Policy 7230A - Department of Administration
Policy 7230A - Department of Administration
Policy 7230A - Department of Administration
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
6.2. Integrity Operations<br />
The following are the Non-Mandatory Baselines that support the Integrity Operations<br />
section <strong>of</strong> the Default Security Requirements:<br />
6.2.1. Monitor System Security Controls<br />
Agencies should provide for continuous monitoring so as to not undermine the<br />
value <strong>of</strong> any implemented security controls and to maximize the value those<br />
controls provide:<br />
6.2.1.a Identification <strong>of</strong> Monitoring Sources<br />
• Determine at what level(s) infrastructure security monitoring<br />
will be performed:<br />
o Monitoring at the network level will detect threats that<br />
impact the organization but may not reveal specific<br />
information as to the specific systems or information<br />
targeted by the threat. This level <strong>of</strong> monitoring requires<br />
the least investment <strong>of</strong> effort.<br />
o Monitoring at the system level will detect threats that<br />
impact the system, but may not reveal specific<br />
information as to the specific information targeted by<br />
the threat. This level <strong>of</strong> monitoring requires a moderate<br />
level <strong>of</strong> effort.<br />
o Monitoring at the component level will detect threats<br />
that impact specific information. This level <strong>of</strong><br />
monitoring requires the highest level <strong>of</strong> effort.<br />
6.3. Maintenance Operations<br />
The following are the Non-Mandatory Baselines that support the Maintenance<br />
Operations section <strong>of</strong> the Default Security Requirements:<br />
6.3.1. Plan for, and Provide Notification <strong>of</strong>, Security Operations<br />
Agencies should ensure appropriate entities within the agency are notified<br />
prior to the initiation <strong>of</strong> any security operations (Risk, Vulnerability and<br />
Security Assessments, System Audits, Contingency and Incident Response Plan<br />
Tests and solution implementations):<br />
6.3.1.a Notification and Work Plan<br />
• All works plans should include the following information:<br />
o Nature <strong>of</strong> the work.<br />
o Reason for the work.<br />
o Scheduling <strong>of</strong> the work.<br />
o Tasks involved in the work.<br />
o Contact plans to be followed during the work.<br />
o Rollback plans in the event <strong>of</strong> failure <strong>of</strong> the work.<br />
• All work plans should be accompanied by a notification<br />
schedule that should include the following:<br />
18