Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

5.4.1.3 Maintain Continuity of Security During Migration to Production Ensure that system security is not reduced or compromised in any way during the migration to the production environment by utilizing a formal hand-off: • Integrate security by migrating the management of system security controls from the development environment into the production environment. • Assess system security (see section 6.1.1 of these Non- Mandatory Procedures). 5.4.1.4 Operate and Maintain the System According to Set Practices Once implemented into the production environment the system must be operated and maintained according to established security principles: • Perform change control (see section 5.1.3 of these Non- Mandatory Procedures). • Perform system security control monitoring (see section 6.2.1 of these Non-Mandatory Procedures). • Perform patch and vulnerability management (see section 6.3.2 of these Non-Mandatory Procedures). • Perform system maintenance (see section 6.3.3 of these Non- Mandatory Procedures). 5.5. Maintain Records Agencies should capture documentation appropriate to all systems configuration processes: • Create and maintain a systems component and configuration inventory. • Document and retain copies of SDLC requirements. • Document and retain copies of all system implementation plans. 18

6. Systems Operation These Systems Operation Non-Mandatory Procedures support the Enterprise Security Policy (ITEC 7230 Rev 1), and the IT Security Self Assessment Policy (ITEC 7310). Mandatory Non-Mandatory Procedures Baselines Procedures Baselines 6. Systems Operation 6.1. Assessment Operations 6.1.1. Perform Security Assessment (7 sets) (3 sets) 6.1.2. Perform Security Self Assessment (4 sets) (2 sets) 6.2. Integrity Operations 6.2.1. Monitor System Security Controls (3 sets) (1 sets) 6.3. Maintenance Operations 6.3.1. Plan for, and Provide Notice of, Security Operations (4 sets) (1 sets) 6.3.2. Perform Patch and Vulnerability Management (5 sets) (3 sets) 6.3.3. Securely Maintain Systems (2 sets) (2 sets) 6.4. Maintain Records 6.1. Assessment Operations The following are the Non-Mandatory Procedures that support the Assessment Operations section of the Default Security Requirements: 6.1.1. Perform Security Assessments Security Assessments are thorough and in-depth security analyses designed to determine the security deficiencies of a system. Agencies should perform Security Assessments to ascertain security concerns that may exist in a system: 6.1.1.1 Identify the Target System Collect and document the information that defines the system: 6.1.1.2 Develop an Assessment Plan Create a formal plan that clearly outlines the work that will be performed: • Determine the scope of assessments to be performed. • Establish a prioritized assessment schedule. • Identify and gather required skills and tools. • Creation an assessment implementation plan. 6.1.1.3 Execute the Plan Apply the developed plan to the targeted system to determine and validate the existence of security compromises: • Review the system and system documentation to determine expected security configuration and capabilities of the system: • Identify and analyze the target system through investigative techniques: • Validate vulnerabilities that may be discovered: 19

5.4.1.3 Maintain Continuity <strong>of</strong> Security During Migration to Production<br />

Ensure that system security is not reduced or compromised in any<br />

way during the migration to the production environment by utilizing a<br />

formal hand-<strong>of</strong>f:<br />

• Integrate security by migrating the management <strong>of</strong> system<br />

security controls from the development environment into the<br />

production environment.<br />

• Assess system security (see section 6.1.1 <strong>of</strong> these Non-<br />

Mandatory Procedures).<br />

5.4.1.4 Operate and Maintain the System According to Set Practices<br />

Once implemented into the production environment the system must<br />

be operated and maintained according to established security<br />

principles:<br />

• Perform change control (see section 5.1.3 <strong>of</strong> these Non-<br />

Mandatory Procedures).<br />

• Perform system security control monitoring (see section 6.2.1<br />

<strong>of</strong> these Non-Mandatory Procedures).<br />

• Perform patch and vulnerability management (see section<br />

6.3.2 <strong>of</strong> these Non-Mandatory Procedures).<br />

• Perform system maintenance (see section 6.3.3 <strong>of</strong> these Non-<br />

Mandatory Procedures).<br />

5.5. Maintain Records<br />

Agencies should capture documentation appropriate to all systems configuration<br />

processes:<br />

• Create and maintain a systems component and configuration inventory.<br />

• Document and retain copies <strong>of</strong> SDLC requirements.<br />

• Document and retain copies <strong>of</strong> all system implementation plans.<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!