Security Policy Tyler Public Safety (TPS) A Project Involving a Detailed Study of Tyler Public Safety’s Security Policies Project performed and presented by Billy Henson ISQS 6342 Strategic Uses of Telecom Technology Summer 2006 June 28 2006 Under the direction of Dr. John R. Durrett The purpose of this project was to gain a deeper understanding of security policies through participating in discussions with Tyler Public Safety’s Security manager, studying Tyler Public Safety’s written security policy, improving the security policy, and comparing those findings with notes taken from class, specifically related to the CIA Triangle.. _______________________________________________________________________ Bhenson 1 of 12 3/6/2016 Table of Contents Executive Summary …………………………………………………… … 3 Work History ………………………………………………………………. 3 General Nature of the Project ………………………………………………. 5 CIA Triangle ………………………………………………………………. 6 Details ………………… ………………………………………….… 7 PC Usage and Guidelines …………………………………………….….…. 8 Acceptable Use Policy… … ……………………………………..……… 9 Facility Security Policy………………………………………….…………. 9 Security Training Policy …….………………………………….…………. 10 Password Policy …………… ……………………………………..……… 10 Network Connection Policy … ……………………………………..………11 Benefits, Future Plans, Take-Aways ………………………………..………11 Summary ………………… … ……………………………………..………12 Bhenson 2 of 12 3/6/2016 Security Policy Security Policy Paper: this is the out of class segment of the course. Write a paper giving me a real world example of a security policy, security standards, and security guidelines for a real business. I prefer one where you have worked if that is not possible the pick one you are familiar with, for instance a University Business School. Executive Summary Security policies are increasingly becoming more important as terabytes of sensitive and valuable information pile up at unbelievable rates. Companies, employees, and customers are involved in and touched by security policies in some form or fashion on a daily basis. When reviewing security policies, guidelines, and procedures, the CIA triangle is a good place to start as it covers many very sensitive areas. In this context, the CIA triangle involves maintaining the confidentiality, integrity, and availability of information resources. Everyone wants the satisfaction of knowing their data is secure, correct, and available at all times. Throughout this paper I will discuss the sections and elements of a real-life security policy maintained by a local company, the reasons for needing each of the sections and elements as they relate to the CIA triangle, accompanied by proposed changes and addendums to the security policy as a whole. Work History I began my professional work experience interning with an agricultural insurance company, AgriPeril Software, during my last semester as an undergraduate at Texas Tech University. While interning as a Foxpro programmer, I was introduced to many new challenges and concepts that seemed overwhelming at first. As time passed I soon learned the company’s culture, what was expected, and what was acceptable. It was Bhenson 3 of 12 3/6/2016 during this time that I learned the importance of guidelines and procedures as they related to the management of security during software development. As a small company that employed five programmers and one support person, AgriPeril was challenged as they competed with much larger companies for business. Formal guidelines and procedures were overlooked, as every team member became responsible for a specific knowledge area, including programming and supporting their work. This informal working environment allowed for greater flexibility among team members and quicker responses to customer’s needs; but with that came many stressful situations that demanded longer work hours. Ironically, this resulted in a very tightly coupled, cohesive team that produced software that eventually became the premier crop insurance application in the field. A much larger insurance company, Fireman’s Fund, had been in the insurance business for many decades, but had never entered into the crop insurance arena. Their focus had primarily been in the areas of life, property, and casualty insurance. Fireman’s Fund eventually acquired AgriPeril just prior to the turn of the century. Soon after the acquisition Fireman’s Fund was faced with ensuring all of their software was Y2K compliant. Realizing the vast number of changes necessary to achieve success in this effort, they decided to further invest in becoming the first crop insurance provider to offer a web-enabled application. This was my first formal introduction to security policies. Prior to building our web-enabled application, everyone who used our system maintained their own database in-house. As we moved to the internet, we made the decision to use DB2 to store everyone’s data in one location. This would allow field and table changes in a much more efficient manner. To help with the security issues related Bhenson 4 of 12 3/6/2016 to everyone’s data located within one database, our CIO brought in a Security Specialist, first as a contractor, but later hired him on full time. The project turned out to be successful, but with success came curious competitors with deep pockets. Fireman’s Fund soon sold off their newly acquired agriculture division, which left many without a job. This led to my employment with INCODE. General Nature of the Project INCODE, a subsidiary of Tyler-Technologies, specializes in providing Technology and Technology Services to local governments. I am currently working in the area that is primarily responsible for developing and maintaining all applications associated within our Tyler Public Safety Division, also known as TPS. Coming up with a project for this course has been a great learning experience in and of itself. I started off by