2019 07 07 13 26 25 Information Security - Policy - Draft
2019 07 07 13 26 25 Information Security - Policy - Draft
For
July, 2019
Document Control
Document Superseded NA
Document Approvers
4.1. Definition 5
4.2. Forms of data and information 5
4.3. Asset Classification 5
4.4. Information Owner 7
4.5. Information Custodian 7
5. Leadership 8
6. Planning 11
9. Human Resources 18
9.1 Prior to Employment 18
9.1.1 Screening 18
9.1.2 Terms and conditions of employment 18
9.2 During Employment 19
9.2.1 Management Responsibilities 19
9.2.2 Information Security awareness, education & training 19
9.2.3 Disciplinary process 19
9.3 Termination and change of employment 19
9.3.1 Termination or change of employment responsibilities 19
ii
11.4. System and Application Access Control 27
11.4.1. Information Access Restriction 27
11.4.2. Secure Log-on Procedure 27
11.4.3. Password Management System 27
11.4.4. Use of Privileged Utility Program 29
11.4.5. Access Control to Program Source Code 29
11.4.6. Secure Coding Practice 29
11.4.7 Database access policy 30
12. Cryptography 31
14.3. Backup 38
14.3.1. Information Backup 38
iv
16.2.5. Secure system engineering principles 47
16.2.6. Secure development environment 48
16.2.7. Outsourced development 48
16.2.8. System security testing 48
16.2.9. System acceptance testing 48
19.2. Redundancies 54
19.2.1. Availability of information processing facilities 54
v
20.2. Information Security Reviews 56
20.2.1. Independent Review of Information Security 56
20.2.2. Compliance with security policies and standards 56
20.2.3. Technical compliance review 56
vi
Abbreviations
DC Data Center
DG Director General
IP Internet Protocol
IS Information Security
vii
NTP Network Time Protocol
PC Personal Computer
PE Procuring Entity
viii
Definition
ix
(11) Eavesdropping: An unauthorized access toinformation through a
network attack by capturing packets while communication/transmission of
data or information.
(22) Risk assessment: Overall process of risk analysis and risk evaluation.
xi
1. Introduction
Information and Communication Technology (ICT) is of paramount importance in e-GP
(Electronic Government Procurement) system that transforms manual procurement process into an
electronic procurement process. This involves not only the applications to ensure business control,
but also comprises necessary software, hardware, database management system, data center,
human interactions, and many other IT equipment. Management and control of such assets is
essentially important to provide the best possible services to e-GP users and thus make the
organization sustainable.
Security of e-GP system managed bythe Central Procurement Technical Unit (CPTU)is highly
important as the Government has declared e-GP as one of the critical government infrastructures.
Confidentiality, Integrity and Availability of the system shall be maintained at all times through
controls that are commensurate with the criticality of e-GP, so as to protect the system from all
types of threats - internal or external, deliberate or accidental. It shall also be ensured that all legal,
regulatory, statutory and contractual obligations are met.
The policy outlines the Information Security domains that are designed to meet e-GP system’s
Information Security objectives and mitigate business risks. Thepolicy provides management
direction and support to implement information security as per ISO 27001:2013 standard.
Moreover the policies defined in this document are also in line with GoBISM (Government of
Bangladesh Information Security Manual) and Information Security Policy Guideline
(Government gazette, 6th April 2014 by ICT Division).
1
2. Objective
The Information Security Policy defines necessary control requirements to ensure management
and control of e-GP systemprotecting against damage, destruction, unauthorized disclosure or
changes, whether it is accidental or deliberate. The policy complies with relevant laws and
regulations of Bangladesh.
To establish controls for protecting data and information resources from theft, abuse,
misuse or any form of damage;
To ensure that e-GP continues its operational activities in the event of significant data and
Information Security Incidents.
2
3. Applicability and Scope
The security policies and standards contained in this document have been established to cover
business processes, information and data, software, hardware and networks used by the e-GP
system and its users/ stakeholders.
