Table of Contents - Amazon Web Services
|Table of Contents |
| |
|Introduction 3 |
|Standard 1: Organisation of Information Security 4 |
|1.1 Introduction 4 |
|1.2 Internal Security Organisation 4 |
|1.3 Third Party Access 5 |
|Standard 2: Asset Management 6 |
|2.1 Introduction 6 |
|2.2 Responsibility for assets 6 |
|2.3 Information classification 6 |
|Standard 3: Human Resources 7 |
|3. 1 Introduction 7 |
|3.2 Prior to Employment 7 |
|3.3 During Employment 8 |
|3.4 Termination or Change of Employment 8 |
|Standard 4: Physical and Environmental Security 9 |
|4.1 Introduction 9 |
|4.2 Secure Areas 9 |
|4.3 Equipment Security 10 |
|Standard 5: Communications and Operations Management 11 |
|5.1. Introduction 11 |
|5.2 Procedures and Responsibilities 11 |
|5.3 Third Party Service Delivery Management 12 |
|5.4 System Planning and Acceptance 12 |
|5.5 Protection Against Malicious and Mobile Code 12 |
|5.6 Back-up 12 |
|5.7 Network Security Management 12 |
|5.8 Media Handling 13 |
|5.9 Exchange of Information 13 |
|5.10 Electronic Commerce Services 13 |
|5.11 Monitoring 14 |
|Standard 6: Access Control 15 |
|6.1 Introduction 15 |
|6.2 Business Requirement for Access Control 15 |
|6.3 User Access Management 15 |
|6.4 User Responsibilities 15 |
|6.5 Network Access Control 16 |
|6.6 Operating System Access Control 16 |
|6.7 Application and Information Access Control 17 |
|6.8 Mobile Computing and Teleworking 17 |
|Standard 7: Information Systems Acquisition, Development and Maintenance 18 |
|7.1 Introduction 18 |
|7.2 Security Requirements of Information Systems 18 |
|7.3 Correct Processing in Applications 18 |
|7.4 Cryptographic Controls 18 |
|7.5 Security of File Systems 19 |
|7.6 Security in the Development and Support Processes 19 |
|7.7 Technical Vulnerability Management 19 |
|Standard 8: Incident Management 20 |
|8.1 Introduction 20 |
|8.2 Reporting Information Security Events 20 |
|8.3 Management of Information Security Incidents and Improvements 20 |
|Standard 9: Business Continuity Management 21 |
|9.1 Introduction 21 |
|9.2 Information Security Aspects of Business Continuity Management 21 |
|Standard 10: Compliance 22 |
|10.1 Introduction 22 |
|10.2 Compliance with Legal Requirements 22 |
|10.3 Compliance with Security Policies and Standards 23 |
|10.4 Information System Audit Considerations 23 |
Introduction
1. Introduction
1.1 These standards form part of the [Authority Name]’s information security policy which provides a framework for the management of the information asset to ensure that is kept secure, is available when needed, maintains its integrity and, where necessary, remains confidential ensuring compliance with all laws, regulations and other obligations.
2. Scope
1. These standards shall apply to [Description of who document is applicable to] third party contractors and partner organisations sharing [Authority Name]’s information.
3. Risks
3.1 Failure to adequately manage information security can amongst other things lead to:
• Systems failure due to insufficient resources;
• Damage to [Authority Name]’s reputation;
• Disclosure of confidential or personal information.
• Misuse of [Authority Name] information for personal gain, e.g. fraud;
• Inability to take disciplinary and/or legal action against anyone misusing information.
• Fire and resultant loss of data, buildings and other assets;
• Theft of data and other assets;
• Death or injury to [Authority Name] staff, Council Members, public visitors etc.
• Loss or damage to data due to infection by computer viruses;
• Breaches of legislation and legal against [Authority Name];
• Electronic eavesdropping or interception of communications;
• Inaccuracies in data processing.
• Serious system malfunctions;
• Litigation action against [Authority Name] owing to negligence.
