Third-Party-Security-Guideline-EN
Third-Party-Security-Guideline-EN
Third-Party-Security-Guideline-EN
Purpose
This Guideline articulates the high-level information security requirements that a Third Party
should respect to protect CN’s Information and IT Assets. All CN’s Third Parties shall safeguard
the availability, integrity and confidentiality of CN’s Confidential Information. Furthermore,
some Third Parties may be provided access to CN’s IT Assets and as a consequence shall
respect CN’s corporate policies and standards to prevent cyber attacks on CN’s IT Assets.
Failure to do so could cause irreparable harm to CN’s business, operations, reputation and
financial standing.
Scope
This Guideline applies to all Third Parties who provide CN with Information Technology
services, Operational Technology services or services whereby they host, store or access CN’s
Confidential Information. Additionally, when accessing CN’s IT Assets, Third Parties shall
comply with CN’s corporate information security policies and security controls. CN will update
its Third Party Information Security Guideline from time to time to reflect evolving technology,
threats and security standards and Third Parties are encouraged to verify the Guideline from
time to time. CN reserves the right to monitor its Third Parties’ performance and compliance
to the security standards included in CN’s contractual documents.
Document details
Key dates
Published on 9/3/2018
Ownership: InfoSec
Table of Contents
Purpose ...................................................................................................................................... 1
Scope ......................................................................................................................................... 1
Document details....................................................................................................................... 2
Definitions ................................................................................................................................. 4
Definitions
CN’s commercially or competitively sensitive, all data that is classified as CN-INTERNAL, CN-
proprietary or private information including CONFIDENTIAL and CN-RESTRICTED, in any form
information of a business, commercial, industrial, including paper, electronic, video or voice
scientific, strategic, or technical nature recording data.
data, plans, drawings, in particular operational, new product, brand and marketing strategies,
commercial financial or investment plans plans and forecasts, strategic alliances,
development of new products and business areas
business and strategic operating plans customer lists and contact information, needs,
purchasing history, rates, specifications and
preferences
corporate transactions, mergers and acquisitions competitive intelligence and market information
compiled for CN
1.2. Third Parties should evaluate and monitor their exposure to security risks and other
threats and take appropriate measures to address the associated risks to their
facilities, IT Assets, as well as CN Confidential Information.
1.3. Third Parties should review the following document titled AAR Rail Information
Security Committee Cyber Security Effective Practices for Information Technology
Procurement. This document is available at https://www.aar.org/data/cyber-security-
effective-practices-for-information-technology-procurements/. It contains a set of
recommended practices for securing rail systems.
1.4. Third Parties should formalize and document their information security program and
security controls in a set of policies, standards, and procedures that can be made
available to CN upon request.
2.2. Third Parties should evaluate and monitor their exposure to information security risks
and threats through regular review and take appropriate actions to address the
associated risks to their IT Assets and CN’s Confidential Information. Findings from
these reviews shall be made available to CN upon request.
3. Security Controls
3.1. Third Parties should implement information security controls. A minimum set of
examples would include:
• robust and documented change control processes, including regular release
management cycles, preferably following well-known practices such as ITIL
• vulnerability management, security patches/fixes and changes to IT Assets shall
be controlled and follow standard change management procedures and
approved operational change windows, which, where appropriate, may be
agreed between CN and Third Party
• development, test, production and/or backup environments that are physically
and logically separated to reduce the risk of unauthorized access or changes to
production environments
• controls to prevent changing, copying or altering any code belonging to CN
without prior written permission
• back-up and retention policies that define frequency of back-ups and retention
cycles for all data and environments as required for the performance of their
services in accordance with any agreements for such services
• intrusion detection, prevention, and recovery controls that protect against
malicious code and maintain all anti-virus software and signatures current and
actively running to detect and remove malware
• detection tools that help protect users from downloading programs or other
material from the Internet or use of any type of removable media (including
USB, CD/DVD media) on Third Party IT Assets that may store, access or process
CN Confidential Information unless they have been authenticated as originating
from a trusted source and scanned for viruses
• password complexity standards to mitigate weak password threats
• network and physical perimeter security
• secure software development practices (commonly known as S-SDLC)
and detection, prevention, and recovery controls with respect to all aspects of
the relationship with CN and services managed by Third Party
• manage log lifecycles and retain them beyond the business services or
relationship purpose, or longer where specified in the relevant agreement
and/or where required by laws or regulations applicable to the services or
relationship of the Third Party
• are protected against tampering and unauthorized access.
4.2. Third Parties may be asked to make relevant log information available to CN either
regularly or upon request for audit and archival purposes.
5. Audit Rights
5.1. To perform security assessments, and upon reasonable notice, Third Parties shall
permit CN or its partners (including government regulators requiring inspections of
CN) to access CN’s Confidential Information that is hosted, stored, accessed or
otherwise processed in Third Party’s IT Assets. Security assessments shall include, as
applicable, the following:
• network vulnerability assessments
• review of high-level design and topology of the information security services
• review of configuration files for IT Assets
• review of technical and security controls in the data center and associated IT
operations
• forensic investigations for cybersecurity incidents.
6.2. CN IT Assets that are made available to Third Parties remain CN’s sole property. Third
parties shall have no expectation of privacy when using CN’s IT assets nor expect that
anything that is stored or received on or sent from CN’s IT Assets is Third Party’s
private property or information. In particular, CN may, from time to time monitor,
review, intercept, access, modify or delete any files or communications stored on or
exchanged through CN’s IT assets, including non-business information, without
notice.
7. Personnel
7.1. The Third Party is responsible for the acts and omissions of its Personnel and as such
shall for all Personnel who may have access to Third Party IT Assets or have access to
or custody of CN IT assets, facilities, and/or CN Confidential Information shall:
• conduct relevant background and reference checks
• provide suitable information security training and awareness program
• manage their Personnel’s performance in securing CN’s IT Assets and CN’s
Confidential Information.
9.3. If Third Party’s behaviour is not compliant with applicable laws, this could also result
in law enforcement, criminal prosecution or other legal action.