Information Security Management Policy Purpose This policy defines the objectives, accountabilities and application of information security management in the Department of . . .. Replaces <Previous Policy Document> Commences <date> File: <file reference or policy number> Scope This policy covers the management of security for Department information including technology infrastructure, information systems, business information systems, and the systems and services that store, process and communicate Department information. Principle The <Director General/Chief Executive Officer/Commissioner> is accountable for use of Department resources and to ensure the requirements for information security are satisfied in accordance with the principles of risk management, including: protecting the availability, confidentiality and integrity of information; control of access to and proper use of information and information systems; authentication of users; and non-repudiation of electronic transactions Responsibility The Department’s Corporate Executive Committee is responsible to oversee this policy. Staff members, including contractors and consultants, are responsible to ensure they comply with this policy. Custodian Director, Information Services Date Executive Director, Corporate Services Date Director General Date Approver Endorser © Copyright 2010 The State of Western Australia 106730236 Page 1 of 12 Department of . . . 1. Information Security Management Policy Policy The Department of . . . is responsible for the security of its information and information systems. 2. Objectives To ensure that Department requirements for information security are satisfied in accordance with the principles of risk management: a. the control of access to and proper use of information and information systems b. the availability, confidentiality and integrity of information c. the authentication of users d. the non-repudiation of electronic transactions 3. Definition Interpretation:‘Department information’ means e. any official information, government record or personal information (see the Criminal Code, the State Records Act 2000 (WA), Freedom of Information Act 1992) f. which is created or obtained by the Department, stored by the Department or on Department facilities Interpretation:‘Department resources’ includes g. official information, equipment and facilities (see the Public Sector Management Act (1994), section 9(b)) 4. Application a. The Department will adopt relevant standards for information security management and risk management, including WA Government guidelines b. The compliance with these guidelines is to be managed by the Information Security Group c. Compliance means: regular reviews of security exposures investigation of security infringements, as required an ongoing action plan to achieve continuous improvement in security, within the operational budget allocation d. The Department’s framework for information security management is summarised in the appendices. <Departments should include, policy lists, and delegations> 5. Accountabilities and Responsibilities 5.1. The Director General a. Is accountable for Department compliance with this information security management policy © Copyright 2010 The State of Western Australia 106730236 Page 2 of 12 Department of . . . Information Security Management Policy b. Shall establish a management group to approve information security policies, standards and procedures, and to supervise the management of the information security management process. 5.2. Director, Information Services Director, Information Services is responsible for: a. Information b. Information infrastructure c. Information policies 5.3. Information Security Group The Information Security Group is responsible for: a. formulating and managing the Department’s information security policy b. Coordinating the implementation of security across the Department. 5.4. Information Security Manager The Information Security Manager, <Section>, is responsible for: a. establishing and maintaining a management system for the information security process within the Department b. maintaining the Department’s information and security policies, such as the Computer and Telecommunications Facility Policy. 5.5. Staff Department staff are responsible to: c. understand and comply with the Department’s information security policies, standards and procedures, such as: the Computer and Telecommunications Facilities Policy the Intellectual Property Policy the Backup and Recovery Policy the Virus and Vulnerability Patching Policy d. never subvert or attempt to subvert any security measures related to the protection of Department information systems and assets e. report immediately any actual or suspected security incidents, weaknesses or failures to the Service Desk, Line Manager or Information Security Manager 5.6. System Owners a. Are responsible for ensuring the compliance of their systems with this Information Security Management Policy. 