Doc04 - ISO 27001-2013 ISMS Manual TOP
Doc04 - ISO 27001-2013 ISMS Manual TOP
Control Objective: To ensure the correct and secure operation of information processing
facilities.
The purpose is to ensure correct operations of information systems and information processing
facilities. XXX. has a set of defined operating manuals for processing the department functionality.
All documented operating manuals are identified in the ‘PAL-Process Asset Library-Content
Master’. Operating procedures and responsibilities for information systems and information
processing facilities must be authorized, documented, and maintained. Information Owner must
ensure that approved operating procedures and standards are:
Documented;
Consistent with the policies, standards and guidelines;
Reviewed and updated annually or when there are:
o Alterations to building layouts,
o Changes to equipment/systems located in the facility,
o Changes in business services and the supporting information systems operations,
and,
o As part of any related security incident investigation.
The purpose is to ensure changes to information systems and facilities are applied correctly and do
not compromise the security of information and information systems. Whenever a change in the IT
infrastructure is to be done, a proper evaluation and analysis is done which includes cost, security,
technical functionality and compatibility. Any user can initiate change request. Manager/IT is
authorized to initiate the change & Head/IT approves these operational and process changes. To
control all operational changes XXX. has defined policy. Changes to information systems and
information processing facilities must be controlled.
a) Planning changes
b) Change management process
c) Implementing change
a) Planning changes
Information Owners must plan for changes to information systems and information processing
facilities by assessing the impact of the proposed change on security by conducting a security
review based on the size of the change.
c) Implementing changes
Information Owners must implement changes by:
The purpose is to protect information and information systems from unauthorized access, theft or
misuse. It is the responsibility of the individual managers to look for capacity demands for their
projects in advance. This ensures that the required capacity can be arranged in time to minimize
the risk of failure due to lack of capacity. It also ensures the continuous availability of operational
systems. Utilization of existing resources is monitored regularly. Controls must be applied to limit
opportunities for information leakage. Information Owners must implement processes to reduce
the opportunity for information leakage in information systems by:
Guidelines:
Scanning outbound media and communications for hidden information should be considered.
The purpose is to reduce the risk of system failures and unacceptable performance levels by
monitoring and optimizing resources to meet current and future information system capacity
requirements. The development and testing activities shall not be done in production server. The
use of information system resources must be monitored, optimized and projections made of future
capacity requirements.
a) Resource capacity management
b) Resource capacity planning
Information Owners are responsible for implementing capacity management processes by:
Information Owner must use trend information from the capacity management process to identify
and remediate potential bottlenecks that present a threat to system security or services. Information
Owners must plan and budget for business and service capacity management.
Guidelines:
Resource capacity management processes should be automated where feasible.
Control Objective: To protect the integrity of software and information processing facilities are
protected against malware.
The purpose is to protect the integrity of information systems and software through requirements
for the prevention and detection of network and host-based threats. Precautions are required to
prevent and detect the introduction of malicious software. Software information processing
facilities are vulnerable to the introduction of malicious software, such as computer viruses,
network worms, Trojan horses, and logic bombs etc. XXX. has implemented several controls to
address the threat:
Security awareness, prevention and detection controls must be utilized to protect information
systems against network and host-based threats.
a) Prevention and detection controls
b) User awareness
Installing, updating and consistently using software designed to scan for, detect and provide
protection from network and host-based threats;
Prohibiting the use of unauthorized software;
Checking files, including electronic mail attachments and file downloads for malware
before use;
Maintaining business continuity plans to recover from security incidents;
Regularly reviewing file and data content on critical systems to identify unapproved or
unauthorized files and file changes; and
Scanning back-up media prior to restoration so that malware is not introduced or re-
introduced into an information system and network.
