ITS Security Policy - Part2
ITS Security Policy - Part2
Non-compliance with or violation of this policy could result in a penalty and/or disciplinary
action that may include, but not limited to, the following:
• Warning/Caution;
• Suspension;
• Contractual Penalties;
• Termination;
• Legal proceedings.
Action taken against a policy violation would depend upon the context and gravity of violation
and would be taken in accordance with legal, contracts and human resource department.
The context and gravity of violations as well as the sanctions coupled to them can be found
it the ITS HR Policy and ITS disciplinary process.
Definitions
Using the TOGAF TRM ensures that all Information and Communication Technology (ICT)
components are considered and addressed by the ADA IT Security Policy.
2 http://www.opengroup.org/public/arch/p3/trm/trm_dtail.htm#Fig3_3
Network security is greatly dependent on the working relationships among all seven
segments, and a multi-layered approach should be taken to ensure all seven segments
working together in integrated manner. The ITS ISP shall be reviewed annually or as and
when there are any changes to the ADA and ITS security posture.
The audience for the policy will be ADA, non ADA staff & ITS Stakeholders
The policy focuses upon the data in all its states (in motion, in use and at rest), and services
that ADA exchanges and provides to the community and its partners. Each policy mentioned
hereunder provides both strategic reasoning and tactical implementation requirements and
standards. Use cases within each of the policy areas will help users relate the Policy to their
own circumstances. To ensure traceability to standards, guides, processes and procedures,
each policy statement (PS) is indicated with an indication of the policy area (as an example,
Audience Policy Area 1: Information Security Policy is indicated as ISP PS.
The governing documents for Information Security Management are defined below. The
foundation for this best practice is ISO/IEC 27001:2013 and ISO/IEC 27002:2013 which have
been condensed to a manageable and applicable level (25-30 pages as opposed to the 108
pages of ISO/IEC 27002:2013). 3
Policy Statement
The policy statements for Policy Area 1 – Information Security Policy is described as
Information Security Policy Statement (ISP PS)The following three principles are the core
requirements for information security:
3 Important Note: It is based on ISO/IEC 27001:2013 and ISO/IEC 27002:2013 and has been condensed to a
manageable and applicable level (25-30 pages as opposed to the 108 pages of ISO/IEC 27002:2013).
CONFIDENTIALITY:
The principle that information is not made available or disclosed to unauthorized individuals,
entities, or processes.
INTEGRITY:
AVAILABILITY:
The principle of being accessible and usable upon demand by an authorized entity.
General
ISP PS 19: Compliance shall be proved through the ITS ICT audit process.
Security Goals:
ADA is committed to safeguard the confidentiality, integrity and availability of all physical and
electronic information assets of the institution to ensure that regulatory, operational and
contractual requirements are fulfilled. The overall goals for information and Physical security
at ADA are the following:
ISP PS 20: Ensure compliance with current laws, regulations and guidelines of KSA
specified in Section 1.1.
ISP PS 21: Comply with requirements for confidentiality, integrity and availability for
ADA's Employees, non-employees and ITS Stakeholders physical and
electronic information assets.
ISP PS 22: Establish technical and administrative controls for protecting ADA's
information and information systems against theft, abuse and other forms
of harm and loss.
ISP PS 23: Motivate administrators and employees to maintain the responsibility for,
ownership of and knowledge about information security, in order to
minimize the risk of security incidents. For additional information on
motivation, rewards and incentives please consult the ADA HR Policy.
ISP PS 24: Ensure that ADA is capable of continuing their services even if major
security incidents occur.
ISP PS 25: Ensure the protection of personal data (privacy).
ISP PS 26: Ensure the availability and reliability of the network infrastructure and the
services supplied and operated by ADA and ITS Stakeholders.
ISP PS 27: Comply with methods from international standards for information security
management, e.g. ISO/IEC 27001:2013.
ISP PS 28: Ensure that external service providers comply with ADA's information
security needs and requirements.
ISP PS 29: Ensure flexibility and an acceptable level of security for accessing
information systems.
