10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.2. Integrity Operations<br />

The following are the Non-Mandatory Baselines that support the Integrity Operations<br />

section <strong>of</strong> the Default Security Requirements:<br />

6.2.1. Monitor System Security Controls<br />

Agencies should provide for continuous monitoring so as to not undermine the<br />

value <strong>of</strong> any implemented security controls and to maximize the value those<br />

controls provide:<br />

6.2.1.a Identification <strong>of</strong> Monitoring Sources<br />

• Determine at what level(s) infrastructure security monitoring<br />

will be performed:<br />

o Monitoring at the network level will detect threats that<br />

impact the organization but may not reveal specific<br />

information as to the specific systems or information<br />

targeted by the threat. This level <strong>of</strong> monitoring requires<br />

the least investment <strong>of</strong> effort.<br />

o Monitoring at the system level will detect threats that<br />

impact the system, but may not reveal specific<br />

information as to the specific information targeted by<br />

the threat. This level <strong>of</strong> monitoring requires a moderate<br />

level <strong>of</strong> effort.<br />

o Monitoring at the component level will detect threats<br />

that impact specific information. This level <strong>of</strong><br />

monitoring requires the highest level <strong>of</strong> effort.<br />

6.3. Maintenance Operations<br />

The following are the Non-Mandatory Baselines that support the Maintenance<br />

Operations section <strong>of</strong> the Default Security Requirements:<br />

6.3.1. Plan for, and Provide Notification <strong>of</strong>, Security Operations<br />

Agencies should ensure appropriate entities within the agency are notified<br />

prior to the initiation <strong>of</strong> any security operations (Risk, Vulnerability and<br />

Security Assessments, System Audits, Contingency and Incident Response Plan<br />

Tests and solution implementations):<br />

6.3.1.a Notification and Work Plan<br />

• All works plans should include the following information:<br />

o Nature <strong>of</strong> the work.<br />

o Reason for the work.<br />

o Scheduling <strong>of</strong> the work.<br />

o Tasks involved in the work.<br />

o Contact plans to be followed during the work.<br />

o Rollback plans in the event <strong>of</strong> failure <strong>of</strong> the work.<br />

• All work plans should be accompanied by a notification<br />

schedule that should include the following:<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!