Security Requirements for Password Management and Use

Similar documents
Security Requirements for Wireless Local Area Networks

Government of Ontario IT Standard (GO-ITS) Number 25.7 Security Requirements for Remote Access Services

Government of Ontario IT Standard (GO-ITS) Number 25.7 Security Requirements for Remote Access Services

Government of Ontario IT Standard (GO ITS)

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard

Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved

Ministry of Government Services Office of the Corporate Chief Information Officer Corporate Security Branch

OCCIO/OCCTO MANAGEMENT BOARD SECRETARIAT CORPORATE ARCHITECTURE BRANCH TECHNICAL STANDARDS SECTION. NTv2 (National Transformation Version 2)

Government of Ontario IT Standard (GO-ITS) GO-ITS Number Security Requirements for Mobile Devices

Government of Ontario IT Standard (GO-ITS) Number Security Design Requirements

The Honest Advantage

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification

Employee Security Awareness Training Program

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Baseline Information Security and Privacy Requirements for Suppliers

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Password Standard Version 2.0 October 2006

SECURITY & PRIVACY DOCUMENTATION

Government of Ontario IT Standard (GO-ITS) GO-ITS Number Security Requirements for Mobile Devices

Juniper Vendor Security Requirements

TABLE OF CONTENTS. Lakehead University Password Maintenance Standard Operating Procedure

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

Information Security Policy

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Executive Order 13556

Data Protection Policy

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Data Contributor, Identity Provider, or Viewer Sites

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

01.0 Policy Responsibilities and Oversight

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

AUTHORITY FOR ELECTRICITY REGULATION

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Information Technology General Control Review

Information Security Data Classification Procedure

Tennessee Technological University Policy No Password Management

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

IDENTITY THEFT PREVENTION Policy Statement

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

Red Flags/Identity Theft Prevention Policy: Purpose

INFORMATION SECURITY AND RISK POLICY

HIPAA Security and Privacy Policies & Procedures

Integration of Agilent UV-Visible ChemStation with OpenLAB ECM

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

General Information System Controls Review

Policy and Procedure: SDM Guidance for HIPAA Business Associates

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

Cloud Security Standards

Donor Credit Card Security Policy

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Enterprise Income Verification (EIV) System User Access Authorization Form

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

Information Security Controls Policy

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites

INFORMATION ASSET MANAGEMENT POLICY

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

A company built on security

Data Protection Policy

ADIENT VENDOR SECURITY STANDARD

ASD CERTIFICATION REPORT

Access to University Data Policy

Information Technology Branch Organization of Cyber Security Technical Standard

University of Sunderland Business Assurance PCI Security Policy

The Common Controls Framework BY ADOBE

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer

SAC PA Security Frameworks - FISMA and NIST

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

Bring Your Own Device Policy

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

CIP Cyber Security Personnel & Training

TEL2813/IS2820 Security Management

Critical Cyber Asset Identification Security Management Controls

Table of Contents. PCI Information Security Policy

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Rev.1 Solution Brief

Information Security Policy

Records Management and Retention

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Cyber Security Program

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

Regulation P & GLBA Training

Security Management Models And Practices Feb 5, 2008

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Security Policies and Procedures Principles and Practices

Checklist: Credit Union Information Security and Privacy Policies

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

CYBER SECURITY POLICY REVISION: 12

COMPUTER PASSWORDS POLICY

Security and Privacy Breach Notification

Computer Security Policy

Transcription:

Government of Ontario IT Standard (GO-ITS) Number 25.15 Security Requirements for Password Management and Use Version #: 1.3 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under the delegated authority of the Management Board of Cabinet UNCLASSIFIED Queen's Printer for Ontario, 2009 Last Review Date: 2009-03-12

Table of Contents Purpose... 3 Application and scope... 4 Contact information... 5 1. REQUIREMENTS... 6 2. PASSWORDS... 8 3. ROLES AND RESPONSIBILITIES... 12 4. ACKNOWLEDGEMENTS... 14 5. DEFINITIONS... 15 6. APPENDIX A: ADDITIONAL INFORMATION... 16 7. DOCUMENT HISTORY... 19 UNCLASSIFIED 1

