IsecT Infosec Policy Manual SAMPLE v7
IsecT Infosec Policy Manual SAMPLE v7
IsecT Infosec Policy Manual SAMPLE v7
Draft version 7, June 2009 SAMPLE EXTRACTED PURELY FOR PRODUCT EVALUATION
Security principles and axioms approved by the Executive Directors on: [not yet approved]
Policies approved by the Chief Information Officer on: [not yet approved]
The generic information security policy manual based on ISO/IEC 27002:2005 is copyright 2009 IsecT Ltd. Consult your license agreement for the terms and conditions of use. The generic manual must not be distributed to third parties unless explicitly permitted in the license.
<ORGANIZATION>
Information is an extremely valuable and important corporate asset that requires protection against risks that would threaten its confidentiality, integrity and/or availability. Suitable information security controls must therefore be selected and implemented. The security controls identified in this manual are based on ISO/IEC standards that document internationally-accepted good practice. Along with my colleagues on the senior management team, I fully endorse this information security policy manual and expect the controls to be implemented consistently throughout <ORGANIZATION>.
Signature: ________________ Date: __________ AUTHORS NOTE: The statement above is a straw man, a suggestion to get you started. Discussing and working on this with the MD/CEO and other executives is an opportunity to raise their awareness of the value of information security and get them engaged with the implementation of ISO/IEC 27002. Do not underestimate the value of this explicit management endorsement!
Page 2 of 132
<ORGANIZATION>
Contents
1 Scope........................................................................................................ 9
1.1 1.2 1.3 1.4 1.4.2 1.4.3 1.5 1.5.1 1.5.2 1.5.3 1.6 1.7 Introduction and objectives....................................................................................... 9 Status and applicability ............................................................................................. 9 Intended audience .................................................................................................... 10 Policy exceptions ..................................................................................................... 10 Routine policy exceptions .................................................................................... 10 Emergency policy exceptions .............................................................................. 11 Origin, structure and design of this manual .......................................................... 11 Origin in ISO/IEC 27002 ...................................................................................... 11 Structure and overview ........................................................................................ 12 Formatting and presentation ................................................................................ 13 References ................................................................................................................ 13 Document change control ....................................................................................... 15
2 3
Security policy....................................................................................... 48
5.1 5.1.1 5.1.2 Information security policy...................................................................................... 48 This Information Security Policy Manual.............................................................. 48 Review of the Information Security Policy Manual............................................... 49
Contact with authorities ....................................................................................... 56 Contact with special interest groups .................................................................... 56 Independent review of information security ......................................................... 56 External parties ........................................................................................................ 57 Identification of risks related to external parties................................................... 57 Addressing security when dealing with customers .............................................. 59 Addressing security in third party agreements..................................................... 60
Security of equipment off-premises ..................................................................... 74 Secure disposal or re-use of equipment .............................................................. 75 Removal of property ............................................................................................ 75
Page 5 of 132
Monitoring system use ......................................................................................... 88 Protection of log information ................................................................................ 89 Administrator and operator logs........................................................................... 89 Fault logging ........................................................................................................ 89 Clock synchronization .......................................................................................... 89
11 Access control....................................................................................... 90
11.1 11.1.1 11.2 11.2.1 11.2.2 11.2.3 11.2.4 11.3 11.3.1 11.3.2 11.3.3 11.4 11.4.1 11.4.2 11.4.3 11.4.4 11.4.5 11.4.6 11.4.7 11.5 11.5.1 11.5.2 11.5.3 11.5.4 11.5.5 11.5.6 11.6 11.6.1 11.6.2 11.7 11.7.1 11.7.2 Business requirement for access control.............................................................. 90 Access control policy ........................................................................................... 90 User access management ....................................................................................... 90 User registration .................................................................................................. 90 Privilege management ......................................................................................... 91 User password management............................................................................... 92 Review of user access rights ............................................................................... 92 User responsibilities ................................................................................................ 93 Password use ...................................................................................................... 93 Unattended user equipment ................................................................................ 93 Clear desk and clear screen policy...................................................................... 94 Network access control ........................................................................................... 94 Policy on use of network services........................................................................ 94 User authentication for external connections....................................................... 