Information Security Operations Management Manual
Section 1 - Audience
(1) All
Section 2 - Executive Summary
(2) The
(3) All users interacting with information
(4) The
Section 3 - Operational Procedures and Responsibilities
Objective – To ensure correct and secure operations of information systems
Documented Operating Procedures
(5)
- are documented;
- are approved by an appropriate authority;
- are up to date and maintained;
- are consistent with
University policies, procedures, manuals and guidelines; - include a ‘current as at [date]’ or equivalent statement; and
- are reviewed and updated:
- when there are changes to the solution architecture;
- when there are changes in business processes or to system operations; or
- following a related security incident investigation.
(6) SOPs for each system should cover the following:
- high-level solution architecture design, including key integrations with other systems;
- system administration and maintenance activities, such as managing backups and user accounts;
- software and hardware configuration;
- patch, update and upgrade processes;
- log data management;
- Disaster Recovery;
- Business Continuity Plan; and
- contact information for technical and business
personnel .
Change Management
(7) Changes to business processes and information systems that effect information security must be controlled.
(8) All changes to the
(9) The change management process must follow the guidelines, approvals and templates provided as per the
(10) Changes must be controlled by:
- identifying and recording significant changes;
- assessing the potential impact, including that on security, of the changes;
- obtaining approval for changes from those responsible for the information system;
- planning and testing changes including the documentation of rollback procedures;
- communicating change details to relevant
personnel , users and stakeholders; and - confirming that planned change(s) were implemented as intended.
(11)
- assessing the potential impact of the proposed change on security by conducting a security review or
risk assessment ; - identifying any impact on agreements, including information sharing agreements and licensing;
- notifying affected internal and external parties;
- obtaining approvals from relevant
Information Owners ; and - training technical and operational
staff as necessary.
(12) System Administrators must implement changes by:
- preparing change implementation plans that include testing and contingency plans in the event of problems;
- following the documented implementation plans; and
- confirming that the changes have been performed and no unintended changes took place.
Capacity Management
(13) The use of information system resources must be monitored and optimised with projections made to plan for future capacity requirements.
(14)
- documenting current capacity requirements;
- documenting capacity planning processes;
- including capacity requirements in service agreements; and
- monitoring and optimising information systems to detect impending capacity limitations.
(15)
- statistical or historical capacity requirements;
- projected business and information systems requirements; and
- expected trends in information processing capabilities (e.g. introduction of more efficient hardware or software).
(16)
Separation of Development, Testing and Production Environments
(17) Development and testing environments must be separated from production environments to reduce the
(18)
- separate production environments from test and development environments by using different servers, networks and, where possible, different domains;
- ensure that production servers do not host test or development services or applications;
- prevent the use of test and development identities as credentials for production systems;
- store source code in a secure location away from the production environment and restrict access to specific authorised
personnel ; - prevent access to compilers, editors and other development and testing tools from production systems;
- use approved change management processes for promoting software from development / test to production;
- prohibit the use of production data in development, test or training systems; and
- prohibit the use of Highly Restricted information in development, test or training systems.
Section 4 - Protection from Malware
Objective – To ensure that information systems are protected against malware.
Controls Against Malicious Code
(19) Detection, prevention and recovery controls, supported by user awareness activities, must be implemented to protect against malware.
(20)
- installing, updating and using software designed to scan, detect, isolate and delete malicious code, configured with:
- signature-based detection enabled;
- heuristic-based detection enabled;
- detection signatures checked for currency and updated on at least a daily basis; and
- automatic and regular scanning configured for all fixed disks and removable media;
- preventing unauthorised users from disabling installed security controls;
- prohibiting the use of unauthorised software;
- checking files, email attachments and file downloads for malicious code before use;
- refraining from reading emails, browsing the web, or obtaining files via online services, when authenticated with root or administrator privileges;
- maintaining business continuity plans, that align to the
University's Business Continuity Management Policy, to recover from malicious code incidents; and - maintain a critical incident management plan to identify and respond to malicious code incidents.
(21)
Section 5 - Backup
Objective – To protect against loss of data
Information Backup
(22) Backup copies of information, software and system images must be made, secured, and be available for recovery.
(23)
(24) Backup and recovery processes must comply with:
- the
University Business Continuity Management Policy; - legislative, regulatory,
University policy, and other obligations; and - records management requirements (refer Records and Information Management Policy).
(25) The documentation for backup and recovery must include:
- types of information to be backed up;
- schedules for the backup of information and information systems;
- physical and logical backup media management;
- methods for performing, validating and labeling backups; and
- methods for validating the recovery of information and information systems.
(26) Backup media and facilities must be appropriately secure based on a security review or
- use of approved encryption;
- physical security;
- access controls;
- methods of transit to and from off-site locations;
- appropriate environmental conditions while in storage; and
- off-site locations must be at a sufficient distance to escape damage from an event at the main site.
(27) The backup frequency of information, software and configuration settings should be a function of business continuity requirements.
(28) Backups must be stored for three months or greater, depending on legislative and business requirements.
(29) Full backup and restoration processes must be tested at least once when initially implemented and each time fundamental information technology infrastructure changes occur.
(30) Partial backup and restoration processes should be tested on at least an annual basis.
Top of PageSection 6 - Logging and Monitoring
Objective – To log events and monitor compliance.
Event Logging
(31) System Owners must ensure that event logs recording user activities, exceptions, faults and information security events are produced, kept and regularly reviewed.
(32) The degree of detail to be logged must be based on the value and sensitivity of the information and the criticality of the system. The resources required to analyse the logs must also be considered.
(33) A centralised logging facility should be implemented, and systems configured to save event logs to the centralised logging facility as soon as possible after each event occurs.
(34) Where applicable, sufficient detail must be recorded in order for the event log to be useful, including:
- date and times of the event;
- the relevant user or process;
- the event description; and
- the
ICT resources involved.
(35) For any system requiring authentication, logon, failed logon and logoff events must be logged.
(36) If event logging is disabled the decision must be documented and approved by the
(37) Event logs may be configured to alert someone if certain events or signatures are detected.
- identification of the event;
- isolation of the event and effected
assets ; - identification and isolation of the source;
- corrective action;
- forensic analysis;
- action to prevent recurrence; and
- securing of event logs as evidence.
Protection of Log Information
(38) Information system logging facilities and log information must be protected against unauthorised access, modification and deletion.
(39) System Administrators must implement controls to protect logging facilities and log files from unauthorised modification, access or destruction. Controls must include:
- physical security safeguards;
- preventing administrators and operators from being able to modify, erase or de-activate logs; and
- automatic archiving of logs to remain within storage capacity (capacity management).
Retention of Log Information
(40) Event logs can contribute to investigations following cyber security incidents, and should be retained for at least the life of a system. However, the retention requirement for these records under NSW State Archive’s General Retention and Disposal Authority: Administrative Records (GA28) recommends that audit data should be retained for the period of the base transaction record, e.g. seven (7) years for financial system log data.
(41) System logs for systems that support the
(42) Data centre physical access logs must be retained for at least seven (7) years.
(43) Logs must be retained indefinitely if an investigation has commenced, or it is known that evidence may be obtained from them, and until the investigation has concluded.
(44) Contact Records Governance Services (RGS) for further guidance on retention requirements for specific business information.
Administrator and Operator Logs
(45) Activities of privileged users must be logged and the log subject to regular review.
(46) The activities of System Administrators, operators and other privileged user(s) must be logged including:
- the time an event (e.g. success or failure) occurred;
- event details including files access, modified or deleted, errors and corrective action taken;
- the account and the identity of the privileged user involved; and
- the systems processes involved.
(47) Logs of the activities of privileged users should be checked by the
Operating System Logs
(48) The following events should be logged for operating systems:
- transfer of data to external media;
- system startup and shutdown;
- service failures and restarts;
- failed attempts to access data and system resources;
- changes to system configurations;
- changes to security policy;
- changes to accounts;
- attempts to use special privileges;
- application crashes and any error messages; and
- access to restricted or highly-restricted data and processes.
Web Application Logs
(49) The following events should be logged for web applications:
- search queries initiated by users;
- crashes and any error messages;
- attempted access that is denied; and
- login and logoff events.