Foreword Government of Ontario Information Technology Standards (GO-ITS) are the official publications on the guidelines, preferred practices, standards and technical reports adopted by the Information Technology Standards Council (ITSC) under delegated authority of the Management Board of Cabinet (MBC). These publications support the responsibilities of the Ministry of Government Services (MGS) for coordinating standardization of Information & Information Technology (I&IT) in the Government. Publications that set new or revised standards provide enterprise architecture guidance, policy guidance and administrative information for their implementation. In particular, GO-ITS describe where the application of a standard is mandatory and specify any qualifications governing the implementation of standards. All GO-ITS 25 Standards are based on the work of recognized global authorities in information and operational security, both in government and industry. Copies of cited standards may be obtained as follows: Intranet: http://intra.collaboration.gov.on.ca/mgs/occio/occto/our-services/technologyadoption/technical-standards-1/approved-go-its-standards/ Internet: http://www.gov.on.ca/mgs/en/iandit/stel02_047295.html Terms Within this document, certain words are used which require precise interpretation from the readers. The following are the precise requirements associated with the following terms: Must The requirement is mandatory. Without it, the system is not considered secure. Should The requirement ought to be adhered to, unless exigent business needs dictate otherwise and the full implications of non-compliance are understood. All exceptions are to be documented and approved in writing by management, identifying the rationale for the exception to standard practice. Summary The Information and Information Technology (I&IT) Security Directive requires that Government employees protect information that is received, created, held by, or retained on behalf of, Ontario ministries and agencies. Programs are responsible for the implementation of appropriate safeguards, based on an assessment of the risks involved. Passwords are a commonly used technical safeguard. The following points summarize the role of passwords within the Government of Ontario and the intent of this document: The protection of information and information technology is the responsibility of all members of the Ontario Public Service; Information and information technology must be protected by access controls which may employ passwords; UNCLASSIFIED 2

Passwords are character strings used to verify the identity of a user; Passwords themselves are highly sensitive and must be protected accordingly; Passwords must be created, used, maintained, stored, protected and deleted in accordance with this standard; Users must be aware of the risks to information through improper password usage and maintenance; Managers must help and instruct staff to know and adhere to this standard; Password owners are accountable for any access to information technology gained through the use of their password; Users must not disclose their passwords to anyone else; Users must know whom to contact for assistance with their password; Users must immediately change any disclosed or compromised passwords; Users must know how and when to report a password breach; Users must know and adhere to all the requirements of this standard; Systems administrators must implement this standard; Management must make available the technical tools required for all staff to adhere to this standard; and Reasonable, compensating controls must be used if compliance with this standard is not immediately possible. Purpose This document is one in a series that defines operational principles, requirements and best practices for the protection of the government of Ontario s networks and computer systems. This document sets out security requirements for password management and use within the government of Ontario. The objective of this document is to ensure that the management and use of passwords to access Government of Ontario information and information technology is effective, and assists in the mitigation of unacceptable risks to those resources. UNCLASSIFIED 3

Version Control Date Version Author Comment Feb. 28, 2006 1.0 Lynette Craig, CSB Approved by Architecture Review Board Sep. 20, 2006 1.1 Oct. 5, 2007 1.2 Jan. 13, 2009 1.3 Sylvia Nikodem, CSB Sylvia Nikodem, CSB Charlotte Ward, CSB Approved by Architecture Review Board Approved by Architecture Review Board For approval by ITSC and ARB Application and scope These requirements apply to: All ministries of the government of Ontario and any organization that uses a ministry s or I&IT cluster s information technology infrastructure; and All agencies that use a ministry s information and information technology infrastructure. The scope of this standard extends to all information and information technology regardless of the computer system or platform. While other methods of user verification exist (e.g., biometrics, smartcards), they are not within the scope of this document. This standard regulates the use of passwords, which are defined as confidential authentication information in the form of a string of characters, used as proof of identity for systems. However, all approved credentials/tokens which provide access to Government of Ontario information and information technology are considered sensitive, and must be protected in accordance with the Information Security and Privacy Classification Policy. 1 To ensure minimal impact to business functions, this standard should be applied as part of an I&IT Security Plan, as required by the I&IT Security Directive. 2 Assistance for creating a plan is provided in the I&IT Security Plan Guideline. 3 Assistance with implementing a plan is available through the Cluster Security Officer assigned to each ministry cluster. Plans should take into account all applicable restrictions and establish reasonable timelines for compliance. Compensating controls must be used if compliance with this standard is not immediately possible. 1 http://intra.pmed.mbs.gov.on.ca/mbc/pdf/informationsecurity&privacyclassificationpolicy-aug05.pdf 2 http://intra.pmed.mbs.gov.on.ca/mbc/pdf/management_of_it-dir.pdf 3 http://intra.security.gov.on.ca UNCLASSIFIED 4

