Example of Password Management Policy

1 Policy Statement

It is imperative that users practice due diligence in controlling access to their systems by protecting their user accounts with passwords that are not easily guessed or deduced. Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of the entire corporate network of XXX. As such, all employees (including contractors and vendors with access to systems of XXX) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords

2. Purpose

The purpose of this policy is to ensure that security practices are introduced and maintained by all employees with respect to password-protected information infrastructure.

3. Scope

3.1 IT Assets

The policy is applicable to all IT systems and services.

3.2 Documentation

The documentation shall consist of Password Policy and related guidelines.

3.3 Document Control

The Password Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purposes.

3.4 Records

Records being generated as part of the Password Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.

3.5 Distributions and Maintenance

The Password Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of the document will be with the CISO and system administrators.

4. Privacy

The Password Policy document shall be considered as “confidential” and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.

5 Responsibility

The Password Policy shall be implemented by the CISO / designated personnel.

General Manager

  • Provides management oversight of the process for administering passwords for XXX systems
  • Publishes and maintains policy guidelines for the creation, safeguarding, and control of the passwords

Information Security Officer (ISO)

  • Grants access and reviews access every year to determine the continued need for access; and, if the need continues, re-approves through submission of System Access Request Form
  • Prepares policy guidelines for the creation, safeguarding, and control of passwords
  • Approves access to supervisor passwords and passwords for similar privileged accounts used on XXX’s network

IT Manager

  • Communicates to the users the system access and password requirements outlined in this policy
  • Informs XXX’s Security Officer when access is to be removed
  • Immediately informs XXX’s Security Officer if it is suspected that password has been compromised
  • Issues and manage passwords for systems and applications under their control in accordance with XXX’s policy described below
  • Issues passwords for privileged accounts to the primary system administrator and no more than one designated alternate system administrator; these passwords shall be changed at least every 30 days or when necessary due to employment termination, actual or suspected password compromise

Users

  • Understand their responsibilities for safeguarding passwords
  • Use XXX data in accordance with job function and company policy
  • Understand the consequences of their failure to adhere to statutes and policy governing information resources
  • Immediately notify the supervisor if it is suspected that password has been compromised

6.Policy

6.1 General

a. Password policy shall ensure that all user accounts are protected by strong passwords and that the strength of the passwords meets the security requirements of the system.
b. The concept of aging shall be used for passwords. Passwords on their expiry shall cease to function.
c. Users shall be educated about password protection and the password policy shall be implemented to ensure that users follow best practices for password protection.
d. IT systems shall be configured to prevent password reuse.
e. For critical information systems, account lockout strategy shall be defined. This shall be based on a risk analysis of the system as well as the costs to be incurred in case such a strategy is implemented.

6.2 Access Authorization Requirements

  • Access to XXX resources shall be controlled and shall be based on an approved System Access Request Form for each of the systems.
  • Individuals shall be granted access only to those information systems necessary for the performance of their official duties; users must receive the supervisor’s and the IT Manager’s approval prior to being granted access to XXX’s information resources. This requirement includes contracted employees and all other non-XXX personnel who have been granted access.
  • Passwords shall be used on all XXX automated information systems to uniquely identify individual users.
  • Passwords shall not be shared with, used by, or disclosed to others; generic or group passwords shall not be used.
  • To preclude password guessing, an intruder lock-out feature shall suspend accounts after three invalid attempts to log on; manual action by a security system administrator is required to reactivate the ID.

6.3 Password Parameters

All user and system passwords, even temporary passwords set for new user accounts, should meet the following characteristics:

  • Be at least six characters in length
  • Consist of a mix of alpha, and at least one numeric, and special characters
  • Not be dictionary words
  • Not be portions of associated account names (e.g., user ID, log-in name)
  • Not be character strings (e.g., ABC or 123)
  • Not be simple keyboard patterns

In addition, users are required to select a new password immediately after their initial login. Passwords must be changed at least every 15 days. Previously used passwords may not be re-used.

6.4 Password and Account Security

  • Password accounts not used for 90 days will be disabled and reviewed for possible deletion. Accounts disabled for 60 days will be deleted. Accounts for XXX contractors shall terminate on the expiration date of their contract.
  • Lockout policy must be implemented for unsuccessful login attempts. As a good practice, a maximum of 3 login attempts should be allowed. The auto-lock policy for locked accounts must be released after 24 hours only.
  • Screen-saver password must be enabled after 10 minutes of inactivity of the user. Users must not be allowed to change the inactivity time.
  • Passwords for all users including administrator accounts 15 days must be changed.
  • Administrative account passwords must be changed promptly upon departure of personnel (mandatory or voluntary) or suspected compromise of the password. User accounts will be disabled promptly upon departure of personnel (mandatory or voluntary). Users should immediately change their password if they suspect it has been compromised.
  • Vendor or service accounts will be removed from computer systems prior to deployment and new passwords are to be implemented on all systems immediately upon installation at XXX facilities.
  • Passwords may not be embedded in automated programs, utilities, or applications, such as autoexec.bat files, batch job files, terminal hotkeys.
  • Passwords may be not visible on a screen, hardcopy printouts, or any other output device

7.Enforcement

Unauthorized personnel is not allowed to see or obtain sensitive data. Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy.

Back to Home

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Media Handling Policy

1 Policy Statement

To meet the enterprise business objectives and ensure acceptable use of its information systems and networks, XXX shall adopt and follow well-defined and time-tested plans and procedures, follow guidelines to ensure the secure management of media to protect sensitive or personal information from intentional or accidental exposure or misuse. Media is anything on which information or data can be recorded or stored and includes both paper and a variety of electronic media. Storage devices include but are not limited to computer hard drives, portable hard drives, backup tapes, DVD / CD media, USB drives and other Personal Digital Assistants (PDA), cell phones, iPods, MP3 players, digital cameras, fax machines, and photocopiers. When handling and managing information it is essential to understand that maintaining security for both the information and the media on which it is stored is equally important.

2. Purpose

This Policy offers guidance regarding media handling. It is intended to guide and inform personnel and help them understand their roles and responsibilities according to the policy.

3. Scope

3.1 Employees

This policy applies to all Management, Employees, Contractors, and Third Party Employees, who use media of  XXX

3.2 IT Assets

This policy applies to all organizational IT assets of XXX.

3.3 Documentation

The documentation shall consist of Media Handling Policy, and related procedures & guidelines.

3.4 Document Control

The Media Handling Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purposes.

3.5 Records

Records being generated as part of the Media Handling Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.

3.6 Distribution and Maintenance

The Media Handling Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of the document shall be with the CISO and system administrators.

5 Privacy

The Media Handling Policy document shall be considered as “confidential” and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.

6 Responsibility

The Media Handling Policy shall be implemented by the CISO / designated personnel.