95 Equipment identification in networks ................................................................... 96 Remote diagnostic and configuration port protection .......................................... 96 Segregation in networks ...................................................................................... 96 Network connection control ................................................................................. 97 Network routing control........................................................................................ 97 Operating system access control ........................................................................... 98 Secure logon procedures..................................................................................... 98 User identification and authentication.................................................................. 98 Password management system........................................................................... 99 Use of system utilities .......................................................................................... 99 Session time-out .................................................................................................. 99 Limitation of connection time ............................................................................. 100 Application and information access control........................................................ 100 Information access restriction ............................................................................ 100 Sensitive system isolation.................................................................................. 101 Mobile computing and teleworking ...................................................................... 101 Mobile computing............................................................................................... 101 Teleworking ....................................................................................................... 102
Page 6 of 132
<ORGANIZATION> 12.2 12.2.1 12.2.2 12.2.3 12.2.4 12.3 12.3.1 12.3.2 12.4 12.4.1 12.4.2 12.4.3 12.5 12.5.1 12.5.2 12.5.3 12.5.4 12.5.5 12.6 12.6.1
Correct processing in applications ...................................................................... 105 Input data validation........................................................................................... 105 Control of internal processing ............................................................................ 106 Message integrity............................................................................................... 106 Output data validation........................................................................................ 107 Cryptographic controls.......................................................................................... 107 Policy on use of cryptographic controls ............................................................. 107 Key management............................................................................................... 108 Security of system files ......................................................................................... 109 Control of operational software.......................................................................... 109 Protection of system test data ........................................................................... 110 Access control to program source code ............................................................ 110 Security in development and support activities.................................................. 110 Change control procedures ............................................................................... 110 Technical review of applications after operating system changes ..................... 111 Restrictions on changes to software packages ................................................. 111 Information leakage ........................................................................................... 112 Outsourced software development .................................................................... 112 Technical vulnerability management.................................................................... 113 Control of technical vulnerabilities ..................................................................... 113
Prevention of misuse of information processing facilities .................................. 127 Regulation of cryptographic controls ................................................................. 127 Compliance with security policies and standards and technical compliance . 128 Compliance with security policies and standards .............................................. 128 Technical compliance checking ......................................................................... 128 Information systems audit considerations .......................................................... 128 Information system audit controls ...................................................................... 128 Protection of information systems audit tools .................................................... 129
Appendix A
Page 8 of 132
<ORGANIZATION>
1 Scope
1.1
1.1.1.1
1.2
1.2.1.1
1.2.1.2
1.2.1.3
1.2.1.4
Page 9 of 132
<ORGANIZATION>
1.3
1.3.1.1
Intended audience
This policy manual is primarily intended for use by: Workers* comprising all <ORGANIZATION> employees (including managers, staff, temporary employees such as student placements) and third parties (such as consultants, contractors, support/maintenance staff) acting in a similar capacity. Workers are broadly informed of <ORGANIZATION>s main information security requirements through this manual and are specifically informed of any that are directly relevant to their activities through the associated security awareness activities, terms and conditions of employment, management briefings etc.; Information technologists including professionals working within Information Technology department such as Security Administration, Operations, Applications Development, IT Help/Service Desk etc. and others IT and knowledge workers within business departments. They use this document as a reference when specifying, designing, building and operating technical, physical and procedural information security controls relating to <ORGANIZATION> information systems and networks; Managers the policy manual comprises a set of corporate policy statements and guidance on important information security matters that <ORGANIZATION> managers need to understand and support, especially given their governance responsibilities; Corporate functions such as Internal Audit, Human Resources, Risk Management, Compliance and Legal who use the manual both to promote and assess compliance with corporate information security policy, and to blend information security controls seamlessly with other forms of control and governance; Third parties such as business partners, external auditors and industry regulators who refer to the manual to understand <ORGANIZATION>s overall information security position and, where appropriate, to evaluate or direct the operation of specific information security controls to meet their contractual obligations.
