Commonwealth of Massachusetts Information Technology Division Enterprise Access Control Policy Reference #: ITD-SEC-X.X Issue Date: Month XX, 2010 Issue #: No. Pri #17 Draft v. 0.4 TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................. 1 WHO THIS POLICY APPLIES TO................................................................................. 2 POLICY STATEMENT ................................................................................................ 2 ROLES AND RESPONSIBILITIES .................................................................................. 9 RELATED DOCUMENTS ........................................................................................... 10 CONTACT.............................................................................................................. 11 TERMS ................................................................................................................. 12 DOCUMENT HISTORY ............................................................................................. 14 EXECUTIVE SUMMARY This policy articulates requirements to ensure that appropriate security and access controls are applied to applications, information assets, Information Technology (IT) Resources and infrastructure for local and remote access to prevent any compromise of confidentiality, integrity and availability of the data and IT Resources used to manage the services provided by Commonwealth agencies, authorities, and business partners. In addition, the purpose of this policy is to ensure that remote access to the Wide Area Network (WAN) and all Commonwealth IT domains does not result in an unacceptable level of risk to the security of the connected IT systems. Since a security breach committed or caused by one agency WAN user can adversely impact other agency members or the entire IT environment, all agencies must take responsibility for their system’s security by adhering to the requirements of this policy. It is the responsibility of Agency Heads to have the appropriate combination of controls (administrative, technical, physical) in place and in effect that provide reasonable assurance that security objectives are addressed. Agencies must achieve compliance with the overall information security goals of the Commonwealth including compliance with laws, regulations, policies and standards to which their technology resources and data, including but not limited to personal information, are subject. - Uncontrolled if printed - Page 1 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 WHO THIS POLICY APPLIES TO All Secretariats and their respective Agencies and entities governed by the overarching Enterprise Information Security Policy must adhere to requirements of this supporting policy. Executive Department Secretariats and their respective Agencies, 1 in addition to any agency or third party that connects to the Commonwealth’s wide area network (MAGNet), must comply with this policy. Executive Department Secretariats and their respective Agencies are required to ensure compliance by any business partner that accesses Executive Department IT Resources or shared environments, e.g. MAGNet; and Executive Department Secretariats and their respective Agencies are required to ensure compliance by third parties in any aspect of the process of providing goods and services to their agency. These include, but are not limited to, electronic data collection, storage, processing, disposal, dissemination and maintenance. Third parties that interact in any way with Executive Department Commonwealth IT Resources, e.g. MAGNet, are required to comply with this policy. Other Commonwealth entities are encouraged to adopt, at a minimum, security requirements in accordance with this Enterprise Access Control Policy or a more stringent agency policy that addresses agency specific and business related directives, laws, and regulations. POLICY STATEMENT BUSINESS REQUIREMENT FOR ACCESS CONTROL Executive Department Secretariats and their respective Agencies are required to implement controls for authorized access to information, IT Resources, information processing facilities, and business processes on the basis of business and security requirements. This policy is preconditioned upon having performed for all users, background verification checks (as part of human resource security procedures) for employees, contractors and third party users in accordance with relevant ethics, laws and regulations commensurate with business requirements, data classes to be accessed and the perceived risks. The following must be applied when evaluating and implementing access controls: 1. Access to IT systems must be commensurate with security requirements of that system and the classification of data it provides access to. 1 The Executive Department is comprised of the Executive Branch minus the Constitutional Offices, i.e., the State Auditor, State Treasurer, the Attorney General, and the Secretary of the Commonwealth. - Uncontrolled if printed - Page 2 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 2. Authentication methods used for systems classified as having medium sensitivity must at a minimum require a username/password combination to provide verification of the users’ identity. 