7 Policy

The primary area of concern is the secure management of media to protect sensitive or personal information from intentional or accidental exposure or misuse. The following shall be implemented:

  1. Risks to information and the media on which it resides shall be securely managed throughout the lifecycle of procurement, use, storage, and disposition.
  2. The only government-authorized media shall be used for managing data.
  3. Erasure of information from media shall be done by approved standards and secure disposal of media shall be followed using documented procedures.
  4. Media shall be handled according to the highest level of sensitivity of contained information.
  5. Media shall be protected from theft or tampering.
  6. Where there is re-assignment or destruction of hardware and media, inventory records shall be kept current.

8. Enforcement
Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy.

Back to Home

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Examples of Cryptographic control policy

1. POLICY STATEMENT

A policy on cryptographic controls has been developed with procedures to provide appropriate levels of protection to sensitive information whilst ensuring compliance with statutory, regulatory, and contractual requirements. The  Data Handling Procedures establish requirements for the use of encryption techniques to protect sensitive data both at rest and in transit. This policy defines the controls and related procedures for the various areas where encryption and other cryptographic techniques are employed.

2. SCOPE AND APPLICATION OF THE POLICY

Cryptographic controls can be used to achieve different information security objectives, e.g.:

  • Confidentiality: using encryption of information to protect sensitive or critical information, either stored or transmitted
  • Integrity/authenticity: using digital signature certificates or message authentication codes to verify the authenticity or integrity of stored or transmitted sensitive or critical information
  • Non-repudiation: using cryptographic techniques to provide evidence of the occurrence of an event or action
  • Authentication: using cryptographic techniques to authenticate users and other system entities requesting access or transacting with system users, entities, and resources

3. DEFINITIONS

  • Cryptography: a method of storing and transmitting data in a form that only those it is intended for can read and process.
  • Encryption: the process of converting data from plaintext to a form that is not readable to unauthorized parties, known as ciphertext.
  • Key: the input that controls the process of encryption and decryption. There are both secret and public keys used in cryptography.
  • Digital Certificate: An electronic document that is used to verify the identity of the certificate holder when conducting electronic transactions. SSL certificates are a common example that has identified data about a server on the Internet as well as the owning authority’s public encryption key.
  • Digital Signature Certificate: a type of digital certificate that proves that the sender of a message or owner of a document is authentic and the integrity of the message or document is intact. A digital signature certificate uses asymmetric cryptography and is not a scanned version of someone’s handwritten signature or a computer-generated handwritten signature (a.k.a. an electronic signature).
  • SSH Keys: A public/private key pair used for authenticating SSH servers and establishing a secure network connection.

4. USE OF CRYPTOGRAPHIC CONTROLS POLICY

  1. Approved encryption methods for data at rest
    1. The Data Handling Procedures require that the storage of sensitive data in some locations be encrypted. Refer to the Data Handling Procedures for specific requirements.
    2. Refer to the Procedures for Encrypting Data for approved encryption methods and key management procedures.
  2. Encryption methods for data in motion
  3. The Data Handling Procedures require the transfer of sensitive data through a secure channel. A secure channel is an encrypted network connection.
  4. Various methods of encryption are available and generally built-in to the application. The user should be aware of the data connection being used to transmit sensitive data and if encryption is enabled for that connection.
  5. Encryption is required for:
    • The transport of sensitive files (secure FTP, SCP, or VPN usage to encrypt sensitive data for network file access of unencrypted files).
    • Access to sensitive data via a website, web application, or mobile app. Encryption is required for accessing sensitive data from anything with a web interface, including mobile devices (i.e. use of HTTPS to encrypt sensitive data).
    • All network traffic for remote access to the virtual desktop environment.
    • Transport of sensitive data that is part of a database query or web service call (examples SQL query to retrieve or send data from database or a Restful web service call to retrieve or send data from a cloud application).
    • Privileged access to network or server equipment for system management purposes.
  6. Encryption of Email
    • The Data Handling Procedures require that when emailing some sensitive data the message and attachments be encrypted.
    • Refer to the Procedures for Encrypting Data document for instructions on encrypting Email.
    • Use of digital signature certificates
      • Digital signature certificates are a way to guarantee the authenticity and integrity of an Email message or document.
      • Digital signature certificates are not used for encrypting data.
      • Digital signature certificates are not the same as an electronic signature or e-signature which may be a digitized image of a handwritten signature or other image used to identify the author of a message.
      • E-signatures are not legally binding like a digital signature certificate because they are vulnerable to copying and tampering.
      • Users may use a digital signature certificate to digitally sign email messages.
      • Users may use a digital signature certificate to digitally sign some types of documents or forms.
      • Refer to the Procedures for Using Digital Signatures for instructions on how to acquire and utilize digital signature certificates.
    • Use and management of SSH keys
      • Refer to the Standards for the Use of SSH Keys document for guidance on when and how to utilize SSH keys.
    • Use and management of SSL digital certificates
      • WCU web servers (or devices with a web interface) that support secure (HTTPS) connections must have an SSL certificate installed.
      • Refer to the SSL Certificate Decision Matrix document for choosing the right type of certificate, the WCU certificate standards, and certificate management procedures.
    • Use of encryption
      • Classified information shall only be taken for use away from the organization in an encrypted form unless its confidentiality can otherwise be assured. Classified information that is taken away from the organization for use must be held on an encrypted USB pen drive provided by Computing and Media Services.
      • Procedures shall be established to ensure that authorized staff may gain access, when needed, to any important business information being held in encrypted form. The unique encryption key will be known only to the user and Computing and Media Services (Held in a secure repository).
      • The confidentiality of information being transferred on portable media or across networks must be protected by the use of appropriate encryption techniques. The VPN provides an encrypted tunnel between on-site resources and off-site access points. The VPN should be used in preference to the transfer of data by mobile media.
      • Encryption shall be used whenever appropriate on all remote access connections to the organization’s network and resources. The unique encryption key will be known only to the user and Computing and Media Services. (Held in the secure repository).
    • Managing electronic keys
      • A procedure for the management of electronic keys, to control both the encryption and decryption of sensitive documents or digital signatures, must be established to ensure the adoption of best practice guidelines and compliance with both legal and contractual requirements. Computing and Media Services will manage all electronic keys and provide users with an appropriate encryption service when requested.
    • Using and receiving digital signatures
      • The important business information being communicated electronically shall be authenticated by the use of digital signatures; information received without a digital signature shall not be relied upon. Computing and Media Services will manage all electronic keys and provide users with an appropriate encryption service when requested.

5. REGULATION OF CRYPTOGRAPHIC CONTROLS

Cryptographic controls should be used in compliance with all relevant agreements, legislation, and regulations. The following items must be considered for compliance:

  1. Restrictions on import or export of computer hardware or software used to perform cryptographic functions or are designed to have cryptographic functions added to it.
  2. Restrictions on the use of encryption, especially in foreign countries
  3. Methods of access to encrypted information used by the countries’ authorities.