1.4
1.4.1.1
Policy exceptions
Despite the care that has been taken in authoring, reviewing and approving this policy manual, the authors cannot possibly foresee all possible circumstances or situations in which it might apply. It is therefore conceivable that exceptional situations or emergencies may occur when practical considerations clearly override or negate the policy statements made herein. Examples include the introduction of new legal or regulatory obligations that conflict with specific policy statements, or where slavishly following the policies to the letter would cause unacceptable health and safety risks.
1.4.2
1.4.2.1
Note: Workers is merely a convenient inclusive term and is not meant to imply that others do not work!
Page 10 of 132
<ORGANIZATION>
1.4.2.2
Where a policy exception is permitted, the person requesting the exception (i.e. a manager, normally also an Information Asset Owner) will explicitly assume personal accountability for any security incidents that arise as a direct result of the exception. If, for example, a given IT system cannot be configured to enforce the password length and complexity rules stated in section 11.3.1, the corresponding Information Asset Owner may request a policy exception but will be held to account for any security incidents arising from user authentication failures or incidents as a result of the policy exception. The Information Security Manager is responsible for recording exceptions in the exceptions database, and for following-up with the Information Asset Owners at least once a year to assess progress towards resolving the issue that resulted in the need for an exception.
1.4.2.3
1.4.3
1.4.3.1
1.4.3.2
1.4.3.3
1.5
1.5.1
1.5.1.1
1.5.1.2
Page 11 of 132
<ORGANIZATION>
1.5.2
1.5.2.1
1.5.2.2
5.
6.
7.
8.
9.
10. Communications and operations management: systems and network managers normally require powerful access rights in order to do their jobs, implying a very high degree of trust. Section 10 is the longest section in this manual. It balances the need for IT Operations professionals to have privileged access to our systems and networks against their trustworthiness and competence, and covers several other aspects of systems/network management that directly influence information security (e.g. data backup and change control procedures). 11. Access control: controlling logical access to sensitive data is clearly important to protect confidentiality but the manual explicitly includes integrity and availability requirements as well. 12. Information systems acquisition, development and maintenance: advises on the need to specify and develop information security controls as an integral part of the software development and implementation process, as well as isolating development, testing and live production environments. 13. Information security incident management: explains the need to identify and report security incidents and near misses as soon as possible, and for <ORGANIZATION> to learn the lessons from previous incidents.
Page 12 of 132
<ORGANIZATION>
14. Business continuity management: the manual defines resilience, disaster recovery and general contingency controls to help mitigate the failure of other controls, and links business continuity with IT disaster recovery plans. 15. Compliance: the final section covers processes for reviewing the organization's compliance with its own internal policies as well as those imposed externally such as privacy laws, copyright, contractual terms and industry regulations.
1.5.3
1.5.3.1
Throughout the manual, the words will or must imply an absolute compulsion i.e. the stated policies and controls are mandatory or obligatory, unless exceptions have been explicitly agreed by senior management. In other cases, words such as should or may imply recommendations with an element of discretion meaning that exceptions are permitted without necessarily requiring formal management approval. The manual contains numerous examples, usually preceded by e.g.. The examples are not intended to be exhaustive, merely illustrative.
