S17_EN
S17_EN
INFORMATION SECURITY
[S17]
Version 8.2
April 2025
© 2025 by the Government of the Hong Kong Special Administrative Region of the People's
Republic of China
Unless otherwise indicated, the copyright in the works contained in this publication is owned
by the Government of the Hong Kong Special Administrative Region of the People's
Republic of China. You may generally copy and distribute these materials in any format or
medium provided the following conditions are met –
(a) the particular item has not been specifically indicated to be excluded and is therefore
not to be copied or distributed;
(b) the copying is not done for the purpose of creating copies for sale;
(c) the materials must be reproduced accurately and must not be used in a misleading
context; and
(d) the copies shall be accompanied by the words “copied/distributed with the permission
of the Government of the Hong Kong Special Administrative Region of the People's
Republic of China. All rights reserved.”
If you wish to make copies for purposes other than that permitted above, you should seek
permission by contacting the Digital Policy Office.
BASELINE IT SECURITY POLICY AMENDMENT HISTORY
Amendment History
Amendment History
13 Updated Section 5.2 and 20.2 to align with 8.2 April 2025
the General Circular No. 6/2024.
TABLE OF CONTENTS
1. PURPOSE.....................................................................................................................1
2. SCOPE...............................................................................................................................2
2.1. APPLICABILITY ........................................................................................................... 2
2.2. TARGET AUDIENCE ..................................................................................................... 2
2.3. GOVERNMENT IT SECURITY DOCUMENTS .................................................................. 3
3. NORMATIVE REFERENCES.......................................................................................5
4. DEFINITIONS AND CONVENTIONS.........................................................................6
4.1. DEFINITIONS ............................................................................................................... 6
4.2. CONVENTIONS ............................................................................................................ 8
5. GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION
SECURITY...............................................................................................................................9
5.1. GOVERNMENT INFORMATION SECURITY MANAGEMENT FRAMEWORK....................... 9
5.2. DEPARTMENTAL IT SECURITY ORGANISATION ......................................................... 12
5.3. OTHER ROLES ........................................................................................................... 15
6. CORE SECURITY PRINCIPLES...............................................................................18
7. MANAGEMENT RESPONSIBILITIES.....................................................................20
7.1. GENERAL MANAGEMENT .......................................................................................... 20
7.2. SECURITY RISK MANAGEMENT................................................................................. 20
8. IT SECURITY POLICIES............................................................................................21
8.1. MANAGEMENT DIRECTION FOR IT SECURITY ........................................................... 21
9. HUMAN RESOURCE SECURITY............................................................................22
9.1. NEW, DURING OR TERMINATION OF EMPLOYMENT .................................................. 22
10. ASSET MANAGEMENT.............................................................................................23
10.1. RESPONSIBILITY FOR ASSETS ................................................................................ 23
10.2. INFORMATION CLASSIFICATION ........................................................................... 23
10.3. STORAGE MEDIA HANDLING ................................................................................ 23
11. ACCESS CONTROL...................................................................................................24
11.1. BUSINESS REQUIREMENTS OF ACCESS CONTROL .................................................. 24
11.2. USER ACCESS MANAGEMENT ............................................................................... 24
11.3. USER RESPONSIBILITIES ........................................................................................ 24
11.4. SYSTEM AND APPLICATION ACCESS CONTROL ..................................................... 25
11.5. MOBILE COMPUTING AND REMOTE ACCESS ......................................................... 25
11.6. IOT DEVICES ......................................................................................................... 25
12. CRYPTOGRAPHY......................................................................................................26
12.1. CRYPTOGRAPHIC CONTROLS ................................................................................ 26
1. PURPOSE
With the effective use of Internet services and the general adoption of cloud and
mobile computing, the security and survivability of information systems are
essential to the economy and society. Our increasing dependence on IT for office
works and public services delivery has brought new business focus that the key
information systems and data we rely on have to be secure and actively protected for
the smooth operations of all government bureaux and departments (B/Ds),
underpinning public confidence, security and privacy are fundamental to the
effective, efficient and safe conduct of government business.