The Chief Information Security Officer must ensure processes are implemented to:
Maintain a critical incident management plan to identify and respond to security incidents;
and,
Maintain a register of specific threat countermeasures (e.g., blocked websites, blocked
electronic mail attachment file types, blocked network ports, additional monitoring, etc.)
including a description, the rationale, the approval authority and the date applied.
b) User awareness
The Chief Information Security Officer is responsible for developing user awareness programs for
threat countermeasures. The Information Security Officers are responsible for communicating
technical advice and providing information and awareness activities regarding network and host-
based threats. Employees are required to complete the information protection courses provided by
the CISO as part of their awareness training.
A.12.3 Back-up
Control Objective: To maintain the integrity and availability of information and information
processing facilities.
The purpose is to enable the timely recovery of information and information systems. Backup of
informational Servers are taken regularly. XXX. has a well-defined procedure for Information
backup and restoration. Information and information systems must be backed up and the recovery
process tested regularly.
a) Defining requirements
b) Safeguarding backup facilities and media
c) Testing
a) Defining requirements
Information Owners must define and document backup and recovery processes that reflect the
security classification and availability requirements of information and information systems
including:
c) Testing
Information Owners must regularly test backup and recovery processes.
The purpose is t0 ensure usage of information systems can be monitored and audited. XXX. has
defined policy for event logs. All systems are monitored to detect deviation from access control
policy. This audit trail serves as evidence in case of security breach, and is the basis for any action.
Audit logs are maintained on servers and provide audit information related to User Id, Date and
time of log-on and log-off, failed login attempts, Terminal Location. Audit logs must be produced,
retained and regularly reviewed.
a) Audit logging
b) Review of monitoring activities
c) Audit log retention
d) Response to alarms
a) Audit logging
Information Owners must ensure that audit logs are used to record user and system activities,
exceptions, and information security and operational events including information about activity
on networks, applications and systems. Information Owners and Information Custodians will
determine the degree of detail to be logged based on the value and sensitivity of information assets,
the criticality of the system and the resources required to review and analyze the audit logs. Audit
logs must include, when relevant, the following information:
User identifier;
Dates, times and details of key events (e.g., logon and logoff);
Logon method, location, terminal identity (if possible), network address;
Records of successful and unsuccessful system logon attempts;
Records of successful and unsuccessful data access (including record and field access where
applicable) and other resource access attempts;
Changes to system configuration;
Use of privileges;
Use of system utilities and applications;
Files accessed and type of access (e.g., view, read, modify, delete);
For voice calls: source and destination telephone numbers, date, time, and length of call;
Name and size of file attachments that are part of or are included in data transmissions (e.g.,
email, instant messaging, unified communications platforms, etc.);
Network addresses (source and destination), ports (source and destination), protocols, and
transferred network data traffic flow (packets and bytes);
Alarms raised by the access control system;
Activation and de-activation of protection systems (e.g., anti-virus, intrusion detection).
Audit logs may contain confidential data and access must be restricted to employees with need-to-
know privileged access and be protected accordingly. Information Owners must not have the ability
to modify, erase or de-activate logs of their own activities. If audit logs are not activated, this
decision must be documented and include the name and position of the approver, date and a
rationale for de-activating the log. Where required, the Privacy Impact Assessment and Security
Threat and Risk Assessment must be updated to reflect this decision.
Monitoring must be tested at least annually to ensure that desired events are detected. Analysis of
monitoring activities can indicate:
The efficacy of user awareness and training and indicate new training requirements;
Vulnerabilities that could be, or that are being, exploited; or
Increases or decreases in unauthorized access attempts or unauthorized use of privileges.
Retained according to the approved records retention schedule for the system or information
asset; and,
Retained indefinitely if an investigation has commenced which may require evidence be
obtained from the audit logs.
d) Response to alarms
Information Owners must establish and document alarm response procedures in collaboration with
Information Owners to ensure alarms are responded to immediately and consistently. They should
have documented authority to shut down all or part of a system or network when the alarm indicates
new unacceptable threats are present. When exercising this authority, Information Owners must
report the circumstances to the CISO as soon as possible .Normally, the response to an alarm will
include:
The purpose is to preserve the integrity of information system logging facilities and log
information. Logging facilities and log information are protected against tampering and
unauthorized access.Information system logging facilities and log information must be protected
against tampering and unauthorized access.
a) Protecting information system logging facilities
b) Protecting log information
a) Activities logged
Privileged users typically have extensive system permissions not granted to most users.