This security policy of the e-GP shall apply to any person (management, employees,
administrators, contractors, O&M firms and third-parties including general visitors to the e-GP
system) who access information using e-GP system or any other system related to e-GPin
particular, the security policy applies to the following information assetsbelongs to e-GP:
All client’s (i.e. Procuring Entities, Bidders etc.) data and information;
All software assets such as application software, system software, development tools and
utilities acquired and maintained;
All physical assets, such as computer equipment, communications equipment, media and
equipment;
All utilities/ services, such as power, lighting, HVAC associated with e-GP.
3
Furthermore, the policy is applicable to
All staff (permanent & on contractual basis) and non-employees (contractors, consultants,
suppliers, O&M firms and their employees, vendors etc.) of CPTU and other individuals,
entities or organizations that have access to e-GP systems;
All locations where users have access to various ICT Assets and ICT Services including
locations that have secure areas providing critical ICT Assets and ICT Services;
All ICT Assets and ICT Services involving data, applications, network, security devices,
servers and other ICT system that needs to be appropriately protected from physical and
environmental threats;
All Service Providers who render their ICT services to e-GP and have access to e-GP
facilities (i.e. DC, DR, Other sites).
4
4. Data and Information Asset
4.1. Definition
CPTU considers data and information as the important asset which isoperationally,
administratively, commercially and personally significant and have value to CPTU and other
stakeholders. CPTU has fundamental ‘duty of care’ and legal obligation to protect e-GPdata and
information asset from unauthorized or accidental modification, loss, damages or release.
c) The system (software, hardware and networks) on which the information is stored,
processed or communicated;
e) Physical items from which information regarding design, components or use could
be derived; and
Information stored in e-GP system may have different form of presence; it can have different
states as well. Such as:
a) Archived Information;
Different security mechanism shall be applied considering the importance of the information
and classifying information as required.
e-GP assets shall be classified in terms of its characteristics, value, legal requirements,
sensitivity and criticality. Following three (3)levels of information classification shall be
defined and applied for the classification of the e-GP assets:
1) Confidential- This classification shall apply to sensitive assets that are intended
for use within CPTU/Authorized users. Its unauthorised disclosure could
adversely impact on reputation and operations of e-GP system and the users and
possesses high risks. For example Password, Bid price, encrypted data etc.
2) Restricted- This classification shall apply to sensitive assets that are intended
for use within CPTU/Authorized users. Its unauthorised disclosure/misuse
could cause serious impact on e-GP system and its users and possesses medium
risks. For example access to data centre equipment, bidders information, bid
evaluation etc.
All assets shall be handled according to the classification levels to ensure security of the
information resource.
6
Risk classification shall be done for all assets to enable CPTU to focus on asset protection
mechanisms on assets that are most susceptible to specific risks.
7
5. Leadership
5.1. Leadership and commitment
A committee i.e. “Information Security Steering Committee (ISSC)”shall be formulated to drive
the information security initiatives with a top-down approach and chaired by DG, CPTU.
a) Ensuring that information security objectives are identified, CPTU’s requirements are met
and are integrated in relevant processes;
8
6. Ensuring all appropriate information security controls are implemented for all new
information processing facilities installed;
7. Reviewing the effectiveness of the implementation of the information security policy;
8. Providing clear direction and visibility to the management with respect to security
initiatives;
9. Identifying the needs for internal or external specialist information security advice, and
review and coordinate results of the advice throughout the organization.
The ISSC shall meet at least once a quarter to assess the security requirements of e-GP. The
Minutes of Meeting (MOM), with the attendance details shall be documented. The MOM shall be
circulated to all the members of ISSC irrespective of attendance along with the measurable action
points.
5.2. Policy
5.2.1. Purpose
The purpose of this document is to define policies that need to be adopted in order to maintain the
confidentiality, integrity, and availability of e-GP and to ensure the secure delivery of services.
5.2.3. Implementation
The ISSC is accountable for the overall information security of e-GP. The information security
policy shall be approved by the Honorable Minister of Planning. The approved policy shall be
published and communicated to all stakeholders. The operations and management functions are
responsible for implementing information security and shall be responsible to implement the
relevant rules and to communicate it to the relevant staff.
9
5.2.5. Document convention
The following two keywords used within this document to indicate the level of requirements:
1. SHALL –Mandatory to follow. Failure to comply with the requirements may be construed
as non-compliance to the policy.
2. SHALL NOT –Non-use of this control is mandatory. Failure to comply with the
requirements may be construed as non-compliance to the policy.
