10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

controls. The system use notification will also indicate appropriate security and privacy<br />

notices. Finally this notification will be displayed until the user acknowledges it prior<br />

to completing authenticated system access.<br />

Remote access to information systems will be strictly controlled. These controls<br />

include previous authorization <strong>of</strong> remote access privileges and the use <strong>of</strong> encrypted<br />

communications sessions. Further, all sessions must be actively monitored and must<br />

pass through managed access points. Finally, remote access is only to be used to<br />

execute privileged functions where sufficient rationale can be provided and such<br />

access will be preapproved and documented in the Agency security plan.<br />

All State information systems shall impose restrictions on open sessions that are<br />

inactive for a pre-defined period <strong>of</strong> time. If the open session is established internally,<br />

the session will be locked until the session is re-authenticated. If the open session is<br />

established remotely the session will be terminated. These restrictions apply only to<br />

user accounts and not to system accounts used for inter-system communications.<br />

All State information systems shall positively and definitively identify and authenticate<br />

devices that participate in inter-system communications prior to establishing a<br />

network connection. Appropriate authentication methods include the use <strong>of</strong> shared<br />

known information (such as MAC or TCP/IP addresses) or a defined authentication<br />

solution (such as 802.11x, EAP or Radius).<br />

Information systems external to the control <strong>of</strong> the State <strong>of</strong> Kansas or a State agency<br />

may not establish communication or access State or agency information systems<br />

unless the security controls <strong>of</strong> the third-party information system can be verified to<br />

meet the requirements <strong>of</strong> the State or agency. Additionally connection agreements<br />

must be in place with the third-party host <strong>of</strong> the external information system and all<br />

communications will be both encrypted and actively monitored. Further, all such<br />

remote access to State or agency information systems must pass through defined and<br />

controlled access points. Finally information systems external to the control <strong>of</strong> the<br />

State <strong>of</strong> Kansas or a State agency shall not be used for systems administration or other<br />

privileged functions without compelling reasons (such as during contingency<br />

operations) that have been documented and accepted by the State <strong>of</strong> Kansas.<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!