Information Services IT Security Policies L. Network Management

Size: px
Start display at page:

Download "Information Services IT Security Policies L. Network Management"

Transcription

1 Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security policy: Eoin Dunne Location on web: Table of Contents 1. Introduction Network configuration Controlling access Physical security and integrity Controls addressed in this document

2 1. Introduction The DIT network consists of an interconnection of more than 10,000 networked devices. These include computers, printers and other networking equipment. The Institute depends heavily upon its IT network for research, teaching and administrative activities. It is essential that the stability, integrity and security of the DIT network be safeguarded. This policy defines the Institute regulations regarding management of the DIT network. 1.1 Network management roles and responsibilities The Chief Information Officer (CIO) will have authority to develop, implement and enforce information security policy. The integrity of the DIT network, including the backbone, is the responsibility of Information Services. In order to fulfil this goal, the network service will have an IT Chief Technology Officer who should be assigned responsibility for ensuring the DIT network is appropriately designed, configured and managed in accordance with the business needs of the Institute All users have a responsibility to report promptly to Information Services any incidents which may have security significance to the Institute. 1.2 Background to this document This policy and other associated IT security policies form part of the Institute s IS organisational security policies. The Institute has adopted the UCISA Information Security Toolkit as the framework for its Information security policies. The toolkit draws heavily on the British Standard BS 7799 which was also the main source of the international standard ISO The tool kit comprises sixteen sections, of which this corresponds to Section L. The Institute will have a policy for each section adapted to its needs. Each policy will also refer to associated procedures and guidance notes that are relevant to the policy. 1.3 Intended audience This document is intended to be read by those Institute staff responsible for the management of the DIT network. 2

3 2. Network configuration The DIT network shall be adequately managed and controlled, in order to be protected from threats, and to maintain security for the systems and applications using the network, including information in transit. To provide this, the following measures should be considered: The network must be designed and configured to deliver high performance and reliability to meet the Institute s needs whilst providing a high degree of access control and a range of privilege restrictions An appropriately configured firewall shall be used to protect the network supporting the Institute s business systems 2.1 Connection to the DIT network All equipment connected to the DIT network must conform to the appropriate standards as set by Information Services and run only across the backbone using the supported protocols. Only Information Services or authorised Faculty IT support may connect devices to the DIT network. An exception to this is where Institute staff may connect portable Institute-owned devices to an preassigned data point Connection of wireless equipment Information Services are responsible for providing a secure and reliable campus network to support the mission of the Institute. Under this broad responsibility, the following wireless policies apply: All wireless access points shall be deployed and managed by Information Services. The IT Chief Technology Officer shall have authority to remove any unauthorised devices from the DIT network. Wireless areas are the only locations where users may attached their personally owned devices. Such access is covered by the regulations governing the use of computer resources. Installation of wireless access points for research purposes must be authorised in advance by the IT Chief Technology Officer Connection of servers The connection and use of a computer running a server operating system software or otherwise functioning as a server must be authorised by Information Services. All Servers must have a defined administrator who is responsible for: Server administration and maintenance Server security including but not limited to data backup, access control, operating system and application updates and security patches 3

4 Information Services reserves the right to bar access to servers containing material considered illegal or likely to bring the Institute into disrepute. The Institute also reserves the right to take disciplinary action in these circumstances. In the event that a server, or other device, is causing an unacceptable level of interference with the operation of the DIT network, Information Services reserve the right to disconnect the server from the network. 2.3 Segregation in networks Groups of users and information systems shall be segregated on separate logical networks. This should be done by configuring a number of Virtual Local Area Networks (VLANs) which are designed and deployed for security and performance reasons. VLANs commonly provided include but are not limited to: Data centres/server rooms Staff rooms Student labs/classrooms Wireless networks Routing controls shall be implemented for networks to ensure that computer connections and information flows do not breach the access control policy of the business applications. An updated list of VLANs in use will be maintained and reviewed regularly. Also, all network addresses; including IP addresses, must be allocated and administered by Information Services. Physical and logical access to diagnostic and configuration ports on network equipment shall be controlled. Moves, changes and other reconfigurations of users network access points will only be carried out by staff authorised by Information Services according to procedures laid down by them. 2.3 Change control procedures The implementation of new or upgraded software or firmware must be carefully planned and managed. Formal change control procedures, with audit trails, shall be used for all changes to critical systems or network components. All changes must be properly tested and authorised before moving to the live environment. 3. Controlling access 3.1 Policy on use of network services Procedures shall be established for all network services to ensure that access rights for users are adjusted appropriately, and in a timely manner, whenever there is a change in business need, staff change their role, or staff or students leave the Institute. All access rights should be reviewed at regular intervals. Access to all network services shall use a secure login process and access to the Institute s business applications shall also be limited by time of day or by the location of the initiating terminal or both. 4

5 Automatic equipment identification shall be considered as a means to authenticate connections from specific locations and equipment. Where such connections directly impede the service to the rest of the Institute, Information Services reserve the right to block the connection without prior warning. The designated administrator for such equipment must rectify any threats to Institute security before the connection can be re-established 3.2 User management for external connections External connections are connections to devices and services within the Institute from devices outside of DIT. This is commonly known as remote access and includes but is not limited to: Virtual Private Network (VPN) connections Connections directly across the Internet VPN connections are the recommended approach for DIT staff and third parties requiring remote access. Information Services are the sole providers of the Institute s VPN service. The service is intended for use on DIT computers only. It must be used from secure private locations and not from public locations such as Internet cafes. All connections via the VPN service will be logged. No other remote access service shall be installed or set up, including single modems connected to servers or workstations. Any active dial-in services found to be in existence will be removed from the network. For direct connections, the policy is default deny. Connections to devices and services within DIT from external devices will be not be allowed unless they have first been approved by Information Services. Requests must be signed by the line manager of the requestor and will be examined by the Network & Systems team to ascertain if the change poses any risk to integrity of the DIT network. Approval will be based on the following criteria: The connection is required for DIT business. The connection does not represent an unnecessary security risk to DIT. The connection does not use an insecure protocol where a more secure alternative exists. The connection does not involve unnecessary replication of functionality. The cost of implementing the exception is proportional to the benefit to DIT. Remote connections to any campus IT services are subject to the same rules and regulations, policies and practices just as if the users were physically on the campus. All DIT staff and external third parties who need remote access to DIT computing resources will be dealt with on an individual basis. Requests for access to specific applications will need to follow the procedures outlined in the User Access Setup and Review of User Accounts section in the A. Information Security policy. For further information please refer to the following documents: Staff VPN Support Agreement Acceptable usage policy for staff and students Internet usage policy 5

6 Remote access policy DIT Password Policy Declaration of Agreement to Comply with Internet Usage Firewall change request form 4. Physical security and integrity 4.1 Protecting against external and environmental threats Networking and communications facilities, including wiring closets, data centres and computer rooms, must have good physical security. These facilities should be housed in a secure areas, protected by a physical security perimeter with appropriate access control and hazard reduction mechanisms in place. To reduce the risk of services being disrupted, the following measures must be considered: Where possible, key facilities should be sited away from areas of public access or direct approach by public vehicles The facilities should also be in areas where there is a reduced risk of fire, flood, explosion and damage from neighbouring activities or natural disasters There should be no obvious signs identifying the presence of network equipment. Hazardous or combustible materials should not be stored within equipment rooms. Appropriate safety equipment should be installed, such as heat and smoke detectors with a procedure in place to monitor alerts Fire protection measures such as self closing fire resistant doors should be in place Any fire extinguishing equipment must be of the correct type and suitably located Doors should be locked when unattended. External protection should be considered if there are windows. The facility has to be periodically checked for hazards and unnecessary items must be removed. Unprotected diagnostic ports, out-of-band management ports and in-band access to diagnostic and management services (e.g. SNMP or web interfaces on routers) might all provide a means of unauthorised access. Where Institute staff require access to the networking and communications facilities, the following guidelines must be considered: Access to the secured area shall be limited to authorized personnel only and should be issued in accordance with formal procedures Personnel must be trained in emergency evacuation procedures and in the use of fire extinguishers 6

