Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

3. Awareness & Operations Training These Awareness and Operations Training Mandatory Baselines support the Enterprise Security Policy (ITEC 7230 Rev 1), the Security Awareness Training Policy (ITEC 7400), and the Security Awareness Requirements (ITEC 7400A). Mandatory Non-Mandatory Procedures Baselines Procedures Baselines 3. Awareness & Training 3.1. Security Awareness Training 3.1.1. Design and Develop an Awareness Training Program (2 sets) (1 set) 3.1.2. Provide Awareness Training (2 sets) (1 set) 3.2. Security Operations Training 3.2.1. Design and Develop an Operations Training Program (2 sets) (1 set) 3.2.2. Provide Operations Training (3 sets) (2 sets) 3.3. Maintain Records 3.1. Security Awareness Training The following are the Mandatory Baselines that support the Security Awareness Training section of the Default Security Requirements: 3.1.1. Design and Develop an Awareness Training Program Create a program and supporting materials that are appropriate to the needs of the agency: 3.1.1.a Awareness Training Requirements • At a minimum, security awareness training will address the following: o The creation and maintenance of passwords, including the need to maintain password confidentiality. o Detecting, avoiding and responding to Social Engineering. o Detecting, avoiding and responding to Identity Theft. o Detecting, avoiding and responding to viruses and other malware. o Appropriate handling of sensitive information to ensure confidentiality and integrity. o Appropriate usage of the Internet, e-mail and other organization resources. o Appropriate usage of software, including copyright infringement and file sharing. o Appropriate usage of portable devices, including external storage devices and portable computing devices. o Appropriate usage of encryption devices. Mandatory Baselines Page 4 of 25

o Appropriate physical security measures to ensure the protection of facilities, assets and personnel. o Appropriate reporting, including the reporting of abuse, policy violations and suspicious activities. 3.1.2. Provide Security Awareness Training Awareness Training is defined as the first level of the security learning continuum and its purpose is to focus attention on security and allow individuals to recognize security concerns in order to respond accordingly. Awareness must be provided to all users of a system: 3.1.2.a Security Awareness Training Frequency and Scheduling • Security awareness training shall be provided for all employees within 90 days of commencement of employment. • Security awareness training shall be provided thereafter for all employees on an at least annual basis. Where possible, employees will be trained together as groups. 3.2. Security Operations Training The following are the Mandatory Baselines that support the Security Operations Training section of the Default Security Requirements: 3.2.1. Design and Develop an Operations Training Program Create a program and supporting materials that are appropriate to the needs of the agency: 3.2.1.a Operational Training Requirements • At a minimum, security operations training will address the following: o Implementation and appropriate configuration of security controls inherent to the system or system component. o Implementation and appropriate configuration of security controls external to the system or system component. o Operations of the security controls inherent to the system or system component. o Operations of the security controls external to the system or system component. 3.2.2. Provide Security Operations Training Operations Training is defined as the second level of the security learning continuum and its purpose is to provide specific skills that will allow an individual to create and maintain security in a system. Training must be Mandatory Baselines Page 5 of 25

3. Awareness & Operations Training<br />

These Awareness and Operations Training Mandatory Baselines support the Enterprise<br />

Security <strong>Policy</strong> (ITEC 7230 Rev 1), the Security Awareness Training <strong>Policy</strong> (ITEC 7400), and<br />

the Security Awareness Requirements (ITEC 7400A).<br />

Mandatory<br />

Non-Mandatory<br />

Procedures Baselines Procedures Baselines<br />

3. Awareness & Training <br />

3.1. Security Awareness Training<br />

3.1.1. Design and Develop an Awareness Training Program (2 sets) (1 set)<br />

3.1.2. Provide Awareness Training (2 sets) (1 set)<br />

3.2. Security Operations Training<br />

3.2.1. Design and Develop an Operations Training Program (2 sets) (1 set)<br />

3.2.2. Provide Operations Training (3 sets) (2 sets)<br />

3.3. Maintain Records <br />

3.1. Security Awareness Training<br />

The following are the Mandatory Baselines that support the Security Awareness<br />

Training section <strong>of</strong> the Default Security Requirements:<br />

3.1.1. Design and Develop an Awareness Training Program<br />

Create a program and supporting materials that are appropriate to the needs<br />

<strong>of</strong> the agency:<br />

3.1.1.a Awareness Training Requirements<br />

• At a minimum, security awareness training will address the<br />

following:<br />

o The creation and maintenance <strong>of</strong> passwords, including<br />

the need to maintain password confidentiality.<br />

o Detecting, avoiding and responding to Social<br />

Engineering.<br />

o Detecting, avoiding and responding to Identity Theft.<br />

o Detecting, avoiding and responding to viruses and<br />

other malware.<br />

o Appropriate handling <strong>of</strong> sensitive information to ensure<br />

confidentiality and integrity.<br />

o Appropriate usage <strong>of</strong> the Internet, e-mail and other<br />

organization resources.<br />

o Appropriate usage <strong>of</strong> s<strong>of</strong>tware, including copyright<br />

infringement and file sharing.<br />

o Appropriate usage <strong>of</strong> portable devices, including<br />

external storage devices and portable computing<br />

devices.<br />

o Appropriate usage <strong>of</strong> encryption devices.<br />

Mandatory Baselines<br />

Page 4 <strong>of</strong> 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!