3. Agencies must develop and/or maintain an access control policy including remote access that documents agencies’ use of authorized and acceptable remote access methodologies. USER ACCESS MANAGEMENT 1. User Registration Agencies must have an appropriate Human Resource identity proofing and pre-provisioning process in place to ensure and verify an individual’s identity prior to the creation of user accounts and associated IT Resource access. Agencies are responsible for applying sufficient user registration controls that accomplish the following: a. Provide an inclusive and exhaustive listing of all users to be registered. b. Provide unique identification of enabled users c. Administer permissions of authorized user within a system or environment as required by the business owner and appropriate stakeholders d. Provide authorized users with documentation of their access rights and responsibilities and verification of user acceptance of terms e. Ensuring service providers do not provide access until authorization procedures have been completed f. Maintains system/environment specific documentation of current users and their access g. Allows for appropriate blocking of access based on role changes or change of employment h. Ensures that redundant user IDs are not issued to other users 2. Privilege Management Access control rules must take into account existing policies for information dissemination and authorization with consideration for the application of: Least privilege: grant only the lowest level of access, rights, privileges, and security permissions needed for the performance of authorized tasks to all IT systems which include: a. Allocation of user privileges on a need-to-use basis, per system, per application; b. Allocation of user privileges per business requirements with the minimum requirements per functional role. c. Restriction of system administration privileges and usage of “super user” account log on. - Uncontrolled if printed - Page 3 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 d. Agencies must adhere to the principles of separation of duties when assigning job responsibilities and roles relating to restricted or IT Resources identified as mission critical and classified as high sensitivity. e. Agencies must limit and provide access to IT systems and users based upon the following criteria: system and data classification, business requirements, job function, related responsibilities or “need to know”. Unique roles and responsibilities must be assigned with consideration for the segregation of access control roles (i.e. access request, access authorization, and access administration) and management to reduce the risk of accidental or deliberate system or application misuse. Implementation and enforcement of the separation of duties security principle provides a mechanism to manage conflict of interest and restricts the amount of power and/or control by an individual while reducing risk of system or application misuse. 3. User Password Management Allocation of complex passwords through a formalized and preferably automated process requiring users to change their passwords at periodic intervals and restrict re-use of previously used passwords 4. Review of User Access Rights Agencies must establish procedures to cover all phases in the life-cycle of user access, authorization and privileges from provisioning to de-provisioning. User accounts and associated access and authorization in all systems (e.g. Active Directory as well as within applications themselves) must be reviewed at regular intervals or when employment or information system changes occur which impact their roles, responsibilities and system access requirements. Agencies should implement session time outs for inactive sessions depending upon the application type, classification of the data, and the types of access to the data and IT systems to reduce the risk of access by unauthorized persons including: a. Invoke account lock-outs following a fixed number of unsuccessful log on attempts and; b. Enforce user screen/computer lock out settings upon the assigned time period of inactivity (i.e. password protected screen saver). c. Resumption of the session must require re-authorization USER RESPONSIBILITIES Require users to sign an acknowledgement statement of the conditions prior to use of remote access systems. - Uncontrolled if printed - Page 4 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 1. Password Use Agency users must be advised to: a. Keep passwords confidential b. Avoid keeping a record (e.g. paper, software file or hand-held device) of passwords, unless this can be stored securely and the method of storing has been approved 2. Unattended User Equipment Agency users must be advised to: a. Terminate active sessions when finished, unless they can be secured by an appropriate locking mechanism, e.g. a password protected screen saver 3. Clear Desk and Clear Screen Policy A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities must be adopted that is compatible with the working environment of Agency staff. NETWORK ACCESS CONTROL 1. Policy on Use of Network Services Agencies must specify: a. network and network services which are allowed to be accessed b. authorization procedures for determining who is allowed to access which networks and networks services c. management controls and procedures to protect access to network connections and network services d. the means used to access networks and network service (e.g. the conditions for allowing access to an Internet service provider or remote system) 2. User Authentication for External Connections Agencies must use approved techniques to authenticate remote users, e.g. VPN 3. Equipment Identification in Networks Agencies must indicate that communications to IT assets can only be initiated from a specific locations and equipment types, e.g. Agency-owned equipment. A protocol for approving non-standard equipment must be instituted in the case of external contractors. This protocol must contain provisions for equipment which does not remain onsite and which may become infected with malware while off-site. - Uncontrolled if printed - Page 5 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 4. Remote Diagnostic and Configuration Port Protection TBD 5. Segregation in Networks Agencies must adopt a segmentation approach to separate logical network domains. An organization’s internal network domains must be separated from external facing network domains or DMZ, each protected by a defined security perimeter with unique parameters appropriate for that segment. Consideration should be given to the segregation of wireless networks from internal and private networks. 