1.5.3.3
1.6
1.6.1.1
References
Just like ISO/IEC 27002, this policy manual incorporates internal cross-references since certain controls are relevant to more than one section. The definitive on-line version of this manual on the intranet contains fully functional hyperlinks shown underlined like this. The manual refers and gives authority to various supporting documents including: Certification Practice Statement (CPS) - formally defines <ORGANIZATION>s Public Key Infrastructure in accordance with IETF RFC 2527 assignment 15; Change Control Procedure - protects production systems against untested, unauthorized and unsuitable changes; Clear Screen and Clear Desk Guideline - expands on section 11.3.3 of this manual; Code of Conduct - is referenced by all employment contracts and describes employees general responsibilities towards <ORGANIZATION>, including the obligation to comply with company policies such as those within this manual. The corporate Code of Conduct is owned and maintained by Human Resources; Computer Equipment and Storage Media Disposal Standard - expands on sections 9.2.6 and 10.7.2 concerning the need for systems and media to be securely cleansed of <ORGANIZATION> or personal data before being disposed of or reused; Control Self Assessment Procedures explain the management processes for self-checking and reporting of the status of information security and IT governance controls throughout <ORGANIZATION>; Data Access Request Procedure defines a controlled and auditable process for requesting, authorizing/approving and allocating network, system and data access rights;
1.6.1.2
Page 13 of 132
<ORGANIZATION>
Disaster Recovery Standards, Procedures and Guidelines document the arrangements for recovering IT systems and data following major incidents; Information Retention Standard - determines the period during which various forms of <ORGANIZATION> information must be retained, according to legal and business requirements; Information Security Incident Management Procedures documented processes for reporting security events, and for investigating and resolving incidents; Office Systems Security Guidelines information and guidance about security risks and controls arising from the use of office computers, emails, faxes, telephones etc.; Password Reset Procedure describes the process for users to re-authenticate themselves and request replacement passwords; Physical IT Security Guidelines advise workers on the physical protection of IT equipment against theft, criminal/accidental damage, loss etc.; Portable Computing Security Guideline describes the particular security risks associated with the use of laptops, PDAs, mobile phones etc. plus controls; Security Logging and Alerting Standard explains how systems are to monitor and log security-relevant events and raise real-time alarms for significant events; Security Management Plan is a document describing the information security requirements for a contractual arrangement; Software Copyright Compliance Standard - explains the controls to ensure that unlicensed software is not installed or used on <ORGANIZATION> equipment; Windows Security Baseline Standard one example of a technical security standard defining the minimum level of security controls that must be applied to all Windows Vista systems owned by <ORGANIZATION>.
Page 14 of 132
<ORGANIZATION>
1.6.1.3
The following external standards are referenced in this manual: ISO/IEC 27000:2009 International standard Information security management systems - Fundamentals and vocabulary (available as a free PDF download from ISO/ITTF); ISO/IEC 27001:2005 International standard Specification for an Information Security Management System (currently being revised); ISO/IEC 27002:2005 International standard Code of Practice for Information Security Management (currently being revised); ISO/IEC 27005:2008 International standard for Information Security Risk Management; ISO/IEC TR 18044 International standard for Information Security Incident Management (due to become ISO/IEC 27035); ISO/IEC Guide 73:2002 Guideline Risk management Vocabulary Guidelines for use in standards (currently being revised) FIPS 140-2 Level 3 NIST standard Security Requirements for Cryptographic Modules; RFC 2527 Internet X.509 Public Key Infrastructure - Certificate Policy and Certification Practices Framework specifies the term Certification Practice Statement.
1.7
1.7.1.1
Page 15 of 132
<ORGANIZATION>
1.7.1.2
Feedback comments, corrections and improvement suggestions on this policy manual (including any areas that are not sufficiently well covered) are welcome from any part of <ORGANIZATION> at any time. Feel free to use the table below to collect your thoughts on the manual as you read it, prior to discussing them with your line manager and/or the Information Security Manager (ISM) or Chief Security Officer (CSO):
Section number
General
1.7.1.3
Proposed alterations to the manual will be analyzed and developed by the ISM in conjunction with relevant parties from IT, Risk Management, Compliance, Legal, Human Resources, Internal Audit etc. Updates may be circulated for comment, clearly labeled as DRAFTs. DRAFTs are not intended for implementation and do not necessarily reflect official <ORGANIZATION> policy until they are formally approved by the CSO and/or Executive Directors and released on the intranet. The standards manual as a whole must also be comprehensively reviewed by the CSO and updated as necessary every year (see 5.1.2). The Executive Directors must review and re-approve the policy axioms and guiding principles at least once every two years. When DRAFTs have been reviewed and if necessary updated, they must be formally submitted for approval by the CSO. If they contain new policy axioms or significant changes to the interpretation or implementation of axioms, they must be submitted by the CSO to the Board of Directors for final approval. At the point they are approved, the standards become official <ORGANIZATION> policy and must be published on the policies section of the corporate intranet as soon as practicable.
1.7.1.4
1.7.1.5
Page 16 of 132
<ORGANIZATION>
The following information security-related terms are defined particularly as they are used in the context of ISO/IEC 27002 and in this manual. Click the hyperlinked (underlined) terms for further explanations. Common security abbreviations and acronyms are also listed. Meanings shown in italics are quoted directly from the cited standards.