• Workforce security
• Facility access controls of IT & ITS Resources
• Equipment security
• Least privilege
• Visitor control
• Secure disposal or reuse of equipment
References
PES PS 7. Identity of the visitors shall be verified at the reception using their national
ID card, driving license or passport. before issuing them visitors badge.
Where none of these documents are available, the identity of the visitor
shall be verified by the person being visited.
PES PS 8. Entry shall be provided to visitors only after notifying the particular
employee being visited and verifying the purpose of visit with him/her.
PES PS 9. Strong physical access control mechanisms (e.g. magnetic stripe cards,
padlocks, pins etc.) shall be used for areas containing critical information
and information processing systems, or/and high value equipment.
PES PS 10. Physical access to areas containing critical information and information
processing systems shall be controlled and allowed to authorized
personnel only. .
PES PS 11. When the physical access of an employee or non-employee is permanently
or temporarily terminated due to employment contract termination, all
identity authentication means of the user (magnetic stripe cards, pin
numbers, etc.) shall be de-activated and the relevant access rights
revoked.
PES PS 12. Physical access rights of all employees and non-employees to critical
information processing facilities such as data centers shall be checked and
updated on a periodic basis by the information security officer.
PES PS 13. A formal, documented physical and environmental protection policy that
addresses purpose, scope, roles, responsibilities, management
commitment, coordination among organizational entities, and
compliance; and formal, documented processes and procedures to
facilitate the implementation of the physical and environmental
protection policy and associated physical and environmental
protection controls. This policy need to be developed.
PES PS 14. Stakeholders should enforce physical access authorizations for all physical
access points (including designated entry/exit points) to the facility where
the information system resides (excluding those areas within the facility
officially designated as publicly accessible).
PES PS 15. Stakeholders should verify individual access authorizations before granting
access to the facility.
PES PS 16. Stakeholders should deploy entry controls to facilitate access to the facility
containing the information system such as physical access devices and/or
guards.
PES PS 17. Stakeholders should control access to areas officially designated as
publicly accessible in accordance with the organization’s assessment of
risk.
PES PS 18. Stakeholders should deploy controls such as secure keys, combinations,
and other physical access devices.
PES PS 19. Stakeholders should inventory physical access devices at least annually.
PES PS 20. Stakeholders should change combinations and keys at least annually and
when keys are lost, combinations are compromised, or individuals are
transferred or terminated.
Secure Offices
PES PS 21. Sites hosting critical information processing facilities shall be sited at
appropriate areas so that they are less prone to natural disasters. For
example areas where natural disasters such as floods and earthquakes
occur frequently must be avoided.
PES PS 22. Sites hosting critical information processing facilities shall be sited at
appropriate areas so that they are less prone to incidents such as theft, fire,
electrocution etc..
PES PS 23. Buildings hosting critical information processing systems such as
datacenters shall be unobtrusive in nature and shall not have external signs
or indications that would give minimum indication of their actual
purpose and use.
Identification badges
ITS Stakeholders shall position information system components within the facility to minimize
potential damage from physical and environmental hazards and to minimize the opportunity
for unauthorized access. No visitor shall be allowed to enter into ITS Facilities.
PES PS 31. All employees, non-employees, ITS Stakeholders and visitors shall wear
identification badges while they are in ADA premises. The identification
badge should be worn such that it is clearly visible to all.
PES PS 32. Employees, non-employees and ITS Stakeholders who have forgotten their
identification badge must obtain a temporary ID at the reception, by
providing a token of identification such as National ID Card, driving license
or passport and shall be considered as Guests / visitors.
PES PS 33. Whenever an employee, non-employee, ITS Stakeholders or visitor is
noticed without an identification badge, the person shall be questioned
about the purpose of his/her presence and shall be immediately
accompanied to the reception desk.
Asset Movement
PES PS 34. Security guards at the reception reserve the right to inspect all kinds of
belongings including personal items e.g. briefcases of employees, non-
employees, ITS Stakeholders or visitors before allowing them to enter or
leave the building.
