Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

3.2 Security Operations Training The State of Kansas requires that Security Operations Training be conducted for all administrators (including third parties working for or as State employees) of the State’s information systems. This training will address the secure operations of the information systems (or components of information systems) for which the employee is an administrator. Security operations training ensures that administrators of the State’s information systems understand the security requirements of the information system as well as the manner in which those security requirements should be implemented and maintained. Without such training information systems have an increased likelihood of being breached. All employees of the State of Kansas that work as administrators or hold other positions with significant and relevant security operations responsibilities are required to participate in security operations training within 90 days of starting work or the deployment of a new or significantly updated/revised information system and thereafter on an at least annual basis. Upon completion of security operations training all employees will be required to sign a declaration that they have completed the training, understand the purpose of the training and the specific procedures taught, and that they intend to abide by these security policies. That signed declaration shall be filed with the Human Resources department of the employee’s individual agency. The security operations training program and accompanying materials will be reviewed and, where required, updated on at least an annual basis. This work will ensure that program and accompanying materials have the greatest level of on-going relevance with regards to the State of Kansas’ IT security requirements. This review will occur prior to annual security operations training to ensure the training provided is always as current as possible. 10

4 Access Control Sections 4.1, 4.2, and 4.3 constitute the State of Kansas’ Access Control Policy. By definition, access control includes Identification and Authentication. This policy is accompanied by defined Access Control Mandatory and Non-Mandatory Procedures and Baselines that are distributed in a companion document. Mandatory Non-Mandatory Procedures Baselines Procedures Baselines 4. Access Control 4.1. Identification and Authentication 4.1.1. Manage Identification and Authentication (6 sets) (4 sets) 4.2. Account Management 4.2.1. Configure User Accounts (4 sets) (2 sets) 4.3. Session Management 4.3.1. Configure Systems for Secure Access (6 sets) (3 sets) 4.3.2. Configure Systems for Secure Communications (3 sets) (1 set) 4.1 Identification & Authentication The State of Kansas requires that all approved information system users must be given authorization to access information systems, must be uniquely identified within those information systems and must present some form of acceptable identity authentication to be allowed to use any information system that houses privileged information. The use of authorization, identification and authentication controls ensures that only known users make use of the information system. Without authorization, identification and authentication controls, the potential exists that information systems could be accessed illicitly and the confidentiality, integrity and availability of those information systems be compromised. Prior to being granted access to an information system, users must be provided with formal authorization by an appropriate official (i.e., the owner of the information system, the custodian of the data housed within the information system or a designee of these individuals). This authorization will be based on definitive and verifiable identification of the user. Further, this authorization will be logged by the authorizing official and shared with systems and user management departments of the body that employs that user. Once authorization has been granted, the user will be provided with a unique information system identifier. Examples of identifiers include user ids and smart cards. This identifier will be delivered to the authorized user in such a manner as to ensure that it is received only by the authorized user. Additionally, the user will be provided with a unique information system authenticator that is tied to the assigned identifier. Examples of authenticators include passwords, tokens and certificates. This authenticator will also be delivered to the authorized user in such a manner as to ensure that it is received only by the authorized user. To minimize risk, identifiers and 11

3.2 Security Operations Training<br />

The State <strong>of</strong> Kansas requires that Security Operations Training be conducted for all<br />

administrators (including third parties working for or as State employees) <strong>of</strong> the<br />

State’s information systems. This training will address the secure operations <strong>of</strong> the<br />

information systems (or components <strong>of</strong> information systems) for which the employee<br />

is an administrator.<br />

Security operations training ensures that administrators <strong>of</strong> the State’s information<br />

systems understand the security requirements <strong>of</strong> the information system as well as the<br />

manner in which those security requirements should be implemented and maintained.<br />

Without such training information systems have an increased likelihood <strong>of</strong> being<br />

breached.<br />

All employees <strong>of</strong> the State <strong>of</strong> Kansas that work as administrators or hold other<br />

positions with significant and relevant security operations responsibilities are required<br />

to participate in security operations training within 90 days <strong>of</strong> starting work or the<br />

deployment <strong>of</strong> a new or significantly updated/revised information system and<br />

thereafter on an at least annual basis. Upon completion <strong>of</strong> security operations training<br />

all employees will be required to sign a declaration that they have completed the<br />

training, understand the purpose <strong>of</strong> the training and the specific procedures taught,<br />

and that they intend to abide by these security policies. That signed declaration shall<br />

be filed with the Human Resources department <strong>of</strong> the employee’s individual agency.<br />

The security operations training program and accompanying materials will be<br />

reviewed and, where required, updated on at least an annual basis. This work will<br />

ensure that program and accompanying materials have the greatest level <strong>of</strong> on-going<br />

relevance with regards to the State <strong>of</strong> Kansas’ IT security requirements. This review<br />

will occur prior to annual security operations training to ensure the training provided<br />

is always as current as possible.<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!