6. Network Connection Control (flow control) The connection capability of Agency users must be restricted through network gateways that filter traffic by means of pre-defined tables or rules. Examples are: messaging, e.g. electronic mail, file transfer, interactive access, application access 7. Network Routing Control Controlled access and authentication to applications, systems and networks: A combination of application and business requirements are the determining factors in developing and defining flow control as it relates to application, system and network access. Flow control is the management of data flow between computers and\or devices or between nodes in a network so only the necessary sources, destinations and ports are allowed to transverse the network. Agencies will protect IT systems through the following approaches: a. Restrict access to all systems per business application requirements and allow access to only those required and at the minimum level required. b. Deploy a firewall or secure gateway which must protect the internal trusted network from an external un-trusted (public) network such as the Internet. c. Ensure the secure gateway provides a level of protection to ensure that only authorized users can access the internal network. d. Enforce encryption when remote users are accessing and transferring data which is classified as high sensitivity. e. Establish, document and test processes for revoking access rights or interrupting the connection between systems when appropriate. f. Require agency remote access users to utilize an authorized agency computer system for remote access where possible. If home computers are used for remote access to agency IT resources, the computer must be configured at a minimum with: antivirus software with current definition files, spyware detection and removal tools, personal firewall, manufacturer supported operating system with current updates and - Uncontrolled if printed - Page 6 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 agency supported remote access software as prerequisites for remote access to Commonwealth IT systems. OPERATING SYSTEM ACCESS CONTROL 1. Secure Log-on Procedures Agency login procedures must, as a rule, minimize the opportunity for unauthorized access. The log-on procedure should therefore disclose the minimum of information about the system, in order to avoid providing an unauthorized user with any unnecessary assistance. A good log-on procedure should: a. Not display system or application identifiers until the log-on process has been successfully completed b. Record successful and failed system authentication attempts c. Issue alarms when system security policies are breached d. Where appropriate, restrict the connection time of users 2. User Identification and Authentication TBD 3. Password Management System TBD 4. Use of System Utilities TBD 5. Session Time-out TBD 6. Limitation of Connection Time TBD 7. Communication and Operations Management Assignment of Privileges: Agencies must adhere to the principles of separation of duties when assigning job responsibilities and roles relating to restricted or IT Resources identified as mission critical and classified as high sensitivity. Agencies must limit and provide access to IT systems and users based upon the following criteria: system and data classification, business requirements, job function, related responsibilities or “need to know”. Administration of Privileges: Unique roles and responsibilities must be assigned with consideration for the segregation of access control roles (i.e. access request, access authorization, and access administration) and management to reduce the risk of accidental or deliberate system or - Uncontrolled if printed - Page 7 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 application misuse. Implementation and enforcement of the separation of duties security principle provides a mechanism to manage conflict of interest and restricts the amount of power and/or control by an individual while reducing risk of system or application misuse. APPLICATION AND INFORMATION ACCESS CONTROL Place IT resources which require remote access in a DMZ where possible. 1. Information Access Restriction 2. Sensitive System Isolation MOBILE COMPUTING AND TELEWORKING 1. Mobile Computing and Communications Wireless and remote access methods and controls: Wireless local area network (LAN) access is considered to be remote access and therefore subject to the following authorized and supported remote access methods and controls to agency systems: a. Ensure the logon process uses an appropriately strong mechanism to validate a user’s identity. Two-factor authentication is required for remote access. b. Utilize strong passwords, and further enforce the use of such strong passwords where technically feasible. c. Implement and utilize authorized VPN technology standard supported by the agency for all users that require remote access. d. Invoke and maintain system controls that log identification of each remote access user. e. Invoke and maintain system audit logs of remote user activity. f. Comply and adhere to the following authorized methods and related standards when agency remote access services are utilized and deployed including: 1. Mass.Gov Portal (State’s Web Server) 2. Public Access Architecture (PAA) 3. MassMail Remote Access - Activesync, Outlook Web Access (OWA) and Native Outlook 4. Enterprise SSL VPN Solution. - Uncontrolled if printed - Page 8 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 g. Educate users of the specific risks, threats, vulnerabilities and the proper use of a secured remote access system. h. Inform users to notify appropriate agency security staff if they see or witness suspicious activity, or activity that violates this policy. 