Legal advice should be sought to ensure compliance before encrypted information or cryptographic controls are moved across jurisdictional borders.

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Remote working Policy

1. Policy Statement

As stated in its Policy on Equal Opportunities: ‘the Organization confirms its commitment to develop, maintain and support a comprehensive policy of equal opportunities in employment within the Organization’. To assist in this the Organization will actively support Remote working where it is reasonable and practical to do so and where operational needs will not be adversely affected.

2.  Definition of Remote working

Remote work is defined as working at home or at other off-site locations that are linked electronically (via computer, fax, etc.) to a central office or principal place of employment. Remote working is a cooperative arrangement between the Organization and an employee, based upon the needs of the job, workgroup, and the Organization. This policy does not apply to situations where a supervisor occasionally allows an employee to work at home on a temporary, irregular basis.

3. Aims and Objectives

The Organization is committed to equality of opportunity for all its staff regardless of the number of hours worked. In order to facilitate this, the Organization may create working arrangements, in accordance with managerial interests, whereby it can widen its recruitment pool and retain the valuable skills of existing employees.

4.  Eligibility

To be eligible for consideration of a Remote work arrangement, an employee must have no record of performance problems or disciplinary actions within the preceding two (2) years. In the case of a new hire, the organization will conduct a thorough reference check with past employers to determine whether he/she meets the requirement.

Criteria for consideration of Remote working Arrangement

  • Is the employee a good candidate for teleworking?
  • Proven ability to perform;
  • No disciplinary action;
  • High job knowledge;
  • Ability to establish clear objectives;
  • Flexibility;
  • Ability to work independently;
  • Dependability.
  • Does the nature of the work lend itself to Remote working?
  • Jobs that entail working alone or with equipment that can be kept at the alternate worksite
  • Clearly defined tasks and objectives;
  • Little face-to-face communication needed; Measurable work activities

5.  Job Responsibilities

Employee job responsibilities will not change due to Remote working. Professionalism in terms of job responsibilities, work output, and customer orientation will continue to follow the standards set by the Organization.  The amount of time an employee is expected to work will not change due to teleworking.  Employee work hours will be mutually agreed upon by the supervisor and the employee.  In the event that business conditions require the Remote working employee’s presence at a central work location function, meeting, or other events, the employee is expected to report to the central work location, even if such occurs during normally scheduled home-work area hours.

6.  Contact With the Central Work Location

Once a Remote working arrangement has been approved, the employee is responsible for maintaining regular contact with his or her Supervisor. The Supervisor shall be the Remote working employee’s primary contact within the central work location. It is expected that the Supervisor and the Remote worker will act together to keep each other apprised of events or information obtained during the working day.

7.  Alternate Work Area

The Organization shall provide workers’ compensation and liability protection as obligated by State statutes for the employee while in the course of employment within the agreed-upon location and defined work schedule.  The Organization assumes no responsibility for any activity, damages, or injury which is not directly associated or resulting from the official job duties for which the Organization has no ability to exercise control.  The Organization assumes no responsibility for the employee’s personal property.

In addition, the following must be adhered to:

  1. A designated workspace should be maintained by the employee in a clean, professional, and safe condition.
  2.   Any change in the approved job assignment, location, or defined work schedule must be reviewed and approved by the supervisor in advance.
  3.   As liability may extend to accident5s which could occur in the alternative work location, the Organization retains the right to make on-site inspections of this work area, at a mutually agreed upon time, to ensure that safe work conditions exist.
  4. Employee tax implications related to alternate work locations are the responsibility of the employee.
  5. Employee expenses not specifically covered in this policy will be dealt with on a case-by-case basis between the employee and his/her supervisor.
  6. Employees who work at home will manage dependent care and personal responsibilities in a way that allows them to successfully meet job responsibilities.

8.  Equipment

  1. Any hardware or software purchased by the Organization remains the property of the Organization and will be returned to the Organization should the alternative work arrangement be terminated.
  2. Software owned by the Organization may not be duplicated except as formally authorized by policy.
  3.   Employees using Organization software must adhere to the manufacturer’s licensing agreements.
  4.   Restricted access materials (such as payroll, personnel files, etc) may not be taken out of the office, copied, or compromised in any way.  Employees working at alternate sites will take all precautions necessary to secure sensitive information and prevent unauthorized access to the Organization.
  5.   Organization equipment located at an alternative work location may not be used for personal activities.

Back to Home

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

An example of Mobile Device Policy

  1. Introduction

Mobile devices, such as smartphones and tablet computers, are important tools for the organization and Company to support their use to achieve business goals. However, mobile devices also represent a significant risk to data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the organization’s data and IT infrastructure. This can subsequently lead to data leakage and system infection. It has a requirement to protect its information assets in order to safeguard its customers, intellectual property, and reputation. This document outlines a set of practices and requirements for the safe use of mobile devices and applications.

2. Scope

  1. All mobile devices, whether owned by or owned by employees, inclusive of smartphones and tablet computers, that have access to corporate networks, data and systems are governed by this mobile device security policy. The scope of this policy does not include corporate IT-managed laptops.
  2. Exemptions: Where there is a business that needs to be exempted from this policy (too costly, too complex, adversely impacting other business requirements) a risk authorized by security management must be conducted.
  3. Applications used by employees on their own personal devices which store or access corporate data, such as cloud storage applications, are also subject to this policy.

3.  Policy

  1. Technical Requirements
    1. Devices must use the following Operating Systems: Android 2.2 or later, iOS 4.x or later.
    2. Devices must store all user-saved passwords in an encrypted password store.
    3. Devices must be configured with a secure password that complies with ’s password policy. This password must not be the same as any other credentials used within the organization.
    4. Only devices managed by IT will be allowed to connect directly to the internal corporate network.
    5. These devices will be subject to the valid compliance rules on security features such as encryption, password, key lock, etc. These policies will be enforced by the IT department using Mobile Device Management software.
  2. User Requirements
    1. Users may only load corporate data that is essential to their role onto their mobile device(s).
    2. Users must report all lost or stolen devices to IT immediately.
    3. If a user suspects that unauthorized access to company data has taken place via a mobile device, they must report the incident in alignment with ’s incident handling process.
    4. Devices must not be “jailbroken” or “rooted”* or have any software/firmware installed which is designed to gain access to functionality not intended to be exposed to the user.
    5. Users must not load pirated software or illegal content onto their devices.
    6. Applications must only be installed from official platform-owner-approved sources. Installation of code from untrusted sources is forbidden. If you are unsure if an application is from an approved source contact IT.
    7. Devices must be kept up to date with the manufacturer or network-provided patches. As minimum patches should be checked weekly and applied at least once a month.
    8. Devices must not be connected to a PC that does not have up-to-date and enabled anti-malware protection and which does not comply with corporate policy.
    9. Devices must be encrypted in line with ’s compliance standards.
    10. Users must be cautious about the merging of personal and work email accounts on their devices. They must take particular care to ensure that company data is only sent through the corporate email system. If a user suspects that company data has been sent from a personal email account, either in the body text or as an attachment, they must notify IT immediately.
    11. The above requirements will be checked regularly and should a device be non-compliant that may result in the loss of access to email, a device lock, or in particularly severe cases, a device wipe.
    12. The user is responsible for the backup of their own personal data and the company will accept no responsibility for the loss of files due to a non-compliant device being wiped for security reasons.
    13. (If applicable to your organization) Users must not use corporate workstations to backup or synchronize device content such as media files unless such content is required for legitimate business purposes.