Term
419
Meaning
Number of a Nigerian penal code that is supposed to stop advance fee frauds originating in Nigeria but is patently ineffective. Ability of a user or program to interact with an information asset e.g. to read or write data, send messages over the network etc.; also ability of a person to enter a site, building, room, wiring closet etc. Type of control designed to restrict access to an information asset, permitting authorized access while preventing unauthorized access. Means to ensue that access to assets is authorized and and restricted based on business and security requirements (ISO/IEC 27000). Table relating types of user rle (on one axis) to IT systems, application functions and/or classes of data (on the other axis), showing the types of access permitted within the body of the matrix. Although we tend to think that security incidents result from deliberate acts by hackers, malware etc., most are in fact the result of chance events, errors and mistakes. A person who is held accountable for something is personally responsible for it and may be disciplined if they do not fulfill their obligations. Unlike responsibility, however, accountability is similar to ownership in that it cannot be delegated to another (in short, the buck stops here). Responsibility of an entity for its actions and decisions (ISO/IEC 27000). Microsoft technology for interactive web pages. Malicious ActiveX controls (a form of malware) may potentially compromise the users systems: if the browser security settings allow, even unauthenticated (unsigned) ActiveX controls may access files on hard drives. Type of fraud in which the fraudster persuades a nave victim to send money as advance fees supposedly to secure a payment which never actually materializes. Commonly known as a 419 scam. Annoying program that displays advertisements etc. Considered by some to be a form of malware since it is often installed secretly and has undesirable effects that may compromise privacy. Audio/visual warning that a critical condition requiring an urgent high priority response (e.g. fire/smoke, intruder, flood) has occurred. See also alert. Page 17 of 132
Access control
Access matrix
Accident
Accountable, accountability
ActiveX
Adware
Alarm
<ORGANIZATION>
Policy hierarchy
This Information Security Policy Manual defines the <ORGANIZATION>s information security policy hierarchy: top three layers of
Several security standards, procedures and guidelines are referenced in this manual in areas where more explicit details about the associated controls are required. The additional detailed materials are likely to evolve considerably during the lifetime of this manual reflecting change in technologies and information security risks. However the manual itself, being technology agnostic, is expected to remain relatively stable. A number of governance activities, strategies and plans sit conceptually above the information security policy hierarchy, including corporate governance, information and IT strategies and so forth. The policy hierarchy is supported by various information security management activities (such as procedures for measuring and reporting on security metrics, security awareness activities and a number of compliance activities) which, although important, are not explained in detail within this manual. Great effort has been taken to avoid excessive duplication and avoid significant gaps or discrepancies within this policy manual, and to remain consistent with external requirements and obligations. If you notice possible anomalies in the manual, please submit your comments to the ISM for consideration in or before the next policy manual review and update (see 5.1.2).
3.1.1.3
3.1.1.4
3.1.1.5
Page 44 of 132
<ORGANIZATION>
3.2
3.2.1
3.2.1.1
3.2.2
3.2.2.1
Axioms
Axioms are more specific statements of management intent such as Access to networks, systems and applications must be authorized based on business need, security requirements and least privilege. There are 39 axioms noted throughout this manual (collated at Appendix A) which directly relate to the 39 control objectives listed in ISO/IEC 27002. The control objectives define why information security is important to <ORGANIZATION>.
3.2.3
3.2.3.1
Policies
Policy statements explain what information security controls, specifically, are used to satisfy the control objectives referenced by the axioms. The bulk of this manual contains information security policy statements.
3.2.4
3.2.4.1
Standards
Standards provide yet more detail on information security controls and explain how policy statements are to be satisfied on particular system platforms or in certain circumstances. Contact the ISM for information about information security standards written by <ORGANIZATION> or available publicly.
3.2.5
3.2.5.1
Procedures
Procedures are documented information security processes containing manual, administrative or managerial controls, again relating to policy statements.