• Failure to deliver critical services to [Authority Name]’s customers;
Standard 1: Organisation of Information Security
1.1 Introduction
This standard sets out [Authority Name] commitment to manage information security.
1.1.2 Control Objective
This standard is intended to ensure that [Authority Name] manages the security of information within a clear and agreed framework which shall be applied across the organisation and in its dealings with third parties thereby demonstrating adequate security management of the information asset.
1.1.3 Policy
[Authority Name] will manage the security of information within an approved framework through assigning roles and co-ordinating implementation of this security policy across the organisation and in its dealings with third parties, where necessary drawing upon specialist external advice so as to maintain the security policy and thus address new and emerging threats and standards.
1.2 Internal Security Organisation
1.2.1 There is a management forum to give clear direction and support for information security initiatives.
1.2.2 A cross-functional forum co-ordinates security measures.
1.2.3 Responsibilities for the protection of individual assets, and for carrying out specific processes are clearly defined.
1.2.4 A management authorisation process is in place for the installation of new information processing facilities.
1.2.5 [Authority Name] requires confidentiality and non-disclosure agreements to be completed where appropriate.
1.2.6 Information security advice will be sought in connection with from in-house or external specialist advisors and is communicated throughout the organisation.
1.2.7 [Authority Name] maintains contacts with external security specialists, e.g. law enforcement and regulatory bodies.
1.2.8 An independent review is undertaken of the implementation and maintenance of the Information Security Policy.
1.3 Third Party Access
1.3.1 All third party access to [Authority Name] information systems must be Risk assessed and appropriate counter measures applied to mitigate the risk.
1.3.2 Customers given access to [Authority Name] information or assets must comply with [Authority Name]‘s Information Security Policy.
1.3.3 Contracts with third parties set out the security conditions and controls that they are required to adhere to.
Standard 2: Asset Management
2.1 Introduction
This standard sets out [Authority Name] commitment to protect information and related information processing assets. Assets can include data, information, software, computer and communications equipment, service utilities, people and intangible assets such as goodwill.
2.1.2 Control Objective
This standard is intended to ensure that [Authority Name] achieves and maintains an appropriate level of protection of its organisational assets.
2.1.3 Policy
[Authority Name] requires that all assets are accounted for and have a nominated person made responsible for their safekeeping (the ‘owner’). The ‘owner’ shall be responsible for the maintenance and protection of the asset/s concerned.
2.2 Responsibility for assets
2.2.1 An inventory of assets is maintained which includes: software, databases, information stores, physical assets, services, people and intangibles.
2.2.2 An owner, either an individual or a section, must be formally assigned to all information and assets connected with information processing. The owner has responsibility for controlling the production, development, maintenance, use and security of a named asset.
2.2.3 Documented rules must be established and maintained for the acceptable use of information and assets associated with information processing facilities.
2.3 Information classification
2.3.1 Information classification and associated protective controls suited to business needs must be applied, to facilitate sharing or restricting information.
2.3.2 [Authority Name] maintains procedures for information labelling and handling in accordance with its classification scheme.
Standard 3: Human Resources
3. 1 Introduction
This standard sets out [Authority Name] commitment to reduce the risk of employee, contractor or third party user theft, fraud or misuse of information and information processing facilities.
3.1.2 Control Objective
This standard is intended to ensure that [Authority Name] employees, contractors and third party organisations understand their responsibilities having been adequately assessed as suitable for their role and provided with adequate resources to safeguard [Authority Name] information assets.
3.1.3 Policy
[Authority Name] requires that employee, contractor and third party terms and conditions of employment/working and any supporting documents, e.g. job descriptions, set out security responsibilities with an adequate screening and declaration processes in place. These shall be supported by an adequate training and awareness programmes with recourse to disciplinary/contract action if necessary.
3.2 Prior to Employment
3.2.1 Security roles and procedures of [Authority Name] employees, contractors and third party users are defined and documented in accordance with this Information Security Policy and are clearly communicated prior to engagement .
3.2.2 Background (screening) checks are carried out in respect of employees, employment candidates, contractors and third party users, relevant to the classification of information they will access.