      *To jailbreak/root a mobile device is to remove the limitations imposed by the manufacturer. This gives access to the operating system, thereby unlocking all its features and enabling the installation of unauthorized software.

1.Actions which may result in a full or partial wipe of the device, or other interaction by IT

  1. A  device is jailbroken/rooted
  2. A device contains an app known to contain a security vulnerability (if not removed within a given time-frame after informing the user)
  3. A device is lost or stolen
  4. A user has exceeded the maximum number of failed password attempts

2.Use of particular applications which have access to corporate data

  1. Cloud storage solutions: Company X supports the use of the following cloud storage solutions xxxxxx
  2. The use of solutions other than the above will lead to a compliance breach and the loss of access to the corporate network for the user

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Clear Desk and Clear Screen Policy

1. Policy Statement

The Clear Desk and Clear Screen Policy shall communicate the Management’s intent to protect information stored in physical and electronic media and minimize the risk of unauthorized access. Information is an asset that, like other important business assets, has value to XXX and consequently needs to be suitably protected. Information, in whatever form it takes, or means by which it is shared or stored, should always be appropriately protected.

2. Purpose

To improve the security and confidentiality of information, wherever possible a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adopted. This shall reduce the risk of unauthorized access, loss of, and damage to information during and outside normal working hours or when areas are unattended. The purpose of this policy is to set forth the requirements to ensure that all work areas are clear of company information, whether in electronic or paper form, classified as Level 1 – Confidential (Confidential) or Level 2 – Internal Use (Internal Use) when the work area is unattended.

3. Definitions

Level 1 – Confidential Information

Confidential information is information whose unauthorized use, access, disclosure acquisition, modification, loss, or deletion could result in severe damage to XXX’s employees or customers. Financial loss, damage to XXX’s reputation, and legal action could occur. Confidential information is intended solely for use within XXX’s and limited to those with a “business need-to-know”. Statutes, regulations, or other legal obligations or mandates protect much of this information. Disclosure of Confidential information to persons outside of the organization is governed by specific standards and controls designed to protect the information.

Level 2- Internal Use Information

Information that must be protected due to proprietary, ethical, or privacy considerations. Although not specifically protected by statute, regulations, or other legal obligations or mandates, unauthorized use, access, disclosure, acquisition, modification, loss, or deletion of the information at this level could cause financial loss, damage to XXX’s reputation, violate an individual’s privacy rights or legal action could occur.

4 Scope

4.1 IT Assets

This policy applies to all  Employees, Contractors, and Third Party Employees, who have access to IT assets of XXX and may be bound by contractual agreements.

4.2 Documentation

The Policy documentation shall consist of Clear Desk and Clear Screen Policy and related guidelines.

4.3 Document Control

The Clear Desk and Clear Screen Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purposes.

4.4 Records

Records being generated as part of the Clear Desk and Clear Screen Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.

4.5 Distribution and Maintenance

The Clear Desk and Clear Screen Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of the Clear Desk and Clear Screen Policy document shall be with the CISO and system administrators.

5 Privacy

The Clear Desk and Clear Screen Policy document shall be considered as “confidential” and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.

6 Responsibility

The CISO / designated personnel is responsible for proper implementation of the Policy.

7 Policy

  1. Computers/computer terminals shall not be left logged-on when unattended and shall be password-protected.
  2. The Windows Security Lock shall be set to activate when there is no activity for three minutes.
  3. The Windows Security Lock shall be password protected for reactivation.
  4. Users shall shut down their machines when they leave for the day.
  5. There shall be no screen savers set on for the individual’s desktops and laptops.
  6. Where practically possible, paper and computer media shall be stored in suitable locked safes, cabinets or other forms of security furniture when not in use, especially outside working hours.
  7. Sensitive or classified information, when printed, shall be cleared from printers immediately.
  8. The reception desk can be particularly vulnerable to visitors. This area shall be kept as clear as possible at all times.
  9. Individual Personal belongings like bags, books, edibles, etc. shall be kept in drawers.
  10. Before leaving for the day an individual shall make sure not to leave any paper or belongings on the desk.
  11. Desktops shall have only shortcuts instead of having complete files or folders.
  12. Computer screens shall be angled away from the view of unauthorized persons.
  13. Physical access to the information system device that displays information shall be controlled to prevent unauthorized individuals from observing the display output.
  14. Server rooms and office areas shall remain locked when they are not in use.
  15. All Confidential and Internal Use information must be removed from the desk and locked in a drawer or file cabinet when the workstation is unattended and at the end of the workday.
  16. All Confidential and Internal Use information must be stored in lockable drawers or cabinets.
  17. File cabinets containing Confidential or Internal Use information must be locked when not in use or when not attended.
  18. Keys used to access Confidential or Internal Use information must not be left in an unattended work area.
  19. Laptops must be either locked with a locking cable or locked away in a drawer or cabinet when the work area is unattended or at the end of the workday.
  20. Passwords must not be posted on or under a computer or in any other accessible location.
  21. Copies of documents containing Confidential or Internal Use information must be immediately removed from printers.

8 Enforcement

Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy / Staff Regulation Act of XXX.

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Acceptable Use Policy

1 Policy Statement

To meet the enterprise business objectives and ensure acceptable use of its information systems and networks, XXX shall adopt and follow well-defined and time-tested plans and procedures, and follow guidelines to exercise judgment regarding the use of organizational resources. XXX is deploying IT-enabled services at various internal divisions for managing its business activities. Presently XXX depends on the following IT-enabled processes for managing its business activities:

  • E-tendering / E-Publishing
  • Financial Accounting Package (FAP)
  • E-litigation
  • Procurement Monitoring System (PMS)
  • Release Order (RO) Module.

The acceptable use policy and guidelines shall be communicated to and understood by all the employees of XXX. The acceptable use policy and guidelines shall be available to the CEO, GMs, DGMs, AGMs, managers.

2 Purpose

The purpose of this policy is to outline the acceptable use of computer equipment and other electronic devices at XXX. These rules are in place to protect the employee and XXX. Inappropriate use exposes XXX to cyber risks including virus attacks including ransomware, compromise of network systems and services, data breach, and legal issues. These rules are in place to protect the employees and the organization. Inappropriate use exposes XXX to risks including virus attacks, compromise of network systems and services, and legal issues.