3.2.6
3.2.6.1
Guidelines
Guidelines give further information and helpful advice on information security to users of <ORGANIZATION>s information assets. Despite the name, guidelines include a mixture of mandatory controls relating to higher-level standards, policies, axioms and principles, as well as optional controls, advice and supporting information to help workers understand and apply information security more effectively. In practice, guidelines include various security awareness materials such as briefings, presentations, training course materials, intranet pages, posters, reminder cards etc.
Page 45 of 132
<ORGANIZATION>
7 Asset management
7.1 Responsibility for assets
Information Asset Owners must be identified to be held accountable for the protection of all Significant Information Assets
Axiom 4:
7.1.1
7.1.1.1
Inventory of assets
Management must identify <ORGANIZATION>s Significant Information Assets meaning information assets, both individual items and related groups of information assets (such as all the computer hardware and software providing a given IT service) having an aggregate replacement value of at least $50,000 (this value is reviewed annually by the Executive Directors). Management must understand their relative values in order to specify appropriate protection. Information assets include: Intangible information assets: the information content of databases and data files, system documentation, user manuals, training material, operational or support procedures, continuity plans, fallback arrangements, archived information, proprietary knowledge, experience and expertise, reputation and brand; Tangible information assets: documentation, printouts etc.; Software assets: application software, system software, development tools and utilities either owned by or licensed to <ORGANIZATION>; IT-related physical assets: computer and telecommunications hardware (processors, monitors, laptops, routers, telephone exchanges, fax machines, answering machines), magnetic media (tapes and disks), other technical equipment (power supplies, air-conditioning units), furniture, computer rooms etc.; IT-related services: computing and communications services, application services and utilities supporting IT equipment such as computer room air-conditioning, lighting, power and earthing. An accurate and complete inventory must be maintained by IT Change Management, identifying all Significant Information Assets along with key parameters such as the corresponding Information Asset Owners, their security classifications (see 7.2), locations, operating systems, versions etc.
7.1.1.2
7.1.1.3
7.1.2
7.1.2.1
Ownership of assets
Trustworthy Information Asset Owners* (IAOs) must be unambiguously designated by the LSC or SC to be accountable for the protection of all Significant Information Assets against information security incidents. Accountability will be distributed at the lowest feasible level of management within the organization. Although responsibility for designing, implementing, managing and/or operating information security controls may be delegated by IAOs to other parties (such as IT and Information Security Management), the IAOs remain personally accountable for their proper protection. IAOs are responsible for classifying their information assets (see 7.2) and defining/reviewing access restrictions and other information security controls.
7.1.2.2
Information assets are legally owned by <ORGANIZATION> not IAOs. Owner is used here in the sense of a custodian who management holds accountable for protecting the information asset.
Copyright 2009 IsecT Ltd.
Page 62 of 132
<ORGANIZATION>
7.1.3
7.1.3.1
7.2
Information classification
Information assets must be risk assessed, classified and protected according to <ORGANIZATION>s information security requirements
Axiom 5:
7.2.1
7.2.1.1
Classification guidelines
The following classifications apply to <ORGANIZATION>s information assets:
Security aspect
Classification
Examples Information
Corporate secrets the most sensitive classification level
label
SECRET
Controls
Strict access controls e.g. strong encryption routines with long keys; biometric authentication; safes Strong access controls e.g. standard encryption routines and keys; multifactor authentication; locked filing cabinets Routine access controls No specific requirement Strict data validation; automated periodic system integrity checks Routine data validation; manual/ad hoc system integrity checks No specific requirement Live-live or equivalent highly resilient systems and proven disaster recovery arrangements Cold standby disaster recovery arrangements No specific requirement
Confidentiality
CONFIDENTIAL
Most general business information Press releases, marketing brochures Important financial, safety or operational information Routine operational information General advice and background information Business- and safetycritical information Information used routinely Supplementary information
HIGH INTEGRITY
Integrity
Availability
TIER 1
TIER 2 TIER 3
Note: Significant information assets classified into any of the shaded boxes should have documented information security designs based on formal risk assessment (see 4.1).
Copyright 2009 IsecT Ltd.