3.2.3 [Authority Name] employees, contractors and third parties sign an information security agreement as part of their initial terms and conditions of employment.
3.3 During Employment
3.3.1 [Authority Name] management are responsible for ensuring that members ,employees, contractors and third party users apply security in accordance with this Information Security Policy and its related procedures.
3.3.2 [Authority Name]’s members, employees, contractors and third party users receive appropriate training and regular updates in policies and procedures.
3.3.3 [Authority Name] maintains a formal disciplinary process for employees who commit an information security breach.
3.4 Termination or Change of Employment
3.4.1 [Authority Name] maintains clearly defined and assigned procedures in respect of leavers, which must be followed at all times.
3.4.2 Members, employees, contractors and third party users must return all information assets in their possession upon termination of their employment, contract or agreement.
3.4.3 The access rights of all members, employees, contractors and third party users to information and information processing facilities must be terminated upon termination of their employment, contract or agreement.
Standard 4: Physical and Environmental Security
4.1 Introduction
This standard sets out [Authority Name] commitment to prevent authorised physical access, damage, theft and interference to [Authority Name] premises, information or processing equipment.
4.1.2 Control Objective
This standard is intended to ensure that [Authority Name] takes adequate steps to prevent unauthorised physical access and damage or interference to its premises, information, assets or people therein.
4.1.3 Policy
[Authority Name] requires that physical security is commensurate with the risks faced for the area concerned. In particular critical or sensitive information processing facilities shall be housed in secure areas protected by defined security perimeters with appropriate security barriers and/or entry controls and protection for the infrastructure.
4.2 Secure Areas
4.2.1 Areas that contain information and information processing facilities are protected by security perimeters.
4.2.2 Entry controls must protect secure areas to ensure that only authorised personnel have access.
4.2.3 Offices, rooms and facilities must be designed along Information security guidelines.
4.2.4 [Authority Name] must have guidelines to design facilities with protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster
4.2.5 [Authority Name] must have guidelines and physical protection for employees, contractors and third parties working in secure areas.
4.2.6 Information processing facilities are isolated from delivery and loading areas and other points where unauthorised persons may enter the premises.
4.3 Equipment Security
4.3.1 Information processing equipment is sited with a view to minimise loss or damage from environmental threats and hazards or opportunities for unauthorised access.
4.3.2 Key items of equipment are protected from power failures and other disruptions caused by failures in supporting utilities.
4.3.3 Data carrying cabling is protected from interception or damage.
4.3.4 Equipment is maintained in accordance with manufacturer’s recommendations to ensure continued availability and integrity.
4.3.5 Due consideration is taken for equipment removed from [Authority Name] premises in terms of its security and that of any information held on it .
4.3.6 Equipment is checked prior to disposal to remove or overwrite any sensitive data and/or licensed software.
4.3.7 [Authority Name] equipment, information or software is not taken off site without prior authorisation.
Standard 5: Communications and Operations Management
5.1. Introduction
This standard sets out [Authority Name] commitment to ensure the correct and secure operation of information processing facilities within, between and outside of [Authority Name].
5.1.2 Control Objective
This standard is intended to ensure that [Authority Name] processing facilities are secure and allow for the correct processing of data.
5.1.3 Policy
[Authority Name] requires that responsibilities and procedures for the management, operation and ongoing security and availability of all information processing facilities within, outside and between [Authority Name] and other organisations are established, data being stored and destroyed in a controlled manner.
5.2 Procedures and Responsibilities
5.2.1 Detailed operating procedures are documented and maintained through formal change control processes covering:
• Information processing and handling;
• Scheduling including interdependencies;
• Error handling/exceptions;
• Support contracts;
• Special output handling e.g. cheques;
• Restart and recovery procedures;
• Back up / maintenance;
• System start up/close down.
5.2.2 Formal change control procedures to information processing facilities and systems are in place with audit logs stamped with the date and time and a roll-back capability.
5.2.3 The duties of those involved with the handling and processing of data and of subsequent output are wherever possible segregated and/or compensating controls adopted.