Contact information Contact 1 Contact 2 Name/Title Charlotte Ward, Manager, Policy and Administration Sylvia Nikodem, Policy Advisor, Performance Measurement Security Policy & Administration Organization/Ministry Ministry of Government Services Ministry of Government Services Division OCCIO OCCIO Branch Corporate Security Branch Corporate Security Branch Section/Unit Security Policy Security Policy Office Phone (416) 327-9385 (416) 327-2502 E-mail Charlotte.Ward@ontario.ca Sylvia.Nikodem@ontario.ca UNCLASSIFIED 5

1. REQUIREMENTS Access controls must include mechanisms to prevent intruders from impersonating legitimate users. Therefore, it is necessary to verify that users are who they claim to be. Passwords are the most common way to provide identity verification for users of Government of Ontario applications, systems and networks. Passwords are administered by different people across different computer platforms, and must be held to a minimum standard. This document seeks to provide adequate structure for the use and maintenance of passwords while ensuring that users are able to enter passwords with minimal inconvenience. Passwords must themselves be treated as sensitive information, as defined by ISPC. Sensitive information must be safeguarded in accordance with the Information Security & Privacy Classification (ISPC) Policy. The ISPC Policy states that all high sensitivity information must be encrypted while in storage and transmission. Encrypting passwords is a very effective way to prevent their detection by unauthorized persons. High sensitivity information is described as information, which, if disclosed without authorization, could reasonably be expected to cause loss of life or public safety, extremely serious personal or enterprise injury, major political or economic impact, sabotage/terrorism, significant financial loss and social hardship. Also included, is all medical and financial information about identifiable individuals. Protection of passwords, and user accountability, also depends on the continuous efforts of users to maintain assigned credentials in strict confidence. Therefore, each password owner is accountable for any access to systems gained through the use of their password. This standard requires that passwords be a minimum of 8 characters in length 4. A minimum password length is required to protect against brute force attacks (a systematic bombardment of a system that uses extensive lists of common passwords to gain unauthorized access to a given user account). The longer and more complex the password composition, the greater the list of password guesses must be. For example, a six character, alphanumeric password brute force attack would require 1.8 billion unauthorized access attempts. A password of 8 characters would take over 2.6 trillion unauthorized access attempts, and require advanced computing capabilities. Those who have difficulty remembering passwords may want to use passphrases. For instance, a memorable street address, that is not the user s own residence or business address, will meet the requirements for password length and composition and may be more easily remembered without being written down (e.g., 24SussexDrive) when compared to a password of similar length. 4 With the exception of BlackBerry devices; see Requirements section for Users of BlackBerry devices. UNCLASSIFIED 6

Principles This standard supports the I&IT Security Directive, Operating Procedures for Use of I&IT Resources, Information Security & Privacy Classification Policy and Operating Procedures, and GO-ITS-25 Security Standards. The following principles inform this document: Information and information systems and resources are valuable and integral assets for the delivery of all government of Ontario programs; therefore, they require protection through approved user verification. Passwords, certificates or tokens that allow access to government of Ontario information systems containing sensitive data are themselves sensitive information assets. All users are individually accountable for their access and use of I&IT resources; therefore, individual accountability requires individual identification. Access controls cannot be effective if it is possible for intruders to impersonate legitimate users. Access controls must be commensurate with the business needs and the strategy and goals of the government of Ontario. UNCLASSIFIED 7

2. PASSWORDS General All authorized access to information and information technology must be subject to an approved verification/authentication process. At a minimum, that process must be the entry of an approved, unique login identification and password combination; All users are responsible for any access gained by the use of their password; The strength and complexity of a password must be commensurate with the business requirement for confidentiality, integrity and availability of the information and information systems and resources involved; In all instances where the technology will allow it, passphrases should be used, (e.g., 24SussexDrive) instead of a (typically shorter) password; and Inactivity timeouts typically combined with screen blanking or locking must be in place, and require password re-entry. Creating passwords Initial passwords must be communicated to the user directly in person, by telephone or by encrypted email; Where technology permits, initial passwords must be set to expire within 5 days; The password owner, on first login, must change the initial password; Passwords must contain at least 8 characters; Passwords must contain at least one digit and at least one upper case and one lower case letter; Passwords must be chosen so that they are easy enough to remember but not easily guessed and/or deduced by someone else; Passwords must not include easily obtained personal information about the user, (e.g., names of family members, pets, birthdays, anniversaries, hobbies); Passwords must not be based upon words, phrases or acronyms that are part of the broadly recognized Ontario Public Service culture; Passwords must not be the same as all or part of a user s login ID, actual last or given names, or a commonly known nickname; Passwords must not be blank; the use of null passwords is prohibited; A mechanism must be in place to ensure that passwords are not reused by the same user within a span of 12 consecutive months; and Software product known default passwords must be changed upon installation. UNCLASSIFIED 8