Page 63 of 132
<ORGANIZATION>
7.2.1.2
Classification of information applies to all types or forms of information asset, both tangible and intangible. In practice, however, classification is most important for Significant Information Assets with replacement values of at least $50,000. For the purposes of classification, information assets may consist of related information items, grouped together so that broadly similar controls may be applied to the group, for example: Physical: computer equipment (servers, desktop PCs, laptops, disk arrays), communications equipment (routers, switches, PABX, fax machines), magnetic media (tapes and disks), other environmental equipment (power supplies, air conditioning), furniture and premises; Software: application software, system software, middleware, development tools and utilities; Information: databases, data files, system documentation, user manuals, training materials, operation or support procedures, business continuity and IT disaster recovery plans, archived information, proprietary knowledge. Each Significant Information Asset must be classified by the IAO or CSO at the earliest practicable opportunity based on the confidentiality, integrity and availability requirements of the most sensitive or business valuable parts of the information, as shown below. Classifications should be reviewed annually or sooner if changes occur (e.g. information that is due to be published in the annual report may be SECRET up to the point of publication, whereupon it becomes PUBLIC).
7.2.1.3
7.2.1.4
7.2.2
7.2.2.1
7.2.2.2
7.2.2.3
Page 64 of 132
<ORGANIZATION>
Axiom 6:
8.1.1
8.1.1.1
8.1.1.2
8.1.2
8.1.2.1
Screening
All potential recruits (including permanent employees, consultants, contractors and temporary staff) should be adequately screened prior to being offered employment, especially in the case of applicants for particularly sensitive or responsible positions where the candidates integrity (honesty and trustworthiness) and competence (skills, experience and qualifications) are vital. The screening process cannot absolutely guarantee a candidates integrity or competence but is a means to reduce the risk of employing unsuitable people. The extent of screening should therefore reflect the risk associated with abuse of the position. Where permitted by local law, pre-employment screening for all applicants should include the following checks: Availability of satisfactory character references, typically at least one business and one personal; Assessing the completeness and accuracy of the applicants curriculum vitae (including academic and professional history and qualifications) by discussion with the applicant at interview and/or by other means; Checking the identity of the applicant, ideally by reference to their passport or similar authentic identity document having a verified official photograph or listing distinguishing features.
8.1.2.2
Page 65 of 132
<ORGANIZATION>
8.1.2.3
If permitted by local law, additional checks should be performed if a candidate is anticipated to need significant access to CONFIDENTIAL or SECRET information, such as: Taking up the candidates character references and seeking additional confirmation of the candidates integrity from previous employers or business associates; Validating CV details such as the candidates employment history and claimed academic and professional qualifications (for example by calling past employers and checking the original certificates and, if necessary, confirming with the issuing institutions); Actively assessing the candidates competency for the rle through pre-employment tests and/or a post-employment probationary period prior to confirming their appointment; Credit, criminal record and/or other background or security checks (the candidates explicit permission is normally required for checks of this nature). Such additional checks should be repeated periodically for workers holding positions of considerable authority, or where there are valid reasons for management to doubt their integrity or competence. Where workers are provided through an agency, the contract with the agency (see 6.2.3) should clearly specify the agencys responsibilities for screening and the notification procedures they must follow if screening has not been completed or if the results give cause for doubt or concern. <ORGANIZATION> must periodically confirm the agencys compliance with these requirements, and be alert for non-compliance (e.g. unsuitable candidates being placed). Management must evaluate the need to supervise new and inexperienced workers with access to Significant Information Assets including sensitive information. The work of all workers must be periodically reviewed and approved by managers or other senior or trusted employees. Managers should be aware that personal circumstances of their staff may affect their work. Personal or financial problems, changes in their behavior or lifestyle, recurring absences and evidence of stress or depression might lead to fraud, theft, error or other security implications. Fraudsters sometimes betray their activities by conspicuous consumption or living beyond their means. Suspicions of this nature should be reported to Human Resources and/or the ISM. Personal information about candidates should be classified as CONFIDENTIAL and protected accordingly.
8.1.2.4
8.1.2.5
8.1.2.6
8.1.2.7
8.1.2.8
8.1.3
8.1.3.1
8.1.3.2
8.1.3.3
<ORGANIZATION>
8.2
During employment
Workers must be made aware of and motivated to comply with their obligations under these information security policies plus the associated standards, procedures, guidelines, laws and regulations
Axiom 7:
8.2.1
8.2.1.1
Management responsibilities
All workers must comply with <ORGANIZATION>s information security principles, axioms, policies, standards, procedures and guidelines, plus requirements identified in the terms and conditions of their employment or service contracts and applicable laws and regulations. Managers are responsible for ensuring that, throughout their employment, workers: Are properly briefed and made aware of their security responsibilities (for example, using the Code of Conduct supplemented where necessary by more specific guidance in job descriptions, security guidelines and procedures) before being granted access to <ORGANIZATION> networks, systems or data, and periodically thereafter; Are motivated to comply with their responsibilities through a combination of ongoing management supervision, encouragement and reinforcement; Maintain their information security competencies, skills and qualifications through ongoing awareness, education and training (see below).
8.2.1.2
8.2.2
8.2.2.1
8.2.2.2
8.2.3
8.2.3.1
Disciplinary process
Workers who commit a security breach (for example deliberately violating these information security policies or related security standards, procedures, guidelines, laws or regulations) should be disciplined through the standard disciplinary process owned by Human Resources, or (in the case of non-employees) through contractual or legal processes. All workers must be treated fairly and correctly, based on reliable evidence verifying that breaches have occurred (see 13.2.3).
8.2.3.2
Page 67 of 132
<ORGANIZATION>
8.2.3.3
The disciplinary process allows for a range of actions according to the severity of the violation, potentially including summary dismissal and legal action to recover losses and consequential damages. Workers who break the law may also be prosecuted. The deterrent value of an effective disciplinary process should not be underestimated. Where appropriate and provided that any confidentiality issues are taken into account, uses and outcomes of the disciplinary process should be communicated among managers and peers to reinforce <ORGANIZATION>s policies in this area.
8.2.3.4
8.3
Axiom 8:
8.3.1
8.3.1.1
Termination responsibilities
Managers are responsible for ensuring that suitable termination processes are completed when subordinate workers leave <ORGANIZATION>: Standard termination checklists (owned by Human Resources) must be completed and returned to HR; Workers must be reminded of their ongoing legal and ethical responsibilities to maintain the confidentiality of proprietary and personal information obtained in the course of their employment. Similar considerations apply when a worker transfers between departments or changes status within <ORGANIZATION>. The managers involved in a transfer should jointly agree a fixed transition period, beyond which the worker will no longer have access to information and other assets exclusively associated with their previous rle. It is particularly important that key controls relating to divisions of responsibility are not compromised at this time e.g. the worker should not be able to initiate a payment under the old rle and approve it under the new rle (see also 10.1.3).
8.3.1.2
8.3.2
8.3.2.1
Return of assets
Workers must return all <ORGANIZATION> assets (including documents, data, computer systems, mobile phones, corporate credit cards, access tokens and authentication devices etc.) in their possession when they leave <ORGANIZATION>. Managers should explicitly request this, for example in the course of completing the termination checklist. Workers with vital knowledge should be encouraged to hand-over to their peers before they leave, ideally by preparing procedures and other notes [this process should be happening routinely in any case to minimize reliance on critical people].
8.3.2.2
8.3.3
8.3.3.1
Page 68 of 132
<ORGANIZATION>
8.3.3.2
In circumstances such as summary dismissal for fraud or theft, the risks relating to a workers termination may justify the immediate revocation of their access rights. In conjunction with Human Resources, the ISM and Physical Security, the workers manager should ensure that the risks of continued access are assessed and appropriate action is initiated at the earliest opportunity (e.g. immediate revocation of the workers network login ID and building access card). In such cases, there may also be a need to retain logs and other files and information for forensic analysis (see 13.2.3).
IsecTs NoticeBored security awareness service significantly extends this policy manual, supplying a broad range of security guidelines, briefings, presentations, posters and other security awareness materials, all written to the same high quality standard. The additional materials support implementation of ISO/IEC 27001 and ISO/IEC 27002 and encourage compliance with the good practices detailed in this manual, helping to build a genuine information security culture. For more information and to purchase the full version of this manual, please visit www.NoticeBored.com.
Page 69 of 132