Information Security Review For Projects Questionnaire Introduction As part of any significant Information Technology Project, it is very important to identify and incorporate information security requirements at the early planning stage. In doing so, the risk of new security and compliance problems being introduced into the University environment is greatly reduced. It also minimizes the risk of project schedule delays and cost overruns when security requirements must be retrofitted into systems and/or contractual agreements late in the process. The purpose of this questionnaire is to: facilitate identification of security requirements for a given Information Technology Project; and help minimize risks associated with planned outsourcing of Mission Critical IT services. This questionnaire is intended for an Information Technology Project (as defined in the Definitions Section) that will: involve (e.g., create, obtain, transmit, maintain, use, process, store or dispose) institutional data classified as Highly Sensitive; or acquire ongoing vendor IT services (e.g., application software hosting, hardware/software infrastructure, data storage facilities, staffing, etc.) considered Mission Critical by the project sponsor. The questionnaire consists of six sections as follows: 1 2 3 4 5 6 • Identify sensitivity of data the project involves • Describe plans, if any, for use of vendor IT services • Describe planned user access methods • Describe planned data input/output processes • Describe plans for data storage and destruction • Review Institutional Data Protection Standards Directions for Use 1. Joint completion of the questionnaire by the Project Manager and Project Sponsor, with the Project Manager taking the lead, is recommended. 2. The questionnaire should be completed during the project planning phase when most, if not all, requested information is known. (See UVa’s IT Project Management Methodology Overview for activities that typically occur during the project planning phase.) Reviewing the UVa’s Institutional Data Protection Standards prior to completion is recommended. 3. The Project Manager should: a. submit the completed questionnaire and any additional project information he/she believes would be helpful, e.g., project charter, to it-policy@virginia.edu; b. copy the Project Sponsor on the submission; and c. retain a copy with other project documentation. Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 1 of 7 4. The Information Security, Policy, and Records Management Office will review the questionnaire and provide the Project Manager and Project Sponsor with any recommendations it has regarding security and records management measures and/or additional consultation steps. Definitions Authentication – The process of verifying the identity of a user. Examples include but are not limited to use of: user ID/password, hardware token, Netbadge, Enhanced Netbadge. Authorization – The process of establishing a user’s rights or privileges to access the software/hardware/data associated with the project. Encryption – The process of converting data to a form that is incomprehensible, except by the authorized recipient (human or machine). Data may be encrypted during transmission and/or in storage. Examples include but are not limited to use of: VPNs (transmission encryption) and TrueCrypt (storage encryption). Highly Sensitive Data – Institutional data classified as “Highly Sensitive” include personal information that can lead to identity theft if exposed and health information that reveals an individual’s health condition and/or history of health services use. Refer to university policy for examples. Information Technology Project – A project having as its primary purpose the creation of a unique information technology product or service. Consistent with the University Information Technology Project Management Policy, research projects, research initiatives and instructional programs are not included in the scope of this definition. Mission Critical – As a general rule, an asset is critical when its disclosure, modification, destruction, or misuse will cause harmful consequences to the department’s — or the University’s — goals and mission, or will provide an undesired and unintended benefit to someone. See Section B. Step 1: IT Mission Impact Analysis of the University’s Information Technology Security Risk Management Program for further definition and guidance. Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 2 of 7 Information Security Review For Projects Questionnaire Project Name: Project Manager Name: Project Sponsor Name: Date of Questionnaire Submission: 01/02/2013 SECTION 1: IDENTIFY SENSITIVITY OF DATA THAT THE PROJECT INVOLVES Purpose This section identifies the sensitivity level of data that the project involves. This information is needed to determine baseline data security requirements that must be addressed during the project. 1.1. The project involves: (check all that apply) The first name or first initial and last name in combination with and linked to any one or more of the following data elements about an individual: Social Security number Driver’s license number or state identification card number issued in lieu of a driver’s license number Passport number; or Financial account number, or credit card or debit card number. Information that, if exposed, can reveal an individual’s mental or physical condition and/or history of health services use (refer to university policy for examples). Other personally identifiable data the project sponsor considers Highly Sensitive. If checked, describe here: If any box above is checked, explain why the involvement of this Highly Sensitive Data is essential to the system/service to be delivered by the project: SECTION 2: DESCRIBE PLANS, IF ANY, FOR USE OF VENDOR IT SERVICES Purpose This section describes the intent, if any, to acquire ongoing vendor IT services (e.g., application software hosting, hardware/software infrastructure, data storage facilities, staffing, etc.) considered Mission Critical by the project sponsor. This information is needed to determine security requirements that should considered when evaluating vendor services and negotiating vendor contracts. Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 3 of 7 2.1 Will the project acquire ongoing vendor IT services (e.g., application software hosting, hardware/software infrastructure, data storage facilities, staffing, etc.) considered Mission Critical by the project sponsor? Yes No. If checked, skip to Section 3. 2.2 Briefly describe below the service(s) to be acquired, including names of desired vendor(s) if known: 2.3 The vendor service(s) will be acquired via: Request For Proposal Sole Source Procurement Purchase Order Agreement to vendor’s online license user agreement Other. If checked, describe here: NOTE: If the project will not involve Highly Sensitive Data (no boxes are checked in Sub-section 1.1) and will not acquire ongoing vendor IT services (“no” box checked in Sub-section 2.1), further completion and submission of this questionnaire is NOT REQUIRED. Otherwise, proceed. SECTION 3: DESCRIBE PLANNED USER ACCESS METHODS Purpose This section identifies the user population who will have access to the IT product or service to be delivered by the project, as well as planned security access controls. This information will help determine if additional controls are needed to reduce the risk of unauthorized or otherwise inappropriate access to sensitive data. 3.1. What UVa organizational units and general user populations, e.g., students, will have access to the IT product or service delivered by the project? 3.2. What entities external to the University will have access to the IT product or service? 3.3. Briefly describe the process by which Authorization of users will likely be accomplished, if known. Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 4 of 7 3.4. What means will likely be used to Authenticate system users, if known? (check all that apply) Users authorized to Users authorized to access only their access data of own data other individuals IT staff authorized to administer the system User ID and Password NetBadge Enhanced NetBadge Hardware Token Other* * If Other, describe here: SECTION 4: DESCRIBE PLANNED DATA INPUT/OUTPUT PROCESSES Purpose This section describes the planned processes for entering data into and sending it out of the IT product or service delivered by the project. This information will help determine if additional controls are needed to reduce the risk of unauthorized data exposure or integrity compromise in input/output processes. 4.1 Will the IT product or service collect information about individuals directly from those individuals? Yes No. If checked, skip to Sub-section 4.2. What method(s) will likely be used for collecting data from the individuals? (check all that apply) Paper form Web form Fax Phone Scanned document upload Other. If checked, describe here: Is any of the data to be collected from the individuals classified as Highly Sensitive Data? Yes No Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 5 of 7 4.2 Will UVa organizational units enter data into the IT product or service? If so, what data entry method(s) will likely be used? (check all that apply) End user input via Web interface Data entry from collected hard-copy forms File(s) transferred from other system(s) Other. If checked, describe here: Is any data to be entered by UVa organization units classified as Highly Sensitive Data? Yes No 4.3 Will copies of data files be transmitted out of the IT product or service? If so, what transmission method(s) will likely be used? (check all that apply) Electronic file transfers to other information systems within UVa Electronic file transfers to entities external to UVa Spreadsheets/databases created by users of the IT product or service Other. If checked, describe here: For each method checked, briefly describe the purpose of the data files transmission: Is any data to be transmitted classified as Highly Sensitive Data? Yes No SECTION 5: DESCRIBE PLANS FOR DATA STORAGE AND DESTRUCTION Purpose This section describes the plans for storing and destroying data. This information will help determine if additional controls are needed to reduce the risk of unauthorized data exposure or integrity compromise while stored and to verify information security and records management compliance issues are being addressed. Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 6 of 7 5.1 Where will production and test data likely be stored? (check all that apply) On server(s) managed by Information Technology Services (ITS) On server(s) managed by Health Systems Technology Services (HSTS) On server(s) managed by UVa department staff On server(s) managed by vendor Other. If checked, describe here: If known, provide either ITS/HSTS/UVa department server name(s) and/or storage vendor name(s) for each location checked: 5.2 What is the planned schedule for purging production and test data from the IT product or service, if known? 5.3 Where will copies of the IT product or service data likely be stored? Electronic backup media stored in Information Technology Services (ITS) facility Electronic backup media stored in Health Systems Technology Services (HSTS) facility Electronic backup media stored in UVa department facility Electronic backup media stored in vendor facility Paper documents stored in UVa department facility Paper documents stored in vendor facility If vendor facility checked, provide vendor name if known: 5.4 What is the planned schedule for destroying copies of data, if known? 5.5 If copies of Highly Sensitive Data will be stored, will it be encrypted? (See “Encrypting Your Data” for guidance.) Yes No. If checked, explain why not here: SECTION 6: REVIEW INSTITUTIONAL DATA PROTECTION STANDARDS Purpose This step helps verify that the IT product or service delivered by the project will meet UVa’s Institutional Data Protection Standards. 6.1. UVa’s Institutional Data Protection Standards specify mandatory security requirements for each classification(s) of data that will be used by the IT product or service. If there are any questions concerning these standards, please indicate those here: Information Security Review For Projects Questionnaire Version 1.0 April 2013 Page 7 of 7