Infosecuritystandards 2009 12 Final
Infosecuritystandards 2009 12 Final
Infosecuritystandards 2009 12 Final
STATEWIDE INFORMATION
SECURITY STANDARDS
(503) 378-6557
security.office@state.or.us
http://oregon.gov/das/EISPD/ESO
By Changes Version date
Amy McLaughlin, Richard Woodford, Original draft created 6/30/2009
Shaun Gatherum
Agencies Review & Comment Comments added and addressed 8/2009
ESO All comments addressed and edits made 10/1/09
State CIO Review No comments no changes 10/12/09
EISAB Out for review & comment 10/13/09 – 10/23/09
TABLE OF CONTENTS
1
NIST Special Publication 800-63 Electronic Authentication Guideline.
2
Statewide Information Asset Classification Policy #107-004-050
3
NIST Special Publication 800–118 Guide to Enterprise Password Management (Draft)
4
Identity and Privacy Strategies, Reference Architecture Technical Position, Burton Group.
5
Identity and Privacy Strategies, Reference Architecture Technical Position, Burton Group
6
Statewide Information Asset Classification Policy #107-004-050
7
NIST 800-53, PCI Standard
8
Statewide Information Asset Classification Policy #107-004-050
9
ISO 27002 10.8.1 Information exchange policies and procedures & 10.8.5 Business information systems
10
Statewide Information Asset Classification Policy #107-004-050
3.8.1 Configuration management and monitoring tools should be used to identify unapproved
changes to server configuration files.
3.8.2 Application servers should not be used to store application data. Application data should
be stored on a different server than the application server in accordance with the Security
Zone and Network Security Management (local Area Network and Wide Area Network
Standards in section 3.13
3.13. Security Zone and Network Security Management (Local Area Network & Wide Area
Network) Standards:
3.13.1 A business needs analysis shall be conducted to determine what network traffic is
required for each information system.
3.13.2 Firewalls shall allow only explicitly approved network traffic.
3.13.3 Internal state information systems and data shall be separated from the public Internet
through the use of a perimeter firewall.
3.13.4 Internal security zones shall be established to segregate network traffic with differing
security requirements from each other. These zones shall segregate trusted local
workstation networks from restricted server networks. Public facing web applications
shall segregate those applications within a DMZ zone. Servers containing level 3 or level
4 11 data shall be located within a restricted zone.
3.13.5 Network equipment (firewalls, MPLS, VLANs, hubs, switches, routers, wireless access
points) shall be managed to ensure that security zones are maintained.
3.13.6 By default all hardware switch ports shall be turned off unless physical access is
controlled to both endpoints of the physical connection.
3.13.7 DHCP address assignments shall be logged.
3.13.8 Virtual separation mechanisms (eg. VM and VLAN) shall only be used for segregation of
machines with differing security requirements if security controls are in place to ensure
segregation between security zones cannot be bypassed.
3.13.9 The following standards areas also apply to security zone management:
3.13.9.1. Log Management Standards in section 3.9
3.13.9.2. Remote Access Standards in section 3.19
3.14. Security Zone and Network Security Management (Local Area Network & Wide
Area Network)Recommended Best Practices:
3.14.1 Security zones should be consistently managed and documentation of information
exchanges between agencies and business partners should be in place.
3.14.2 Data for applications located in a DMZ zone should be segregated and stored within a
protected security zone.
3.14.3 Network hubs should be avoided for network extension, switches should be used instead.
11
Statewide Information Asset Classification Policy #107-004-050
3.17.1 Virus and spam filtering shall be implemented on email gateways in accordance with the
Antivirus and Anti-malware Standard in section 3.1.
3.17.2 Level 3 or Level 4 12 electronic data shall not be sent via unencrypted e-mail
3.17.3 Copies of e-mail shall be retained in accordance with data retention schedules.
3.17.4 E-mail servers shall be secured in accordance with the Server Management Standards
in section 3.7
3.17.5 E-mail accounts shall be connected to individual users. Where a group e-mail account
exists, primary ownership of and responsibility for that account shall be assigned to an
individual.
3.17.6 Access controls shall be implemented to maintain integrity and confidentiality in
accordance with the Access Standards in section 1.
12
Statewide Information Asset Classification Policy #107-004-050
13
Statewide Information Asset Classification Policy #107-004-050
14
ISO 12.6.1
15
Statewide Information Asset Classification Policy #107-004-050
By:
Scott Harra, Director, DAS Date
By:
Dugan Petty, State Chief Information Officer, DAS Date
By:
Theresa Masse, State Chief Information Security Officer, DAS Date