5.7. Divisional Heads, Executive Directors, Directors a. Are responsible for managing the risks to their business processes and assets b. Must manage the information and information systems that belong to their business processes and assets © Copyright 2010 The State of Western Australia 106730236 Page 3 of 12 Department of . . . Information Security Management Policy c. Must ensure that the security requirements that are justified for their processes and assets are satisfied d. Are responsible for managing the risks to their information and information systems e. Are responsible for authorising, controlling access to and administering their information and systems f. Must identify and justify security requirements for their information and information systems g. Are responsible for the development, management and maintenance of jurisdiction specific information security management system including policy, standards and procedures h. Are responsible for their staff and contractors being properly educated about relevant Department information security policy, standards and procedures and being properly trained and authorised to use the information and information systems necessary to perform their work. 6. Policy Promulgation Commencement date Communication process 7. Policy Review The Department reviews and updates this policy as needed. 8. Contact Questions related to this policy document may be directed to the Director, Information Services on (08) 9999-9999. © Copyright 2010 The State of Western Australia 106730236 Page 4 of 12 Department of . . . Appendix – 17799:2006) 9. Information Security Management Policy Minimum Standards (per ISO AS/NZS ISO/IEC Information security is the protection of information from a wide range of threats in order to ensure business continuity, minimize business risk, and maximize return on investments and business opportunities. Information security is achieved by implementing a suitable set of controls, including policies, processes, procedures, organizational structures and software and hardware functions. 9.1. How to establish security requirements It is essential that an organization identifies its security requirements. There are three main sources of security requirements. 1. One source is derived from assessing risks to the organization, taking into account the organization’s overall business strategy and objectives. Through a risk assessment, threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated. 2. Another source is the legal, statutory, regulatory, and contractual requirements that an organization, its trading partners, contractors, and service providers have to satisfy, and their socio-cultural environment. 3. A further source is the particular set of principles, objectives and business requirements for information processing that an organization has developed to support its operations. 9.2. Assessing Security Risks Security requirements are identified by a methodical assessment of security risks. Expenditure on controls needs to be balanced against the business harm likely to result from security failures. 9.3. Selecting Controls Once security requirements and risks have been identified and decisions for the treatment of risks have been made, appropriate controls should be selected and implemented to ensure risks are reduced to an acceptable level [for the Department]. 9.4. Minimum Controls [Protections or Objectives] Controls considered to be essential to an organization from a legislative point of view include, depending on applicable legislation[, must address]: a) data protection and privacy of personal information (see 15.1.4); b) protection of organizational records (see 15.1.3); c) intellectual property rights (see 15.1.2). 9.5. [Recommended] Common Controls Controls considered to be common practice for information security include: a) information security policy document (see 5.1.1); b) allocation of information security responsibilities (see 6.1.3); © Copyright 2010 The State of Western Australia 106730236 Page 5 of 12 Department of . . . Information Security Management Policy c) information security awareness, education, and training (see 8.2.2); d) correct processing in applications (see 12.2); e) technical vulnerability management (see 12.6); f) business continuity management (see 14); g) management of information security incidents and improvements (see 13.2). 10. Appendix – Information Security Categories (delete as needed) The International standards define the following information security categories: Category Summary Risk assessment Security policy management direction Organization of information security governance of information security Asset management inventory and information assets Human resources security security aspects for employees joining, moving and leaving an organization Physical and environmental security protection of the computer facilities Communications and operations management management of technical security controls in systems and networks Access control restriction of access rights to networks, systems, applications, functions and data classification of Information systems acquisition, development building security into applications and maintenance Information security incident management anticipating and responding appropriately to information security breaches Business continuity management protecting, maintaining and recovering business- critical processes and systems Compliance ensuring conformance with information security policies, standards, laws and regulations AS/NZS ISO/IEC 17799:2006 is identical with and has been reproduced from ISO/IEC 17799:2005. ISO/IEC 27002:2005 comprises ISO/IEC 17799:2005 and ISO/IEC 17799:2005/Cor.1:2007. Its technical content is identical to that of ISO/IEC 17799:2005. ISO/IEC 17799:2005/Cor.1:2007 changes the reference number of the standard from 17799 to 27002. © Copyright 2010 The State of Western Australia 106730236 Page 6 of 12 Information Security Management Policy 11. Appendix – Information Security Controls (delete as needed) AS/NZS ISO/IEC 17799:2006 defines 39 information security controls in twelve categories. Category 4 Risk Assessment Section 4.1 Assessing Security risks 4.2 Treating Security risks 5 Security Policy 5.1 Information Security Policy 6 Organization Of Information Security 6.1 Internal Organization 6.2 External Parties 7 Asset Management 7.1 Responsibility For Assets To maintain the security of the organization’s information and information processing facilities that are accessed, processed, communicated to, or managed by external parties. To achieve and maintain appropriate protection of organizational assets. 