10
6. Planning
6.1. Actions to address risks and opportunities
6.1.1. General
When planning for information security, CPTU shall consider the organisational security issues
and the requirements of various stakeholders. CPTU shall determine the risks and opportunities
that need to be addressed to:
1. Ensure that information security initiatives can achieve their intended outcome;
2. Prevent or reduce undesired effects; and
3. Achieve continual improvement.
a) The information risk assessment process shall assess the potential consequences that
would result if the risks identified were to materialize (i.e. impact).
b) The realistic likelihood of the occurrence of these risks shall be assessed;
c) The level of risk shall be determined.
Moreover, regular vulnerability analysis and risk assessment shall be conducted by CPTU’s
internal team and submit the report to ISSC.
13
7. Implementation of Information Security Policy
Policy Statement
Security of information assets of e-GP is of paramount importance. Confidentiality, Integrity and
Availability of these assets shall be maintained at all times through controls that are commensurate
to the criticality of the asset, so as to protect the assets from all types of threats, whether internal or
external, deliberate or accidental.
Control Objectives
CPTU shall strive to safeguard Confidentiality, Integrity, and Availability of the information
systems and resources in e-GP’s facilities by:
2. Taking corrective and preventive actions for security incidents/breaches with respect to
Information Security Policy;
14
8. Information Security Organization
Policy Statement
The Information Security Steering Committee (ISSC) defines the authority and responsibilities to
manage information security for e-GP. The Committee will ensure structured co-ordination of
information security related activities within CPTU.
Control Objective
The Committee establishes a management framework to ensure that information security is given
oversight, managed, understood, communicated and implemented at the right level across CPTU
to meet compliance and to set security rules.
Chairperson
The Chairperson of Information Security Committee shall have the following responsibilities:
2. Responsible for driving technology and service decisions to ensure compliance and
protection of data & ICT assetsrelated to e-GP;
Members
The members will have the following responsibilities:
2. Responsible for developing and maintaining the security policies, procedures and standards
for e-GP;
3. Ensure that all critical operations are carried out in accordance with the security
requirements;
15
6. Perform regular audits and provides regular reports;
7. Analyse the security incidents and document corrective and preventive action and
escalation.
1. CPTU shall maintain contact with authorities including but not limited to BCC
(Bangladesh Computer Council), law enforcement authorities, fire department, BSTI
(Bangladesh Standards and Testing Institution) and other emergency services;
2. The contact details of these agencies shall be maintained and displayed at prominent places
in the CPTU office location.
16
8.1.4 Contact with Special Interest Groups
1. CPTU shall maintain contact with special interest groups and authorized information
security forums for receiving and distributing updates on new vulnerabilities, security
threats, regulations and/ or risks pertaining to the services and information systems used in
the CPTU.
1. Information security should be addressed in all the new development initiatives of e-GP,
regardless of the type of the development (i.e. software, datacenter enhancement etc.);
2. All the initiatives shall comply with the requirements of the Information Security Policy;
3. Project Risk Assessment and risk mitigation plan must be done at the initiation stage of the
project.
2. Physical protection, encryption for information in storage and transfer, back-up of data
and virus protection of devices shall be ensured;
3. Incase of loss and theft of devices containing sensitive information, the user shall inform
CPTU administration in the form of written document (email or SMS or Letter) within 24
hours;
4. Training sessions shall be conducted for the employeesto increase awareness on the risks.
8.1.6.2 Telecommuting
Controls shall be established and implemented to maintain the Confidentiality, Integrity and
Availability of the CPTU Information for teleworking requirements:
1. There shall be a secure communication channel between the teleworkers and the CPTU
network (i.e. VPN with authorized device/IP, TeamViewer, WebEx, etc.);
2. Teleworkers shall get written approval from DG, CPTU or the delegated officer to use the
network.
17
9. Human Resources
Policy Statement
Information security controls shall be designed and integrated in the Human Resources (HR)
processes to ensure that employees understand their responsibilities in maintaining confidentiality,
integrity and availability of information assets.
Control Objective
These controls define the information security requirements that need to be incorporated in the
recruitment processes, employment and transfer/ exit of employees to reduce the risk of theft, fraud
and misuse of CPTU’s assets and facilities.
2. All vendors, consultants and sub-consultants, O&M firms, third-party vendors and service
providers appointed by CPTU shall sign a confidentiality (non-disclosure) agreement.
9.1.1 Screening
CPTU shall ensure that the Terms and Conditions of employment reflect the information security
requirements and include the following:
18
9.2 During Employment
All employees, O&M firms, third-party vendors and service providers shall implement and
comply with the information security policy in accordance with established guideline and
procedures of the Bangladesh Government.
1. Employees of CPTU, O&M firms and third-party vendors shall receive regular updates on
organizational security policies and procedures;
2. Recurring information security awareness activities shall be performed to ensure that the
behavior of staff is in accordance with the policy and rules.Consultants, O&M firms,
Third-party vendors shall assure that their employees follow the policy accordingly;
4. CPTU shall arrange training for the employees of CPTU in home and abroad to keep them
updated on information security.
1. Disciplinary action on violating information security policy shall be as per the law/act of
the Government of Bangladesh;
1. CPTU employees, consultants, O&M firms, third-party vendors and service providers
shall be governed as per Government rules and regulations or the contract agreement;
2. A termination process shall include returns of all issued assets that are the property of
CPTU and sign-off from DG, CPTUor the delegated officer;
3. The employee user ID, credentials and access rights shall be revoked/ deactivated at the
end of the last working day.
19
10. Assets Management
Policy Statement
All e-GP assetsshall be classified and managed based on their confidentiality, sensitivity value and
availability requirements. The level of security to be accorded shall depend directly on the
classification level associated with each asset.
Control Objective
To establish controls for protecting information assets. Information Assets shall be identified,
inventoried, labelled, classified, accounted for and shall have comprehensive protection based on
the criticality of the asset.
a) Ensuring that assets under e-GP system are classified as per classification policy;
b) Ensuring that periodic validation of the asset inventory is in place.
CPTU shall identify and document all the information assets related to e-GP system in the Asset
Register. The information on the Asset Register shall contain, at a minimum, the following
information about each of the assets:
All assets (i.e. software, hardware, networks, storage, data etc.) under e-GP system are the property of
Bangladesh Government.
20
10.1.3 Acceptable use of Assets
Any usersusing the information assets or accessing the information processing facilities shall
follow the ‘acceptable use of assets’ as mentioned below:
1. Violationsoftherightsofanypersonorcompanyprotectedbycopyright,tradesecret,patentorotherinte
llectualproperty rights,orsimilarlawsor
regulations,including,butnotlimitedto,theinstallationordistributionof"pirated"orothersoftware
productsthatarenotappropriatelylicensedforuse byCPTU;
21
2. Exportingdata, application software,e-GP application source code (full or in part),
technicalinformation, technical documentation,encryptionsoftwareortechnology etc.on
external media;
3. Introductionofmaliciousprogramsintothenetworkorserver(e.g.,viruses, worms,Trojanhorses,e-
mailbombs,etc.);
4. Revealingtheaccountpasswordtoothersorallowinguseofindividual’s accountby
others.Thisincludesfamilyandotherhouseholdmemberswhenworkisbeing doneathome;
5. UsingCPTUcomputingassettoactivelyengageinprocuringortransmittingmaterialthatisinviolati
onofthelawof Bangladesh;
6. Attemptingsecuritybreachesordisruptionsofinternal (inside CPTU) or external (outside
CPTU) networkcommunication.Security
breachesinclude,butnotlimitedto,accessingdataofwhichtheuserisnotanintendedrecipientorlogg
ingintoaserveroraccountthatthe
userisnotexpresslyauthorizedtoaccess,unlessthesedutiesarewithin thescopeofregularduties.On
the other hand,"disruption"includes,
butisnotlimitedto,networksniffing,pingfloods,packetspoofing,denialofservice,andforgedrouti
nginformationformaliciouspurposes (i.e. any types of hacking activities);
7. Sendingunsolicitedemailmessages,includingthesendingof"junkmail"or
otheradvertisingmaterialtoindividualswhodidnotspecificallyrequestsuch material(emailspam);
and
8. Anyformofoffensive communication via email, telephone,whether through
language,frequency,orsizeofmessages.
Users must be cautious on using the CPTU assets by abiding the law of Bangladesh.