7 Access to ports on network equipment should be protected by appropriate security mechanism (e.g. a key lock, secure login, dial-back or limiting the locations that can gain access) Access to the secured area should be controlled by advanced locks (i.e. key pads, swipe cards) and periodically reviewed, to ensure that only appropriate individuals are allowed access Access must be revoked promptly when no longer needed (e.g. when authorized individuals change jobs). A policy prohibiting consumption of food and drink must be strictly enforced When access to secure areas is required by third parties, Institute staff are required to adhere to the standard operating procedure for the Management of Contractors issued by the Buildings Office. They should also bring it to the attention of the third party. In addition to the above, the following measures should also be applied: Visitors and third parties have to be supervised at all times. Visitors and third parties should wear visible means of identification. Employees have to be encouraged to challenge unescorted strangers or personnel with no visible identity For further information on measures to protect networking and communications facilities, please refer to the following policy documents: Physical and environmental security Server room access 4.2 Equipment siting and protection Networking and communications equipment outside of the secure areas such as wireless equipment also need protection from unauthorised access. The following security measures can be applied to reduce these risks: Wireless aerials should be positioned so that they are out of physical reach, and can be maintained only by authorised personnel. Power and network connections to the wireless units should be adequately protected. Wireless aerial power levels should be reduced to prevent the signal being broadcast beyond designated areas, while still providing coverage. Network and user access controls should be used to reduce the risk of the wireless network being used for unauthorised purposes. Wired network switches should be located in locked cabinets with access restricted to authorised personnel 7

8 Access to network equipment located on building roofs must first be approved by the IT Chief Technology Officer 4.3 Supporting utilities To reduce the risk of services being disrupted, supporting equipment such as climate control units and uninterruptible power supplies (UPS) should be correctly maintained to ensure the continued availability and integrity of critical networking and communications equipment The power supply to critical computer and communications equipment must be protected by UPS devices and backup generators, where necessary, to provide an alternative source of power in the event of extended power failure The installation of supporting equipment must be conducted by a qualified contractor certified to the appropriate Irish Standards Electrical equipment should have a clearly marked emergency power off button protected from accidental activation. The temperature and humidity of equipment and cabling rooms will be monitored and controlled. Air quality, lighting, temperature and humidity must be regulated in compliance with applicable Health and Safely legislation. 4.4 Cabling security Cables carrying data or supporting information services require protection from interception or damage. Cabling within buildings should be protected, by using conduit or by avoiding routes through public areas, and cables between buildings should be underground where possible (or subject to adequate alternative protection). Where cables form part of a loop, consideration should be given to using separate routes in order to reduce loss in the event of damage. Cabling in public areas (e.g. to wireless units) should be unobtrusive and out of physical reach Information Services must be informed of any proposed physical re-organisation to the network. This includes requests for extra cabling. All requests for physical connections to the DIT network backbone must be directed to the IS Support desk. Cabling must be installed to the requirements listed in the following documents so that Information Services are in a position to ensure the current and future delivery of the network service and satisfy quality and performance objectives. For further information on cabling standards, please refer to the following policy: Technical Cabling Standards Policy Cabling in wiring centres The cabling used in major server rooms and wiring centres should be reviewed on an annual basis to ensure that critical equipment remains accessible and to reduce the risk of hot spots from air vents 8

9 being blocked by inappropriate patching. During a cabling review, the following should be considered: Cabling to inactive ports on switches should be removed Cables should be of the correct length for patching between devices and patch panels Labelling of cables for critical devices should be applied Damaged cables or cables of the incorrect colour should be replaced Doors for cabling cabinets should remain closed and locked when not in use In addition to the above, a log book should be provided for each major server room and wiring centre so that events can be recorded along with any remedial action taken 4.5 Equipment maintenance Equipment should be correctly maintained to ensure its continued availability and integrity and servicing should only be performed by authorised personnel. Additional controls might include: Supporting equipment (e.g. UPS, back-up generators, climate control) should be tested and serviced in accordance with manufacturers' recommendations Measures should be taken to protect against dust if there is an excessive amount The air flow of climate control equipment must not be impeded by the incorrect placement of equipment (e.g. leaving servers out of their racks) A record of all faults or suspected faults should be kept in a log book 5. Controls addressed in this document Standard Objective no. Description BS 7799 / ISO Allocation of information security responsibilities BS 7799 / ISO Protecting against external and environmental threats BS 7799 / ISO Equipment siting and protection BS 7799 / ISO Supporting utilities BS 7799 / ISO Cabling security BS 7799 / ISO Equipment maintenance BS 7799 / ISO Network controls BS 7799 / ISO Security of network services BS 7799 / ISO Policy on use of network services BS 7799 / ISO User authentication for external connections 9