Maintaining passwords A mechanism should be in place to force the user to change the initial password and thereafter on a regular and consistent schedule. If the use of software for this function is not possible, then the administrator must manually instruct the password change and verify that it has been successfully completed; Regular users must change their passwords at least once every 90 days 5 ; System administrators must change their passwords (e.g., those associated with privileged login IDs) at least once every 30 days; Password changes must not involve the use of easily recognized patterns (e.g., changing compop10 to compop11 and so on); Software that prohibits the use of recognizable patterns should be used wherever possible; Applications that require two factor identity authentication will be exempt from the maximum refresh cycles (i.e. the maximum length of time before the password must be changed), for user and administrator passwords. These applications must establish unique password refresh cycles based on system requirements; and Documented procedures must be in place in the event of password loss, change or emergency modification. Sharing or disclosing Passwords assigned to an individual must not be shared with anyone; Authentication must be granted for individual users, not groups of users; Passwords must be changed immediately if they have been disclosed, compromised, or it is even suspected that they have been compromised; Access to backup media that contains passwords must be limited to authorized personnel; Security systems and passwords must not be discussed with, or in the vicinity of, staff or contractors who have not signed a non-disclosure agreement or who are otherwise not authorized to receive such information; Passwords must not be displayed while being entered but may be represented on the screen by a special character such as an asterisk; and Password completion software must not be installed. Where automatic competition software is part of any authorized, proprietary software, it must be disabled. 5 This requirement is not mandatory for BlackBerry device users; however, it is still recommended that passwords be changed every 90 days or less for these devices. UNCLASSIFIED 9

Administering passwords To ensure that no one person can commit fraud and erase all trace of their actions, systems administrators with global rights must be a separate function from the function that creates and maintains user passwords; Administration and use of passwords must be consistent, uniform and documented in the I&IT Security Plan for the system on which they are used; A mechanism must be in place that provides the briefest possible explanation for the denial of access in the event that a password does not conform to rules for creation and/or change. The message should provide contact information for user assistance. (e.g., access denied contact your system administrator ); Default vendor passwords that accompany software must be changed immediately following installation of the software; Access must be denied after the fifth, consecutive, incorrect password entry attempt; users must contact their help desk or system administrator to enable further password entry attempts; Login IDs associated with passwords that have not been used in 45 days must be deleted unless an important business reason exists to maintain it; Access denials due to the maximum incorrect password attempts must be recorded in an audit or system log; this log must be reviewed, and if necessary, investigated in accordance with approved monitoring and escalation procedures; The password reset process must include strong positive authentication of the requester so that a password change can be performed for any user who is not visually identifiable, (e.g., a telephone request for password change); Guest passwords must be disabled; Controls must be in place to ensure that emergency passwords are changed after each use; and Details of why, how and when the emergency password was used must be submitted to the appropriate management level. Auditing passwords User passwords must be tested for strength (e.g., complexity, entropy, etc.) on a periodic basis; Passwords identified as weak (e.g., guessable/deducible or vulnerable to brute force attack) and passwords that do not comply with this standard must be corrected immediately; Software that captures unencrypted passwords must not be allowed on any system; and Auditing methods must be deployed when a new system is implemented to identify poor quality passwords. Vendor supplied access Any non-system accounts that by default do not have a password must be secured with an appropriate password immediately; and UNCLASSIFIED 10

Accounts used for vendor access must have their passwords set and/or reset for each instanced of required use. Storage and transmission Passwords must be encrypted in storage and in transmission; Passwords stored in files must not indicate the system that they are used for, unless that information is encrypted also; Passwords must not be hard-coded into operating programs, applications or stored in batch files; Passwords must not be embedded in any automated login process, stored in a macro or function key; Passwords must not be retrievable from an authentication process; Cryptographic keys must be stored in a secure manner using the approved encryption methods available within the Ontario Public Service, as defined within GO-ITS 25.12 Security Requirements for the Use of Cryptography; Unencrypted passwords or credential information must not be cached; and Passwords must not be stored on a hard drive; they must be manually entered each time the application is accessed. Multiple platform passwords Users who have access to multiple systems where their login IDs are identical, must use different passwords for each login ID on each system; and Remote access passwords must be different from regular system access passwords. Users of BlackBerry devices Although the password policies listed above are recommended, the following requirements apply specifically to users of BlackBerry devices: Passwords must contain at least 6 characters; The device must expire the user s session and require re-entry of password after 20 minutes of inactivity; and After the tenth, consecutive, unsuccessful password entry attempt, all of the data is erased and the BlackBerry is disabled. To re-enable the device, users must contact OPS IT Service Desk to initiate the regular activation process. 6 6 Users who are unable to remember their password are advised to call the OPS IT Service desk well before the tenth attempt to undergo password recovery procedures. UNCLASSIFIED 11

3. ROLES AND RESPONSIBILITIES Users All Users are responsible for: Adopting security measures as outlined in this standard to protect their login IDs and passwords from unauthorized access; Ensuring they have taken the approved education provided for the proper use and maintenance of passwords; Knowing who to call to report and/or change forgotten or compromised passwords; Understanding and performing their responsibilities to the government information and information technology to which they are granted access; and Protecting their passwords and reporting any compromise of the password to their manager and the Help Desk. Program Managers Program Managers are responsible for: Authorizing and approving employee and contractor access privileges; Ensuring employees and contractors are individually accountable for using information systems and for following government directives, policies, standards, procedures, guidelines and best practices; Reporting any security breaches or suspected security incidents as instructed by the I&IT Cluster Security Officer; Ensuring employees and contractors are educated in the proper use and maintenance of passwords including how to report and/or change forgotten or compromised passwords; Ensuring users are able to enter their secret passwords with minimal inconvenience; and Ensuring the use of passwords is immediately revoked when access is no longer required or authorized. Corporate Security Branch The Corporate Security Branch is responsible for: Monitoring as required, to ensure compliance with this standard; Updating this standard, as required; Approving encryption software to be used as a standard throughout the Ontario Public Service; and Assisting with interpretation of this standard and any other associated policies and procedures. UNCLASSIFIED 12

I&IT Cluster Security Officers The Cluster Security Officers are responsible for: Working with client Program Managers to investigate excessive password misuse or nonnormal activity; Assessing password policy needs; Liaising between the cluster and Corporate Security Branch for password security issues, policies, education, and measures to implement this policy; Assisting in the identification, design and implementation of measures to implement this policy; Monitoring and promoting the implementation of and adherence to these standards on a regular basis; Assisting Program Managers to include password requirements in the creation of their I&IT Security Plans; and Reporting password breaches to Corporate Security Branch. System Administrators System Administrators are responsible for: Establishing initial passwords in accordance with these standards for new users and for resetting passwords for users whose passwords have been forgotten or compromised; Implementing system technical controls to comply with the password security requirements; Providing password reset services; Supporting security incident procedures; Documenting password loss, change and emergency use procedures; Ensuring on a regular basis that network security measures are in place and monitored for unauthorized access attempts; Practicing a higher standard of care in maintaining confidentiality and password security due to their higher level of user privileges; and Reporting password breaches to the appropriate I&IT Cluster Security Officers. UNCLASSIFIED 13

4. ACKNOWLEDGEMENTS 4.1 Editors Sylvia Nikodem Full Name Cluster, Ministry and/or Area MGS Corporate Security Branch 4.2 Contributors Full Name Cluster, Ministry and/or Area Tim Dafoe Lynette Craig MGS Corporate Security Branch MGS Corporate Security Branch 4.3 Consultations The following individuals were consulted: Charlotte Ward, MGS Corporate Security Branch 4.4 Reviewers The following groups have reviewed this standard: IT Standards Council February 2009 Architecture Review Board March 2009 UNCLASSIFIED 14

5. DEFINITIONS Accountability: The obligation to answer for the results and the manner in which responsibilities are discharged. Accountability cannot be delegated. Authentication: To establish the validity of a claimed identity of a user prior to gaining access. Password owner: The individual authorized to use a password and responsible for its use to gain access to information and information technology (I&IT). Responsibility: The obligation to perform a given task or tasks associated with a specific role. Sensitive information: Information that if released without authorization, may cause harm or injury, embarrassment, or unfair economic advantage; degrees of information sensitivity are defined by the Information Security and Privacy Classification Policy and Operating Procedures. UNCLASSIFIED 15

6. APPENDIX A: ADDITIONAL INFORMATION Type of Standard Check One Type of Standard Implementation or Process Standards requirements or specifications, which may include best practices and guidance, for the implementation of a technology or the performance of an activity related to the use of technology, applicable throughout the provincial government. (e.g., mandatory O/S configuration requirements, security procedures, change management procedures, web page design requirements etc.). Information Standard specifications for a data format (e.g., XML schema, metadata, and/or related data models) Technical Standard - networking and communications specifications, protocols, interfaces (API s) (e.g., standards adopted from recognized standards development organizations such as W3C, OASIS or IETF such as TCP/IP, XML, SOAP, etc.) Architecture Standard application patterns, architecture and standards principles governing the design and technology decisions for the development of major enterprise applications Product Standard an enterprise-wide product which is mandatory for use such as a single corporate-wide application, which all ministries and agencies use to record and access their HR information. Publication Please indicate if this standard should be restricted to publishing on the Internal (Intranet) IT Standards web site or whether it is intended for publishing on the public (Internet) Government of Ontario IT Standards web site. Check One Publish as Internal or External Internal Standard External Standard UNCLASSIFIED 16

Consultation Check Area Technical Standards Unit, Corporate Architecture and Standards Branch, OCCTO Corporate Architecture and Standards Branch (CASB Architects), OCCTO Infrastructure Development Branch & ITS, OCCSD Corporate Security Branch Strategy, Policy, Planning and Management Branch (SPPM, OCCS) Corporate ACT and Domain Working Groups Information Architecture Domain (IADWG) Technology Architecture Domain (TADWG) Application Architecture Domain (AADWG) Security Architecture Working Group (SAWG) Cluster ACT/ARB (for Cluster standards promoted to Corporate standards) IT Executive Leadership Council (ITELC) IT Standards Council (ITSC) ITSC Wireless Working Group Cluster Security Officers Network Office, ITS Network Management Committee Date: (month/year) May 2008 (Updated January 2009) Impacts to Standards List any existing GO-ITS that may be impacted or associated with this standard. GO-ITS # Describe Impact Recommended Action (or page number where details can be found) GO-ITS 25.10 Some impact to Mobile Devices standard (regarding new mandatory requirement for BlackBerry passwords) Compliance UNCLASSIFIED 17

Impacts to Existing Environments List any significant impacts this standard may have on existing I&IT environment. Application(s) or Infrastructure impacted RIM BlackBerry / BlackBerry Enterprise Server Describe Impact Password requirement will have some end-user impact. Adherence to these security requirements will reduce the risks to Government I&IT resources. Requirements are in line with current practice and impact should be minimal relative to security benefit. Recommended Action (or page number where details can be found) Compliance with these requirements UNCLASSIFIED 18

7. DOCUMENT HISTORY February 15, 2006 Approved by the IT Standards Council February 28, 2006 Approved by the Architecture Review Board September 20, 2006 Updated: Removed version history from Appendix A Updated Contact Information section on page 4 Changed version number to 1.1 October 5, 2007 Updated: Updated contact information on page 4 Updated Background Information on page 5 to reflect new password minimum of 8 characters Changed requirements for creating passwords on page 7 to reflect new password requirements Ensure that all requirements and examples are supported by current OPS technological capacity Ensure that roles and responsibilities sections reflect current organizational structure Changed version number to 1.2 October 19, 2007 Updated: Removed appendices A and B. Publication Details moved to main body, and marked for external posting as directed by Corporate Security Branch January 13, 2009 Updated: Added BlackBerry Users section Modified portions of document to reflect new BlackBerry password guidelines Format changes (document now in ITSC format) Some changes for clarity in language and technical direction Updated contact information and organizational details Changed version number to 1.3 UNCLASSIFIED 19

February 18, 2009 Endorsed: IT Standards Council endorsement March 12, 2009 Approved: Architecture Review Board approval Copyright Queen's Printer for Ontario, 2009 UNCLASSIFIED 20