CPTU shall ensure that at the time of termination/change of employment/contract, change in the
responsibilities or transfer of employee, end of contract, all the assets belonging to CPTU are
returned by the employees/consultants/O&M firms/vendors.
22
10.2.1 Labeling of Information
The assets shall be labeled and secured based on the classification, from the time it is created until
the time it is destroyed or disposed. The labels shall be pasted on all media holding any
information (hard copies, CD-ROMs, etc.) and also on all other assets (Physical and Electronic).
Information assets handling procedures including the secure processing, storage, transmission, and
destruction shall be followed for each classification level. Retention period for all records shall be
complyingto the legal and/ or mission requirements.
2. All information assets, operations and services shall be subjected to change management
(14.1.2) controls.
Records shall be maintained for all removable media used in e-GP system.
2. The contents of any re-usable media shall be made unrecoverable before putting it to re-
use;
3. Records shall be maintained for the issuance and return of removable media;
4. If removable media are required to be taken out of office premises, user shall get
authorization from the CPTU;
5. Removable media containing critical data (i.e. database backup, configuration backup etc.)
shall be kept encrypted. Decryption key and recovery key shall be shared with CPTU;
6. Removable media containing critical data (i.e. database backup, configuration backup, etc.)
must have Media Identification Number (MIN) and record should be maintained for all the
media with MIN containing critical data;
23
7. User shall not transfer any PersonallyIdentifiable Information (PII) from removable media
to any personal device;
8. In the event of loss of removable media, the user shall inform CPTU immediately.
2. The technique used for disposal shall depend on the type of media and the classification of
information that is contained in the media;
4. The contents of any re-usable media that are to be removed shall be erased or destroyed
physically to prevent reuse;
5. The media containing sensitive information like tape cartridge, hard disk, CD, USB, etc.
should be physically damaged under the supervision of ISSC in such a way that data
cannot recovered at all applying any recovery techniques;
6. The media containing sensitive information like paper should cross-shredded or burned
during disposal under the supervision of ISSC.
1. In case of shipment or movement, the removable media must have media identification
number (MIN) - shall be recorded and protected in signed and sealed envelope and sent
through an approved courier service or hand delivered;
2. It shall be ensured that the third-parties involved in the transfer, signs an agreement
ensuring required security of information assets;
3. CPTU employees and third-party staff carrying media are required to ensure its protection
during transit via tamper proof envelop/box and encryption.
24
11. Access Control
Policy statement
Access control is applied to protect the e-GP information systems from unauthorized access,
modification, disclosure or destruction.Access shall be given need to access need to know basis as
per business requirement.
Control Objective
To define controls need to be implemented and maintained in order to protect e-GP information
systems against unauthorized access.
4. Separate System Administration Network shall be created to administer the system using
privilege password. System administration network must not be connected with the
internet to protect privilege accounts from the potential cyber threats;
25
11.2.2. User Access Provisioning
1. e-GP users (Procuring Entity, Tenderers etc.) shall follow the e-GP guideline or registration
process to register in the system;
2. Access to the users providing technical support to e-GP system shall be granted as per the
requirement and following the Access Control Matrix.
2. Privileges shall be allocated to individuals based on their roles and responsibilities after
approval from DG, CPTUor the delegated officer.
26
3. Sharing of Password is a violation of Information Security Policy and may subject to
termination from the job/contract or disciplinary action.
2. Access rights to e-GP system shall be reviewed at periodic intervals (twice a year) by
ISSC.
1. System or application identifiers shall not be displayed until the log-on process has been
successfully completed;
2. Display a general notice warning that the equipment should only be accessed by
authorized users;
3. Users shall log off/sign out from the system once the job is done.
General:
All user-level passwords used to access emails, web accounts, laptops, desktop computers
etc. shall be changed at least every 90 days;
27
Alluser-levelandsystem-levelpasswordsshallconformtotheguidelines describedbelow.
