Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

1 Governing Principles Information is an asset that is vital to the business of the State of Kansas – whether the information is contained in a hardcopy document, a softcopy file, an e-mail or other transmission. Whatever form the information takes, or whatever means by which it is stored and shared, it should always be appropriately protected. To achieve this protection, Information Security is utilized. Information Security is used to mitigate the risk to information assets and ensure their Confidentiality, Integrity and Availability. Information Security is achieved through the implementation of a set of controls that can include policies and procedures, as well as hardware and software tools. This document outlines the policies that the State of Kansas follows to achieve appropriate Information Security as referenced in the Information Technology Executive Council (ITEC) Policy 7230 – Information Technology Enterprise Security Policy. If an Agency of the State of Kansas does not have a Security Policy of its own, then this document shall be adopted as the default for that Agency. Agencies may develop and utilize their own individually developed Security Policy; however, that policy can be no less stringent than this standard. In cases of conflict between this policy and an individually developed Agency policy, the more stringent policy will take precedence. 1.1 Security Policy Overview A. Purpose These policies represent the requirements of the Information Technology Executive Committee (ITEC) in regards to the on-going security of the State of Kansas’ computing resources and information assets, or information systems. The State of Kansas’ computing resources are defined as all network connectivity devices, all IT Security infrastructure devices, all server hardware, all workstations, and all mobile computing devices, as well as all operating systems and all application software. The State of Kansas’ information assets are defined as all sensitive and confidential information, whether it be held in hardcopy or softcopy, be developed independently by the State or provided to it by third parties. B. Intent Through the careful definition of the access and utilization permissions associated with each information system, and through judicious application of those permissions, unauthorized usage, whether intentional or unintentional, from legitimate or illegitimate users can be controlled, reduced and eliminated. The control, reduction and elimination of unauthorized usage will benefit the State of Kansas and its employees in several ways: 2

• It will ensure that privileged information stays privileged. Protection of privileged information can lessen the susceptibility of the organization to lawsuits and other potentially damaging actions. • It will ensure that State resources are always available for their intended purpose, and that they will not be hijacked and utilized as the launching pad for attacks against other entities. C. Audience and Applicability This policy has been written to address all employees of the State of Kansas as well as, where applicable, all clients and partners of the State as well as third parties with whom the State may work from time-to-time. All users of State information systems are required to be familiar with the portion of these policies that are directly related to their role (section 1.2). Appendix B, Matrix of Responsibilities by Role details which sections of this policy each role is required to be aware of and comply with. This policy is deemed to always be in effect and as such applies whether an information system user is working internally at a State of Kansas facility or at an external location (e.g. partner’s location, home office etc.) on State of Kansas business. Further it applies equally to information systems that are owned/operated exclusively by the State or any of its agencies, or by third parties on behalf of the State or any of its agencies. 1.2 Roles and Responsibilities A. Chief Information Technology Officer, State of Kansas The State Chief Information Technology Officer (CITO) is responsible for all aspects of IT infrastructure and operations for the State of Kansas. As such, final and ultimate responsibility for IT security, and thus for the implementation of and adherence to this policy, rests with the CITO though on-going management is delegated to the State Chief Information Security Officer who acts on behalf of the CITO. B. Chief Information Security Officer, State of Kansas The State Chief Information Security Officer (CISO) acts on behalf of the State CITO and is responsible the development, distribution, maintenance and administration of all information security policies and procedures. The State CISO is also responsible for ensuring that these information security policies are adhered to for all information systems that are owned or operated on behalf of the State of Kansas as a whole. Finally, the State CISO is also responsible for ensuring that these information security policies are adhered to for all information systems that are owned or operated on behalf of state agencies where those state agencies have no Information Security Officer. The State CISO will fill the role of chairperson of the Information Technology Security Council (ITSC). Acting as chairperson of the ITSC however, provides, nor 3

1 Governing Principles<br />

Information is an asset that is vital to the business <strong>of</strong> the State <strong>of</strong> Kansas – whether the<br />

information is contained in a hardcopy document, a s<strong>of</strong>tcopy file, an e-mail or other<br />

transmission. Whatever form the information takes, or whatever means by which it is<br />

stored and shared, it should always be appropriately protected.<br />

To achieve this protection, Information Security is utilized. Information Security is used to<br />

mitigate the risk to information assets and ensure their Confidentiality, Integrity and<br />

Availability. Information Security is achieved through the implementation <strong>of</strong> a set <strong>of</strong><br />

controls that can include policies and procedures, as well as hardware and s<strong>of</strong>tware tools.<br />

This document outlines the policies that the State <strong>of</strong> Kansas follows to achieve appropriate<br />

Information Security as referenced in the Information Technology Executive Council (ITEC)<br />

<strong>Policy</strong> 7230 – Information Technology Enterprise Security <strong>Policy</strong>.<br />

If an Agency <strong>of</strong> the State <strong>of</strong> Kansas does not have a Security <strong>Policy</strong> <strong>of</strong> its own, then this<br />

document shall be adopted as the default for that Agency. Agencies may develop and utilize<br />

their own individually developed Security <strong>Policy</strong>; however, that policy can be no less<br />

stringent than this standard. In cases <strong>of</strong> conflict between this policy and an individually<br />

developed Agency policy, the more stringent policy will take precedence.<br />

1.1 Security <strong>Policy</strong> Overview<br />

A. Purpose<br />

These policies represent the requirements <strong>of</strong> the Information Technology<br />

Executive Committee (ITEC) in regards to the on-going security <strong>of</strong> the State <strong>of</strong><br />

Kansas’ computing resources and information assets, or information systems.<br />

The State <strong>of</strong> Kansas’ computing resources are defined as all network connectivity<br />

devices, all IT Security infrastructure devices, all server hardware, all workstations,<br />

and all mobile computing devices, as well as all operating systems and all<br />

application s<strong>of</strong>tware.<br />

The State <strong>of</strong> Kansas’ information assets are defined as all sensitive and confidential<br />

information, whether it be held in hardcopy or s<strong>of</strong>tcopy, be developed<br />

independently by the State or provided to it by third parties.<br />

B. Intent<br />

Through the careful definition <strong>of</strong> the access and utilization permissions associated<br />

with each information system, and through judicious application <strong>of</strong> those<br />

permissions, unauthorized usage, whether intentional or unintentional, from<br />

legitimate or illegitimate users can be controlled, reduced and eliminated. The<br />

control, reduction and elimination <strong>of</strong> unauthorized usage will benefit the State <strong>of</strong><br />

Kansas and its employees in several ways:<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!