© University of Reading 2008 www.reading.ac.uk Information Technology Services 23 December 2015 Information Security Policy Mike Roch - Director of IT.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

All Rights Reserved, Duke Medicine 2007 IT Security Presented by: Trisha Craig and Don Elsner Principal Auditors – IT Audit Duke University 1.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
Information Security Policies and Standards
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Systems Security Officer
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Office of Inspector General (OIG) Internal Audit
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
OHSAS 18001: Occupational health and safety management systems - Specification Karen Lawrence.
Session 3 – Information Security Policies
5.2 Personnel Use competent staff Supervise as necessary
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Key changes from OHSAS 18001:1999
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Change and Patch Management Controls
Hazards Identification and Risk Assessment
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Security fundamentals Topic 12 Maintaining organisational security.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
IAEA International Atomic Energy Agency. IAEA Outline Responsibilities and functions of the regulatory body Objectives of regulatory functions Organizational.
Most Common Deficiencies Cheryl O. Morton Managing Director, AIHA Laboratory Accreditation Programs, LLC.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Risk management.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Internal Controls.
IT Development Initiative: Status and Next Steps
Final HIPAA Security Rule
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Drew Hunt Network Security Analyst Valley Medical Center
PLANNING A SECURE BASELINE INSTALLATION
Awareness and Auditor training kit
Internal Controls.
Risk Management NDS Forum June 23rd 2010.
Internal Controls.
Presentation transcript:

© University of Reading Information Technology Services 23 December 2015 Information Security Policy Mike Roch - Director of IT Services

2 Overall Policy Agreed Autumn 2006 – Part of Information Strategy implementation – Defines scope “All information recorded within the scope of University activity is deemed a University record. Therefore staff have a duty to ensure appropriate keeping and/or disposal of all information they create and handle.” – Relationship to sector standards (BS7799/ISO27001:2005) – Governance Information Strategy Cttee responsible for policy devt. University management structures responsible for implementation (cf Health and Safety policies) – Default review cycle 4 years

3 Sub- Policies Agreed Autumn 2007 Systems Planning Policy Systems Management Policy Systems Operation Policy Software Management Policy Communications Networks Management Policy

4 Information Security Issues C onfidentiality Can only the appropriate people read it? I ntegrity  Is the data all present and correct?  Could it be altered inappropriately? A vailability Can the appropriate people get to it when required?

5 Risk Assessment x Student PC x FOCUS x Lab PC x Staff PC x Dept Web Server

6 Systems Planning Policy New systems authorised, given competent advice, and information security requirements recognised Info Security risks assessed for new/upgraded software Information assets identified, classified and recorded Adequate capacity, resilience and fault tolerance specfied Adequate physical and environmental security – FMD Appropriate access controls overall and to O/S controls Testing of compliance with all policies before acceptance

7 Systems Management Policy Systems to be managed by suitably trained and qualified staff. Training to include information security Appropriate access controls agreed by management and records kept of access granted and revoked Appropriate log on process, accesses logged, logs secured Appropriate time-outs, password management, etc Tight control of who may issue O/S level commands Change management – sanity checking, stake-holder consultation, audit trails, roll-back System clocks, anti-malware, patching

8 Systems Operations Policy Information security risks assessed to inform operations procedures Appropriate physical security, environmental protection and access controls ensured Documented operating procedures, developed with information security in mind Appropriate segregation of duties Reporting of security incidents and software malfunction Appropriate separation of development/test systems from live systems

9 Software Management Policy Applications to be managed by suitably trained and qualified staff Procurement and implementation of new or upgraded software to follow a formal, documented process Business case for new or upgraded software shall address information security issues Appropriate change control procedures shall apply Interfaces between applications documented and risks identified All software to be checked and tested independently of live systems before implementation/upgrade Mobile code to be especially scrutinised

10 Comms Networks Management Policy Single network design authority – currently IT Services University will provide ubiquitous links Managed by suitably trained and qualified staff Designed to provide suitable performance and reliability Access to resources on the network controlled - data network segregated firewalls to protect critical systems Remote access subject to robust authentication and appropriate encryption New/upgraded software subject to change control Suitable protection from physical, environment and technical threats

11 Next steps Documentation – Model policies for departments Training – Identification of general needs