10 BS 7799 / ISO Equipment identification in networks BS 7799 / ISO Remote diagnostic and configuration port protection BS 7799 / ISO Segregation in networks BS 7799 / ISO Network connection control BS 7799 / ISO Network routing control BS 7799 / ISO Change control procedures 10

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

PHYSICAL AND ENVIRONMENTAL SECURITY

PHYSICAL AND ENVIRONMENTAL SECURITY PHYSICAL AND ENVIRONMENTAL SECURITY 1.0 STANDARD FOR PHYSICAL AND ENVIRONMENTAL SECURITY - EQUIPMENT 1.1 PURPOSE The purpose of this standard is to establish baseline controls to prevent loss, damage,

More information

Standard: Data Center Security

Standard: Data Center Security Standard: Data Center Security Page 1 Executive Summary The university data centers provide for the reliable operation of SJSU s computing systems, computing infrastructure, and communication systems.

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Information Security Management

Information Security Management Information Security Management BS ISO/ IEC 17799:2005 (BS ISO/ IEC 27001:2005) BS 7799-1:2005, BS 7799-2:2005 SANS Audit Check List Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SFS, ITS 2319, IT

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Office Name: Enterprise Risk Management Questions

Office Name: Enterprise Risk Management Questions Office Name: Business Impact Analysis Questions The identification of information, computing hardware and software, and associated personnel that require protection against unavailability, unauthorized

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

Wireless Security Access Policy and Agreement

Wireless Security Access Policy and Agreement Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1. London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

EA-ISP-009 Use of Computers Policy

EA-ISP-009 Use of Computers Policy Technology & Information Services EA-ISP-009 Use of Computers Policy Owner: Nick Sharratt Author: Paul Ferrier Date: 28/03/2018 Document Security Level: PUBLIC Document Version: 1.05 Document Ref: EA-ISP-009

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

1. Policy Responsibilities & Oversight

1. Policy Responsibilities & Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 07/26/2013 Last Revised 07/26/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

INFORMATION TECHNOLOGY POLICY

INFORMATION TECHNOLOGY POLICY COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF HUMAN SERVICES, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Physical and Environmental Security Policy Domain: Security Date Issued: 06/09/11

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

This document provides a general overview of information security at Aegon UK for existing and prospective clients.

This document provides a general overview of information security at Aegon UK for existing and prospective clients. Information for third parties Information Security This document provides a general overview of information security at Aegon UK for existing and prospective clients. This document aims to provide assurance

More information

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017 University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017 Related Policies, Procedures, and Resources UAB Acceptable Use Policy, UAB Protection and Security Policy, UAB

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

INTERNATIONAL SOS. Information Security Policy. Version 2.00

INTERNATIONAL SOS. Information Security Policy. Version 2.00 INTERNATIONAL SOS Information Security Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: August 2009 Updated: April 2018 2018 All copyright in these materials are

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

LESSOR Group CVR no.:

LESSOR Group CVR no.: Independent service auditor s assurance report on the description of controls, their design and operating effectiveness regarding the operation of hosted services for the period 01-04-2017 to 31-03-2018

More information

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria) Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Computer Security Policy

Computer Security Policy Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

State of Rhode Island Department of Administration Division of Information Technol

State of Rhode Island Department of Administration Division of Information Technol Division of Information Technol 1. Background Physical and environmental security controls protect information system facilities from physical and environmental threats. Physical access to facilities and

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

University Network Policies

University Network Policies BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

GUIDELINES FOR RECORDS STORAGE FACILITIES

GUIDELINES FOR RECORDS STORAGE FACILITIES GUIDELINES FOR RECORDS STORAGE FACILITIES Physical Control of Records in a Repository Main Things to Remember about Managing Records in a Records Storage Facility Establish how long the records need to

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more. FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013 Visit us online at Flank.org to learn more. HITRUST CSF v9 Framework ISO 27001/27002:2013 Framework FLANK ISO 27001/27002:2013 Documentation from

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Server Colocation Standards

Server Colocation Standards Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

CCBC is equipped with 3 computer rooms, one at each main campus location:

CCBC is equipped with 3 computer rooms, one at each main campus location: Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology

More information

Credentials Policy. Document Summary

Credentials Policy. Document Summary Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information