Guideline:
A. GeneralPasswordConstructionGuidelines
Users:
Shall notrevealanypasswordoverthephonetoANYONE;
Shall notrevealanypasswordinanemailmessage;
Shall notrevealhis/her passwordtothesuperiors/supervisors;
Shall nottalkaboutthe passwordinfrontofothers;
Shall nothintattheformatofapassword(e.g.,"myfavorite color");
Shall notrevealapasswordonquestionnairesorsecurityforms or in a letter;
Shall notshareapasswordwithfamilymembers;
Shall not revealapasswordtoco-workerswhileonvacation;
Shallnotusethe"RememberPassword"featureofapplications(e.g., Browser,MS Outlook
etc.);
28
Shallnotwritepasswordsdownandstorethemanywhereintheoffice;
ShallnotstorepasswordsinafileonANYcomputersystem(includingtabletsorsimilar
devices);
Ifanaccountorpasswordissuspectedtohavebeencompromised,reporttheincidenttoCPTUa
ndchangethe password.
Applications:
Shallsupportauthenticationofindividualusers,notgroups;
Shallnotstorepasswordsincleartextorinanyeasilyreversibleform;
Shallprovideauthenticationmanagement,suchthatoneusercannottake overthefunctions of
another.
1. The developers shall follow standard security guidelines, (i.e. but not limited to OWASP -
www.owasp.org, and secure coding guideline published by BCC) on developing the
application (i.e. web portal, mobile app etc.);
2. The developers shall address common web application vulnerabilities such as SQL
Injection, Cross Site Scripting (XSS), Broken authentication and Session management etc.
29
(considering the OWASP top ten vulnerabilities) and ensure that the application is free
from such vulnerabilities;
3. CPTU shall ensure that the vulnerability assessment is being done and corrective measures
have been taken based on the assessment before the final release of the application.
1. Access shall be restricted in production database based on the job nature and need basis;
2. Direct access to raw data in Database is strictly restricted with exception in case of
unavoidable minor corrections required in Database where authorized person of CPTU is
required to access directly in database is required prior approval from DG, CPTU or the
delegated officer and corrections to be made in presence of another staff from CPTU as double
checker. DG, CPTU will issue an office order for this authorization. Standard scripts shall be
developed to make such corrections. CPTU shall keep audit trail for each changes.
Subsequently CPTU shall take all necessary steps to avoid direct access to database. A
separate change request module shall be developed to make this changes through interfaces;
4. DBA (Database administrators) shall access to production database for maintenance purpose
only;
5. Person assigned for administration i.e. Database backup, health monitoring, cluster health,
High Availability group, performance tuning etc. shall not have read permission to production
data.
6. CPTU shall enforce a clear SOD for database maintenance and operation.
30
12. Cryptography
Policy Statement
CPTU shall provide adequate protection to its information and information systems with
cryptographic controls.
Control Objective
The objectives of Cryptographic policy are to establish and implement controls to maintain the
confidentiality, integrity and availability of information and ensure non-repudiation.
31
13. Physical and Environmental Security
Policy Statement
CPTU shall provide adequate protection to its information systems and facilities against
unauthorized physical access and environmental threats. Controls shall be implemented to
maintain the physical and environment security of all assets of e-GP system.
Control Objective
The Physical and Environmental Security policydefines security controls requiredto protect
information assets and information processing facilities of e-GP system from unauthorized access
and physical and environmental threats.
32
13.1.3. Visitor Management
1. Reception areas shall be manned by a receptionist(s) and/ or security guard(s) during the
office hours to track and control visitor movement;
2. Visitor shall be accompanied by authorized CPTU personnel during his/her visit in the
data center or information processing facilities;
3. Entry and exit along with date, time and the purpose of visit of visitors shall be recorded
and maintained at the entry points.
33
13.2.3. Cabling Security
Channels shall be used to protect power and network cables from unauthorized interception or
damage.
2. Users shall log-off from applications or network services when no longer needed;
3. Users shall secure computers or mobile devices from unauthorized use by a key lock or an
equivalent control, e.g. password access, when not in use;
4. All the desktops and laptops connected with the CPTU network and e-GP system should
prompt for password to get access to system if the desktops/laptops remain inactive for the
period of 5 (five) minutes.