discussing security policies with my immediate boss. This soon led to a very interesting hour-long discussion. During this hour-long meeting, (I call it a meeting because others were brought in), I learned two key things: We had a security officer, but did not have a formal security policy within our TPS division Many had no idea what types of security related policies, other than what we already have in place, might be beneficial to the company We do have security agreements with our clients, and staff with different levels of security access, but very few employees knew of these agreements and access levels. In an effort to discover what security policies would be beneficial to our company, I shared the information I had gained in my research for this project with my boss and others. Bhenson 5 of 12 3/6/2016 After leading into discussions around the CIA Triangle, everything began to come together. We were all in agreement that this was an area that needed to be better defined and discussed in greater detail. I will first briefly explain the CIA Triangle and how it relates to my company, followed by details of my findings and work on this project, and finally ending with a brief overview of benefits, future plans, and takeaways. CIA Triangle As Stated in my quiz, The CIA Triangle is a very good place to start when reviewing a company’s security policy. For the purpose of understanding this area, for those who might not have read my response to the quiz, I have included the breakdown of each of the areas that comprise the CIA Triangle below. Confidentiality As confidentiality relates to IT, it means data and information intended to be private, as outlined in any predefined expectations or otherwise, should remain private. Not only does this include the data itself, but also the knowledge of such data. As a company who deals in matters related to police and court records, as well as many other areas of the criminal justice realm, we are responsible for keeping all of our data confidential at all times. Many of our employees must pass specific security levels before they are able to gain access to sensitive data. Reviewing this area with my coworkers allowed us to take a much closer look at just how sensitive and confidential this information is, and should remain. Integrity Integrity relates to the correctness and accuracy of data. Because we deal with police departments, court systems, and other criminal data, we must be careful that the Bhenson 6 of 12 3/6/2016 integrity of that data remains at a very high level as it passes through our systems. A small mistake during a conversion could change someone’s life forever. Conversions are very common within our industry and customers expect their data to represent exactly what it represented prior to any conversion. This forces our company to run many detailed checks during a conversion process, including record counts from every table. Availability Availability means that when someone requests information, and is authorized do so, the data related to that information is made available to them in a timely manner. As this relates to my company, the availability of data is of the utmost importance. Officers in the field rely on the data to not only be accurate, but also available to them in seconds. By looking up information within our system, an officer can find out if the person is wanted, might be carrying, or otherwise dangerous. Faulty or unavailable information could result in less than desired results for an officer. Details Discussions at work over the last month have evolved around security policies. Everyone seems to be curious and eager to learn more about them. During our discussions we all learned that we, indeed, have a person in charge of security, known as our CSO, with a rather slim security policy in place; but not necessarily in force. For legal purposes, and otherwise, we currently fall under the umbrella of our parent company, but we felt we needed more restrictions and guidelines in place, specifically related to our highly sensitive criminal justice data and information. I asked our CSO to brainstorm with me a couple of hours each week, and help me come up with what a more detailed security policy might look like, if we had one. From these meetings, we Bhenson 7 of 12 3/6/2016 produced the following, which are not a part of TPS. (Much more upper level management and legal involvement would need to take place to enforce any of the items that we discussed). We came up with these five areas very closely tied to the areas found in the text for this class, “The CISSP Prep Guide” (ISBN: 0-7645-5915-X): PC Usage and Guidelines Acceptable use Policy Facility Security Policy Security Training Policy Password Policy Network Connection Policy PC Usage and Guidelines PC Usage and Guidelines covers general guidelines found within many companies. In addition to these we felt it important to break levels of security clearance down within our public safety group, mainly because we have employees cleared through the FBI, while others may be cleared through one of the many Departments of Public Safety across the nation. We also want to include the shredding of any printed documents that may contain sensitive and highly secure information. This would help ensure the confidentiality agreements we have with our clients are maintained. Many times we are required to store criminal information on our computers for validation, testing, and converting into other formats. Because of this, we included a statement within this section that states we will never reproduce or store information on our systems without permission from our clients as well as our Chief Security Officer, (CSO). To Bhenson 8 of 12 3/6/2016 demonstrate what this section might look like, we wrote our ideas down, using “policy” terms, as shown below: TPS staff is prohibited