Assignment title: Management
Operations and Management Security Policy August 1, 2013
Purpose
The purpose of this policy is to help ensure the secure operation of K‐State information systems and
proper management of ACOM's IT security program and technologies.
Scope
This policy applies to all colleges, departments, administrative units, and affiliated organizations that use
college information technology resources to create, access, store or manage College Data to perform
their business functions.
Effective Date
This policy became effective on August 1, 2013
Authority
The ACOM Dean's Committee, Business Contingency Planning, requires all departments, to develop
"business continuity plans to ensure that all entities can continue critical operations during any
disruption and resume normal operations within a reasonable period of time."
Information Technology Security Self‐Assessment Policy, requires all divisions, to complete an annual
self‐assessment of the status of the security of its information systems.
Policy
1. Business continuity plan ‐ Alabama College of Osteopathic Medicine must have a business continuity
plan to guide recovery from disasters or other major disruptions to service in a manner that maintains
the security of ACOM's information systems and ensures timely restoration of services.
2. Configuration management ‐ the configuration of servers, workstations, network devices, firewalls
and other enterprise security technologies should be managed in a way that provides consistent setup,
documents changes, and ensures security requirements are maintained when the configuration is
changed.
3. Data backups ‐ College Data must be backed up regularly and backup media stored securely,
commensurate with the classification of the data.
4. Firewalls
•All connections to networks outside the ACOM campus, such as the Internet, must be
protected with a firewall that filters both incoming and outgoing network traffic against
common threats.Operations and Management Security Policy August 1, 2013
•All enterprise information systems and any ACOM system hosting confidential data must be
protected by a network firewall and a host‐based software firewall, both configured in "default
deny" mode for incoming traffic and enforcing documented trust relationships for those
systems.
•All college computers connected to the university network must have a host‐based firewall
configured appropriately for the security requirements of the system and the classification of
data stored therein.
•Logging should be enabled for all firewalls and periodically reviewed for anomalous events.
•Configuration of network firewalls and host‐based firewalls on enterprise information systems
should be audited periodically to ensure consistency with the security requirements of the
system(s) they protect.
5. Security event logging and auditing
•Audit logs recording user activities, exceptions (i.e., errors or failures), and information security
events should be generated commensurate with the security requirements of the system being
monitored. Audit logs should be retained for at least 30 days.
•Enterprise information systems must log system administrator activities, such as the use of
privileged accounts (e.g., supervisor, administrator, or root).
•Audit logs should be periodically reviewed to detect security violations.
•Security event log data must be protected against unauthorized access and alteration.
•Clocks of systems being monitored should be synchronized regularly from an accurate time
source.
6. Security management ‐ ACOM's IT security program and policies must be monitored and periodically
assessed to ensure their continued effectiveness. The Chief Information Security Officer or designee
must perform an annual IT security self‐assessment and submit a summary report to the ACOM Dean's
Committee, as required by ACOM information technology policy.
Definitions
1. Authentication ‐ Process of verifying one's digital identity. For example, when someone logs into
Webmail, the password verifies that the person logging in is the owner of the User ID. The verification
process is called authentication.
2. Confidential data ‐ Highly sensitive data intended for limited, specific use by a workgroup,
department, or group of individuals with a legitimate need‐to‐know. See ACOM's Data Classification and
Security Policy for an expanded definition and examples.
3. Default Deny ‐ a firewall rule set that begins with blocking all network traffic, both incoming and
outgoing, then only allowing specific network traffic required for the effective and secure operation of
the system(s) protected by the firewall.Operations and Management Security Policy August 1, 2013
4. Enterprise information system ‐ An information system and/or server providing services commonly
needed by the University community and typically provided by central IT units. Departmental
information systems provide services specific to the mission and focus of individual Colleges,
departments, administrative units, or affiliated organizations and are typically provided by distributed IT
staff in those units.
