Policy Statement
In accordance with the Business Data Classification Policy, all information systems that create, receive, store, or transmit data classified as 'Confidential' must adhere to the integrity principles of this document.
Reason for Policy
State and federal regulations, as well as general best practices, shape the security and privacy protections that must be afforded to data classified as "Confidential". This policy addresses regulatory and best practice requirements to protect data integrity.
Who Should Read this Policy
All users of Business.
Principles
Information systems or applications that create, receive, store, or transmit Confidential data (hereafter "Confidential Systems" - see Data Classification policy) must, without exclusion, adhere to the following:
Disabling unnecessary services
- All Confidential Systems must disable services that are not required to achieve the business purpose or function of the system. Examples of unnecessary services could include, but are not limited to, FTP, Telnet, SMTP, Web services, etc.
Monitoring Log-in Attempts
- All access to Confidential Systems must be logged. Logs must be audited on a predetermined, periodic basis. Documented procedures must be in place for the regular review of the audited activity. Discrepancies or access violations found through audits must be documented and, when appropriate, reported as per the Business incident reporting process.
Protection from malicious software
- All Confidential Systems must be tagged with an ITS tag, which ensures ITS-offered protections from malicious software are available. These protections include, but are not limited to, antivirus software, personal firewall software, and automated installation of security patches. For non-networked Confidential Systems, users should make reasonable efforts to keep systems updated with the latest security patches and antivirus software and definitions. Antivirus software is available to all users through the Information Technologies and Services.
- Confidential Systems (including laptops and PDA's) should be used for appropriate Business functions. While non-essential computer activities such as playing music are not generally prohibited, users should be cognizant that, when misused, this type of practice can result in disruption of the larger Business computing environment. Users are expected to treat electronic resources with care and seek advice from their direct supervisors or ITS Liaisons if they are unsure as to the appropriateness of particular computing functions.
Patch Management
- Managers and administrators of Confidential Systems have the responsibility of determining whether and/or which patches (e.g. operating system, application, or other patches) to deploy. In cases where the ITS department recommends deployment of a patch, managers and administrators of Confidential Systems must deploy that patch in a timely manner or otherwise implement documented compensating controls.
Intrusion Detection and Vulnerability Scanning
- Networks that support processing, storage, or transmission of Confidential data must be monitored for intrusion and compromise by contemporary intrusion detection and/or prevention technologies. Intrusions must be investigated, logged and reported as per the Business incident reporting policy.
- Vulnerability scanning of Confidential Systems must occur on a predetermined, regular basis, no less than annually. Vulnerability scans must be reviewed by trained personnel and, when appropriate, reported as per the Business incident reporting policy.
Server Security
- Server administrative functions on Confidential Systems may be performed only by personnel with documented authorization.
Workstation Security
- Anyone authorized to use a Business workstation is expected to protect the integrity of that workstation and the data it contains.
- Users are expected to make reasonable efforts (e.g. by one more of the following: locking, logging out, using privacy screens, using logons with limited access, etc.) to restrict the viewable access to workstations that are connected to (or are considered to be) Confidential Systems when they are going to be out of viewable range of those workstations. After a predetermined amount of inactivity, workstations that have access to (or are considered to be) Confidential Systems should automatically lock or log off. Electronic access from workstations to Confidential Systems should be automatically terminated after a predetermined period of activity.
- Workstations, printers, fax machines, etc, classified as "Confidential" should not be located in public sections of walkways, hallways, waiting areas, etc. To the extent reasonable, efforts should be made to limit the viewing of data on these workstations to workforce members with legitimate business need to do so.
Laptops
- All reasonable efforts should be made to avoid storing Confidential data on laptops. Laptops devices that store Confidential data must employ:
- Unique individual power-on passwords
- Password protected screen savers (when technically possible)
- Encryption of Confidential data (when technically possible)
Mobile Devices
- All reasonable efforts should be made to avoid storing Confidential data on mobile devices, including PDA's, Blackberries, Flash Drives, etc. Mobile devices that must store Confidential data must employ encryption of Confidential data (when technically possible).
Data Security
- Managers and administrators of Confidential Systems must document and adhere to a process to regularly assess data storage systems and requirements in order to:
- Reduce the risk of compromise of Confidential data confidentiality and/or integrity.
- Implement and/or review controls designed to protect Confidential data from improper alteration or destruction.
- Ensure that Confidential data is stored in a manner that supports user access logs and automated monitoring for potential security incidents.
- Ensure that back-end databases containing large amounts (over 1 gigabyte) of Confidential data are isolated from other application or system services (e.g. application middleware, Web and e-mail servers, thin-client servers, etc.) and where not practical, protected by equivalent compensating controls.
- Backup media containing Confidential data must be encrypted using contemporary encryption standards.
Transmission Security
- Managers, administrators, or other applicable users of Confidential Systems are responsible for protecting Confidential data (including file transfers) while in transit, both within the Business networks, and on public networks such as the Internet. Managers and administrators of Confidential Systems and data must adhere to the following:
- Any transmission of Confidential data over public networks must be encrypted.
- Integrity controls that ensure data has not been tampered with by unauthorized users must be in place for all Confidential data that traverses the Business networks.
- Sender authentication controls that verify the sender of Confidential data is who that sender claims to be must be in place for all Confidential data that traverses the Business networks.
- Recipient authentication controls that verify the recipient of Confidential data is who that recipient claims to be must be in place for all Confidential data that traverses the Business networks.
- System logs of all transmissions of Confidential data over public networks must be stored for a documented, predetermined amount of time. These logs must be available for audit.
Email Transmission Security
- Many of the controls above are addressed by the appropriate use of security technologies (e.g. IPSec-compliant virtual private networks (VPN's), SMTP over SSL, etc) and practices. Users must be particularly careful when transmitting email containing Confidential data, as e-mail is inherently insecure. Additional standards for the use of email in communicating Confidential data are:
- The inclusion of Confidential data in email must be kept to the minimum necessary needed to meet the intended purpose of the message and must be directed only to people with legitimate authorization.
- Sending messages to an unintended recipient is particularly easy to do with email, and senders should verify the send-to email address before sending messages containing Confidential data.
- To protect the confidentiality of Confidential data, senders should use encrypted email services wherever such services are available and practical.
- Instead of sending or receiving email attachments containing unencrypted Confidential data, users should use a secure file transfer service where implemented by Business.
- Instant messaging and other similar technologies (e.g. text paging, text messaging) have many of the same security problems as email and are generally even more difficult to secure. Unless the communicating parties are certain that communications are protected effectively against unauthorized use or disclosure. Confidential data may not be sent through instant messaging or other similar technologies.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article