10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Additionally, information systems will be configured to enforce user access<br />

restrictions. Supplemental and more restrictive controls will be used to restrict<br />

administrative access to operational and security settings, configurations and data.<br />

An asset inventory <strong>of</strong> information system component elements (individual pieces<br />

<strong>of</strong> hardware, firmware and s<strong>of</strong>tware) will be maintained. This inventory will be<br />

structured such that it is searchable by both individual element and entire<br />

information system for contingency planning and operations purposes. The<br />

inventory is to be immediately updated whenever a new information system,<br />

information system component or information system component element is<br />

implemented or when an old one is retired. The asset inventory is to be reviewed<br />

and, where necessary, updated at least annually.<br />

Each information system is to be provided with a complete set <strong>of</strong> documentation.<br />

This documentation shall include, at a minimum, administrator and user guides for<br />

each information system component element as well as guides to the functional<br />

properties <strong>of</strong> integrated security controls. These security controls guides must be<br />

detailed enough to allow for testing <strong>of</strong> the security controls.<br />

B. Network Configuration<br />

Information flow between information systems or components <strong>of</strong> information<br />

systems is restricted through the use <strong>of</strong> Access Control Lists, filtering and other<br />

mechanisms. Further, the authenticity <strong>of</strong> communications between information<br />

systems or information system components will make use <strong>of</strong> certificates,<br />

encryption and other mechanisms.<br />

The information system that provides DNS will provide authenticated responses to<br />

requests for name resolution. These authenticated responses will be accompanied<br />

by origin and integrity artifacts (such as certificates and digital signatures). Further<br />

the information system that provides DNS will be configured for maximum fault<br />

tolerance including the use <strong>of</strong> fully redundant information system components and<br />

information system component elements.<br />

Wireless networks will be restricted and may only be used where documented<br />

appropriate authorization has first been provided. Wireless networks will be<br />

actively monitored and access will be strictly controlled.<br />

VoIP systems will be restricted and may only be used where documented<br />

appropriate authorization has first been provided. VoIP systems will be actively<br />

monitored and access will be strictly controlled.<br />

C. Other Systems Configuration<br />

The use <strong>of</strong> mobile and portable computing devices (PDA’s, smart phones, cell<br />

phones, etc.) will be restricted and may only occur where documented appropriate<br />

authorization has first been provided. Where possible, the use <strong>of</strong> these devices will<br />

be actively monitored and their access to information systems strictly controlled.<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!