12.07.2015 Views

Minimum Security Standards for Systems with Cat I, II, III Data

Minimum Security Standards for Systems with Cat I, II, III Data

Minimum Security Standards for Systems with Cat I, II, III Data

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITY<strong>Minimum</strong> <strong>Security</strong> <strong>Standards</strong> <strong>for</strong><strong>Systems</strong> Associated <strong>with</strong> <strong>Cat</strong>egory I, <strong>II</strong>,or <strong>II</strong>I <strong>Data</strong>Effective Date: March 17, 2007PurposeScopeAudience<strong>Minimum</strong> Standard<strong>Security</strong> Review <strong>for</strong> New <strong>Security</strong> Software and AppliancesNon-Compliance and ExceptionsRelated UT Dallas Policies, Procedures, Best Practices and Applicable LawsI. PurposeThis minimum standard serves as a supplement to IR <strong>Security</strong> OperationsManual, The University of Texas at Dallas’ implementation of UT-System UTS165. Adherence to the standard will increase the security of systems and helpsafeguard university in<strong>for</strong>mation technology resources.Compliance <strong>with</strong> these requirements does not imply a completely securesystem. Instead, these requirements should be integrated into a comprehensivesystem security plan.<strong>II</strong>. ScopeThis standard applies to all devices, physical or virtual, connected to theuniversity network through a physical, wireless, or VPN connection where data isclassified as <strong>Cat</strong>egory I, <strong>II</strong>, or <strong>II</strong>I (see <strong>Data</strong> Classification <strong>Standards</strong>).<strong>II</strong>I. Audience


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITYAll users <strong>with</strong> systems connected to the university network as in Sec. <strong>II</strong>, above.IV. <strong>Minimum</strong> StandardThis section lists the minimum standards that should be applied and enabled in<strong>Cat</strong>egory I, <strong>II</strong>, and <strong>II</strong>I data systems that are connected to the university network.<strong>Standards</strong> <strong>for</strong> <strong>Cat</strong>egory I are generally required.If products are not available from reputable commercial or reliable open sourcecommunities <strong>for</strong> a specific requirement, then the specific requirement is waiveduntil an appropriate solution is available. In<strong>for</strong>mation Resources owners andcustodians, Primary Investigators (PIs), and/or systems administrators areexpected to use their professional judgment in managing risks to the in<strong>for</strong>mationand systems they use and/or support. All security controls should beproportional to the confidentiality, integrity, and availability requirements of thedata processed by the system.Backups# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I1.1System administrators should establish and follow a procedure tocarry out regular system backups.RequiredRecommended1.2Backups must be verified at least monthly, either throughautomated verification, through customer restores, or throughtrial restores.RequiredRecommended1.3<strong>Systems</strong> administrators must maintain documented restorationprocedures <strong>for</strong> systems and the data on those systems.RequiredRecommendedChange Management# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITY2.1There must be a change control process <strong>for</strong> systems configuration. Thisprocess must be documented.RequiredRecommendedSystem changes should be evaluated prior to being applied in aproduction environment.2.2Patches must be tested prior to installation in the productionenvironment if a test environment is available.RequiredRecommendedIf a test environment is not available, the lack of patch testingshould be communicated to the service subscriber or data customer,along <strong>with</strong> possible changes in the environment due to the patch.Computer Virus Prevention# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I3.1 Anti-virus software must be installed and enabled. Required Required3.2Anti-spyware software must be installed and enabled if the machine is used byadministrators to browse Web sites not specifically related to the administration ofthe machine. In addition, anti-spyware software must be installed if users are ableto install software.RecommendedRecommended3.3Anti-virus and, if applicable, anti-spyware software should be configured to updatesignatures daily.RequiredRecommended3.4<strong>Systems</strong> administrators should maintain and keep available a description of thestandard configuration of anti-virus software.RequiredRecommendedPhysical Access# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I4.1<strong>Systems</strong> must be physically secured in racks or areas <strong>with</strong>restricted access. Portable devices shall be physically secured ifleft unattended.RequiredRecommended4.2Backup media must be secured from unauthorized physicalaccess. If the backup media is stored off-site, it must beencrypted.RequiredRecommended


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITYSystem Hardening# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I5.1<strong>Systems</strong> must be set up in a protected network environment or by usinga method that assures the system is not accessible via a potentiallyhostile network until it is secured.RequiredRecommended5.2Operating system and application services security patches should beinstalled expediently and in a manner consistent <strong>with</strong> changemanagement procedures.RequiredRequired5.3WSUS is the preferred method <strong>for</strong> updating Windows systems. If this isnot used and if automatic notification of new patches is available on theoperating system you are running, that option should be enabled.RequiredRequired5.4Services, applications, and user accounts that are not being utilizedshould be disabled or uninstalled.RequiredRecommended5.5Methods should be enabled to limit connections to services running onthe host to only the authorized users of the service. Software firewalls,hardware firewalls, and service configuration are a few of the methodsthat may be employed.RequiredRecommended5.6Services or applications running on systems manipulating <strong>Cat</strong>egory Idata should implement secure (that is, encrypted) communications toensure <strong>Cat</strong>egory I data does not traverse the Internet in clear text.RequiredRecommended5.7<strong>Systems</strong> will provide secure (that is, encrypted) storage <strong>for</strong> <strong>Cat</strong>egory Idata as required by confidentiality and integrity needs.RequiredRecommended5.8If the operating system supports it, integrity checking of critical operatingsystem files should be enabled and tested. Third-party tools may also beused to implement this.RequiredRecommended5.9Integrity checking of system accounts, group memberships, and theirassociated privileges should be enabled and tested.RequiredRecommended


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITY5.10 The required University warning banner should be installed. Required Required5.11Whenever possible, all non-removable or (re-) writeable media must beconfigured <strong>with</strong> file systems that support access control.RequiredRecommended5.12 Access to non-public file system areas must require authentication. Required Recommended<strong>Security</strong> Monitoring# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I6.1If the operating system comes <strong>with</strong> a means to log activity, enabling andtesting of those controls is required.RequiredRecommended6.2Operating system and service log monitoring and analysis should beper<strong>for</strong>med routinely. This process should be documented.RequiredRecommended6.3The systems administrator must follow a documented backup strategy <strong>for</strong>security logs (<strong>for</strong> example, account management, access control, dataintegrity, etc.). <strong>Security</strong> logs should retain at least 14 days of relevant login<strong>for</strong>mation (data retention requirements <strong>for</strong> specific data should beconsidered).RequiredRecommended6.4 All administrator or root access must be logged. Required Required<strong>Data</strong> Disposal# Practice <strong>Cat</strong> I <strong>Cat</strong> <strong>II</strong> & <strong>II</strong>I7.1If the data resides on electronic media (disks, tapes, hard drives, USBs, PDAs,etc.), the data must be rendered unrecoverable or indecipherable. This can beaccomplished by shredding the media (UTD has a certified contract <strong>for</strong> thisprocess), <strong>for</strong> example: any device that is sent to surplus must have the diskremoved and shredded be<strong>for</strong>e being shipped off-site. Any media that is beingrepurposed, <strong>for</strong> instance, transferred to another person or department, mustRequiredRequired


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITYhave a Department of Defense level re<strong>for</strong>mat (wipe) per<strong>for</strong>med on the media.7.2 Records must be maintained according to the UTD Records Retention Policy Required Required.V. <strong>Security</strong> Review <strong>for</strong> New <strong>Security</strong> Softwareand AppliancesDepartments evaluating the implementation of new security software orappliances, involving <strong>Cat</strong>egory I type data, must request a security review bysending a written description of the proposed implementation to the In<strong>for</strong>mation<strong>Security</strong> Office prior to selecting vendors or products. <strong>Security</strong> reviews tend tobe in<strong>for</strong>mal and can often be per<strong>for</strong>med quickly, while ensuring that bestpractices are being considered.VI. Non-Compliance and ExceptionsFor all system administrators — if any of the minimum standards contained<strong>with</strong>in this document cannot be met on systems manipulating <strong>Cat</strong>egory I or <strong>II</strong>data that you support, an Exception Process must be initiated that includesreporting the non-compliance to the In<strong>for</strong>mation <strong>Security</strong> Office, along <strong>with</strong> aplan <strong>for</strong> risk assessment and management. (See <strong>Security</strong> Exception Report.)Non-compliance <strong>with</strong> this standard may result in revocation of system or networkaccess, notification of supervisors, and reporting to the Office of Internal Audit.University of Texas at Dallas employees are required to comply <strong>with</strong> bothinstitutional rules and regulations and applicable UT System rules andregulations. In addition to University and System rules and regulations, TheUniversity of Texas at Dallas employees are required to comply <strong>with</strong> state lawsand regulations.V<strong>II</strong>. Related UT Dallas Policies, Procedures, BestPractices and Applicable Laws


THE UNIVERSITY OF TEXAS AT DALLASINFORMATION SECURITYThe policies and practices listed here in<strong>for</strong>m the system hardening proceduresdescribed in this document and <strong>with</strong> which you should be familiar. (This is not anall-inclusive list of policies and procedures that affect in<strong>for</strong>mation resources.)UTD In<strong>for</strong>mation Resources <strong>Security</strong> Operations ManualUTD Acceptable Use PolicyUTD <strong>Data</strong> Classification GuidelinesUTD In<strong>for</strong>mation <strong>Security</strong> Exception Process

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!