This document outlines the mandatory minimum security requirements for the
protection of all HKSAR government information systems and data assets. B/Ds
shall develop, document, implement, maintain and review appropriate security
measures to protect their information systems and data assets by:
2. SCOPE
2.1. Applicability
This document adopts and adapts the security areas and controls specified in the
Information security, cybersecurity and privacy protection – Information security
management systems – Requirements (ISO/IEC 27001: 2022) and the Information
security, cybersecurity and privacy protection – Information security controls
(ISO/IEC 27002: 2022) published by the International Organization for
Standardization (ISO) and the International Electrotechnical Commission (IEC).
This document addresses the mandatory security considerations in the following 14
areas:
This document sets the minimum security requirements. B/Ds need to apply
enhanced security measures, appropriate to their circumstances and commensurate
with the determined risks.
The policy statements are developed for all levels of staff acting in different roles
within B/Ds, including management staff, IT administrators, and general IT end
users. It is the responsibility of ALL staff to read through the entire document to
understand and comply with IT security policies accordingly.
In addition, the document is intended for reference by the vendors, contractors and
consultants who provide IT services to the Government.
Practice Guides
IT Security Information
Security Risk IT Security
Risk Security
Assessment Threat
Management Incident
& Audit Management
Handling
The Government IT Security Policy and Guidelines set out the minimum standards
of security requirements and provide guidance on implementing appropriate security
measures to protect information assets and information systems.
For topical issues and specific technical requirements, a series of practice guides are
developed to support the IT Security Guidelines. Supplementary documents provide
guidance notes on specific security areas to assist B/Ds in addressing and mitigating
risks brought by emerging technologies and security threats.
All practice guides are available at the ITG InfoStation under the IT Security Theme
Page (https://itginfo.ccgo.hksarg/content/itsecure/techcorner/practices.shtml).
B/Ds shall formulate their own departmental IT policies, procedures and guidelines
based on all the government security requirements and implementation guidance
specified in the Security Regulations and the Government IT Security Policy and
Guidelines mentioned in Sections 2.3.1 and 2.3.2 above.
3. NORMATIVE REFERENCES
4.1. Definitions
4.2. Conventions
The roles and responsibilities of each party are explained in detail in the following
sections.
Representative(s) from other B/Ds will be co-opted into the committee on a need
basis in relation to specific subject matters. DPO will assist in reviewing and
clarifying the documents submitted by B/Ds as required in this document.
The IT Security Working Group (ITSWG) serves as the executive arm of the ISMC
in the promulgation and compliance monitoring of government IT security related
regulations, policies and guidelines. The ITSWG was established in May 2000, and
its responsibilities are to:
Representative(s) from other B/Ds will be co-opted into the working group on a
need basis, in relation to specific subject matters.
• Maintain a central inventory and oversee the handling of all information security
incidents in the Government;
• Prepare periodic statistics reports on government information security incidents;
• Act as a central office to co-ordinate the handling of multiple-point security
attacks (i.e. simultaneous attacks on different government information systems);
and
• Enable experience sharing and information exchange related to information
security incident handling among ISIRTs of different B/Ds.
5.1.5. Bureaux/Departments
B/Ds shall be responsible for the security protection of their information assets and
information systems. The roles and responsibilities of IT security staff within a B/D
are detailed in Section 5.2 - Departmental IT Security Organisation.
Head of B/D shall appoint an officer at D3 level or above from the senior
management to be the Departmental IT Security Officer (DITSO) and responsible
for IT security. As the senior management of the B/D, the DITSO shall participate
in the overall steering of IT security matters of the B/D. The DITSO shall also
understand the B/D’s priorities, the importance of the B/D’s information systems
and data assets, and the level of security that shall be achieved.
If a B/D does not have a directorate officer at D3 level or above, the highest rank
1 The actual IT Security Management structure may vary according to the circumstances of each organisation.
directorate officer of the B/D shall assume the position of DITSO so as to uphold the
principle of ensuring accountability in IT security.