5.3 Third Party Service Delivery Management
5.3.1 Security controls, service definitions and delivery levels are included in third party service agreements are implemented, operated and maintained by the third party.
5.3.2 Third party services, reports and records are regularly monitored and reviewed with periodic audits being undertaken.
5.3.3 Changes to the provision of third party services, including maintaining and improving existing information security policies, procedures and controls are managed taking into account the risks involved.
5.4 System Planning and Acceptance
5.4.1 All usage of resources is monitored and adjusted with projections made of future requirements to maintain system performance.
5.4.2 New information systems, upgrades and new versions are subject to established acceptance criteria with suitable tests being carried out prior to acceptance.
5.5 Protection Against Malicious and Mobile Code
5.5.1 Preventative, detective and recovery controls are implemented to protect against malicious code with appropriate user awareness procedures having been implemented.
5.5.2 Mobile code is authorised in accordance with clearly defined security arrangements and unauthorised mobile code is prevented from running.
5.6 Back-up
5.6.1 Back-up copies of essential business information and software are regularly taken and tested in accordance with a back-up policy.
5.7 Network Security Management
5.7.1 A range of controls has been implemented to achieve and maintain security across [Authority Name] networks and data whilst in transit.
5.7.2 The security features, service levels and management requirements of all network services have been identified and included in the network services agreement.
5.8 Media Handling
5.8.1 The management of removable computer media, e.g. tapes, disks, cassettes, PDAs, data sticks and printed reports is adequately controlled.
5.8.2 Procedures are in place for the secure and safe disposal of media.
5.8.3 Procedures are in place for the handling and storage of information.
5.8.4 System documentation is protected from unauthorised access.
5.9 Exchange of Information
5.9.1 Formal policies, procedures and controls have been established for the electronic or manual exchange of information and software between [Authority Name] and other organisations.
5.9.2 Agreements are in place between [Authority Name] and other organisations with regard to the exchange of information and software.
5.9.3 Media in transit is protected from unauthorised access, misuse or corruption.
5.9.4 Electronic messaging systems, e.g. email, are appropriately protected.
5.9.5 Policies and procedures are in place and implemented to protect information accessed in the maintenance of business information systems.
5.10 Electronic Commerce Services
5.10.1 Information used in the conduct of electronic commerce passing over public networks is protected from fraudulent activity, contract dispute, unauthorised disclosure and modification.
5.10.2 Information transmitted in respect of on-line electronic services is protected against incomplete transmission, mis-routing, unauthorised alteration and disclosure, duplication or replay.
5.10.3 The integrity of information made available to [Authority Name] users is protected against unauthorised modification.
5.11 Monitoring
5.11.1 Audit logs recording user activities, exceptions and security events are produced and retained for an agreed period.
5.11.2 Procedures to monitoring of the use made of information processing facilities have been established and the results regularly reviewed.
Standard 6: Access Control
6.1 Introduction
This standard sets out [Authority Name] commitment to control access to its information and information systems so as to safeguard its information against deliberate or accidental damage, disclosure or misuse.
6.1.2 Control Objective
This standard is intended to ensure that [Authority Name] controls access to information to an appropriate level.
6.1.3 Policy
[Authority Name] requires that access to information and information systems shall be driven by business requirements. Access shall be granted to personnel, members and contractors to a level that will allow them to carry out their duties and shall not be excessive.
6.2 Business Requirement for Access Control
6.2.1 An access control policy is established, documented and reviewed periodically
6.3 User Access Management
6.3.1 A formal user registration and de-registration is in place for granting and revoking access to information systems and services.
6.3.2 The allocation of user rights to information and information systems is controlled and in accordance with the individuals authorised operational role.
6.3.3 The allocation of passwords for information and information systems is controlled through a formal release process.
6.3.4 Information system user’s access rights are reviewed at regular intervals.
6.4 User Responsibilities
6.4.1 Users of information systems follow good security practices in the selection and use of passwords.
6.4.2 Unattended information and information processing equipment has appropriate protection.
6.5 Network Access Control
6.5.1 Users are only provided with access to services that they have specifically been authorised to use.
6.5.2 Appropriate authentication methods are used to control access by remote users, e.g. Dial-back modems, hardware tokens etc.