Information Owners must ensure that the activities of privileged users are regularly reviewed,
including logging:
Privileged users must not have permission to erase logs or de-activate logging of their own
activities.
b) Independent review
Information Owner must have a documented process to ensure that activity of privileged users is
independently reviewed. Reviews must be conducted regularly and at random with the frequency
being commensurate with the criticality, value and sensitivity of system and information assets.
Following verification of logs, the individual checking them should digitally sign them and store
or archive them securely in accordance with the approved records retention schedule. The audit
logs must be reviewed prior to being discarded or overwritten.
the purpose is to ensure the integrity of information system logs. The correct setting of critical
computer clocks is important and carried out to ensure the accuracy of audit logs, which may be
required for investigation or as evidence in legal or disciplinary cases. One Server is identified as
Time Master Server & other Servers of the network are synchronized with the Master. Computer
clocks must be synchronized for accurate reporting.
a) Synchronization
b) Checking and Verification
a) Synchronization
System administrators must synchronize information system clocks to:
Time discrepancies must be reported to IT Helpdesk, Customer Service Centre. The clock hosts
must be synchronized with a national time service
1. Pre-Implementation
Before an updated or new information system is implemented into the operational
environment, checks must be performed to ensure that:
o A Security Threat and Risk Assessment has been carried out;
o A Privacy Impact Assessment has been performed and approved;
o Limitations of security controls are documented;
o Performance and capacity requirements can be met and support organizations have
the capacity to maintain the information system;
o Development problems have been resolved successfully;
o The effects on existing operational information systems are known;
o Arrangements for fall-back have been established if the updated or new information
system fails to function as intended;
o Error recovery and restart procedures are established;
o Business continuity plans are developed or updated;
o Operating procedures are tested;
o Changes are communicated to users who may be affected by the change;
o Users are educated to use the information system correctly and securely; and,
o Computer operators and system administrators are trained in how to run the
information system correctly and securely.
2. Implementation
The installation process must include:
o Validating the load or conversion of data files;
o Installing executable code only, and not source code;
o Providing ongoing technical support;
o Implementing new or revised procedures and documentation;
o Discontinuing old software, procedures and documentation;
o Arranging for fallback in the event of failure;
o Informing the individuals involved of their roles and responsibilities;
o Transferring responsibility for the information system from development teams to
operational teams to ensure segregation of duties; and,
o Recording installation activity.
3. Post-implementation
Post-implementation reviews must include:
o The efficiency, effectiveness and cost of security controls;
o Lessons learned and scope for improvements of security controls; and,
o Security incidents and mitigation.
Information Owners must ensure that documented procedures for the secure use and storage of
systems documentation are established and followed. Procedures must:
The purpose is to mitigate damage to the operations resulting from exploitation of published
vulnerabilities. XXX. is using VA/PT to obtain information on new exposures while applying
patches for earlier identified threats and vulnerabilities. The VA/PT shall be carried out as per
Security Committee Review Procedure. Appropriate actions will be initiated based on threat
assessment diagnosed from VA/PT. Assessments for known exposures must be conducted to
evaluate information system vulnerabilities and the management of associated risks.
Vulnerabilities which impact information systems must be addressed in a timely manner to mitigate
or minimize the impact on the operations. Information Owners must establish processes to identify,
assess and respond to vulnerabilities that may impact information systems by:
Monitoring external sources of information on published vulnerabilities;
Assessing the risk of published vulnerabilities;
Testing and evaluating options to mitigate or minimize the impact of vulnerabilities;
Applying corrective measures to address the vulnerabilities;
Completing a Security Threat and Risk Assessment to verify the risk has been mitigated;
and,
Reporting to the Chief Information Security Officer on progress in responding to
vulnerabilities.