SB and DPO will provide training to DITSOs to facilitate them in carrying out their
duties and DITSOs shall attend the designated training. The roles and
responsibilities of DITSO shall be clearly defined, which include but are not limited
to the following:
• Establish and maintain an information protection program to assist all staff in the
protection of the information and information systems they use;
• Establish a proper security governance process to evaluate, direct, monitor and
communicate the IT security related activities within the B/D;
• Drive regular discussions on IT security issues at the senior management level to
acquire adequate support and resources;
• Lead in the establishment, maintenance and implementation of IT security
policies, standards, procedures and guidelines;
• Oversee, monitor, review and improve the effectiveness and efficiency of IT
security management throughout every stage of IT operations;
• Monitor and ensure compliance with the government IT security requirements,
including overseeing the satisfactory completion of security audit exercises of
the B/D;
• Oversee the overall IT security awareness and training programmes within the
B/D;
• Co-ordinate with other B/Ds on IT security issues;
• Oversee the overall IT risk management process within the B/D, including
overseeing the satisfactory completion of information security risk assessments
and privacy impact assessments as well as subsequent rectifications and
responding to the evolving risk landscape, regulatory changes, technological
advancements, and the system criticality;
• Oversee the IT security threat detection and monitoring process and the threat
intelligence activities of the B/D, including dissemination of security alerts on
impending and actual threats from the GIRO to responsible parties within the
B/D and relevant project teams; and
• Initiate investigation and rectification in case of breach of security and co-
ordinate the required submission of incident reports to the Director of Bureau.
The Head of B/D will designate a Departmental Security Officer (DSO) to perform
the departmental security related duties. The DSO will take the role of an executive
to:
• Discharge responsibilities for all aspects of security for the B/D; and
• Advise on the set up and review of the security policy.
The DSO may take on the role of the DITSO. Alternatively, in those B/Ds where
someone else is appointed, the DITSO shall collaborate with the DSO to oversee the
IT security of the B/D.
The ISIRT is the central focal point for co-ordinating the handling of information
security incidents occurring within the respective B/D. The Head of B/D should
designate an officer from the senior management to be the ISIRT Commander. The
ISIRT Commander should have the authority to appoint core team members for the
ISIRT. The responsibilities of an ISIRT Commander include:
B/Ds shall establish an IT security management unit which reports to DITSO and
assists DITSO in discharging his/her duties. The size and composition of the unit
may vary among B/Ds depending on the business and operational needs of B/Ds.
The responsibilities of the IT security management unit include:
• Assist DITSO in overseeing the security governance process for the IT security
related activities within the B/D;
• Assist DITSO in the IT security management process for all IT operations of the
B/D;
• Assist DITSO in developing, establishing, and maintaining the overall IT
security strategy and roadmap for the B/D, including formulating IT security
policies, baselines, standards, directives, etc.;
• Co-ordinate security awareness and training programmes within the B/D;
• Co-ordinate the implementation of IT security initiatives and monitor the status
of IT security processes to ensure the effectiveness of IT security management
and compliance with government security requirements;
• Facilitate IT security threat and risk management activities and support disaster
recovery and business continuity planning functions relating to IT security;
• Co-ordinate security incident investigation and rectification;
• Liaise with other B/Ds and parties on IT security matters; and
• Perform any other duties as directed by the DITSO.
The IT Security Administrator should not be the same person as the System
Administrator. There should be a segregation of duties between the IT Security
Administrator and the System Administrator.
Although the IT Security Administrators are responsible for managing the audit logs,
they should not tamper with or change any audit log.
B/Ds may appoint an IT Security Auditor, who will be responsible for auditing the
work of the IT Security Administrators to ensure that they perform their duties due
diligently.
Information Owners shall be the collators and the owners of information stored in
information systems. Their primary responsibility is to:
• Determine the data classifications, the authorised data usage, and the
corresponding security requirements for protection of the information.
• Liaise with the Information Owner in order to define and implement system
security requirements during the development and maintenance of applications;
and
• Ensure quality procedures, techniques, and tools are used to produce secure
systems.
5.3.5. Users
Users of information systems shall be the staff authorised to access and use the
information. Users shall be accountable for all their activities. Responsibilities of a
user include:
This section introduces some generally accepted principles that address information
security from a very high-level viewpoint. These principles are fundamental in
nature and rarely change. B/Ds shall observe these principles for developing,
implementing and understanding security policies. The principles listed below are
by no means exhaustive.
B/Ds shall keep records to evidence compliance with security requirements and
support audits of effective implementation of corresponding security measures.
Continual Improvement
To be responsive and adaptive to changing environments and technologies, a
continual improvement process shall be implemented for monitoring, reviewing
and improving the effectiveness and efficiency of IT security management.
Performance of security measures shall be evaluated periodically to determine
whether the IT security objectives are met.
7. MANAGEMENT RESPONSIBILITIES
7.1.1. B/Ds shall define their departmental IT security organisational framework and the
associated roles and responsibilities.