2. Teleworking a. Communicate and educate agency users regarding adherence to Enterprise Wireless Security Policy & Standards. ROLES AND RESPONSIBILITIES All agencies and entities governed by the overarching Enterprise Information Security Policy are subject to the referenced roles and responsibilities in addition to those specifically stated within this supporting policy. The roles and responsibilities associated with implementation and compliance with this policy follow: Assistant Secretary for Information Technology Develop mandatory standards and procedures for agencies to follow before entering into contracts that will provide third parties with access to electronic high sensitivity information including but not limited to personal information or IT systems containing such information. The Assistant Secretary for Information Technology is responsible for the approval and adoption of the Enterprise Access Control Policy and its revisions. Secretariat Chief Information Officer (SCIO) and Agency Head SCIOs and Agency heads are responsible for exercising due diligence in adhering to the requirements contained in this policy. Provide communication, training and enforcement of this policy that support the security goals of the Secretariat, its agencies and the Commonwealth. Provide proper third party oversight as applicable for access to and communication with agency IT Resources including applications and information assets. Secretariat or Agency Information Security Officer (ISO) Ensure that the goals and requirements of the Enterprise Access Control Policy are implemented and met. - Uncontrolled if printed - Page 9 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 Enterprise Security Board (ESB) Recommend revisions and updates to this policy and related standards. Information Technology Division (ITD) After review of any related recommendations of the Enterprise Security Board, issue revisions and updates to this policy and related standards. Third parties Required to comply with agency implementation of this policy at a minimum or a more stringent agency specific policy including: o Attestation and certification that third parties have read Executive Order 504 and this policy. o Review and compliance with all information security programs, plans, guidelines, standards and policies that apply to the work they will be performing for their contracting agency. o Communication of such provisions to and enforce them against their subcontractors, and that they will implement and maintain any other reasonable and appropriate security procedures and practices necessary to protect high sensitivity information including but not limited to personal information to which they are given access as part of the contract from unauthorized access, destruction, use, modification, disclosure or loss. RELATED DOCUMENTS Related Standards and Procedures include: Mass.Gov Portal Public Access Architecture Outlook Web Access (OWA) Procedures Security Shared Service Procedures VPN Procedures Primary references that were used in development of this policy include: ISO 27001 Executive Order 504 Additional information referenced includes: M.G.L., Ch 93H M.G.L., Ch 93I - Uncontrolled if printed - Page 10 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division ITD-SECX.X: Enterprise Access Control Policy Issue Date: XX/XX/2010 M.G.L., Ch 66A ISO 27002 CobiT ITIL HIPAA Security Rule CONTACT Standards@state.ma.us - Uncontrolled if printed - Page 11 of 14 Medium sensitivity Commonwealth of Massachusetts Information Technology Division Appendix: Terms TERMS Key terms used in this policy have been provided below for your convenience. For a full list of terms please refer to the Information Technology Division’s web site where a full glossary of Commonwealth Specific Terms is maintained. Agency – A department, bureau, commission, board, office, council, or other entity in the executive department of government, which was created by the constitution or statues of this State. Business Partner – A generic term referring to both contracted business partners and statutory business partners. Contracted Business Partner - An entity under contract with the Commonwealth with which the Commonwealth has an agreement to share data or engage in secure communications for a limited purpose. Contracted business partners do not include individuals who are under contract with and paid directly by the Commonwealth. DMZ – Demilitarized Zone. DMZ, within the context of this policy is defined as a network added between a protected internal network and an unprotected external network in order to provide a layer of security. A DMZ is sometimes referred to as a “perimeter network”. The DMZ is a location where Internet accessible servers are maintained separately from the internal network. If a DMZ-sited server is breached, it prevents a greater security vulnerability to the internal network. XDMZ - An extended Demilitarized Zone (see DMZ above), in which the DMZ has been deployed either within the Internal network or located within the ITD or local agency environment. Employees – Either Agency’s employees or individuals under contract with the agency to provide services and paid directly by the agency whose work is controlled and directed by the agency. Hardware – Includes computers and any physical equipment used in connection with it, such as keyboards, printers, etc. Information Technology (IT) Resources – Commonwealth’s computers, printers, and other peripherals, programs, local and wide area networks, access to the Internet when provided by the Commonwealth, and remote access methods, including VPN. MAGNet – Commonwealth’s Wide Area Computer Network. OWA - is Outlook Web Access. OWA is a feature subset of Microsoft Outlook that allows MassMail users to remotely access their email via a web browser. - Uncontrolled if printed - Page 12 of 14 Medium sensitivity Business Partner – A generic term referring to both contracted business partners and statutory business partners User – Any workforce member (or computer performing automated tasks) with a legitimate reason and purpose to use Commonwealth IT resources - Uncontrolled if printed - Page 13 of 14 Medium sensitivity Commonweatlh of Massachusetts Information Technology Division Appendix: Document History DOCUMENT HISTORY Date Action Effective Date MM/DD/YYYY Ref # Enterprise Access Control Policy - Uncontrolled if printed - Page 14 of 14 Next Review Date MM/DD/YYYY MM/DD/YYYY Medium sensitivity