PES PS 35. Security guards shall ensure that incoming packages doesn’t pose any
danger (e.g. explosives, flammables, chemicals or other dangerous
materials) to ADA premises. This could be done by scanning all incoming
packages with a X-Ray scanner.
PES PS 36. All incoming and outgoing assets shall be recorded in an asset movement
register by the security guards at the reception.
PES PS 37. Any IT or ITS assets (e.g. hardware, software, mobile computers etc.) shall
not be removed off premises for any reason (use, maintenance, repair etc.)
unless otherwise authorized by the Infrastructure Manager.
PES PS 38. ITS Stakeholder authorizes, monitors, and controls all information system
components entering and exiting the facility and maintains records of those
items.
Equipment Protection
PES PS 39. Areas where critical equipment are located shall have the appropriate
environmental conditions in place (temperature, humidity, electromagnetic
exposure etc.), according to the manufacturer recommendations. Every
Stakeholder maintains temperature and humidity levels within the facility
where the information system resides at consistent with American
Society of Heating, Refrigerating and Air-conditioning Engineers
(ASHRAE) document entitled Thermal Guidelines for Data
Processing Environments; and Monitors temperature and humidity
levels continuously.
PES PS 40. All equipment shall undergo periodic maintenance to ensure operational
conditions and prevent damage from dust and airborne particles are
minimized
PES PS 41. Building hosting critical Information processing facilities shall be located in
places where the risk of water damage is limited due to water leakage,
sewerage problems, rain, flood etc.
PES PS 42. No water sprinkler system shall be used at locations where ITS, IT Systems
and Electrical systems are installed. FM200 or equivalent shall be used
instead.
PES PS 43. Critical information facilities shall be protected against voltage
fluctuations or any other problems related to power supply through
PES PS 51. The areas containing or leading to critical information processing facilities
should be continuously monitored by physical security guards and via
Policy Area 3 – Access Control is described as AC PS. This policy provides the planning and
implementation of mechanisms to restrict reading, writing, processing and transmission of all
ADA information in addition to the modification of information systems, applications, services
and communication configurations.
Logical and physical access controls are required to ensure the integrity of the information
and physical assets.
The following mandatory requirements for controlling logical access should be implemented
by all stakeholder hosting agencies:
• Document and adhere to procedures for granting, modifying and revoking access
• Install detection mechanisms for unauthorized access attempts
• Timeout a session after 30 minutes of inactivity unless specifically required by ITS
• Component, if there are any exceptions ITS Consultants & ADA shall approve that.
• Revoke access after an inactivity period of 60 days.
References:
Account Management
AC PS 7. The account creation process should pass to ADA the check list with the
users’ responsibilities and the privilege check list , the privilege access to
shares, and also their management accounts. ADA, after which, shall
consider creation of any user accounts or a permission to do so.
AC PS 8. For ITS Components, ADA shall establish a central “Active Directory”
service for all stakeholders which shall be established at both TCC & DRC.
The Active Directory shall grant each Systems Administrator a privilege to
administer its own domain entity. For guidance on Active Directory, see
ADA Active Directory Design document.
Access Enforcement
Least Privilege
AC PS 12. ADA shall be approving individual access privileges and shall be enforcing
physical and logical access restrictions associated with changes to the
information system; and generate, retain, and review records reflecting all
such changes.
AC PS 13. The local agencies shall enforce the most restrictive set of rights, privileges
or access needed by users for the performance of specified tasks.
AC PS 14. The Stakeholder shall implement least privilege based on specific duties,
operations, or information systems as necessary to mitigate risk to ADA.
This limits access to ADA to only authorized personnel with the need and
the right to know.
AC PS 15. Logs of access privilege changes shall be maintained for a minimum of one
year or at least equal to the ADA’s record retention policy.
AC PS 16. The Access control mechanisms that enable access to ADA shall be
restricted by objects like data set, volumes, files, records including the
ability to read, write, or delete the objects.
AC PS 17. These Access controls shall be in place and operational for all IT systems
to prevent multiple concurrent active sessions for one user identification,
for those accessing applications. ADA shall document the parameters of
the operational business needs for multiple concurrent active sessions.