7.1.2. B/Ds shall ensure that security protection is responsive and adaptive to changing
environments and technology.
7.1.3. B/Ds shall apply sufficient segregation of duties to avoid the execution of all
security functions of an information system by a single individual.
7.1.4. B/Ds shall ensure that the provision for necessary security safeguards and resources
are covered in their budgets.
7.1.5. B/Ds shall reserve the right to examine all information stored in or transmitted by
government information systems in compliance with the Personal Data (Privacy)
Ordinance.
7.2.1 B/Ds shall adopt a risk-based approach to information security to ensure the
confidentiality, integrity and availability of information assets and all other security
aspects of information systems under their control, including outsourced systems,
and monitor compliance with the security policies, guidelines, etc., by their staff and
contractors.
7.2.2 B/Ds shall adopt classified protection of IT security by assessing the classifications
of all their information systems, including infrastructure facilities and departmental
shared IT services, regardless of the source of their funding and implementing tiered
security controls according to the system classifications. The assessment details of
system classification of all information systems shall be properly documented. The
information system classifications shall be endorsed by the Heads of B/Ds or their
explicitly delegated officer at directorate level.
8. IT SECURITY POLICIES
B/Ds shall define and enforce their IT security policies to provide management
direction and support for protecting information systems and assets in accordance
with the business needs and security requirements.
8.1.1. B/Ds shall promulgate and enforce their own IT Security Policy. They shall use the
Baseline IT Security Policy document as a basis for their policy development.
8.1.2. B/Ds shall conduct a review of their information security policies, standards,
procedures and guidelines periodically.
8.1.3. B/Ds shall clearly define and communicate to users its policy in relation to
acceptable use of IT services and facilities.
B/Ds shall ensure that staff who are engaged in government work are suitable for the
roles, understand their responsibilities and are aware of information security risks.
B/Ds shall protect the government interests in the process of new, changing or
terminating employment.
9.1.1. B/Ds shall advise all staff of their IT security responsibilities upon being assigned a
new post and periodically throughout their term of employment.
9.1.2. Information security is the responsibility of every member of the staff in the
Government. Staff shall receive appropriate awareness training and regular updates
on the IT Security Policy.
9.1.3. Staff shall be educated and trained periodically in order to enable them to discharge
their responsibilities and perform their duties relating to IT security.
9.1.4. Civil servants authorised to access classified information higher than RESTRICTED
shall undergo an integrity check as stipulated by the Secretary for the Civil Service.
For staff other than civil servants, appropriate background verification checks should
be carried out commensurate with the business requirements, the classification of the
information that the staff will handle, and the perceived risks.
9.1.5. B/Ds shall include in their IT Security Policy a provision advising civil servants that
if they contravene any provision of the Policy, they may be subjected to disciplinary
action as stipulated in the Civil Service Regulations and that different levels of
disciplinary action may be instigated depending on the severity of the breach.
9.1.6. B/Ds shall include in their IT Security Policy a provision advising all staff other than
civil servants which shall be covered in 9.1.5 above, that if they contravene any
provision of the Policy, they may be subject to relevant penalty action according to
their respective terms of employment, including but not limited to termination of
their services to the Government, depending on the severity of the breach.
9.1.7. Staff who use or have unescorted access to information systems and resources shall
be carefully selected and they shall be made aware of their own responsibilities and
duties. They shall be formally notified of their authorisation to access information
systems.
9.1.8. No staff shall publish, make private copies of or communicate to unauthorised
persons any classified document or information obtained in his official capacity,
unless he is required to do so in the interest of the Government. The "need to know"
principle shall be applied to all classified information, which should be provided
only to persons who require it for the efficient discharge of their work and who have
authorised access. If in any doubt as to whether an officer has authorised access to a
particular document or classification or information, the Departmental Security
Officer should be consulted.
9.1.9. Information security responsibilities and duties that remain valid after termination or
change of employment shall be defined, communicated to the staff and enforced.
B/Ds shall maintain appropriate protection of all hardware, software and information
assets and ensure all information systems and assets receive an appropriate level of
protection.
10.1.1. B/Ds shall ensure that an inventory of information systems, hardware assets,
software assets, valid warranties, service agreements and legal/contractual
documents are properly owned, kept and maintained.