7.2 Information Classification To ensure that information receives an appropriate level of protection. © Copyright 2010 The State of Western Australia 106730236 Purpose Risk assessments should identify, quantify, and prioritize risks against criteria relevant to the organization. Controls to manage or reduce the risk or its impact To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations. To manage information security within the organization. Sub-sections 6.1.1 Management Commitment To Information Security 6.1.2 Information Security Co-Ordination 6.1.3 Allocation Of Information Security Responsibilities 6.1.4 Authorization Process For Information Processing Facilities 6.1.5 Confidentiality Agreements 6.1.6 Contact With Authorities 6.1.7 Contact With Special Interest Groups 6.1.8 Independent Review Of Information Security 6.2.1 Identification Of Risks Related To External Parties 6.2.2 Addressing Security When Dealing With Customers 6.2.3 Addressing Security In Third Party Agreements 7.1.1 Inventory Of Assets 7.1.2 Ownership Of Assets 7.1.3 Acceptable Use Of Assets 7.2.1 Classification Guidelines 7.2.2 Information Labelling And Handling Page 7 of 12 Department of . . . Category 8 Human Resources Security Information Security Management Policy Section 8.1 Prior To Employment 8.2 During Employment 8.3 Termination Or Change Of Employment 9 Physical And Environmental Security 9.1 Secure Areas 9.2 Equipment Security © Copyright 2010 The State of Western Australia 106730236 Purpose To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities. To ensure that employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner. To prevent unauthorized physical access, damage, and interference to the organization’s premises and information. To prevent loss, damage, theft or compromise of assets and interruption to the organization’s activities. Sub-sections 8.2.1 Management Responsibilities 8.2.2 Information Security Awareness, Education, And Training 8.2.3 Disciplinary Process 8.3.1 Termination Responsibilities 8.3.2 Return Of Assets 8.3.3 Removal Of Access Rights 9.1.1 Physical Security Perimeter 9.1.2 Physical Entry Controls 9.1.3 Securing Offices, Rooms, And Facilities 9.1.4 Protecting Against External And Environmental Threats 9.1.5 Working In Secure Areas 9.1.6 Public Access, Delivery, And Loading Areas 9.2.1 Equipment Siting And Protection 9.2.2 Supporting Utilities 9.2.3 Cabling Security 9.2.4 Equipment Maintenance 9.2.5 Security Of Equipment Off-Premises 9.2.6 Secure Disposal Or Re-Use Of Equipment 9.2.7 Removal Of Property Page 8 of 12 Department of . . . Category 10 Communications And Operations Management Information Security Management Policy Section 10.1 Operational Procedures And Responsibilities Purpose To ensure the correct and secure operation of information processing facilities. 10.2 Third Party Service Delivery Management To implement and maintain the appropriate level of information security and service delivery in line with third party service delivery agreements. To minimize the risk of systems failures. To protect the integrity of software and information. To maintain the integrity and availability of information and information processing facilities. To ensure the protection of information in networks and the protection of the supporting infrastructure To prevent unauthorized disclosure, modification, removal or destruction of assets, and interruption to business activities. To maintain the security of information and software exchanged within an organization and with any external entity. To ensure the security of electronic commerce services, and their secure use. 10.3 System Planning And Acceptance 10.4 Protection Against Malicious And Mobile Code 10.5 Back-Up 10.6 Network Security Management 10.7 Media Handling 10.8 Exchange Of Information 10.9 Electronic Commerce Services © Copyright 2010 The State of Western Australia 106730236 Sub-sections 10.1.1 Documented Operating Procedures 10.1.2 Change Management 10.1.3 Segregation Of Duties 10.1.4 Separation Of Development, Test, And Operational Facilities 10.2.1 Service Delivery 10.2.2 Monitoring And Review Of Third Party Services 10.2.3 Managing Changes To Third Party Services 10.3.1 Capacity Management 10.3.2 System Acceptance 10.4.1 Controls Against Malicious Code 10.4.2 Controls Against Mobile Code 10.5.1 Information Back-Up 10.6.1 Network Controls 10.6.2 Security Of Network Services 10.7.1 Management Of Removable Media 10.7.2 Disposal Of Media 10.7.3 Information Handling Procedures 10.7.4 Security Of System Documentation 10.9.1 Electronic Commerce 10.9.2 On-Line Transactions 10.9.3 Publicly Available Information Page 9 of 12 Department of . . . Information Security Management Policy Category Section 10.10 Monitoring Purpose To detect unauthorized information processing activities. 11 Access Control 11.1 Business Requirement For Access Control 11.2 User Access Management To control access to information. 