6.5.3 Equipment connected to networks is authenticated using automatic equipment identification.
6.5.4 Access to physical and logical diagnostic and configuration ports is controlled.
6.5.5 Information services, users and information systems are adequately segregated on the network.
6.5.6 The capability of users to connect to the network outside of [Authority Name]’s boundaries is restricted.
6.5.7 Network routing controls are aligned to and do not breach the access control requirements in respect of business applications.
6.6 Operating System Access Control
6.6.1 Access to operating systems is controlled through a secure log-on procedure.
6.6.2 Operating system users are provided with a unique identifier (user ID) so that activities are traceable the individual concerned.
6.6.3 An effective password management system is in place for the provision of quality passwords.
6.6.4 Access to system utility programs is restricted and tightly controlled.
6.6.5 Procedures and mechanisms are in place to ensure that inactive terminals in high risk locations or serving high risk systems time out after a defined period of inactivity.
6.7 Application and Information Access Control
6.7.1 Access to information and application system functions is restricted in accordance with agreed policy.
6.7.2 Information systems processing data or holding information of a sensitive nature are held in a dedicated computing environment.
6.8 Mobile Computing and Teleworking
6.8.1 [Authority Name] maintains a formal policy on the appropriate security measures that should be adopted to protect against risks of using mobile computing and communication facilities.
6.8.2 [Authority Name] maintains a working policy with supporting procedures for the delivery of a secure and effective teleworking (homeworking) service.
Standard 7: Information Systems Acquisition, Development and Maintenance
7.1 Introduction
This standard sets out [Authority Name] commitment to ensure that security is an integral part of its information systems.
7.1.2 Control Objective
This standard is intended to ensure that [Authority Name] maintains an adequate level of security in its information processing systems.
7.1.3 Policy
[Authority Name] requires that the information security risks, controls and requirements are identified at the earliest stage in the development or acquisition cycle with controls to mitigate against them being identified. Controls should cover user access, data input, data processing, transmission, storage, system changes and known vulnerabilities.
7.2 Security Requirements of Information Systems
7.2.1 Security requirements are clearly set out in statements of business requirements of new or enhanced information processing systems.
7.3 Correct Processing in Applications
7.3.1 Data input to applications is validated to ensure that it is correct and appropriate.
7.3.2 Validation checks are incorporated into applications to detect any corruption of information through processing errors or deliberate acts.
7.3.3 Appropriate controls are in place to ensure the authenticity and integrity of electronic messages.
7.3.4 Data output from the application is validated.
7.4 Cryptographic Controls
7.4.1 [Authority Name] maintains a policy on the use of cryptographic controls.
7.4.2 Effective key management is in place to support the organisation’s use of cryptographic controls.
7.5 Security of File Systems
7.5.1 [Authority Name] maintains procedures for the installation of software for operational systems.
7.5.2 Test data is carefully selected protected and controlled.
7.5.3 Access to program source code is restricted.
7.6 Security in the Development and Support Processes
7.6.1 Charges to systems are implemented under a formal change control procedure.
7.6.2 The impact of changes to operating systems on business critical applications is formally reviewed and tested to ensure that there has been no adverse effect on operations or security.
7.6.3 Modifications to software packages are generally discouraged and limited to necessary and strictly controlled changes.
7.6.4 [Authority Name] minimises the opportunities for the leakage of information e.g. by scanning outbound media, regular monitoring etc.
7.6.5 Outsourced software development is supervised and monitored.
7.7 Technical Vulnerability Management
7.7.1 Information systems are assessed for technical vulnerabilities in a timely manner.
Standard 8: Incident Management
8.1 Introduction
This standard sets out [Authority Name] commitment to ensure that information security events and weaknesses with information systems are communicated in a consistent manner to allow for timely corrective action to be taken.
8.1.2 Control Objective
This standard is intended to ensure that [Authority Name] information security events and weaknesses associated with information systems are communicated in a manner that allows for timely corrective action to be taken.