Responsibilities for vulnerability response by service providers must be included in external
party service agreements.
The purpose is to limit the installation of software to authorized employees to avoid security
incidents. Users should not run any unauthorized or undocumented software on their desktops. IT
department will approve on the recommendation of Department Heads, the installation of any
software on Desktop/Laptop/Servers. Review of the rules governing the installation of software by
employees must be established and implemented. Uncontrolled installation of software on
computing devices can lead to introducing vulnerabilities and then to information leakage, loss of
integrity or other information security incidents, or to violation of intellectual property rights.
Employees must receive authorization prior to installing software on the organization devices.
Software installation must be consistent with the requirements of the Appropriate Use Policy.
Control Objective: To maximize the effectiveness of and to minimize interference to/from the
information systems audit process.
The purpose is to prevent compliance checking activities from causing unplanned disruptions to
operational information systems.Audit activities involving checks on operational system shall be
carefully planned and agreed to minimize the risk of disruption to business processes. Audit
requirements and activities involving checks on operational systems must be planned and approved
to minimize disruption to business processes.Audit requirements and activities involving checks
on operational systems must be planned and approved to minimize disruption to business processes.
a) Management of information systems compliance checking
b)Protection of information system audit tools
a) Management of information systems compliance checking
Prior to commencing compliance checking activities such as audits, risk and controls reviews,
monitoring or security reviews of operational information systems, the Manager responsible for
the compliance checking activity, Information Owners must define, document and approve the
activities by:
Determining the scope, duration and level of detail of the compliance checking activity;
Limiting access rights to operational information systems for compliance checking
employees to “read only”;
Determining handling requirements for copies of files made by compliance checking
employees including:
o establishing a separate environment for the analysis of files,
o restricting access to those files,
o logging the accesses made to those files, and,
o erasing files at the conclusion of compliance checking activities unless needed to
support report findings;
Identifying special testing or processing which may impact the operational information
system (e.g., penetration tests, server vulnerability assessments) and by:
o notifying the Chief Information Security Officer prior to compliance checking
activities to prevent triggering false security alarms from the infrastructure, and,
o scheduling tests to minimize disruption;
Submitting the reports of penetration tests or vulnerability assessments to the Chief
Information Security Officer immediately upon receipt; and,
Requiring that employees conducting compliance checking activities maintain a
segregation of duty from the operational information systems being checked.
Guidance for compliance checking activities can be obtained from the Information Security
Branch, Office of Chief Information Officer.
The purpose is to ensure that network security controls and network security management practices
are implemented and documented to maintain network security. XXX. has a dedicated team of
employed professionals in network, who are responsible for the smooth and secure operation of the
network. Policies of network usage are defined. 9.1.1 Controls must be implemented to achieve
and maintain security within the network.
a) Control and management of networks
b) Configuration control
c) Secured path
d) Wireless Local Area Networking
e) Equipment management
f) Logging, monitoring and detection
g) Coordination and consistency of control implementation
Information in transit;
Stored information (e.g., cached content, temporary files);
Network infrastructure;
Network configuration information, including device configuration, access control
definitions, routing information, passwords and cryptographic keys;
Network management information;
Network pathways and routes;
Network resources such as bandwidth;
Network security boundaries and perimeters; and,
Information system interfaces to networks.
b) Configuration control
To maintain the integrity of networks, Information Owners must manage and control changes to
network device configuration information such as configuration data, access control definitions,
routing information and passwords. Network device configuration data must be protected from
unauthorized access, modification, misuse or loss by the use of controls such as:
Encryption;
Access controls and multi-factor authentication;
Monitoring of access;
Configuration change logs;
Configuration baselines protected by cryptographic checksums; and,
Regular backups.
Status accounting must be regularly performed to ensure that configuration baselines reflect actual
device configuration.
c) Secured path
Where required by information classification and a Security Threat and Risk Assessment,
information must only be transmitted using a secured path. Secured paths for information
transmission must use controls such as:
Data, message or session encryption, such as SSH, SSL or VPN tunnels; and,
Systems to detect tampering.