11.3 User Responsibilities 11.4 Network Access Control To prevent unauthorized user access, and compromise or theft of information and information processing facilities. To prevent unauthorized access to networked services. 11.5 Operating System Access Control To prevent unauthorized access to operating systems. 11.6 Application And Information Access Control To prevent unauthorized access to information held in application systems. To ensure information security when using mobile computing and teleworking facilities. 11.7 Mobile Computing And Teleworking © Copyright 2010 The State of Western Australia 106730236 Sub-sections 10.10.1 Audit Logging 10.10.2 Monitoring System Use 10.10.3 Protection Of Log Information 10.10.4 Administrator And Operator Logs 10.10.5 Fault Logging 10.10.6 Clock Synchronization 11.1.1 Access Control Policy To ensure authorized user access and to prevent unauthorized access to information systems. 11.2.1 User Registration 11.2.2 Privilege Management 11.2.3 User Password Management 11.2.4 Review Of User Access Rights 11.3.1 Password Use 11.3.2 Unattended User Equipment 11.3.3 Clear Desk And Clear Screen Policy 11.4.1 Policy On Use Of Network Services 11.4.2 User Authentication For External Connections 11.4.3 Equipment Identification In Networks 11.4.4 Remote Diagnostic And Configuration Port Protection 11.4.5 Segregation In Networks 11.4.6 Network Connection Control 11.4.7 Network Routing Control 11.5.1 Secure Log-On Procedures 11.5.2 User Identification And Authentication 11.5.3 Password Management System 11.5.4 Use Of System Utilities 11.5.5 Session Time-Out 11.5.6 Limitation Of Connection Time 11.6.1 Information Access Restriction 11.6.2 Sensitive System Isolation 11.7.1 Mobile Computing And Communications 11.7.2 Teleworking Page 10 of 12 Department of . . . Category 12 Information Systems Acquisition, Development and Maintenance Information Security Management Policy Section 12.1 Security Requirements Of Information Systems Purpose To ensure that security is an integral part of information systems. Sub-sections 12.1.1 Security Requirements Analysis And Specification 12.2 Correct Processing In Applications To prevent errors, loss, unauthorized modification or misuse of information in applications. 12.3 Cryptographic Controls To protect the confidentiality, authenticity or integrity of information by cryptographic means. To ensure the security of system files. 12.2.1 Input Data Validation 12.2.2 Control Of Internal Processing 12.2.3 Message Integrity 12.2.4 Output Data Validation 12.3.1 Policy On The Use Of Cryptographic Controls 12.3.2 Key Management 12.4 Security Of System Files 12.5 Security In Development And Support Processes 12.6 Technical Vulnerability Management 13 Information Security Incident Management 13.1 Reporting Information Security Events And Weaknesses 13.2 Management Of Information Security Incidents And Improvements © Copyright 2010 The State of Western Australia 106730236 To maintain the security of application system software and information. To reduce risks resulting from exploitation of published technical vulnerabilities. To ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken. To ensure a consistent and effective approach is applied to the management of information security incidents. 12.5.1 Change Control Procedures 12.5.2 Technical Review Of Applications After Operating System Changes 12.5.3 Restrictions On Changes To Software Packages 12.5.4 Information Leakage 12.5.5 Outsourced Software Development 12.6.1 Control Of Technical Vulnerabilities 13.1.1 Reporting Information Security Events 13.1.2 Reporting Security Weaknesses 13.2.1 Responsibilities And Procedures 13.2.2 Learning From Information Security Incidents 13.2.3 Collection Of Evidence Page 11 of 12 Department of . . . Information Security Management Policy Category 14 Business Continuity Management Section 14.1 Information Security Aspects Of Business Continuity Management Purpose To counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption. 15 Compliance 15.1 Compliance With Legal Requirements To avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements. 15.2 Compliance With Security Policies And Standards, And Technical Compliance 15.3 Information Systems Audit Considerations To ensure compliance of systems with organizational security policies and standards. To maximize the effectiveness of and to minimize interference to/from the information systems audit process. Sub-sections 14.1.1 Including Information Security In The Business Continuity Management Process 14.1.2 Business Continuity And Risk Assessment 14.1.3 Developing And Implementing Continuity Plans Including Information Security 14.1.4 Business Continuity Planning Framework 14.1.5 Testing, Maintaining And Re-Assessing Business Continuity Plans 15.1.1 Identification Of Applicable Legislation 15.1.2 Intellectual Property Rights (Ipr) 15.1.3 Protection Of Organizational Records 15.1.4 Data Protection And Privacy Of Personal Information 15.1.5 Prevention Of Misuse Of Information Processing Facilities 15.1.6 Regulation Of Cryptographic Controls 15.2.1 Compliance With Security Policies And Standards 15.2.2 Technical Compliance Checking 15.3.1 Information Systems Audit Controls 12. Potential Policies (delete as needed) The ISO/AS/NZS Information Security Controls can be used as a framework or structure for information security policies. © Copyright 2010 The State of Western Australia 106730236 Page 12 of 12