34
13.2.9. Clear desk and clear screen policy
Users shall followclear desk and clear screen policy for e-GP facilities to reduce risks of
unauthorized access and loss of and damage to information:
1. Users shall lock away (ideally in a safe or cabinet or other forms of security furniture)
sensitive or critical information, e.g. on paper or on electronic storage media, when not
required, especially when the office is vacated;
2. Computers and terminals shall be left logged off or protected with a screen and keyboard
locking mechanism controlled by a password when unattended and should be protected by
key locks or passwords when not in use;
3. Unauthorized use of photocopiers and other reproduction technology (e.g. scanners, digital
cameras) shall be prohibited;
4. Media containing sensitive or classified information should be removed from printers
immediately.
35
14. Operations Security
Policy Statement
CPTU shall ensure effective and secure operation of its information systems and computing
devices. Controls shall be implemented to protect the information contained in and processed by
these information systems and computing devices.
Control Objective
To ensure timely and controlled resolution of IT incidents and prevent unauthorized access,
misuse or failure of the information systems and processing facilities of e-GP system.
CPTU shall:
36
9. Any changes in the system should be deployed by system administration team as per the
documentation provided by the software development team and Original Equipment Manufacturer
(OEM) like Microsoft, Red Hat, Cisco, HP, Dell, IBM, Huawei etc.
After changes are made, a report containing all relevant information should be updated,
maintained and retained until the nextsystem and security audit is conducted.
1. CPTU shall conduct schedule system tuning and monitoring to ensure and, where necessary,
improve the availability and efficiency of systems;
1. CPTU shall ensure separation of duties in all technical and operational procedure;
2. CPTU must ensure Segregation of Duties (SOD) in Operating System administration,
application (e-GP) administration, database administration, network administration and cyber
security management in e-GP Operations;
3. Development team should not have access to production environment (application and
database) to ensure the integrity and confidentiality of the system unless such access provided
by the permission of the DG, CPTUor the delegated officer in writing in case of special needs.
Such access shall be fully documented and records shall be maintained.
37
14.1.8. Patch Management
1. Patches to the production systems shall be applied as per OEM’s (Original Equipment
Manufacturer) instruction to ensure that the systems are protected against the threats from
the spread of viruses, worms and malicious activities to an acceptable level;
2. A centralpatch management system shall be established for applying patches to the
information systems;
3. Before deploying any patches, roll back options shall be made available;
4. Proper backup of the system shall be taken before deploying the patch;
5. System availability shall be the highest priority while deploying the patches.Proper
precaution shall be taken;
6. All the security patches must be deployed in the system within 30 (thirty) days of release
of security patches;
7. Security patches include but not limited to operating system (OS), application, database,
network equipment, servers and storage firmware upgrade, etc.
14.3. Backup
14.3.1. Information Backup
1. CPTU shall maintain Backup register that contains complete records of the backup copies
such as Site location, Device type, Name, Backup type, frequency, Backup location, date
etc.;
2. CPTU shall follow 3-2-1 backup rule i.e. take at least three copies of the data, store the
copies on two different media and keep one backup copy offsite;
3. CPTU shall ensure an appropriate level of physical and environmental protection on the
backup;
38
4. For critical data (i.e. Application, DB etc.), CPTU shall test the backup quarterly to ensure
that they can be relied upon for emergency use when necessary;
5. Backup kept any external media shall be encrypted;
6. For database, log-shipping in 15 minutes interval shall be applied besides regular data
backup.
41
3. Open source software/tools shall be authorizedby ISSC after testing for usage.
42
15. Communications Security
Policy Statement
CPTU shall ensure effective and secure communication of information.
Control Objective
The objectives of this policy are to:
1. Ensure protection of information during its transmission from CPTU to e-GP users and
vice versa;
2. Protect the confidentiality, integrity and availability of e-GP information assets from the
adverse impact of malicious code.
43
15.1.3. Segregation in Networks
The security of CPTU network shall be divided into separate logical network domains. Each of
these domains shall be protected by a defined security perimeter. All required Network Zones and
Data Flow Access Controls shall be designed and documented.
System management (privilege users/system administrators) network should be separate from the
CPTU users network. System management network should not have access to internet.
Monitoring
CPTUemployeesshallhavenoexpectationofprivacyinanythingtheystore,sendor
receiveontheemailsystem.CPTU managementmay monitor messageswithoutprior notice.
Email Retention Policy
RecoveringDeletedEmailviaBackupMedia
Confidentiality and non-disclosure agreements shall comply with all applicable laws and
regulations of Bangladesh.