3 Scope

3.1 Employees

This policy applies to all XXX’s Employees, Contractors, and Third Party Employees, who have access to the IT assets of XXX and may be bound by contractual agreements.

3.2 IT Assets

The policy is applicable to all Hardware assets, Software assets, Network assets, and Utilities, including Air conditioners, Power, and telecommunications services (that serve IT assets of XXX). Equipment owned by third parties, but in the custody of XXX, will also be covered under the scope.

3.3 Documentation

The documentation shall consist of an Acceptable Use Policy, guidelines, and policies & procedures for acceptable use of each service.

3.4 Document Control

The Acceptable Use Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purpose.

3.5 Records

Records being generated as part of the Acceptable Use Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.

3.6 Distribution and Maintenance

The Acceptable Use Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of the document shall be with the CISO and system administrators.

4 Privacy

The Acceptable Use Policy document shall be considered as “confidential” and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.

5 Responsibility

  1. The Acceptable Use Policy shall be implemented by the CISO / designated personnel.
  2. Information Security Management is responsible for maintaining this policy and advising generally on information security controls. Working in conjunction with other corporate functions, it is also responsible for running educational activities to raise awareness and understanding of the responsibilities identified in this policy.
  3. IT Department is responsible for building, configuring, operating, and maintaining the corporate email facilities (including anti-spam, anti-malware, and other email security controls) in accordance with this policy.
  4. IT Help/Service Desk is responsible for assisting users with secure use of email facilities and acts as a focal point for reporting email security incidents.
  5. All relevant employees are responsible for complying with this and other corporate policies at all times. This policy also applies to third-party employees acting in a similar capacity whether they are explicitly bound (e.g. by contractual terms and conditions) or implicitly bound (e.g. by generally held standards of acceptable behavior) to comply with our information security policies.
  6. Internal Audit is authorized to assess compliance with this and other corporate policies at any time.

6. Policy

6.1 General Use and Ownership

a. While the security administration of XXX desires to provide a reasonable level of privacy, users should be aware that the data they create on corporate systems remains the property of XXX. Because of the need to protect the IT assets of XXX, management cannot guarantee the confidentiality of personal information stored on an IT asset belonging to XXX.
b. Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Individual departments are responsible for creating guidelines concerning personal use of Internet and Intranet systems. In the absence of such policies, employees should be guided by departmental policies on personal use, and if there is any uncertainty, employees should consult their supervisor or manager.
c. It is recommended that any information that users consider sensitive or vulnerable be protected. For guidelines on information classification, refer to “Information classification and handling policy”.
d. For IT system security and network maintenance purposes, authorized individuals within XXX shall monitor equipment, systems, and network traffic at any time, as per its IT Audit Policy or orders issued by the competent authority.
e. XXX reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.

6.2 Security and Proprietary Information

a. The user interface for information contained on the Internet and Intranet-related systems shall be classified accordingly. Employees shall take all necessary steps to prevent unauthorized access to this information.
b. Authorized users shall be responsible for the security of their passwords and accounts.
c. Encryption of information, if used, shall be in compliance with XXX’s Cryptographic Control Usage Policy.
d. Information contained on portable computers shall be protected.
e. Users and employees shall use suitable procedures and guidelines for acceptable use of E-mail and internet resources.

6.3 Unacceptable Use

Under no circumstances is an employee of XXX authorized to engage in any activity that is illegal under national or international law while utilizing XXX-owned resources. The guidelines for Acceptable Use can be referred for a list of activities that fall under the category of unacceptable use.

The lists below are by no means exhaustive but attempt to provide a framework for activities which fall into the category of unacceptable use.

1. System and Network Activities

The following activities are strictly prohibited, with no exceptions:

  1. Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by XXX
  2. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which XXX or the end user does not have an active license is strictly prohibited.
  3. Accessing data, a server, or an account for any purpose other than conducting XXX business, even if you have authorized access, is prohibited.
  4. Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question.
  5. Introduction of malicious programs into the network or server (e.g., viruses, worms, trojan horses, ransomware, etc.).
  6. Revealing your account password/passphrase to others or allowing use of your account by others. This includes family and other household members when work is being done at home.
  7. Using a XXX computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user’s local jurisdiction.
  8. Making fraudulent offers of products, items, or services originating from any XXX account.
  9. Making statements about warranty, expressly or implied, unless it is a part of normal job duties.
  10. Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, “disruption” includes, but is not limited to, network sniffing, ping floods, packet spoofing, denial of service, brute-forcing accounts, and forged routing information for malicious purposes.
  11. Port scanning or security scanning is expressly prohibited unless prior notification to the Infosec Team is made.
  12. Executing any form of network monitoring which will intercept data not intended for the employee’s host, unless this activity is a part of the employee’s normal job/duty.
  13. Circumventing user authentication or security of any host, network, or account.
  14. Introducing honeypots, honeynets, or similar technology on the XXX network.
  15. Interfering with or denying service to any user other than the employee’s host (for example, denial of service attack).
  16. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet.
  17. Providing information about, or lists of, XXX employees to parties outside XXX

2. Email and Communication Activities

When using company resources to access and use the Internet, users must realize they represent the company. Whenever employees state an affiliation to the company, they must also clearly indicate that “the opinions expressed are my own and not necessarily those of the company”. Questions may be addressed to the IT Department

  1. Sending unsolicited email messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (email spam).
  2. Any form of harassment via email, telephone, text, or paging, whether through language, frequency, or size of messages.
  3. Unauthorized use, or forging, of email header information.
  4. Solicitation of email for any other email address, other than that of the poster’s account, with the intent to harass or to collect replies.
  5. Creating or forwarding “chain letters”, “Ponzi” or other “pyramid” schemes of any type.
  6. Use of unsolicited email originating from within XXX’s networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by XXX or connected via XXX’s network.
  7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam).

3 Blogging and Social Media

  1. Blogging or posting to social media platforms by employees, whether using XXX’s property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. Limited and occasional use of XXX’s systems to engage in blogging or other online posting is acceptable, provided that it is done in a professional and responsible manner, does not otherwise violate XXX’s policy, is not detrimental to XXX’s best interests, and does not interfere with an employee’s regular work duties. Blogging or other online posting from XXX’s systems is also subject to monitoring.
  2. XXX’s Confidential Information policy also applies to blogging. As such, Employees are prohibited from revealing any confidential or proprietary information, trade secrets or any other material covered by ’s Confidential Information policy when engaged in blogging.
  3. Employees shall not engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of XXX and/or any of its employees. Employees are also prohibited from making any discriminatory, disparaging, defamatory or harassing comments when blogging or otherwise engaging in any conduct prohibited by XXX’s Non-Discrimination and Anti-Harassment policy.
  4. Employees may also not attribute personal statements, opinions or beliefs to XXX when engaged in blogging. If an employee is expressing his or her beliefs and/or opinions in blogs, the employee may not, expressly, or implicitly, represent themselves as an employee or representative of XXXEmployees assume any and all risk associated with blogging.
  5. Apart from following all laws pertaining to the handling and disclosure of copyrighted or export-controlled materials, XXX’s trademarks, logos and any other XXX intellectual property may also not be used in connection with any blogging or social media activity
  6. Policy Compliance

6.4 Compliance Measurement

The IT Team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.