from storing CJIS information in any format. If for some reason a TSP obtains CJIS information in a digital format, the information should remain local and protected by password on their computer and never be placed on the network nor should the TSP share this information with staff other than TSP members. If for some reason a TSP obtains CJIS information in the form of printed materials, the materials should be shredded immediately. The TSO should be notified of the receipt of any CJIS information. For no reason should CJIS information be retained past the end of a working day. The TSP should not only delete but wipe away (leave no trace) of any CJIS information stored on their local computer. Acceptable Use Policy The intention of this policy is not to impose restrictions on the established culture of openness, trust, and integrity that we try to maintain at TPS, but rather to protect our employees as well as our customers. Like many other companies, our users should be aware that the data they create on corporate systems remains the property of TPS. They should encrypt any information that they consider sensitive. As stated throughout this paper, confidentiality is very important when dealing with this type of information. At TPS, employees are allowed to use the internet with very few restrictions. We feel something should be included in the policy that refers to employees being responsible for exercising good judgment regarding the reasonableness of personal use. This will hopefully send a message, letting employees know that this is a privilege, but wrongful use of the internet can potentially damage the security of our data. Facility Security Policy We currently operate out of two buildings side by side. One requires a magnetic card for entry, while the other requires a 4 digit key-code. Access to either facility is an Bhenson 9 of 12 3/6/2016 important aspect in protecting network security. Allowing access to individuals other than TSP staff could compromise network security. Because of this, we felt that key codes should be assigned by the CSO for each TPS staff member. We also wanted to mention that TPS staff members should secure their key code by memorization and not store the information in any other location. (This is easier said than done most times). Over the course of a month we average about 10 customers, or potential customers, visiting our facility. We thought it would help send a sense of security if we ensured that each visitor was always escorted by a TPS staff member. Finally, to help ensure our facilities are as secure as possible, in our ideal world, the CSO will audit the access to our facilities on a monthly basis and investigate any access to the facility outside of regular working hours. Security Training Policy We felt that training was an area most often overlooked by ourselves and many other IT shops. Because security is so important and we have failed in the area of training in the past, we felt it important to include this section. Having the CSO responsible for reviewing the Security and Computer Use Guidelines and Policies at least on an annual basis with all TPS staff members is our first note. This will ensure everyone is in “theknow”, while keeping security at the forefront. We also thought it would be a good idea to have the TSO review the Security and Computer Use Guidelines with new TPS staff members on the first day of employment, in an effort to communicate and support our commitment to security. Password Policy Our password policy is pretty typical of what everyone else is enforcing, with documented examples of poor passwords, and suggestions for strong passwords. Bhenson 10 of 12 3/6/2016 Included with this is a pneumonic for memorizing passwords without having to write them down. For example, try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. Network Connection Policy We have many developers and support staff who bring laptops and other devices to work for various reasons. We decided that all computers installed on TPS network fall under the authority and responsibility of the CSO and must meet the minimum security requirements of TPS regulations and policies. The intent of this policy is to ensure that all systems installed on the TPS network are maintained at appropriate levels of security while at the same time not impeding the ability of TPS staff to perform their work. Benefits, Future Plans, Take-Aways One of the major benefits of this project is I now know the rules within our company and what is expected of me. I learned of the CIA Triangle, and brought others in who were as curious about this new information and what we might turn up. In the future we plan to formalize a security policy, get upper management buy-in, and ensure our security policy is shared and signed by all employees. Plans to review such a policy, on a regular basis will be a major key to its success. Throughout this project, I realized just how much I did not know about security policies, but feel I have improved, and hope to continue in that direction.. Bhenson 11 of 12 3/6/2016 Summary In summary, security management is becoming increasingly more important to companies that wish to maintain a competitive advantage in the marketplace. Because of this, candidates for employment who possess certifications and demonstrated experience in the areas of security will have a distinct advantage over other candidates who lack such credentials. As companies evolve and attempt to remain competitive in the marketplace, guidelines, procedures, and rules will certainly change as well. Because of this, it is advantageous for companies and employees to build firm foundations in the areas of security management and training, but to do so in a way that will allow them the flexibility to adapt to change in a relatively short amount of time. Bhenson 12 of 12 3/6/2016