10.1.2. Information about information systems shall not be disclosed where that information
may compromise the security of those systems, except on a need-to-know basis and
only if authorised by the DITSO.
10.1.3. Staff shall not disclose to any unauthorised persons the nature and location of the
information systems and the information system controls that are in use or the way
in which they are implemented.
10.1.4. At the time that a member of the staff is transferred or ceases to provide services to
the Government, the outgoing officer or staff of external parties shall handover and
return computer resources and information to the Government.
10.2.1. B/Ds shall comply with the government security requirements in relation to the
information classification, labelling and handling.
10.2.2. All classified information shall be encrypted in storage irrespective of the storage
media.
10.3.1. B/Ds shall manage the use and transportation of storage media containing classified
information.
10.3.2. Storage media with classified information shall be protected against unauthorised
access, misuse or physical damage.
10.3.3. All classified information shall be completely cleared or destroyed from storage
media before disposal or re-use.
B/Ds shall prevent unauthorised user access and compromise of information systems
and assets and allow only authorised computer resources to connect to the
government internal network.
11.1.1. B/Ds shall enforce the least privilege principle when assigning resources and
privileges of information systems to users.
11.1.2. Access to information shall not be allowed unless authorised by the relevant
information owners.
11.1.3. Access to information systems containing classified information shall be restricted
by means of logical access control.
11.1.4. Access to classified information without appropriate authentication shall not be
allowed.
11.2.1. Procedures for approving, granting and managing user access, including user
registration/de-registration, password delivery and password reset, shall be
documented.
11.2.2. Data access rights shall be granted to users based on a need-to-know basis.
11.2.3. The use of special privileges shall be restricted and controlled.
11.2.4. User privileges and data access rights shall be clearly defined and reviewed
periodically. The review frequency shall be defined and documented. Records for
access rights approval and review shall be maintained.
11.2.5. All user privileges and data access rights shall be revoked after a pre-defined period
of inactivity or when no longer required. The period of inactivity and the
corresponding review frequency shall be defined and documented.
11.2.6. Each user identity (user-ID) shall uniquely identify only one user. Shared or group
user-IDs shall not be permitted unless explicitly approved by the DITSO.
11.3.1. Users shall be responsible for all activities performed with their user-IDs.
11.3.2. Passwords shall not be shared or divulged unless necessary (e.g., helpdesk
assistance, shared PC and shared files). If passwords must be shared, explicit
approval from the DITSO shall be obtained. Besides, the shared passwords should
be changed promptly when the need no longer exists and should be changed
frequently if sharing is required on a regular basis.
11.3.3. Passwords shall always be well protected when held in storage. Passwords shall be
encrypted when transmitted over an un-trusted communication network.
Compensating controls shall be applied to reduce the risk exposure to an acceptable
level if encryption is not implementable.
11.5.1. B/Ds shall define appropriate usage policies and procedures specifying the security
requirements when using mobile computing and remote access. Appropriate
security measures shall be adopted to avoid unauthorised access to or disclosure of
the information stored and processed by these facilities. Authorised users should be
briefed on the security threats and accept their security responsibilities with explicit
acknowledgement.
11.5.2. Security measures shall be in place to prevent unauthorised remote access to
government information systems and data.
11.6.1. B/Ds shall define and implement proper security measures to ensure the security of
IoT devices and data is commensurate with the classification of the information.
11.6.2. The security requirements for mobile devices laid out in this document shall be
followed similarly for IoT devices unless it is not technically feasible for
implementation. Classified information shall not be stored or processed in privately-
owned IoT devices.
12. CRYPTOGRAPHY
B/Ds shall ensure proper and effective use of cryptography to protect the
confidentiality, authenticity and integrity of information.
12.1.1. B/Ds shall manage cryptographic keys through their whole life cycle, including
generating, storing, archiving, retrieving, distributing, retiring and destroying keys.
13.2. Equipment
13.2.1. All information systems shall be placed in a secure environment or attended by staff
to prevent unauthorised access. Regular inspection of equipment and
communication facilities shall be performed to ensure continuous availability and
failure detection.
13.2.2. Staff in possession of mobile devices or removable media for business purposes
shall safeguard the equipment in his/her possession and shall not leave the
equipment unattended without proper security measures.