7 Enforcement

Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy.

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Information Classification and Handling Policy

1 Policy Statement

To meet the enterprise business objectives and ensure continuity of its operations, XXX shall adopt and follow well-defined and time-tested plans and procedures, to ensure that sensitive information is classified correctly and handled as per organizational policies. Information is considered a primary asset of an organization. An organization uses different types of information assets. The sensitivity of these information assets may vary and similarly, their handling mechanisms are also different.

2 Purpose

The purpose of this policy is to ensure personal information and confidential information are protected from unauthorized use and disclosure. This policy helps to facilitate the identification of information to support routine disclosure and active dissemination of information. It also helps to protect the intellectual property of XXX.

3 Scope

3.1 Employees

This policy applies to all Managers, employees, contractors, and third-party employees who have access to IT assets of XXX and may be bound by contractual agreements.

3.2 IT Assets

This policy applies to all information assets of XXX.

3.3 Documentation

The policy documentation shall consist of Information Classification and Handling Policy and related procedures & guidelines.

3.4 Document Control

The Information Classification and Handling Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purposes.

3.5 Records

Records being generated as part of the Information Classification and Handling Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.

3.6 Distribution and Maintenance

The Information Classification and Handling Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of this document shall be with the CISO and website administrator.

4 Privacy

The Information Classification and Handling Policy document shall be considered as “confidential” and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.

5 Responsibility

The CISO / designated personnel is responsible for the proper implementation of the Information Classification and Handling Policy.

6. Policy

XXX categorizes information into four classes: Confidential, Project / Process / Department specific, Internal, and Public.

  1. Confidential – The information assets which have high confidentiality value belong to this category. Only a limited set of authorized users shall access these information assets. Examples include business strategy and personnel files.
  2. Project / Process / Department specific – The information assets that contain data pertaining to the needs of a specific department, project team, or business process, belong to this category. Such information assets shall be accessible to members of the concerned department, project, or business process only.
  3. Internal – The information assets which can be distributed within all offices of XXX belong to this category. Examples are office orders and internal circulars.
  4. Public – The information assets which do not have any confidentiality requirement and/or can be disseminated to the general public belong to this category. Examples include an annual financial report of XXX and information displayed on XXX’s website.

Following are the policies for secure handling of information assets of XXX:

  1. Handling and labeling of all media shall be according to its indicated classification level.
  2. Depending on the classification of information, electronic transmission, copying, and distribution of copies of such information, shall require prior approval of CISO / DGM / GM / CEO, as applicable.
  3. Mailing and/or shipment of confidential information shall require that information be sent through a reputed mail service/courier with proper authentication.
  4. Confidential information shall be stored with proper security and/or in safe lockers.
  5. Disposition of confidential and Project / Process / Department specific information shall require shredding in the presence of CISO / DGM / GM / CEO / Process In-charge, as applicable.
  6. Appropriate access restrictions shall be applied to prevent access from unauthorized personnel.
  7. A formal record of the authorized recipients of data shall be maintained.
  8. Information processing operations shall ensure the following: that input data is complete, that processing is properly completed, and that output validation is applied.
  9. Storage of media shall be in accordance with the manufacturers’ specifications.
  10. All copies of media shall be clearly marked for the attention of the authorized recipient.
  11. Spooled data awaiting output shall be protected to a level consistent with its sensitivity.
  12. The distribution of data shall be based on “need to know” and “need to use” principles.
  13. Distribution lists and lists of authorized recipients shall be reviewed at regular intervals.

7 Enforcement

Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy / Staff Regulation Act of XXX.

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example for Corporate Policy for Information Security Management System

1. Purpose

The purpose of the Information Security Management System (ISMS) in XXX is to ensure the continuity and protection of the business processes and information assets that are considered within the ISMS scope (stated in the ISMS scope document). The information security needs and objectives are stated in this document to minimize the impact of security incidents on the operations of XXX.

2. Scope

The primary audiences for Corporate Information Security Policy are Senior Management, System and Information Owners, Business and Functional Managers, Chief Information Security Officer (CISO), and IT Security Practitioners of the organization.

3. Definition

4.1 Availability – Property of being accessible and usable upon demand by an authorized entity.
4.2 Asset – Anything that has value to the organization.
4.3 Confidentiality – Property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
4.4 Integrity – Property of accuracy and completeness.
4.5 ISMS – Information Security Management System is the part of the overall management system and required to establish, implement, maintain and continually improve the information security of the organization.

4. Corporate ISMS Policy

The Information Security Management System of XXX intends to ensure:
4.1 Integrity of all business processes, information assets, and supporting IT assets and processes, through protection from unauthorized modification, guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. The unauthorized modification or destruction of information could have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals;
4.2 Availability of all business processes, information assets, and supporting IT assets and processes to authorized users when needed, ensuring timely and reliable access to and use of information. The disruption of access to, or use of, information or an information system could have a serious adverse effect on organizational operations, organizational assets, or individuals;
4.3 Confidentiality of all information assets (information is not disclosed to unauthorized persons through deliberate or careless action). Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. The unauthorized disclosure of information could have a limited adverse effect on organizational operations, organizational assets, or individuals;
4.4 All IT-enabled processes and stakeholders shall follow the rules and regulations or circulars published in the organization;
4.5 All audit trails and logs, as decided by the Management Information Security Forum (MISF), shall be maintained and monitored by XXX;
4.6 All operational and system changes shall be monitored closely; these shall adhere to the change management process;
4.7 XXX complies with the laws, regulations, and contractual obligations which are applicable to the organization in general and in particular to its ISMS;
4.8 All applicable information security requirements are satisfied;
4.9 Continual improvement of the information security management system.

5. Applicability

This policy applies to all Manager and staff of XXX, contractors, and third-party employees under contract, who have any access to, or involvement with, the business processes, information assets, and supporting IT assets and processes covered under the scope of ISMS.

6. Responsibility

XXX  shall ensure that all activities required to implement, maintain and review this policy are performed. All personnel, regarded as included in the ISMS scope, must comply with this policy statement and its related security responsibilities defined in the information security policies and procedures that support the corporate information security policy. All personnel, even if not included in the ISMS scope, have a responsibility for reporting security incidents and identified weaknesses, and to contribute to the protection of business processes, information assets, and resources of XXX.

7. Enforcement

XXX holds the right to monitor the compliance of its personnel to this policy. Manager and staff of XXX, contractors, and third-party employees, who fail to comply with this policy, may be subjected to appropriate disciplinary actions.