Database Logs
(50) The following events should be logged for databases:
- use of executable commands;
- modifications to data;
- database logons and logoffs;
- database administrator actions;
- changes to user roles or database permissions;
- changes to the database structure;
- database access attempts, whether successful or unsuccessful;
- attempts to elevate privileges;
- any query or database alerts or failures;
- any query containing multiple embedded queries;
- any query containing comments;
- addition of new users, including privileged users; and
- access to restricted or highly-restricted information.
Clock Synchronisation
(51) An accurate time source must be established and used consistently across systems and network devices to assist with the correlation of events.
(52) System Administrators must synchronise information system clocks to the local router gateway or a
(53) System Administrators must confirm system clock synchronisation following power outages and as part of incident analysis and event log review.
Top of PageSection 7 - Control of Operational Software
Objective – To ensure the integrity of production systems.
Installation of Software on Production Systems
(54) The installation of software on production information systems must be controlled.
(55)
(56) Access to operating system and operational or production application software libraries must be restricted to authorised
(57) To minimise the
- the updating of the operational software, applications and program libraries must only be performed by trained administrators upon appropriate authorisation;
- production systems must not contain development code or compilers;
- applications and operating system software updates must only be implemented after successful testing; the tests should cover usability, security, effects from and on other systems and user experience;
- a configuration control system should be used to keep control of all implemented software as well as the system documentation;
- a rollback strategy should be in place and previous versions of application software retained; and
- old software versions should be archived with configuration details and system documentation.
(58) Vendor-supplied software used anywhere within the
(59) Physical or logical access to
Section 8 - Technical Vulnerability Management
Objective – To prevent exploitation of technical vulnerabilities.
Management of Technical Vulnerabilities
(60) Vulnerability assessments and penetration tests should be conducted by the
(61) To support technical vulnerability management, the Chief Information Officer (CIO) must maintain an inventory of ICT
- the software vendor;
- version numbers;
- current state of deployment; and
- the person(s) responsible for the system.
(62) Vulnerabilities which impact
(63) Vulnerability remediation efforts, including patch implementations, shall be coordinated and processed according to the
(64) Vulnerability assessments must be conducted both internal and external to the
- Internal Vulnerability Assessments:
- servers infrastructure;
- desktops and workstations; and
- network infrastructure;
- External Vulnerability Assessments:
- perimeter network devices exposed to internet;
- all external facing servers and services;
- network appliances, streaming devices and essential IP
assets that are internet facing; and - cloud based services;
Vulnerability Management Cycle
Asset Discovery
(65) The IT DevOps team will share the IP segments of all
(66) The Information Security Team will perform an asset discovery scan for servers and ICT infrastructure on the network segments on a weekly basis.
(67) The list of identified assets will be scanned for vulnerabilities.
Scan – Remediate – Rescan
(68) The Information Security Team shall perform vulnerability analysis scans on all in-scope assets on a weekly basis.
(69) The Information Security Team will use the industry standard Common Vulnerability Scoring System (CVSS) to assess the inherent risk associated with identified vulnerabilities.
(70) The Information Security Team shall inform the
(71) All vulnerabilities identified in the VA Scan shall be remediated in accordance with the Remediation Timeline and Risk Acceptance (below).
(72) The
(73) Vulnerabilities that cannot be actioned within the defined timeframe will need to be managed according to the requirements of the
Ad-Hoc Scans
(74) Ad-hoc scans include scans on any new servers and services prior to production deployment as per the following process:
- the
System Owner or System Administrator shall create a new service request and submit to the Information Security Team for actioning; - the Information Security Team shall perform Vulnerability Analysis Scan of all systems and services related to the specified implementation;
- the vulnerability assessment report shall be submitted to the implementation team;
- the Information Security Team lead will validate with respective
System Owners or System Administrator on closure of the vulnerabilities, and then perform a re-scan; - vulnerabilities that cannot be actioned within the defined timeframe will need to be managed according to the requirements of the
University's Risk Management Framework; and assets / services / devices can be released to production only after the final sign off by Information Security Team, and the appropriate Change Management approval.