13.2.3. IT equipment shall not be taken away from sites without proper control.
13.2.4. If there has been no activity for a pre-defined period of time, to prevent illegal
system access attempts, re-authentication shall be activated, or the logon session and
connection shall be terminated. Also, the user workstation shall be switched off, if
appropriate, before leaving work for the day or before a prolonged period of
inactivity.
13.2.5. The display screen of an information system on which classified information can be
viewed shall be carefully positioned so that unauthorised persons cannot readily
view it.
B/Ds shall ensure secure operations of information systems, protect the information
systems from malware, log IT processes and events, monitor suspicious activities,
and prevent exploitation of technical vulnerabilities.
14.1.1. B/Ds shall manage information systems using the principle of least functionality
with all unnecessary services or components removed or restricted.
14.1.2. Changes affecting existing security protection mechanisms shall be carefully
considered.
14.1.3. Operational and administrative procedures for information systems shall be properly
documented, followed, and reviewed periodically.
14.2.1. Anti-malware protection shall be enabled on all local area network servers, personal
computers, mobile devices, and computers connecting to the government internal
network via a remote access channel.
14.2.2. B/Ds shall protect their information systems from malware. Malware definitions, as
well as their detection and repair engines, shall be updated regularly and whenever
necessary.
14.2.3. Storage media and files from unknown source or origin shall not be used unless the
storage media and files have been checked and cleaned for malware.
14.2.4. Users shall not intentionally write, generate, copy, propagate, execute or involve in
introducing malware.
14.2.5. Computers and networks shall only run software that comes from trustworthy
sources.
14.2.6. B/Ds should consider the value versus inconvenience of implementing technologies
to block non-business websites.
14.2.7. All software and files downloaded from the Internet shall be screened and verified
with an anti-malware solution.
14.2.8. Staff should not execute mobile code or software downloaded from the Internet
unless the code is from a known and trusted source.
14.3. Backup
14.4. Logging
14.4.1. B/Ds shall define and document policies relating to the logging of activities of
information systems under their control (including the retention period) according to
the business needs and data classification.
14.4.2. Any log kept shall provide sufficient information to support comprehensive audits of
the effectiveness of and compliance with security measures.
14.4.3. Logs shall be retained for a period commensurate with their usefulness as an audit
tool. During this period, such logs shall be secured such that they cannot be
modified and can only be read by authorised persons.
14.4.4. Logs shall not be used to profile the activity of a particular user unless it relates to a
necessary audit activity as approved by a directorate officer.
14.4.5. The clocks of information systems shall be synchronised to a trusted time source.
14.5.1. Installation of all computer equipment and software shall be done under control and
audit.
14.5.2. Changes to information systems shall be controlled by the use of change control
procedures. Change records shall be maintained to keep track of the applied
changes.
14.7.1. B/Ds shall establish a threat identification, detection and monitoring mechanism and
review the mechanism regularly to ensure its effectiveness concerning the nature of
information systems and technology advancements.
14.7.2. Regular checking on log records, especially on system/application where classified
information is processed/stored, shall be performed, not only on the completeness
but also the integrity of the log records. All system and application errors which are
suspected to be triggered as a result of security breaches shall be reported and
logged.
B/Ds shall ensure the security of the information transferred within the Government
and with any external parties.
2 Such modes of use may include, for example, Internet surfing, electronic message exchange, and the use of
official, portable computers while on business trip. The relevant stand-alone machines must still be protected by
any applicable security mechanisms.
B/Ds shall ensure that security is an integral part of information systems across the
entire life cycle and isolate the development, system testing, acceptance testing, and
live operation environments whenever possible.
16.1.1. Security planning and implementation of appropriate security measures and controls
for systems under development according to the systems’ security requirements shall
be included.
16.2.1. B/Ds shall establish and appropriately secure development environments for system
development and integration efforts that cover the entire system development life
cycle.
16.2.2. Documentation, program source code and listings of applications shall be properly
maintained and restricted for access on a need-to-know basis.
16.2.3. Formal testing and review of security measures shall be performed prior to
implementation.
16.2.4. The integrity of an application shall be maintained with appropriate security
measures such as version control mechanism and separation of environments for
development, system testing, acceptance testing, and live operation.
16.2.5. Change control procedures for requesting and approving program/system changes
shall be documented.
16.2.6. B/Ds shall ensure that staff are formally advised of the impact of security changes
and usage on information systems.