8. Ownership and Revision

This policy statement is owned by the Board of Directors of XXX who has delegated this task to the Chief Information Security Officer (CISO). This policy shall be revised once in two years by the CISO and every time that the Board of Directors of FCI, or the MISF, decides to do so. MISF of XXX shall consist of the following members (as approved by CEO):
Executive Director (IT), Executive Director (Personnel), Executive Director (Finance), Executive Director (P&R), and Executive Director (Legal).

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.

Example of Access control policy

1 Policy Statement

[Organization Name] will establish specific requirements for protecting information and information systems against unauthorized access. [Organization Name] will effectively communicate the need for information and information system access control.

2 Purpose

Information security is the protection of information against accidental or malicious disclosure, modification, or destruction. Information is an important, valuable asset of [Organization Name] that must be managed with care. All information has value to the Organization. However, not all of this information has equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the right to use different information resources and by guarding against unauthorized use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection, and frequency of change.

3 Scope

This policy applies to all [Organization Name] Organization, Committees, Departments, Partners, Employees of the Organization (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Organization with any form of access to [Organization Name’s] information and information systems.

4 Definition

Access control rules and procedures are required to regulate who can access [Organization Name] information resources or systems and the associated access privileges. This policy applies at all times and should be adhered to whenever accessing [Organization Name] information in any format, and on any device.

5 Risks

On occasion business information may be disclosed or accessed prematurely, accidentally, or unlawfully. Individuals or companies, without the correct authorization and clearance, may intentionally or accidentally gain unauthorized access to business information which may adversely affect day-to-day business. This policy is intended to mitigate that risk. Non-compliance with this policy could have a significant effect on the efficient operation of the Organization and may result in financial loss and an inability to provide necessary services to our customers.

6 Applying the Policy – Passwords

6.1 Choosing Passwords

Passwords are the first line of defense for our ICT systems and together with the user ID helps to establish that people are who they claim to be. A poorly chosen or misused password is a security risk and may impact the confidentiality, integrity, or availability of our computers and systems.

6.1.1 Weak and strong passwords

A weak password is one that is easily discovered, or detected, by people who are not supposed to know it. Examples of weak passwords include words picked out of a dictionary, names of children and pets, car registration numbers, and simple patterns of letters from a computer keyboard. A strong password is a password that is designed in such a way that it is unlikely to be detected by people who are not supposed to know it, and difficult to work out even with the help of a computer.Everyone must use strong passwords with a minimum standard of:

  • At least seven characters.
  • Contain a mix of alpha and numeric, with at least one digit
  • More complex than a single word (such passwords are easier for hackers to crack).
  • [Amend the above as required for your local needs]

The organization advises using Environ passwords with the following format: consonant, vowel, consonant, consonant, vowel, consonant, number, number. An example for illustration purposes is provided below:

  • pinray45

6.2 Protecting Passwords

It is of utmost importance that the password remains protected at all times. The following guidelines must be adhered to at all times [amend the list as appropriate]:

  • Never reveal your passwords to anyone.
  • Never use the ‘remember password’ function.
  • Never write your passwords down or store them where they are open to theft.
  • Never store your passwords in a computer system without encryption.
  • Do not use any part of your username within the password.
  • Do not use the same password to access different [Organization Name] systems.
  • Do not use the same password for systems inside and outside of work.

6.3 Changing Passwords

All user-level passwords must be changed at a maximum of every 90 days, or whenever a system prompts you to change it. Default passwords must also be changed immediately. If you become aware or suspect, that your password has become known to someone else, you must change it immediately and report your concern to [Name a department – e.g. IT Helpdesk]. Users must not reuse the same password within 20 password changes [amend as appropriate].

6.4 System Administration Standards

The password administration process for individual [Organization Name] systems is well-documented and available to designated individuals. All [Organization Name] IT systems will be configured to enforce the following:

  • Authentication of individual users, not groups of users – i.e. no generic accounts.
  • Protection with regards to the retrieval of passwords and security details.
  • System access monitoring and logging – at a user level.
  • Role management so that functions can be performed without sharing passwords.
  • Password admin processes must be properly controlled, secure and auditable.

7 Applying the Policy – Employee Access

7.1 User Access Management

7.1.1 User access provisioning
Each user must be allocated access rights and permissions to computer systems and data that are commensurate with the tasks they are expected to perform. In general, this will be role-based, in which a user account will be added to a group that has been created with the access permissions required by that job role. Group roles must be maintained in line with business requirements and any changes to them must be formally authorized and controlled via the change management process. Ad-hoc additional permissions must not be granted to user accounts outside of the group role; if such permissions are required this must be addressed as a change and formally requested. They must cover all stages of the life cycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed upon by [Organization Name]. Each user must be allocated access rights and permissions to computer systems and data that:

  • Are commensurate with the tasks they are expected to perform.
  • Have a unique login that is not shared with or disclosed to any other user.
  • Have an associated unique password that is requested at each new login.

User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks.

7.1.2 Removal or adjustment of access rights
Where an adjustment of access rights or permissions is required, for example due to an individual changing role, this must be carried out as part of the role change. It must be ensured that access rights no longer required as part of the new role are removed from the user account. If a user is taking on a new role in addition to their existing one (rather than instead of) then a new composite role must be requested via change management. Due consideration of any issues of segregation of duties must be given.
Under no circumstances will administrators be permitted to change their own user accounts or permissions.

7.1.3 Management of privileged access rights
Privileged access rights such as those associated with administrator-level accounts must be identified for each system or network and tightly controlled. In general, technical users (such as IT support staff) will not make day to day use of user accounts with privileged access, rather a separate “admin” user account must be created and used only when the additional privileges are required. These accounts must be specific to an individual, for example “Pretesh Biswas Admin”; generic admin accounts must not be used as they provide insufficient identification of the user. Access to admin level permissions must only be allocated to individuals whose roles require them and who have received enough training to understand the implications of their use. The use of user accounts with privileged access in automated routines such as batch or interface jobs must be avoided where possible. Where this is unavoidable the password used must be protected and changed on a regular basis.

7.1.4 User authentication for external connections
In line with the Network Security Policy the use of modems on non-organization owned devices connected to the organization’s network can seriously compromise the security of the network. Specific approval must be obtained from the [IT Service Desk] before connecting any equipment to the organization’s network. Where remote access to the network is required via VPN, a request must be made via the [IT Service Desk]. A policy of using multifactor authentication for remote access will be used in line with the principle of “something you have and something you know” in order to reduce the risk of unauthorised access from the Internet. For further information please refer to the Mobile Device Policy and Remote Working Policy.

7.1.5 Supplier remote access to the organization network
Partner agencies or 3rd party suppliers must not be given details of how to access the organization’s network without permission from the [IT Service Desk]. Any changes to supplier’s connections (for example on termination of a contract) must be immediately sent to the [IT Service Desk] so that access can be updated or ceased. All permissions and access methods must be controlled by the [IT Service Desk]. Partners or 3rd party suppliers must contact the [IT Service Desk] on each occasion to request permission to connect to the network and a log of activity must be maintained. Remote access software and user accounts must be disabled when not in use.