45
16. System Acquisition, Development and Maintenance
Policy Statement
Security controls shall be integrated during acquisition, development, deployment and
maintenance of the application software, system software, products and/or services ensuring
confidentiality, integrity and availability of the e-GP information.
Control Objective
The aim of this policy is to ensure that security is an integral part of the e-GP system and all
security requirements are identified.
46
16.2. Security in Development and Support Processes
16.2.1. Secure Development Policy
Secure development shall be followed to build up a secure service, architecture, software and
system considering security of the development environment, security requirements in the design
phase, security check points within the project milestones, security in version control and likewise.
1. Business.
2. Data.
3. Applications.
4. Technology
New technology shall be analyzed for security risks and the design shall be reviewed against
known attack patterns.
47
16.2.6. Secure development environment
CPTU shall assess risks associated with system development and establish secure development
environments.
48
17. Supplier Relationships
Policy Statement
All measures shall be considered to ensure that the data/ information or information processing
facilities accessed by third-party/ vendor/ supplier/O&M firms is secured.
Control Objective
The objective of the Supplier Relationships policy is to:
1. All relevant information security requirements shall be established and agreed with each
supplier that may access, process, store, communicate, or provide IT infrastructure
components for e-GP information.
2. Agreements with suppliers shall include requirements to address the information security
risks associated with information and communications technology services and product
supply chain.
3. CPTU shall ensure the right tomonitor, review and audit the supplier/vendor or any third-
partyproviding service delivery.
1. If the third-party sub-contracts any service/ work, the sub-contracted parties and their
employees shall also adhere to the policy;
2. Description of the information to be provided or accessed and methods of providing or
accessing the information shall be identified;
3. Legal and regulatory requirements, including data protection, intellectual property
rights and copyright, are met;
49
4. Training and awareness requirements are identified for specific procedures and
information security requirements;
5. Service Levels, including related to security, as defined in the agreements shall be
monitored and reported;
6. Third-parties shall be subjected to independent reviews by CPTU.
50
18. Information Security Incident Management
Policy Statement
The Information Security Incident Management Process shall ensure that all reported security
breaches and violations are reported, responded to promptly and acted upon to prevent recurrence.
Control Objective
To ensure information security events and weaknesses associated with e-GP business applications,
systems and infrastructure are communicated in a manner that allows timely corrective action to
be taken and minimize adverse impact of the incident.
51
18.1.5. Response to information security incidents
Information security incidents should be responded to by a nominated point of contact and other
relevant persons of the organization or external parties.
b) Escalation, as required;
c) Ensuring that all involved response activities are properly logged for later analysis;
d) Communicating the existence of the information security incident or any relevant details
thereof to other internal and external people or organizations with a need-to-know;
e) Dealing with information security weakness(es) found to cause or contribute to the incident;
f) Once the incident has been successfully dealt with, formally closing and recording it. Post-
incident analysis shall take place, as necessary, to identify the source of the incident.
52
19. Information Security Aspect of Business Continuity Management
Policy Statement
Application systems and business processes that are critical to the CPTU shall be planned for
continuity of operations in the events of disaster.
Control Objective
To counteract interruptions to e-GP business activities and to protect critical business processes
from the effects of major failures of information systems or disasters and to ensure their timely
resumption.
53
19.1.3. Verify, review and evaluate information security continuity
1. All plans documented as part of the business continuity framework shall be tested and
exercised on an ongoing basis to ensure their effectiveness.
2. BCP shall be tested bi-annually to identify incorrect assumptions, oversights or changes in
equipment or personnel.
19.2. Redundancies
19.2.1. Availability of information processing facilities
1. CPTU shall identify business requirements for the availability of information systems;
2. Redundant components or architectures shall be considered to ensure availability;
3. Redundant information systems shall be tested to ensure the failover from one component
to another component as intended, wherever applicable.
54
20. Compliance Policy
Policy Statement
CPTU shall ensure that all stakeholders comply with the information security policy.
Control Objective
To ensure that controls are implemented to avoid breaches of any law, statutory, regulatory or
contractual obligations, and of any security requirements and if breached then, to identify the same
through audit process.
END
ND OF INFORMATION SECURITY POLICY