10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Correlate all factors to create a master prioritization schedule.<br />

Revise this schedule each time a new threat or vulnerability is<br />

discovered.<br />

6.3.3. Securely Maintain Systems<br />

Agencies should perform system maintenance work in as secure a manner as<br />

possible:<br />

6.3.3.a Remote Maintenance<br />

• All active connections as well as the system being maintained<br />

should be actively monitored.<br />

• Remote maintenance should be performed over encrypted<br />

tunnels.<br />

• Tunnels should be positively terminated upon completion <strong>of</strong><br />

all work.<br />

6.3.3.b Maintenance Logs<br />

• Maintenance logs, at a minimum, should capture the following<br />

information:<br />

o Affected system.<br />

o Date and time <strong>of</strong> scheduled maintenance.<br />

o Description <strong>of</strong> the work performed.<br />

o Listing <strong>of</strong> any equipment removed or replaced.<br />

o Name and organization <strong>of</strong> person performing the<br />

maintenance.<br />

o Identity verification mechanism used.<br />

o Name <strong>of</strong> escort.<br />

6.4. Maintain Records<br />

Agencies should capture documentation appropriate to all systems operations<br />

processes:<br />

• Document and retain copies <strong>of</strong> all system security operations notifications and<br />

implementation plans.<br />

• Document and retain copies <strong>of</strong> all security assessments.<br />

• Create and maintain systems security monitoring logs.<br />

• Create and maintain patch and remediation logs.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!