7.1.6 Review of user access rights
On a regular basis (at least annually) asset owners must review who has access to their areas of responsibility and the level of access in place. This will be to identify:

  • People who should not have access (e.g. leavers)
  • User accounts with more access than required by the role
  • User accounts with incorrect role allocations
  • User accounts that do not provide adequate identification, e.g. generic or shared accounts
  • Any other issues that do not comply with this policy

This review will be performed according to a formal procedure and any corrective actions identified and carried out. A review of user accounts with privileged access will be carried out by the [Information Security Manager] on a quarterly basis to ensure that this policy is being complied with.

7.2 User Registration

A request for access to the Organization’s computer systems must first be submitted to the [Name a department – e.g. Information Services Helpdesk] for approval. Applications for access must only be submitted if approval has been gained from [Name a role – e.g. your line manager].

When an employee leaves the organization, their access to computer systems and data must be suspended at the close of business on the employee’s last working day. It is the responsibility of the [Name a role – e.g. your line manager] to request the suspension of the access rights via the [Name a department – e.g. Information Services Helpdesk].

7.3 User Responsibilities

It is a user’s responsibility to prevent their userID and password is used to gain unauthorized access to Organization systems by:

  • Following the Password Policy Statements outlined above in Section 6.
  • Ensuring that any PC they are using that is left unattended is locked or logged out.
  • Leaving nothing on display that may contain access information such as login names and passwords.
  • Informing [Name a department – e.g. Information Services Helpdesk – and any relevant roles] of any changes to their role and access requirements.

7.4 Network Access Control

The use of modems on non-Organization-owned PCs connected to the Organization’s network can seriously compromise the security of the network. The normal operation of the network must not be interfered with. Specific approval must be obtained from [Name a department – e.g. Information Services] before connecting any equipment to the Organization’s network.

7.5 User Authentication for External Connections

Where remote access to the [Organization Name] network is required, an application must be made via the [Name a department – e.g. IT Helpdesk]. Remote access to the network must be secured by two-factor authentication consisting of a username and one other component, for example, a [Name a relevant authentication token]. For further information please refer to [name a relevant policy -likely to be Remote Working Policy].

7.6 Supplier’s Remote Access to the Organization Network

Partner agencies or 3rd party suppliers must not be given details of how to access the Organization’s network without permission from [Name a department – e.g. IT Helpdesk]. Any changes to supplier’s connections must be immediately sent to the [Name a department – e.g. IT Helpdesk] so that access can be updated or ceased. All permissions and access methods must be controlled by [Name a department – e.g. IT Helpdesk].

Partners or 3rd party suppliers must contact the [Name a department – e.g. IT Helpdesk] before connecting to the [Organization Name] network and a log of activity must be maintained. Remote access software must be disabled when not in use.

7.7 Operating System Access Control

Access to operating systems is controlled by a secure login process. The access control defined in the User Access Management section (section 7.1) and the Password section (section 6) above must be applied. The login procedure must also be protected by:

  • Not displaying any previous login information e.g. username.
  • Limiting the number of unsuccessful attempts and locking the account, if exceeded.
  • The password characters being hidden by symbols.
  • Displaying a general warning notice that only authorized users are allowed.

All-access to operating systems is via a unique login id that will be audited and can be traced back to each individual user. The login id must not give any indication of the level of access that it provides to the system (e.g. administration rights). System administrators must have individual administrator accounts that will be logged and audited. The administrator account must not be used by individuals for normal day-to-day activities.

7.8 Application and Information Access

Access within software applications must be restricted using the security features built into the individual product. The [Name a department – e.g. IT Helpdesk or ‘business owner’] of the software application is responsible for granting access to the information within the system. The access must [amend the list as appropriate]:

  • Be compliant with the User Access Management section (section 7.1) and the Password section (section 6) above.
  • Be separated into clearly defined roles.
  • Give the appropriate level of access required for the role of the user.
  • Be unable to be overridden (with the admin settings removed or hidden from the user).
  • Be free from alteration by rights inherited from the operating system that could allow unauthorized higher levels of access.
  • Be logged and auditable.

8 Policy Compliance

If any user is found to have breached this policy, they may be subject to [Organization Name’s] disciplinary procedure. If a criminal offense is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from [name appropriate department].

9 Policy Governance

The following table identifies who within [Organization Name] is Accountable, Responsible, Informed, or Consulted with regards to this policy. The following definitions apply:

  • Responsible – the person(s) responsible for developing and implementing the policy.
  • Accountable – the person who has ultimate accountability and authority for the policy.
  • Consulted – the person(s) or groups to be consulted prior to final policy implementation or amendment.
  • Informed – the person(s) or groups to be informed after policy implementation or amendment.

Responsible [Insert appropriate Job Title – e.g. Head of Information Services, Head of Human Resources, etc.]
Accountable [Insert appropriate Job Title – e.g. Section 151 Officer, Director of Finance, etc. It is important that only one role is held accountable.]
Consulted [Insert appropriate Job Title, Department or Group – e.g. Policy Department, Employee Panels, Unions, etc.]
Informed [Insert appropriate Job Title, Department or Group – e.g. All Organization Employees, All Temporary Staff, All Contractors, etc.]

10 Review and Revision

This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. The policy review will be undertaken by [Name an appropriate role].

11 References

The following XXX policy documents are directly relevant to this policy, and are referenced within this document [amend the list as appropriate]:

  • Remote Working Policy.

The following XXX policy documents are indirectly relevant to this policy [amend the list as appropriate]:

  • Email Policy.
  • Internet Acceptable Usage Policy.
  • Software Policy.
  • GCSx Acceptable Usage Policy and Personal Commitment Statement.
  • Legal Responsibilities Policy.
  • Computer, Telephone, and Desk Use Policy.
  • Removable Media Policy.
  • Information Protection Policy.
  • Human Resources Information Security Standards.
  • Information Security Incident Management Policy.
  • IT Infrastructure Policy.
  • Communications and Operation Management Policy.

12 Key Messages

  • All users must use strong passwords.
  • Passwords must be protected at all times and must be changed at least every 90 days.
  • User access rights must be reviewed at regular intervals.
  • It is a user’s responsibility to prevent their userID and password is being used to gain unauthorized access to Organization systems.
  • Partner agencies or 3rd party suppliers must not be given details of how to access the Organization’s network without permission from [Name a department – e.g. IT Helpdesk].
  • Partners or 3rd party suppliers must contact the [Name a department – e.g. IT Helpdesk] before connecting to the [Organization Name] network.

Back to Home Page

If you need assistance or have any doubt and need to ask any questions contact me at preteshbiswas@gmail.com. You can also contribute to this discussion and I shall be happy to publish them. Your comments and suggestion are also welcome.