8.1.3 Policy
[Authority Name] requires that information security events and weaknesses are communicated and actioned in a consistent and timely manner.
8.2 Reporting Information Security Events
8.2.1 Information security events are quickly reported through appropriate management channels.
8.2.2 All employees, contractors and third party users are required to note and report any observed or suspected weaknesses in systems or services.
8.3 Management of Information Security Incidents and Improvements
8.3.1 Management responsibilities and procedures have been established to ensure the quick, effective and orderly response to information security incidents.
8.3.2 Mechanisms are in place to enable the types, volumes and costs of information security incidents to be quantified and monitored.
8.3.3 Evidence is collected and presented in a manner conforming to the rules of evidence laid down by relevant jurisdictions where follow-up action is taken against a person or organisation after an information security incident.
Standard 9: Business Continuity Management
9.1 Introduction
This standard sets out [Authority Name] commitment to ensure that effects arising from major failures in information processing facilities or disasters, e.g. fire, flood etc., are counteracted in a timely manner.
9.1.2 Control Objective
This standard is intended to ensure that [Authority Name]can counteract the effect of any interruption to business activity arising from a failure of information systems or a disaster through a timely resumption of normal services.
9.1.3 Policy
[Authority Name] requires that arrangements be in place for the timely resumption of business information systems in the event of a failure in these systems or damage to them arising from a disaster.
9.2 Information Security Aspects of Business Continuity Management
9.2.1 A managed and structured process is developed and maintained to minimise the impact of a loss of systems brought about by a disaster or otherwise.
9.2.2 Events that can lead to interruptions to business processes are identified with an assessment as to their likelihood of occurring together with an assessment as to their potential impact.
9.2.3 Plans are developed and implemented to maintain or restore operations to ensure availability at the required level and within the required time scales in respect of critical business processes.
9.2.4 A single framework of business continuity plans is maintained to ensure consistency in security arrangements and in the identification of priorities for testing and maintenance.
Standard 10: Compliance
10.1 Introduction
This standard sets out [Authority Name] commitment to avoid breaches of any law, statutory, regulatory or contractual obligation arising out of the management of information assets.
10.1.2 Control Objective
This standard is intended to ensure that [Authority Name] avoids breaches of any law, statutory, regulatory or contractual obligation and any security requirements concerning the collection, processing, holding and dissemination of information assets whether they be communicated on paper, electronic or in verbal format..
10.1.3 Policy
[Authority Name] requires that the design, operation, use and management of information systems observe all statutory, regulatory and contractual security requirements.
10.2 Compliance with Legal Requirements
10.2.1 All statutory, regulatory and contractual requirements and [Authority Name] to meet these is explicitly defined and documented and kept up to date for each information system managed.
10.2.2 Procedures are in place to ensure compliance with legislative, regulatory and contractual requirements on the use of material in respect of which there may be intellectual property rights.
10.2.3 Important records are protected against loss, destruction and falsification in accordance with statutory, regulatory and contractual requirements.
10.2.4 Data protection and privacy is ensured as required by relevant legislation, regulation and where applicable, contractual obligations.
10.2.5 Controls are in place to deter users from using information processing facilities for unauthorised purposes.
10.2.6 Cryptographic controls are used in compliance with relevant laws, agreements and regulations.
10.3 Compliance with Security Policies and Standards
10.3.1 Managers will ensure that all security procedures within their area of responsibility are carried out correctly in compliance with this and other [Authority Name] policies.
10.3.2 Information systems are regularly checked for compliance with security implementation standards.
10.4 Information System Audit Considerations
10.4.1 Audit requirements and checks in respect of operational systems are carefully planned to minimise disruption to business processes.
10.4.2 Access to information system audit tools is protected.
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- amazon web services revenue
- amazon web services revenue 2018
- amazon web services profitability 2018
- amazon web services revenue history
- amazon web services financials
- amazon web services annual report
- amazon web services revenue 2019
- amazon web services strategic plan
- amazon web services cloud
- amazon web services growth
- amazon web services history
- amazon web services cloud platform