Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

2.2.1.b System Responsibility Individuals • For all system responsible individuals, capture the following information: o Name. o Title and employing Agency/Department o Contact information. 2.2.1.c System Security Configuration • High impact systems should be afforded the highest level of system protection: o Systems should be patched and maintained on an at least weekly basis, or as often as the release of patches allows. o System logs should be reviewed on an at least daily basis. o Systems should be protected with anti-malware, data encryption and enhanced authentication solutions. o Systems should be placed on dedicated network segments that are provided with access controls, firewall protection and intrusion detection and prevention capabilities. • Medium impact system should be afforded a moderate level of system protection: o Systems should be patched and maintained on an at least monthly basis, or as often as the release of patches allows. o System logs should be reviewed on an at least weekly basis. o Systems should be protected with anti-malware and data encryption solutions. o Systems should be placed on networks that are provided with perimeter firewall protection and intrusion detection and prevention capabilities. • Low impact systems should be afforded a minimal level of system protection: o Systems should be patched and maintained on an at least quarterly basis, or as often as the release of patches allows. o System logs should be reviewed on an at least monthly basis. o Systems should be protected by anti-malware solutions. o Systems should be placed on networks that are provided perimeter firewall protection. 4

2.3. Maintain Records Agencies should capture documentation appropriate to all assessment and planning processes: • Document and retain copies of the outcome of all Risk Assessments. • Document and retain copies of all Security Plans. 5

2.2.1.b System Responsibility Individuals<br />

• For all system responsible individuals, capture the following<br />

information:<br />

o Name.<br />

o Title and employing Agency/<strong>Department</strong><br />

o Contact information.<br />

2.2.1.c System Security Configuration<br />

• High impact systems should be afforded the highest level <strong>of</strong><br />

system protection:<br />

o Systems should be patched and maintained on an at<br />

least weekly basis, or as <strong>of</strong>ten as the release <strong>of</strong> patches<br />

allows.<br />

o System logs should be reviewed on an at least daily<br />

basis.<br />

o Systems should be protected with anti-malware, data<br />

encryption and enhanced authentication solutions.<br />

o Systems should be placed on dedicated network<br />

segments that are provided with access controls,<br />

firewall protection and intrusion detection and<br />

prevention capabilities.<br />

• Medium impact system should be afforded a moderate level<br />

<strong>of</strong> system protection:<br />

o Systems should be patched and maintained on an at<br />

least monthly basis, or as <strong>of</strong>ten as the release <strong>of</strong><br />

patches allows.<br />

o System logs should be reviewed on an at least weekly<br />

basis.<br />

o Systems should be protected with anti-malware and<br />

data encryption solutions.<br />

o Systems should be placed on networks that are<br />

provided with perimeter firewall protection and<br />

intrusion detection and prevention capabilities.<br />

• Low impact systems should be afforded a minimal level <strong>of</strong><br />

system protection:<br />

o Systems should be patched and maintained on an at<br />

least quarterly basis, or as <strong>of</strong>ten as the release <strong>of</strong><br />

patches allows.<br />

o System logs should be reviewed on an at least monthly<br />

basis.<br />

o Systems should be protected by anti-malware<br />

solutions.<br />

o Systems should be placed on networks that are<br />

provided perimeter firewall protection.<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!