5. Firewall ‐ A specialized device or software program that controls the flow of network traffic between
networks or hosts to enforce security policies and provide protection for the resources on those
networks or hosts. For the purposes of this policy, a router with Access Control Lists (ACLs) is not
considered a firewall.
6. Trust relationships ‐ A specification of the level of access granted to computer systems and/or
applications that are trusted to access resources on a server and its associated data and applications.
This applies to access controls between systems, not access rights for individual users or roles.
7. ACOM Computer ‐ Any computer considered to be the property of Alabama College of Osteopathic
Medicine.
8. College Data ‐ Any data related to Alabama College of Osteopathic Medicine functions that are a)
stored on ACOM information technology systems, b) maintained by ACOM faculty staff, or students, or
c) related to institutional processes on or off campus. This applies to any format or media (in other
words, it is not limited to electronic data).
9. College Network ‐ Any part of ACOM's data network physically located on the Dothan campus. This
includes devices on the network assigned any routable and non‐routable IP addresses, typically 10.X.X.X,
and applies to ACOM's wireless network and the network serving ACOM's student apartments at
Summer Hill Apartments.
Roles and Responsibilities
1. Chief Information Security Officer (CISO) ‐ Coordinates the development of guidelines, standards,
and/or procedures related to this policy as well as the identification, implementation, and assessment of
common security controls needed for this policy; monitors and periodically assesses K‐State's overall IT
security program and policies; and ensures completion of an annual IT security self‐assessment and
report.
2. Information System Security Administrator ‐ Ensures the application of appropriate operational
security controls for an information system; coordinates with the CISO in the identification,
implementation, and assessment of common security controls; ensures that backups are being
performed regularly and stored securely; and ensures that components of an information system have
an appropriate system of configuration management in place. This role may be filled by someone
directly involved with the development, maintenance, and/or operation of the information system.Operations and Management Security Policy August 1, 2013
Implementing Procedures
1. Security event logging and auditing
a) Audit logs should include the following information, when relevant:
i. User ID or username
ii. Date and time of event
iii. Type of event
iv. Description of the event
v. Network addresses and protocols involved
vi. Files accessed
vii. Commands/processes executed
b) ACOM information systems should consider logging the following events and any others
deemed appropriate for tracking important or suspicious actions:
i. Successful and unsuccessful login or authentication attempts
ii. Access to confidential data
iii. Changes to access privileges for confidential data
iv. Activation and de‐activation of security systems such as firewalls, anti‐virus systems,
and intrusion detection systems, and alerts from these systems
v. Privileged operations such as the use of privileged accounts (e.g., supervisor,
administrator, or root), system start‐up and stop, and I/O device
attachment/detachment
vi. System and network alerts and failure messages
vii. Changes to, or attempts to change, system security settings and controls
Related Laws, Regulations, or Policies
1. Existing ACOM IT security operations and management policies
a. Vulnerability management ‐ ACOM's requirements for assessing a system's security
controls and identifying and mitigating vulnerabilities is in ACOM's "System
Development and Maintenance Security Policy" Other related laws, regulations, or
policies.
b. ISO/IEC 27002:2005, "Information technology ‐ Security techniques ‐ Code of practice
for information security management
http://www.iso.org/iso/catalogue_detail?csnumber=50297, published by the
International Standards Organization http://www.iso.org. This is an international
security standard that specifies security requirements for controlling access (see chapter
10, "Communications and operations management") to ensure "the correct and secure
operation of information processing facilities."
c. NIST Special Publication 800‐41 Revision 1, Guidelines on Firewalls and Firewall Policy
http://csrc.nist.gov/publications/nistpubs/800‐41/sp800‐41.pdf, July 2008Operations and Management Security Policy August 1, 2013
Questions/Waivers
The Manager of Information Systems is responsible for this policy. The Dean or designee must approve
any exception to this policy
Questions relating to this policy should be directed to the Chief Information Security Officer.