Classification of Vulnerabilities
(75) Vulnerabilities are classified based on their impact in a given environment, to data / information or to the
Rating |
Red Hat, Microsoft and Adobe Rating (see below) |
Typical CVSS Score |
Description |
---|---|---|---|
Critical | Critical | 10 | A vulnerability whose exploitation could allow malicious code execution or complete system compromise without user interaction. These scenarios include self-propagating malware or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could include browsing to a web page or opening an email, or no action at all. |
High | Important | 7.0 – 9.9 | A vulnerability whose exploitation could result in compromise of the confidentiality, integrity or availability of user data, or of the integrity or availability of processing resources. This includes common use scenarios where a system is compromised with warnings or prompts, regardless of their provenance, quality or usability. Sequences of user actions that do not generate prompts or warnings are also covered. |
Medium | Moderate | 4.0 – 6.9 | Impact of the vulnerability is mitigated to a significant degree by factors such as authentication requirements or applicability only to non-default configurations. The vulnerability is normally difficult to exploit. |
Low | Low | <4.0 | This classification applies to all other issues that have a security impact. These are the types of vulnerabilities that are believed to require unlikely circumstances to be able to be exploited, or where a successful exploit would give minimal consequences. |
Remediation Timeline and Risk Acceptance
(76) All vulnerabilities identified in a Vulnerability Assessment Scan shall be addressed within the timeline described below.
(77) If any particular vulnerability cannot be remediated within this timeframe, the
(78) Remediation time and
Vulnerability Level | Remediation Timelines | ||
---|---|---|---|
External Facing Devices | Internal Devices | Risk Acceptance | |
Critical | 48 Hours | 7 days | CIO, or (Dependent on delegation authority and Risk Management Framework management actions) |
High | 14 days | 30 days | Associate Director, or (Dependent on delegation authority and Risk Management Framework management actions) |
Medium | 3 weeks | Next maintenance window | |
Low | Next Maintenance window | Next maintenance window |
Third Party Scans
(79) A
Vulnerability Management Roles and Responsibilities
(80) The Information Security Team is responsible for:
- performing regular
asset discovery and vulnerability assessments; - overseeing vulnerability remediation;
- targeting vulnerability
program maturity through metrics development; and - monitoring security sources for vulnerability announcements and emerging threats that are relevant to the
University's ICT resources .
(81) The
- the IT asset that is scanned by the vulnerability management process. This role should decide whether identified vulnerabilities are mitigated or their associated risks are accepted; and
- ensuring that System Administrators are charged with the effective management of their system.
(82) The System Administrator, is responsible for:
- testing and evaluating options to mitigate or minimise the impact of vulnerabilities;
- applying corrective measures to address the detected vulnerabilities; and
- reporting to the
System Owner and Information Security Team on progress in responding to vulnerabilities.
(83) Depending on how urgently a technical vulnerability needs to be addressed, the actions taken should be carried out according to the Change Management process, or by following the Information Security Incident Management Guidelines. For a high-risk technical vulnerability with wide-spread impact to the
(84) Responsibilities for vulnerability response must be included in service agreements with suppliers.
Restrictions on Software Installation
Objective – Rules governing the installation of software by users must be established and implemented.
(85) Users are not allowed to install software on
(86) System Administrators are responsible for the installation of software, updates and patches.
Top of PageSection 9 - Information Security Audit Considerations
Objective – To minimise the impact of audit activities on production systems
Information systems Audit Controls
(87) Audit requirements and activities involving checks on production systems must be planned and approved to minimise disruption to business processes.
(88) Prior to commencing compliance checking activities such as audits or security reviews of production systems, the CIO (or their delegate) and the
- the audit requirements and scope of the checks;
- audit
personnel must be independent of the activities being audited; - the checks must be limited to read-only access to software and data, except for isolated copies of system files, which must be erased or given appropriate protection if required when the audit is complete;
- the resources performing the checks must be explicitly identified;
- existing security metrics will be used where possible;
- all access must be monitored and logged and all procedures, requirements and responsibilities must be documented;
- audit tests that could affect system availability must be run outside business hours, and outside of agreed change blackout windows; and
- appropriate
personnel must be notified in advance in order to be able to respond to any incidents resulting from the audit.