16.2.7. Application development and system support staff shall not be permitted to access
classified information in the production systems unless approval from Information
Owner is obtained.
16.3.1. Test data shall be carefully selected, protected and controlled commensurate with its
classification. If the use of classified data from production is genuinely required, the
process shall be reviewed, documented and approved by Information Owner.
B/Ds shall ensure the protection of information systems and assets that are
accessible by external service providers.
17.1.1 External service providers shall observe and comply with B/Ds’ departmental IT
security policy and other information security requirements issued by the
Government.
17.1.2. B/Ds utilising external services or facilities shall identify and assess the risks to the
government data and business operations. Security measures, service levels and
management requirements of external services or facilities commensurate with the
data classification and business requirements shall be documented and implemented.
Security responsibilities of external service providers shall be defined and agreed
upon.
17.2.1. B/Ds shall monitor and review with external service providers to ensure that
operations by external service providers are documented and managed properly.
Confidentiality and non-disclosure agreements shall be properly managed and
reviewed when changes occur that affect the security requirement.
17.2.2. B/Ds shall reserve audit and compliance monitoring rights to ensure external service
providers have implemented sufficient controls on government information systems,
facilities and data. Alternatively, the external service providers shall provide
security audit reports periodically to prove the measures put in place are satisfactory.
17.2.3. B/Ds shall ensure all government data in external services or facilities are cleared or
destroyed according to government security requirements at the expiry or
termination of the service or upon request of the Government.
18.1.1. B/Ds shall establish an incident detection and monitoring mechanism to detect,
contain and ultimately prevent security incidents.
18.1.2. B/Ds shall ensure that system logs and other supporting information are retained for
the proof and tracing of security incidents.
18.1.3. B/Ds shall establish, document, test and maintain a security incident response plan
for their information systems.
18.1.4. Staff shall be made aware of the security incident response plan that is in place and
shall observe and follow it accordingly.
18.1.5. Any observed or suspected security incidents or security problems in information
systems or services shall be reported immediately to the responsible party and
handled according to the incident handling procedure.
18.1.6. Staff shall not disclose information about the individuals, B/Ds or specific systems
that have suffered from damages caused by computer crimes and computer abuses or
the specific methods used to exploit certain system vulnerabilities to any people
other than those who are handling the incident and responsible for the security of
such systems, or authorised investigators involving in the investigation of the crime
or abuse.
B/Ds shall ensure the availability of information systems and security considerations
embedded in disaster recovery plans.
19.1.1. B/Ds shall plan, implement, and regularly review disaster recovery plans to ensure
adequate security measures under such situations.
19.2. Resilience
19.2.1. B/Ds shall ensure adequate resilience to meet the availability requirements of IT
services and facilities.
20. COMPLIANCE
20.1.1. B/Ds shall identify and document all relevant statutory, regulatory and contractual
requirements applicable to the operations of each information system.
20.1.2. B/Ds shall keep records to evidence compliance with security requirements and
support audits of effective implementation of corresponding security measures.
20.1.3. B/Ds shall comply with relevant government requirements in relation to the security
of information systems, including, but not limited to, storage, transmission,
processing, and destruction of classified information. Information without any
security classification should also be protected from unintentional disclosure.
20.1.4. Personal Data (Privacy) Ordinance (Cap. 486) shall be observed when handling
personal data. All personal data should be classified as RESTRICTED information
or above. Depending on the nature and sensitivity of the personal data concerned
and the harm that could result from unauthorised or accidental access, processing,
erasure or other use of the personal data, a higher classification and appropriate
security measures may be required.
20.2.1. Security risk assessments for information systems and production applications as
well as privacy impact assessments for information systems and production
applications involving personal data shall be performed at least once every two
years. A security risk assessment for information systems as well as a privacy
impact assessment for information systems involving personal data shall also be
performed before production rollout and prior to major enhancements and changes
associated with these systems or applications.
20.2.2. Audit on information systems shall be performed at least once every two years to
ensure the compliance of IT security policies and effective implementation of
security measures. The selection of auditors and conduct of audits shall ensure
objectivity and impartiality of the audit process. Auditors shall not audit their own
work.
20.2.3. Use of software and programs for performing security risk assessment or security
audit shall be restricted and controlled.
21. CONTACT
Email: it_security@digitalpolicy.gov.hk