Where supported by the information classification or a Security Threat and Risk Assessment,
additional controls for wireless networks may include:
e) Equipment management
Information Owners must document responsibilities and procedures for operational management
of network infrastructure, including devices at network boundaries and in user areas.
Logs must be continuously monitored to enable detection and response to security events and
intrusions (e.g., automation of log monitoring and event alerting). Logs from available sources
(including, but not limited to, network traffic, network firewalls, Intrusion Prevention Systems,
routers, switches, content filtering, servers, applications, databases, application firewalls,
authentication services) must be continuously correlated to enable detection and response to
security events and intrusions, that otherwise would go undetected without such correlation and
alerting.
In order to support the monitoring and correlation of logs from available sources, in cases when
infrastructure or services are provided via a third-party, it must be ensured that security event logs
from the respective outsourced infrastructure or services can be forwarded real-time to
the centralized monitoring services to allow for the centralized monitoring, correlation and alerting
across the organization. Information Owner must ensure there is a clear segregation of duties for
employees involved in logging, monitoring or detection activities. Active automated surveillance
of networks must be implemented to detect and report on security events (e.g., network intrusion
detection systems). Sensors enabling on-demand capture of network traffic must be implemented
at network security boundaries and within networks housing sensitive information or information
systems as determined by a Security Threat and Risk Assessment.
The purpose is to specify what security features are required for delivery of a network service.
Security attributes for network services like Leased Line / Wireless Radio modem is taken care
through SLA (Service Level Agreement) with ISP (Internet Service Provider) viz., STPI. Security
configuration, service levels and management requirements of all network services must be
documented and included in any network service agreement. Formal network service agreements
must be established between network service providers and consumers of network services to
specify service levels, services offered, security requirements and security features of network
services. The network service agreement must include specification of:
The rules of use to be followed by consumers to maintain the security of network services;
The schedule for ongoing verification of network security controls;
The rights of either party to monitor, audit or investigate as needed;
Security incident response responsibilities, contacts and procedures; and,
The requirement to meet or exceed Information Security Policy and standards.
Information Owners must confirm that the specified security features are implemented prior to
commencement of service delivery.
The purpose is to isolate information systems, users and networks based on risk and business
connectivity requirements. Groups of information services, users and information systems must be
segregated on networks.
a) Segregation based on risk and requirements.
Network zones must be defined and network perimeters established, according to business
requirements and risk as identified in the Security Threat and Risk Assessment and Privacy Impact
Assessment (e.g., network zones, core network, wireless network). Information system operational
management and business applications must be defined and separated by network flow control
points.
Guidelines:
Security gateways should be used to verify the trustworthiness of devices attempting to connect to
the network (e.g., VPN Quarantine systems, network switch isolation and admission control
systems).
Control Objective: To maintain the security of information and software exchanged within an
organization and with any external entity.
A.13.2.1 – Information transfer policies and procedures
The purpose is to protect information from unauthorized disclosure. The Electronic Office Systems
like Telephone, Fax etc. are maintained by a 3rd Party. Security of Information available through
such system is ensured through suitable clauses in the contract. Users shall be made aware about
the risk of Information Security while exchanging information through Voice, Fax, and Video
Communication facility. The Information exchange policies, procedures and controls must be
documented and implemented to protect the exchange of information through all types of electronic
communication services. The Chief Information Security Officer must document and implement
procedures to protect information from interception, copying, misrouting and disposal when being
transmitted electronically. Transmission methods include but are not limited to:
The purpose to protect information or software from loss or unauthorized disclosure. Agreements
shall be established for the exchange of information and software between XXX and external
parties like Oracle, MS, and IBM etc. Information and software exchange agreements
between XXX and other organizations must address the secure transfer of information between
parties.
a) Exchange agreements
b) Information and software exchange requirements
a) Exchange agreements
Information Owners must ensure the terms and conditions for secure exchange of information
assets with external parties is documented in an agreement. The agreement must define: