ADDITIONAL CONTROLS
S141.9
Endpoint devices must not be connected to public internet
WiFi hotspots (irrespective of whether they are free or for fee
services).
S141.10
Endpoint devices must not be connected to Internet Kiosks
and other generally accessible public facilities.
[SC] Sensitive: Cabinet
[I4] Integrity 4
Endpoint Protection
OCIO/S4.6 version 1.0
Page 9 of 10
ISMF Standard 141
6. REFERENCES AND LINKS
ISMF Guideline 18 - Endpoint protection (incl. smartphones and portable devices)
OCIO/F4.1 Government of South Australia Information Security Management Framework [ISMF]
Government of South Australia Protective Security Management Framework [PSMF] issued as
Premier and Cabinet Circular No. 30
AS/NZS ISO/IEC 27002:2006 Information Technology – Security techniques – Code of Practice
for Information Security Management
Application Whitelisting Explained, Australian Signals Directorate, Australian Government,
Canberra.
This work is licensed under a Creative Commons Attribution 3.0 Australia Licence
Copyright © South Australian Government, 2014.
Disclaimer
Download