AC PS 18. The mechanism shall ensure that only authorized personnel can add,
change, or remove component devices, dial- up connections, and remove
or alter programs.
• Logical location
• Network and MAC addresses
• Time-of-day and day-of-week or month restrictions
• Physical location
• Job assignment or function of the user seeking access
AC PS 20. The Stakeholders shall use the following mechanisms when setting up
access controls: for ITS Contractors, these Access Control Mechanisms
shall be discussed and agreed during detailed design
AC PS 21. Encryption: Encrypted information can only be decrypted, and therefore
read, by those possessing the appropriate cryptographic key. While
encryption can provide strong access control, it is accompanied by the
need for strong key management.
AC PS 22. Resource Restrictions: Access to specific functions will be restricted by
never allowing users to request information, functions, or other resources
for which they do not have access. Three major types of resource
restrictions are: menus, database views, and network devices.
AC PS 23. Application Level: In addition to controlling access at the information
system level, access enforcement mechanisms are employed at the
AC PS 26. The system shall enforce a limit of no more than 5 consecutive invalid
access attempts by a user attempting to access ADA or systems with
access to ADA.
AC PS 27. The system shall automatically lock the account for 30 minutes unless
released by an administrator or if there is any special requirement of ITS
System Operator.
AC PS 28. Unsuccessful Login Attempts shall be carefully logged.
AC PS 29. The information system shall display an approved system use notification
message, before granting access, informing potential users of various
usages and monitoring rules.
AC PS 30. The system use notification message shall, at a minimum, provide the
following information:
AC PS 31. The systems shall use notification message which shall provide appropriate
privacy and security notices and remain on the screen until the user
acknowledges the notification and takes explicit actions to log on to the
information system.
AC PS 32. Privacy and security policies shall be consistent with applicable laws,
executive orders, directives, policies, regulations, standards, and
guidance.
AC PS 33. System-use notification messages can be implemented in the form of
warning banners, displayed when individuals log in to the information
system.
Session Lock
AC PS 34. The information system shall prevent further access to the system by
initiating a session lock after a maximum of 30 minutes of inactivity, and
the session lock remains in effect until the user re-establishes access using
appropriate identification and authentication procedures.
AC PS 35. There could be an exception to the session lock requirement for ITS
Components in OCC.
AC PS 36. Users shall directly initiate session lock mechanisms to prevent inadvertent
viewing when a device is unattended. A session lock is not a substitute for
logging out of the information system. Note: an example of a session lock
is a screen saver with password.
Remote Access
AC PS 37. ADA shall authorize, monitor, and control all methods of remote access to
the information system. Remote access is any temporary access to an ITS
The following should be considered, however any procedure before implementation shall be
approved by ADA:
AC PS 44. ADA must consider the existing physical security of the remote computing
site, taking into account the physical security of the building and the local
environment, e.g. 2FA.
AC PS 45. ADA must consider the communications security requirements, taking into
account the need for remote access to the organization's internal systems,
the sensitivity of the information that will be accessed and passed over the
communication link and the sensitivity of the internal system.
AC PS 46. ADA must consider the threat of unauthorized access to information or
resources from other parties using the accommodation.
The controls and arrangements to be considered for access to the TCC include:
AC PS 47. ADA shall provide space and storage space for stakeholders’ equipment
used for remote computing
AC PS 48. ADA shall define the work permitted, the hours of work, the classification
of information that may be held and the internal systems and services that
the user is authorized to access
AC PS 49. Provision of suitable communication equipment, including methods for
securing remote access by all stakeholders for access to the TCC
AC PS 50. Physical security controls shall be considered
AC PS 51. Provisioning of hardware and software support and maintenance shall be
considered.
AC PS 52. Processes and procedures for back-up and business continuity shall be
considered
AC PS 53. Audit and security monitoring as per approved SDS of ITS Stakeholders
shall be considered.
The following steps are recommended for ITS Stakeholders remote access process: