Home

eHR SP Training Scheme

image

Contents

1. To determine very carefully who will have access to system administrator privileges and passwords for the services One approach is to grant only minimal privilege to accomplish the necessary tasks What are the user s rights and responsibilities To incorporate a statement on the users rights and responsibilities concerning the user of the site s information systems and services Ref No G3 15 11 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 3 5 15 4 e What are the rights and responsibilities of the system administrator versus those of the user To specify to what degree system administrators can examine user files to diagnose problems or for other purposes and what rights you granted to the users e What do you do with sensitive information To determine the level of sensitivity of data that users should store on systems The style of the policy is better to have the following characteristics e Use colloquial language that is common and easy to read and understand e Don t be clumsy i e simply explains the deal by clear sentence and wordings e Be brief and keep the sentence simple and short e Be concise and unambiguous e Easy to teach and use e Provide ease of access to everyone who are related for example stored in global database or public directory e Break up policy document into digestible bites instead of a big one e Conform to the departmental format or standard of
2. Accidental threats can result in either exposure of sensitive information or causing an illegal system state to occur due to modification of information An intentional threat is an action performed by an entity with the intention to violate the security Examples are destruction modification fabrication interruption or interception of data In general threats to an asset should be considered in terms of the availability confidentiality and integrity of the asset The following sections describe some possible threats to an information system It should be noted that the list is not exhaustive and other threats may be identified depending on the assets one wants to protect i Unauthorised Access Unauthorised access may take many forms One form of unauthorised access is the use of another user s account to gain access to asystem The use of any computer resource without prior permission may also be considered as another form of unauthorised access The seriousness of an unauthorised access will vary from site to site For some sites it may cause irreparable harm while for others it may open the door for other security threats Unauthorised access may be performed by both insiders and outsiders Ref No G3 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS c ii iii Disclosure of Information Another common threat is disclosure of information The impact of disclosing valuable or sensitive information sto
3. Changes to information systems should be controlled Operational systems and application software should be subject to strict change management control the following should be considered e Identification and recording of significant changes Ref No G3 12 1 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 1 5 12 1 6 e Planning and testing of changes e Assessment of the potential impacts including security impacts e Formal approval procedure for proposed changes e Communication of change details to all relevant parties e Fallback procedures including procedures and responsibilities for aborting and recovering from unsuccessful changes and unforeseen events Operational and Administrative Procedures Operational and administrative procedures should be properly documented followed maintained reviewed regularly and made available to users who need them Documentations should be prepared for system activities associated with information processing and communication facilities such as computer start up and shut down backup equipment maintenance media handling computer room management etc Operations Controls Control of Computer Operators Operations controls relate to the computer operators activities and to the running or operation of the computer equipment The purpose of these controls is to reduce potential fraud in the computer room These controls are usually preventive in nature
4. Guidelines for Security Provisions in Government Office Buildings published by the Security Bureau Ref No G3 8 1 IT SECURITY GUIDELINES PHYSICAL SECURITY Site Preparation Guidelines G36 G41 Actual Requirements SB Security e g Power Voltage Requirements of outlets etc Level I II IIT Physical Security Requirements Typical Workflow in Physical Security Requirements Determination B Ds should observe the physical security specifications from the Security Bureau It is a mandatory standard for a data centre or computer room to conform to Level III security if the IT equipment involves handling of TOP SECRET SECRET information and Level II security if the IT equipment involves handling of CONFIDENTIAL information Level II security is still recommended for physical facilities hosting IT equipment handling information classified as RESTRICTED or below This requirement may be constrained by the existing office environment building structures and or leasing agreements for offices in non government premises B Ds should evaluate the physical feasibility of the environment before building a data centre or computer room in around its own office premise In situations where an office premise cannot fulfil Security Regulations security level requirements B Ds must obtain exemption approval from the Government Security Officer GSO Details about Level II security sp
5. iv Control installation configuration update and removal of mobile applications v Install and manage protective software e g anti malware system or firewall to protect the devices from malicious websites or from attacks coming over other communications channels such as Short Message Service SMS vi Disable unnecessary hardware components such as the camera Wi Fi Bluetooth GPS and restrict the use of external storage media e g SD cards Ref No G3 9 9 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY vii Maintain asset tracking information such as serial number inspect applications on devices and keep track of them for audit End user Controls Store the device in a secure place preferably out of sight when not in use The physical security of the device is the responsibility of the staff to whom the device has been issued Do not store classified or personal data on mobile device except the data is protected with appropriate security measures Install only approved applications apps to mobile devices Properly enable and configure security features of the operating system and installed apps Only take the minimal amount of data necessary to complete the work when working away from office Erase the data according to the security requirements when the data is no longer required to be stored in mobile device Do not synchronise unauthorised computer resources including those privately own
6. eHR Core Clinic CMS on Ramp Server and Client Diagram 3 Connection of CMS On ramp with eHR Sharing System Page 5 of 17 eHR Service Provider Training Scheme Invitation Document 2 Service Offerings and Government Support 2 1 Service Offerings HCPs may recruit eHR SPs to provide the following services e install and setup CMS On ramp application for private HCPs and or update CMS On ramp application e install Communication Module locally to connect to the eHRSS provide on going support and maintenance conduct end user training to front line staff build the add on functionalities e g the billing functions to interface with CMS On ramp and assist private HCPs in data migration 2 2 Government Support The Government will lead the implementation of the eHR SP Training Scheme and provide support in the Scheme The forms of Government support to the Scheme include a Administrative support Handling the applications for eHR SP training maintaining a register of eHR SPs and updating eHR SPs contact information and their service offerings at eHRO website and b Technical support Developing and enhancing the CMS On ramp application and the Communication Module provision of training courses to eHR SP staff on an as and when required basis conducting assessment tests for eHR SP staff and preparation of training materials and other documents including user manual dep
7. eene nee eene nennen trennen rene enne enne enn teen eterne 11 6 11 4 1 Program System Change Control eese enne nre trennen rene enne enne enne enne tenene 11 6 11 4 2 Program Cataloguing ite e eae reete etie Reeves eerte erede Ether petet EDO IV ENE SEKTE CE 11 6 11 4 3 Installation of Computer Equipment and Software sese nneenneeeeenenenee 11 7 WEB APPLICATION SECURITY oroi ieor o hg Eee tete taciti ceinture de cti ee ete cesa 11 7 11 5 1 Web Application Security Architecture sese nennen een rennen entren 11 7 11 5 2 Web Servet Security sose o iei te RU nen dps cecieten Doo ipt dede Icd ene tende 11 9 11 5 3 Web Application Development Process sseeeeeeeeeeeeeeeeeeee nene een een rennen enne 11 9 11 5 4 Web Application Secure Coding sessi neen trennen eren enne enne ene 11 10 MOBILE APPEICATION SECURITY ee tege Ue iet tege ore e irte te Eo iA cone 11 12 Ref No G3 ii 2 IT SECURITY GUIDELINES CONTENTS 12 12 1 12 2 12 3 12 4 12 5 12 6 12 7 12 8 12 9 12 10 12 11 12 12 12 13 12 14 12 15 13 13 1 13 2 14 14 1 14 2 15 15 1 ADDITIONAL REFERENCES bie onere ie ie epo ee elio ti a Prep tie eae 11 14 COMMUNICATIONS amp OPERATIONS SECURITY eere neenenneeneees 12 1 OPERATIONS MANAGEMENT aret eet shag EE ETES EE rE T A op sige PRI TEESEEISE R e EEES 12 1 12 11 Se
8. wireless network with sufficient authentication and transmission encryption measures where appropriate is considered suitable for use by B Ds Similar to that for CONFIDENTIAL and RESTRICTED information proper key management and configuration policies should also be established to complement the technical solution For technical guidelines in compiling such requirements please refer to Annex F of the Security Regulations 12 7 2 Radio Frequency Identification RFID Security RFID technology is a non contact automatic identification technology making use of radio signals to identify track sort and detect a variety of objects such as people vehicles goods and assets without contact as that of magnetic stripe technology or line of sight as that of bar code technology and track the movements of these objects through a network of scanning devices over a distance of several meters RFID technology is growing rapidly in different applications More developers apply the technology not only to traditional applications but also to security applications and services that use together with other wireless technology Ref No G3 12 25 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY Systems implementing RFID technology are typically composed of three key components RFID tag or transponder carries object identifying data Depending on the source of power tags may come in three flavours active semi passi
9. As a result the Internet Engineering Task Force IETF has been working on the IPv6 Internet Protocol version 6 specifications in order to address these limitations along with consideration on performance ease of configuration network management and security issues Ref No G3 12 30 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 11 The overall enhancements on IPv6 may provide better security in certain areas but attackers might still be able to exploit part of the protocol Transitioning tools allow IPv4 applications to access IPv6 services and vice versa There are a variety of IPv6 transition technologies such as 6to4 defined in RFC 3056 Simple Internet Transition SIT tunnels and IPv6 over UDP e g Teredo IPv6 traffic can enter networks via these methods while LAN system administrators may not be aware that networks are vulnerable to IPv6 exploits In addition many firewalls permit UDP traffic allowing IPv6 over UDP to get through firewalls such that LAN system administrators are not aware of it Attackers might also use 6to4 tunnels to evade IDS IPS Some firewall products are only capable of filtering IPv4 traffic but not IPv6 Attackers can exploit this loophole and hence compromise the network by using IPv6 packets Regarding host security on IPv4 IPv6 mixed networks it should also be noted that applications are subject to attacks in both IPv6 and IPv4 versions Therefore if traffic blockin
10. LAN system administrators should keep updated with security advisories and educate users the best practices to protect against computer virus and malicious code Subscribe to notifications advisories so that they can receive critical computer virus malicious code alerts at the earliest possible moment Disseminate promptly the computer virus alert issued by OGCIO to all end users and take necessary actions Educate users to understand the impact of massive computer virus attacks recognise ways of infecting with computer virus and malicious code e g educate users that sender of electronic message containing computer virus and malicious code can be forged as friends or colleagues in order to prevent computer virus and malicious code infection 12 5 3 Detection and Recovery The following can be symptoms of a computer infected with computer virus or malicious code Program takes longer time than usual to execute Sudden reduction in system memory available or disk space Unknown new files programs or processes in the computer Popping up of new windows or browser advertisements Abnormal restart shutdown of the computer Increase in network usage Ref No G3 12 17 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY If a computer is suspected to be infected with a computer virus or malicious code users should stop all activities because continually using the infected computer may help spreading the compu
11. The best way to keep track of operators activities is to record all events on hard copy console logs There are chances that operators activities cannot be logged to an operator job journal file because of a file full condition The console log should be produced on pre numbered pages so that operators could not destroy any pages without being noticed The console log or job journal file should be checked daily for the following Missing pages e Abnormal activities e g security violation messages improper operating procedures etc Besides operators should provide explanations for all reruns and abnormal interventions made such as overrides interrupts halts and restarts Such occurrences can be plotted into a graph so that patterns of occurrences which are indications of fraud perpetration can be spotted Ideally written logs should be prepared by operators to record information like date of execution completion status and any relevant comments for all jobs run The log should also reflect incidents such as equipment malfunctions idle time and downtime The cause of such incidents if known should be specified Supervisors shall then review the logs regularly for monitoring purposes Ref No G3 12 2 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 2 The responsibilities of operators should be and only be directly related to the operation of the computer equipment Therefore under no circumstances
12. detection of and responding to information security incidents Ref No G3 IT SECURITY GUIDELINES REFERENCES 3 REFERENCES 3 1 STANDARDS AND GUIDELINES a b c d e Baseline IT Security Policy S17 http www ogcio gov hk en infrastructure methodology security_policy doc s17_pub pdf Internet Gateway Security Guidelines G50 http www ogcio gov hk en infrastructure methodology security_policy doc g50_pub pdf Security Risk Assessment amp Audit Guidelines G51 http www ogcio gov hk en infrastructure methodology security_policy doc g51_ pub pdf Information Security Incident Handling Guidelines G54 http www ogcio gov hk en infrastructure methodology security policy doc g54 pub pdf The HKSARG Interoperability Framework S18 http www ogcio gov hk en infrastructure e_government if doc s18 pdf Guidelines on System Maintenance Cycle G22 http www ogcio gov hk en infrastructure methodology others doc g22_pub pdf 3 2 OTHER REFERENCES a b c d Asia Pacific Economic Cooperation Telecommunications and Information Working Group http www apectelwg org SecurityFocus http www securityfocus com SANS Institute http www sans org Site Security Handbook http www ietf org rfc rfc2196 txt number 2196 Ref No G3 3 1 IT SECURITY GUIDELINES DEFINITIONS AND CONVENTIONS 4 DEFINITIONS AND CONVENTIONS 4 DEFINITIONS a b c d e
13. productivity results Each site should determine which services are essential and for each of these services determine the effect to the site if that service were to become disabled Therefore working out the security requirements together with users is very important Identifying the Impacts After identifying the assets and threats the impact of security attack should be assessed and appropriate security measures should be introduced The following is a list of tasks for the process Identifying the vulnerabilities of the system Ref No G3 15 9 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS Analysing the likelihood of threats aimed at exploiting these vulnerabilities Assessing the consequences if each threat was to take place Estimating the cost of each attack Costing out potential countermeasures Selecting the security mechanisms that are justified The consequence of a threat materialised in an organisation could result in one or more impacts on the organisation For example impacts can be from Infringement of privacy Financial loss Disruption to activities Impacts can be estimated in monetary terms of any loss of software and files hardware damage and manpower costs to restore altered files reconfigure affected systems and so forth Intangible impacts may have even greater influence and should also be estimated in non monetary terms Examples of these impacts are staff morale g
14. subject to additional security threats as described in Section 11 5 WEB APPLICATION SECURITY the software development team should follow a set of web application secure coding practices that can help withstand common web application security vulnerabilities Listed below are some secure coding practices to be observed when developing web application e Validate all input parameters to prevent attacks such as SQL injection and cross site scripting attacks Develop a centralised module to perform the input parameter validation Check each input parameter against a strict format i e whitelist that specifies exactly which types length and syntax of input will be allowed Filter special characters such as amp lt gt r n from the input form or replace them with escape sequence Do not rely exclusively on blacklist validation to detect malicious input Do not rely on client side script to perform the validation check It should also be done at the server side Do not pass the HTML forms parameters directly to system call or database query Do not display the HTML forms parameters directly in the processing response Ref No G3 11 10 IT SECURITY GUIDELINES APPLICATION SECURITY Sanitise application response Develop a centralised module to perform the sanitisation Check all output return codes and error codes from calls e g calls to backend database to ensure that the expected processin
15. 5 1 GOVERNMENT INFORMATION SECURITY MANAGEMENT FRAMEWORK ee 5 1 5 1 1 Information Security Management Committee ISMC sessseessseseeeeeeeeren rene 5 2 5 1 2 IT Security Working Group ITSWG ssssesseseeseeeeeeenrenne enne nenne nennen trennen trennen rennen enne 5 2 5 1 3 Government Information Security Incident Response Office GIRO sese 5 3 5 T4 Bureaux Departments nete n epe eer eee edid eise eret 5 3 DEPARTMENTAL IT SECURITY ORGANISATION seeseeeeeeeneeeenee nennen nennen reete enemies 5 3 5 2 1 Senior Management jie apie ala elaine el eel ea ai a Peppe 5 4 5 2 2 Departmental IT Security Officer DITSO 00 eee cee cnsecseecseeeseseeeeeeeseeeseesecaecsaeenaecsaesnaeenaeeaes 5 5 5 2 3 Departmental Security Officer DSO eee cecesecesecesecssecseecaeecaeeeaeseaeeeeeseeeseessecaecsaecnaecsaecaaeenaeeaes 5 5 5 2 4 Departmental Information Security Incident Response Team ISIRT Commander 5 5 OTHER ROLES mh eter ee e t ER eei e ir eie eet es Decet tote E cb aerei decr bets ree 5 6 5 3 TP Security Administr tors utter eese eite ederet pe reete te Eee ree Ete rre 5 6 5 3 2 Information Owners tics idco et Reed e et eit tet deu ree tei Ie eco byte de tite 5 7 5 8 8 LAN System Administrators oeeie asine eiae ete eter eee tete E C a Esos Ete dre 5 7 5 3 4 Application Development amp Maintenance Team s
16. Classified information shall be handled strictly in accordance with the procedures set out in the Security Regulations ADDITIONAL REFERENCES e Data Center Physical Security Checklist Sean Heare The SANS Institute http www sans org reading room whitepapers awareness data center physical secur ity checklist 416 e Protect Yourself Justin Bois The SANS Institute http www sans org reading room whitepapers physcial protect yourself 271 e An Introduction to Computer Security Physical and Environmental Security Special Publication SP 800 12 NIST http csrc nist gov publications nistpubs 800 12 800 12 html chapter15 html e Operational Security Standard on Physical Security Treasury Board of Canada Secretariat http www tbs sct gc ca pol doc eng aspx section text amp id 1232 Ref No G3 8 8 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 9 1 1 ACCESS CONTROL SECURITY DATA ACCESS CONTROL B Ds should ensure that access rights to information are not granted unless authorised by relevant information owners Access rights shall be granted on a need to know basis and are clearly defined documented and reviewed Records for access rights approval and review shall be maintained to ensure proper approval processes are followed and the access rights are updated when personnel changes occur Access rights to information processing facilities such as the physical premises where information sys
17. GUIDELINES PURPOSE 1 PURPOSE This document aims at introducing general concepts relating to Information Technology IT security In referencing the Baseline IT Security Policy this document elaborates relevant security concepts and best practices related to the usage of IT Readers will also find guidelines and considerations in defining security requirements in the system development process The materials included in this document are prepared irrespective of computer platforms and may not be applicable to all types of systems Individual project owners should consider and select only those applicable to their environment In order to help an end user understand his her responsibilities on IT security bureaux departments B Ds can consider developing a departmental end user instruction document on IT security which highlights the security requirements that are related to an end user in simple instruction format A sample template is available in Appendix A Sample IT Security End User Instructions In addition to the Baseline IT Security Policy and this document there are three other IT security guideline documents a Internet Gateway Security Guidelines G50 b Security Risk Assessment amp Audit Guidelines G51 c Information Security Incident Handling Guidelines G54 Section 2 1 IT SECURITY DOCUMENT OVERVIEW describes in details the purpose and relationship of these documents Ref No G3 1 1 IT SECURIT
18. Integration Test v User Acceptance Test Y System Installation amp Production Application Security Communications amp Operations Security Post Implementation Review Post Implementation Review Security Risk Assessment amp Auditing Security Incident Management SCOPE Security Issues Related with Different Phases of System Development Life Cycle Ref No G3 IT SECURITY GUIDELINES SCOPE 2 1 IT SECURITY DOCUMENT OVERVIEW The following diagram describes the relationship of various IT security documents within the Government Mandatory Requirements on IT Security Security Baseline Regulations IT Security in particular Policy Chapter IX 17 Guidelines on IT Security IT Security Guidelines G3 Security Risk Assessment amp Audit Guidelines 651 IT Security Documents Ref No G3 2 3 IT SECURITY GUIDELINES SCOPE The purpose and overview of the five core IT security documents are described below Baseline IT Security Policy S17 IT Security Guidelines G3 Internet Gateway Security Guidelines G50 Security Risk Assessment and Audit Guidelines G51 Information Security Incident Handling Guidelines G54 A top level directive statement that sets the minimum standards of a security specification for all B Ds It states what aspects are of paramount importance to a B D T
19. Manager from OGCIO is an example Security Working Team A Security Working Team is a group of staff and users who are directly involved in developing the details of the IT security policy They are required to produce the policy draft to the Security Steering Committee The security working team members may change or vary depending on the needs and requirements of the department and the policy issues Team members include but are not limited to i ii iii iv Technical Personnel may refer to security administrators network administrators system administrators or technical support staff who are familiar with the technological aspects and participate in all technical related issues Users are the user staff who give detail user or business requirements related to user interests on the IT security policy Operational Personnel may refer to the system operators or any administrative staff who provide the day to day operation and monitoring support Depending on the organisational establishment of the department and project Operational Personnel may come from departments or the computer operations of OGCIO System Developers are the application or system developers such as the project team members who may be affected by the IT security policy Project team members may include Systems Managers and Analyst Programmers from OGCIO contract staff or even external human resources for outsourced projects Ref No G
20. Police Force HKPF e Chief Secretary for Administration s Office CSO Ref No G3 5 2 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE 5 2 ON INFORMATION SECURITY Representative s from other B Ds will be co opted into the working group on a need basis in relation to specific subject matters Government Information Security Incident Response Office GIRO To handle information security incidents occurring in B Ds an Information Security Incident Response Team ISIRT shall be established in each B D Meanwhile the Government Information Security Incident Response Office GIRO provides central co ordination and support to the operation of individual ISIRTs of B Ds The GIRO has the following major functions e Disseminate security alerts on impending and actual threats to B Ds e Maintain a central inventory and oversee the handling of all information security incidents in the Government e Prepare periodic statistics reports on Government information security incidents e Actas a central office to coordinate the handling of multiple point security attacks i e simultaneous attacks on different Government information systems e Actas a bridge between the Hong Kong Computer Emergency Response Team Coordination Centre HKCERT and the Government regarding Government s information security incidents e Enable experience sharing and information exchange related to information security incident handling amo
21. Training Scheme Invitation Document eHR SP renew and withdraw process Communication among eHRO eHR SP and clinics Training Materials 1 Documents for System Maintenance and Support User manual Deployment guidelines Implementation guidelines Patches and security fix installation Contingency plan Unwind procedures 999295429 Security Risk Assessment SRA guidelines 2 General Documents IT security guidelines Confidentiality guidelines Note The list of training courses and training materials will be reviewed from time to time and are subject to changes Page 16 of 17 eHR Service Provider Training Scheme Invitation Document Annex C IT Security Guide Please observe the latest version of IT Security Guidelines promulgated by the Office of the Government Chief Information Officer as attached Or via http www ogcio gov hk en infrastructure methodology security policy doc g3 pub pdf Page 17 of 17 The Office of the Government Chief Information Officer IT SECURITY GUIDELINES G3 Version 7 0 September 2012 The Government of the Hong Kong Special Administrative Region COPYRIGHT NOTICE 2012 by the Government of the Hong Kong Special Administrative Region Unless otherwise indicated the copyright in the works contained in this publication is owned by the Government of the Hong Kong Special Administrative Region You may generally copy and distribute these materials in any format
22. access to the physical location of the system In general logical access control refers to four main elements users groups of users resources authentication and authorisation Ref No G3 9 1 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 2 1 Users groups of users refer to those people who are registered and identified for accessing the IT resources 2 People will be granted with rights to access the system resources such as network files directories programs and databases 3 Authentication is to prove the identity of a user Usually it is done based on three major factors They are something you know e g PIN or username passwords something you have e g a token or a smart card or something you are e g biometrics characteristics such as fingerprint facial characteristics retina of eye and volce A combination of two of these factors often called 2 factor authentication can be applied to strengthen the authentication control 4 Upon user authentication authorisation to access will be granted by mapping the user group of users to the system resources AUTHENTICATION SYSTEM An authentication mechanism that uniquely identifies users is the basis for security controls Authentication process begins with identification that requires every user to enter a unique user identity The person can then use conventional way of authentication by entering a password Other ways of authentication include use of smart car
23. and information systems If a user discovers any suspicious activities or suspects a security breach the user should report the case promptly to the help desk during office hours If a security incident occurs after office hours the officers to contact are add names and contacts here Failure to comply with the information security requirements may result in disciplinary proceedings The following are lists of DOs and DON Ts actions that you should be aware of when handling government information or using information systems Note that the lists are not exhaustive you should refer to the departmental IT security policy the Security Regulations and the Baseline IT Security Policy S17 where appropriate DOs 10 11 12 13 The classification category must be clearly marked for example adding RESTRICTED before the subject title for an email containing RESTRICTED information All stored CONFIDENTIAL information must be encrypted Transmission of CONFIDENTIAL or RESTRICTED information must be encrypted For transmission of CONFIDENTIAL information by electronic mail within the Government the Confidential Mail System should be used Safeguard any equipment device or user identity in your possession with proper security measures for example password protected log off or power off locked in drawer when unattended Release information and grant the data access right based on a need to know basis Select passw
24. be made through centrally arranged Internet gateways or B D s own Internet gateway The gateway can provide both security and authentication protection by means of screening routers firewall or other communication facilities The Internet gateway should deny all Internet services unless specifically enabled All unused configurations services ports and unnecessary traffic e g unnecessary daytime service incoming or outgoing ICMP traffic etc should also be disabled or blocked Direct dial up connection to Internet services provider should not be established For technical guidelines on Internet gateway security please refer to the following document for details e Internet Gateway Security Guidelines G50 http www ogcio gov hk en infrastructure methodology security policy doc g50 pub pdf If a B D decides to install broadband connections on standalone 1 e not connected to the Government or departmental network computers without going through centrally arranged Internet gateways or B D s own Internet gateway sufficient security controls such as firewall anti virus program and user permission restriction should be implemented on these computers to avoid potential security breaches and system misuse An approval and control mechanism at appropriate level should also be in place Computers that can simultaneously access a broadband Internet connection and an internal network poses great risk to the Government network and are strictly proh
25. being contaminated with computer virus or spyware adware Use of such software should be avoided If necessary they should only be installed with the approval from DITSO For close source freeware only those with a long history at least more than 2 years with good track record should be installed Open source freeware may be installed when they are carefully inspected and downloaded from trusted sites such as the official website Security patch should be applied when available Nevertheless users should be aware that the licence of freeware may not cover business usage e Regular reviews of the software inventory of systems should be conducted It is necessary to investigate installation of unapproved software or unauthorised amendments to production files 12 6 2 Software Asset Management Software Asset Management SAM tools are used to automate software inventory scanning and software metering They help in detecting unauthorised software ensuring sufficient licence coverage and revealing unused or under utilised software licences B Ds should consider deploying SAM tools to assist in managing their software assets There are different products and technology for SAM For example some desktop operating systems provide a means to maintain software asset inventory and prevent loading of unauthorised software B Ds should choose the best SAM tool that fits to their own IT environment Alternatively B Ds may engage a service provider to im
26. created for wireless specific security functions that operate with IEEE 802 1X WLAN should be used with sufficient authentication and transmission encryption measures in place complemented by proper security management processes and practices 12 7 1 1 Threats and Vulnerabilities of Wireless Network One characteristic of a wireless signal is that it generally fills the air within the WLAN s coverage and can penetrate beyond building walls and windows Thus there is potential security risk that anyone can pick up and read such signals unless security measures have been incorporated to guard the wireless transmissions against offensive listening In fact the risks in WLAN are equal to the sum of the risks of operating a wired network plus Ref No G3 12 21 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY the new risks introduced by weaknesses in wireless protocols The following are some of the risks associated with WLAN Malicious entities may gain unauthorised access to Government internal network through wireless connections potentially bypassing firewall protections and launch attacks Computer viruses or other malicious codes may corrupt data on a wireless device and be subsequently introduced to a wired network Malicious entities may deploy unauthorised equipment e g client devices and access points to surreptitiously gain access to or modify information Sensitive information that is not enc
27. demonstration on installation of CMS On ramp Re take of the assessment is allowed If a SP staff failed in the assessment of training course another assessment session will be arranged Page 11 of 17 eHR Service Provider Training Scheme Invitation Document Annex A Suggested Agreement Terms Note The suggested agreement terms between the private healthcare provider and eHR SP are for reference purposes only Private healthcare providers must exercise care in reviewing the terms and conditions of the agreement Services to be Provided by eHR SP l The following services are provided please delete as appropriate a Install and setup CMS On ramp for private healthcare providers and or update CMS On ramp b Install Communication Module locally to connect to the eHR Sharing System c Provide on going support and maintenance services d Conduct end user training for front line staff e Build the add on functionalities e g the billing functions to interface with CMS On ramp f Assist private healthcare providers in data migration 2 For the services provided eHR SP and the private healthcare provider agree the charging scheme as follows please add details as appropriate Obligations when Providing Services 3 eHR SP agrees to comply with the following conditions when providing services a Comply with the Laws of Hong Kong b Maintain a valid business registration in accordance the Business Registrati
28. department are allowed to access Ref No G3 11 1 IT SECURITY GUIDELINES APPLICATION SECURITY The way that each grade of staff in the user department are allowed to manipulate the data in the computer files Level of audibility required Amount of data to be maintained and the purpose of maintaining it in the information system Data files that need to be backed up Number of copies of backup to be maintained Frequency of backup and archive Conduct privacy impact assessment if the system has significant privacy implications The Privacy Commissioner for Personal Data has published an information leaflet on privacy impact assessment which is available at http www pcpd org hk english publications files PIAleaflet_e pdf The user requirements may be assembled into some form of security statement The user s security statement should then form part of the system s functional specification and be reflected in the system design Agile development methodologies are gaining acceptance in the software industry However due to its characteristics mismatches between agile methodologies and conventional methods for security assurance are quite obvious There are some suggestions to adapt security assurance to fit agile software development Document the security architecture Include a role in the development team for assessing security risks proposing potential security related issues and performing security reviews of
29. electronic messages Latest spamming lists blacklists should be regularly updated Prevent email address harvesting from websites Stop third party mail relay and use web proxy Block by public and private DNS blacklists Allow emails by whitelists Filter by sender email address email subject or email content or use heuristic content filtering Seek help from Internet service providers ISPs to prohibit spammers from using the ISPs services for spamming activities Users should observe the following security guidelines against spam or phishing email Use strong and unique passwords for electronic messaging accounts Do not open or forward any electronic messages from unknown or suspicious sources Ignore or delete all electronic messages from un trusted sources Do not follow URL links from un trusted sources to avoid being re directed to malicious websites or falling prey to phishing attacks Handle the email addresses with care When filling out web registration forms surveys and other online documents etc users are advised to check the privacy policy of the website before providing their email addresses to ensure that the website provides proper protection for their email addresses Use separate email addresses different from their office email addresses when participating in public newsgroup or chat rooms to avoid their office email addresses and or mail systems to become a target of spam Do not reply to spam or phi
30. g h i j Information System Confidentiality Integrity Availability IT Security Policy Classified Information Staff Data Centre Computer Room Malicious Codes a related set of hardware and software organised for the collection processing storage communication or disposition of information only authorised persons are allowed to know or gain access to the information stored or processed by information systems in any aspects only authorised persons are allowed to make changes to the information stored or processed by Information Systems in any aspects Information Systems should be accessible and usable upon demand by authorised persons a documented list of management instructions that describe in detail the proper use and management of computer and network resources with the objective to protect these resources as well as the information stored or processed by Information Systems from any unauthorised disclosure modifications or destruction refers to the categories of information classified in accordance with the Security Regulations persons employed by the Government irrespective of the employment period and terms a centralised data processing facility that houses Information Systems and related equipment A control section is usually provided that accepts work from and releases output to users a dedicated room for housing computer equipment programs intended to perform an unaut
31. if WPA2 Personal is used Disable SSID broadcasting to prevent the access points from broadcasting the SSID so that only authorised users whose configured SSID matches that of the access point can connect to the network Disable DHCP and assign static IP addresses to all wireless users to minimise the possibility of an unauthorised user obtaining a valid IP address Ref No G3 12 23 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Use MAC address filtering for configuring access points so that they allow only clients with specific MAC addresses to access the network or allow access to only a given set of MAC addresses e Do not directly connect wireless networks and wired networks Install a firewall or router with access control lists ACLs between the access point and the B D s network to filter connections e Enable threshold parameters such as inactivity timeouts e Activate logging features and redirect all log entries to a remote logging server if possible The log records should be checked regularly e Install wireless intrusion detection system WIDS or wireless intrusion prevention system WIPS to monitor the wireless networks e Deploy VPN on top of wireless network for connection to departmental network e Use client side digital certificates for mobile devices with limited Wi Fi defences so only authorised devices are allowed to access departmental network or resources e Segment the acc
32. in B Ds whereas Internet System Administrators are responsible for the related tasks for their Internet facing information systems Their responsibilities include e Implement the security mechanisms in accordance with procedures guidelines established by the DITSO 5 3 4 Application Development amp Maintenance Team The Application Development amp Maintenance Team is responsible for producing the quality systems with the use of quality procedures techniques and tools Their responsibilities include e Liaise with the Information Owner in order to agree on system security requirements e Define the solutions to implement these security requirements 5 3 5 Users Users of information systems are the staff who actually use the information and shall be accountable for all their activities Responsibilities of a user include e Know understand follow and apply all the possible and available security mechanisms to the maximum extent possible e Prevent leakage and unauthorised access to information under his her custody e Safekeep computing and storage devices and protect them from unauthorised access or malicious attack with his her best effort Ref No G3 5 7 IT SECURITY GUIDELINES CORE SECURITY PRINCIPLES 6 CORE SECURITY PRINCIPLES This section introduces some generally accepted principles that address information security from a very high level viewpoint These principles are fundamental in nature and rarely chan
33. internal users B Ds are recommended to perform security risk assessment in order to determine the most appropriate security protection measures Ref No G3 11 8 IT SECURITY GUIDELINES APPLICATION SECURITY 11 5 2 Web Server Security The following guidance should be observed in enhancing the security of the web servers Configure web server securely according to the vendor s security guidelines Run web server processes with appropriate privilege account Avoid running the web server processes using privileged accounts e g root SYSTEM Administrator Apply latest security patches to the web server software Configure access rights such that the web server software cannot modify files serving the users In other words the web server software should have read only access rights to those files Disable all unused accounts including user and default accounts It is common for web application to store the hash value of users password in database or file however a successful SQL injection attack or leaking of password file may yield easily crackable passwords The hashing of password should be used with a secret salt to protect against dictionary attack or pre computed lookup table i e a rainbow table of hashed values Install host based intrusion detection system HIDS intrusion prevention system HIPS in web servers storing or processing sensitive information to monitor suspicious activities or unau
34. ipee ve ear Haee 12 Annex B Training Courses and Materials eese 14 Annex CIE Securty Guide doe oreet gu oda b tete fip et e Es ht 17 Page 2 of 17 eHR Service Provider Training Scheme Invitation Document 1 Introduction 1 1 Purpose This document describes the framework and approach for the Electronic Health Record eHR Service Provider SP Training Scheme 1 2 Background eHR Programme In July 2009 the Legislative Council of HKSAR approved a commitment of HK 702 million for implementing the first stage of the eHR Programme from 2009 10 to 2013 14 The eHR Office eHRO of the Food and Health Bureau FHB is the project owner coordinating project implementation The eHR Project Management Office PMO of the Hospital Authority HA is the technical agency of the Government in implementing the eHR Programme eHR SP Training Scheme The engagement and participation of private healthcare and IT service providers are essential to the success in building up a territory wide patient oriented eHR Sharing System eHRSS in Hong Kong The eHRO of FHB launched the Second Stage eHR Engagement Initiative EEI in November 2010 to invite the information technology sector IT to submit partnership proposals contributing to eHR development eHR SP Training Scheme formerly known as eHR Compliant Service Provider Scheme is one of the partnership models in the second stage EEI It is designed to equip interested I
35. message attachments and downloads against computer virus and malicious code before use e Before installing any software verify its integrity e g comparing checksum value and ensure it is free of computer virus and malicious code Installation of any executable software received via electronic message or downloaded from web browsing should be approved by DITSO e Avoid using personal Internet email which is more susceptible to computer virus infection If private Internet email services must be used for business purpose emails should be downloaded to an isolated computer with dedicated Internet connection for Internet mail exchange e Always boot from the primary hard disk Do not allow booting workstations from removable device without permission Ref No G3 12 15 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Do not use storage media and files from unknown source or origin unless the storage media and files have been checked and cleaned for computer viruses and malicious codes e Follow the guidance in Section 10 8 DATA BACKUP AND RECOVERY to backup data User should also note that it is their own responsibility to protect their workstations and mobile devices by taking the appropriate actions for computer virus and malicious code protection 12 5 2 LAN System Administrator s Controls To protect against computer virus and malicious code LAN System Administrators should ensure servers workstations a
36. of information systems prior to the changes or modifications an intruder has made Backups especially if run daily can also be useful in providing a history of an intruder s activities Looking through old backups can provide footprints when the system was first penetrated Intruders may leave files around which although deleted later are captured on the backup media 10 8 1 General Data Backup Guideline Backup copies should be maintained for all operational data to enable reconstruction should they be inadvertently destroyed or lost The backup copies should be taken at regular intervals such that recovery to the most up to date state is possible Backup activities shall be reviewed regularly Procedures for data backup and recovery should be well established Wherever possible their effectiveness in real life situations should be tested thoroughly Ref No G3 10 10 IT SECURITY GUIDELINES DATA SECURITY 10 8 2 e Backup software for servers should be server based so that the data transfer can be faster and no traffic overhead 1s added to the network Moreover the software should allow unattended job scheduling thus backup process can be done in non office hours e tis advisable to store backup copies at a safe and secure location remote from the site of the systems In case of any disaster which destroys the systems the systems could still be reconstructed elsewhere e Should software updates besides backup copies
37. on password and encryption system on data No service due to server Tape backup system mirror disk redundant array of failure independent disks RAID system server backup system hot standby system No service due to Multiple communication paths communication link failure Spoofing of origin someone Multiple authentication mechanism digital signature sends the message in others name Spoofing of delivery someone Transaction log message time stamp digital signature sends the message but denies afterwards or someone makeup the message which he did not send Spoofing of receipt someone Multiple authentication mechanism transaction log pretends he has not read the message send read time stamp return receipt message in which he actually did Ref No G3 10 1 IT SECURITY GUIDELINES DATA SECURITY 10 1 Security usually means trade offs in user friendliness simplicity flexibility investment on time effort and cost and ability to recover the information when keys are not available or not provided User should be explicitly notified of such implication during the implementation of the IT security measures OVERALL DATA CONFIDENTIALITY Before determining security measures the data to be protected need to be identified and classified For instance data which worth money or which if lost can cause interruptions to the daily operation How data should be classified depends on their level of sensit
38. other existing policies or procedures Evaluation and Periodic Review Evaluate the proposed policy by inviting open discussion or arranging meetings among related parties or departments Hiring external qualified IT security auditors or consultants to review or assist in the development of the policy is a possible way to improve the quality and completeness of the policy If necessary the policy may be reviewed by legal counsel The development of an IT security policy without ongoing support will eventually leave the policy unattended and even outdated over time In fact some issues may diminish in importance while the new ones continually appear Hence frequent review of the policy can help to ensure that the policy still meets the latest requirements and copes with the technological changes HOW TO GET IT SECURITY POLICY IMPLEMENTED Even if an IT security policy has obtained approval putting the IT security policy in place is another story It requires a series of activities to streamline the process The paragraphs below list some of these major activities Departments should also consider their procedures rules and regulations during implementation Ref No G3 15 12 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 4 1 15 4 2 15 4 3 15 5 Security Awareness amp Training Security Awareness is crucial to ensuring that all related parties understand the risks and accept and adopt good security practic
39. regular basis to e Review and endorse changes to the Government IT security related regulations policies and guidelines e Define specific roles and responsibilities relating to IT security e Provide guidance and assistance to B Ds in the enforcement of IT security related regulations policies and guidelines through the IT Security Working Group ITSWG The core members of ISMC comprise representatives from e Office of the Government Chief Information Officer OGCIO e Security Bureau SB Representative s from other B Ds will be co opted into the committee on a need basis in relation to specific subject matters IT Security Working Group ITSWG The IT Security Working Group ITSWG serves as the executive arm of the ISMC in the promulgation and compliance monitoring of Government IT security related regulations policies and guidelines The ITSWG was established in May 2000 and its responsibilities are to e Co ordinate activities aimed at providing guidance and assistance to B Ds in the enforcement of IT security related regulations policies and guidelines e Monitor the compliance with the Baseline IT Security Policy at B Ds e Define and review the IT security related regulations policies and guidelines e Promote IT security awareness within the Government The core members of ITSWG comprise representatives from e Office of the Government Chief Information Officer OGCIO e Security Bureau SB e Hong Kong
40. release of security patches hotfixes 12 6 1 Software Usage Copyright law restrictions shall be respected at all times Only approved software and hardware with purchased licences are allowed to be set up and installed following all licensing agreements and procedures Staff shall observe and follow these terms Unauthorised copying modification or unlicensed use of the software or hardware is strictly prohibited Security control procedures should be developed to ensure compliance with all software licences purchase agreements and the existing legislation on copyright An inventory of all installed software should be audited against the licence agreements on a regular basis e g once a year Licences software manuals and procurement documentation should be stored in a secure location such as in a closed file cabinet and the inventory list shall be maintained regularly When upgrades of software are purchased the old version may be required to be disposed of depending on the purchase agreement e All software to be installed or run in a computer should be acquired officially from an authorised dealer supplier Illegal software copy should not be installed or run under any circumstances since these software files may have been computer virus contaminated Ref No G3 12 18 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Public domain software and freeware according to past records have a relatively higher chance of
41. reser ee eese ess sene snsessenssesessesss 15 1 WHAT AN IT SECURITY POLICY IS reife etie y eter eene oe o enpote 15 1 Ref No G3 ii 3 IT SECURITY GUIDELINES CONTENTS 15 2 TOOLS TO IMPLEMENT IT SECURITY POLICY eese enne ene tene tenete trennen 15 2 15 3 HOW TO DEVELOP AN IT SECURITY POLICY eese danao Perne eapi i arinn nen 15 2 15 3 1 Organisation of IT Security Policy Group sees ren een rennen enne tnnene 15 3 15 3 2 Planning tse eerte er e etie te e re eden e eee eerie 15 6 15 3 3 Determination of Security Requirements esses eene nennen een rennen ennt enne tenen 15 7 15 3 4 Construction of an IT Security Policy Framework essere eene 15 10 15 3 5 Evaluation and Periodic Review ene unen inei ee OR RET EE ESEE S ERa IES ESEESE itap OO 15 12 15 4 HOW TO GET IT SECURITY POLICY IMPLEMENTED eere nennen nennen enne 15 12 15 4 1 Security Awareness amp Traming iie teen Dep ESE S OEE DU ap aeS EEPE SEa TESES SE enpe T 15 13 15 4 2 Enforcement and Redress srera eemper HERR TESE EET apasae 15 13 15 4 3 On going Involvement of All Parties esesessseseeseeeeereneenneenneene aeo SEERDE nennen eren rennen ene 15 13 155 ADDITIONAL REFERENGPES ee eon eppeme mop UR PODeTU UO Di Or pe FE HT 15 13 APPENDIX A SAMPLE IT SECURITY END USER INSTRUCTIONS And Ref No G3 ii 4 IT SECURITY
42. should be applied to managing content in storage repositories Use It refers to the stage when the user is interacting with the data Security controls should be deployed to ensure the access of data in a manner that conform to Government security requirements Data access and usage activities should be properly monitored and if possible with preventive measures to alert stop policy violations Share It refers to the stage when exchanging data with users or external parties Secure sharing of data should be ensured by deploying appropriate encryption technology A mix of detective and preventative measures such as by deploying Data Leakage Prevention DLP or Content Management Framework solutions should be considered to monitor Ref No G3 10 4 IT SECURITY GUIDELINES DATA SECURITY communications and block policy violations in addition to monitor the activities related to data exchange Archive It is a process of transferring data from active use into long term storage A combination of encryption and asset management should be used to protect the data and ensure its availability Destroy When the data is no longer needed it should be permanently destructed Verification should be done to ensure the data in all active storage or archives has been destructed Common techniques include shredding disk free space wiping or physical destruction Following are some of the security requirements for handling or using data in connecti
43. the system design and programming code Document security related programming activities Conduct code review if necessary 11 1 1 Security Considerations in Application Design and Development Listed below are some security principles for reference when designing and developing applications Secure architecture design and structure Ensure that security issues are incorporated as part of the basic architectural design Detailed designs for possible security issues should be reviewed and mitigations for all possible threats should be designed and developed Least privilege Ensure that applications are designed to run with the least amount of system privileges necessary to perform their tasks Segregation of duties Ensure that the practice of segregation of duties is followed in such a way that critical functions are divided into steps among different individuals to prevent a single individual from subverting a critical process Ref No G3 11 2 IT SECURITY GUIDELINES APPLICATION SECURITY Need to know The access rights given for system documentation and listings of applications shall be kept to the minimum and authorised by the application owner Secure the weakest link Ensure that proper security protections are in place in all areas to avoid attackers from penetrating through loophole caused by negligence in coding since applications and systems are only as secure as the weakest link Proper authentication and autho
44. their passwords regularly Users should not open or forward any email from unknown or suspicious sources If users suspect or discover email containing computer viruses or suspicious content they should report the incident to the management and LAN System Administrator immediately and follow the corresponding incident handling procedures In particular user should not auto forward official emails to external email systems unless the security of the email system can be assured There is possibility that some emails with classified sensitive content may also be automatically forwarded If those emails with classified sensitive content are not encrypted but auto forwarded it may violate the requirements in SR for transmission of classified information Email systems that are not under direct control of the Government pose additional security risks for the stored information 12 4 2 Instant Messaging Instant messaging IM is widely used nowadays for online communication chatting and file sharing Though IM is an effective means of communication it introduces new security risks e Disclosure of sensitive information Sensitive information can be read by or distributed to unauthorised users This is especially the case when using public IM clients to communicate with individuals outside the Government e Security breaches Malicious code can spread via the IM channel quickly e Monitoring and retention headaches It is not trivial to monitor I
45. to audit the effectiveness of the security measures e g logical access control in case a violation of the IT security policy e g attempt of unauthorised access to a resource is detected Nevertheless the logs shall not be used to profile the activity of a particular user unless it relates to a necessary audit activity as approved by a Directorate officer Logs shall be retained for a period commensurate with their usefulness as an audit tool During this period such logs shall be secured such that they cannot be modified and can only be read by authorised persons Regular checking on log records especially on system application where classified information is processed stored shall be performed not only on the completeness but also the integrity of the log records Any irregularities or system application errors which are suspected to be triggered as a result of security breaches shall be logged and reported Detailed investigation should be carried out if necessary If shared accounts are used in a B D the System Security Administrator should maintain and periodically update an account inventory list for shared group accounts with information including but not limited to system name user name in person who can share the account shared user ID permission s granted account valid period and reason for sharing The account inventory list can be used to trace individual who has shared access to a particular system at a given time f
46. to steal information DON Ts 1 Don t store classified information in your own mobile devices or removable media 2 Don t leave your workstation and computer equipment unattended without sufficient physical access controls e g opened door left on desk 3 Don t keep a written record of password anywhere near to your work e g a memo stuck on screen nor use any information that is easy to be guessed e g a dictionary word or related to you e g name birthday or post as your password nor share your password with others 4 Don t disclose information about your own your system or your department to any unauthorised person 5 Don t connect your own device to Government internal information system or network 6 Don t connect workstations to external network by means of dial up modem wireless interface or broadband link 7 Don t open any suspicious emails or follow any links to avoid being redirected to malicious websites 8 Don t publish or use office email address when participating in public websites to avoid office email address and or mail systems to become a target of attack 9 Don t install software in your workstation without prior approval of DITSO
47. trained eHR SPs to facilitate private HCPs to acquire their services Given the complexities involved company eHR SPs IT vendors and individual eHR SPs private HCPs who plan to install CMS On ramp are required to complete the required training courses and assessments Contact details and service offerings of eHR SPs will be uploaded to the eHRO website As installation technical support and other add on services are subject to negotiations between the private IT vendors and HCPs the Government will not specify any charging scheme for eHR SPs Also the Government will not provide any financial subsidy to eHR SPs who should receive their revenue from the private HCPs Page 7 of 17 eHR Service Provider Training Scheme Invitation Document 3 eHR SP Training Scheme 3 1 Company and Individual Application Company Application For IT Vendor its business is to provide IT services to the healthcare sector and has solid IT system implementation and support experience e it has good knowledge in Operating Systems e g Windows and Mac OS and knowledge and experience in installing application server e g Tomcat JBoss Weblogic Apache HTTP server and database server e g MS SQL MySQL e it is willing to provide services as specified at Section 2 1 to private HCPs and agree to upload its contact details and service offerings at the eHRO website upon successful completion of the training programme e itis willing to compl
48. 10 8 SECURE PRINTING 5 ertt rp e eir DEPO i ERR ten spas secsbbbaney F r br tree e heec boner cheebeaees 10 9 DATA BACKUP AND RECOVERY 3 n et ee RE heit ehe DRE ea e ER EUR Dope DE trier 10 10 10 8 1 General Data Backup Guideline ete eter ride eletti rette it 10 10 10 8 2 Devices and Media for Data Backup eee eeceeccesecesecesecsseceecseecaeecseseaeseeeeseeeeeeseesecaecaeesaecnaesaes 10 11 10 8 3 Server Backup eg Reo een ue aperi qp 10 12 10 8 4 Workstation Backup nre eee ep Hee t irri EES ET EAE E ET EE Erara 10 13 INFORMATION ERASURE 5 5 not eerte Eep EEEE e he EEr erri ERE eri tr E traps 10 14 ADDITIONAL REEPEBRENCPES 3 rrt eret He nsdn hp re te ri Ge E e esT EEr Erose 10 15 APPLICATION SECURITY vasesiisccsesstevsaceiaisusessicssscsspecuscdus vb sctcsnacsvcadsesuiccssecdeccesusassctvessveccor d Eod SYSTEM SPECIFICATION AND DESIGN CONTROL eerte nnne trennen eren enne ens 11 1 11 1 1 Security Considerations in Application Design and Development see 11 2 PROGRAMMING STANDARD AND CONTROL eese nennen nene ene inneren tenete 11 4 11 2 1 Programming Standard Establishment eene nennen een rennen ennt nene 11 4 11 22 Division Of Eabour ae aeree ROI ite eee Rtas de casei copier etc Ir decet KASES 11 4 PROGRAM SYSTEM TESTING itte ettet ee Sos cete pide lee locatur ponte tee ee TOSSE oE EE EEES 11 4 CHANGE MANAGEMENT AND CONTROL
49. 12 24 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY The following table summarises the applicability of wireless network with respect to the transmission of various categories of information in accordance with the requirements specified in the Security Regulations Category of Applicability of Using Wireless Network for Transmission Information TOP SECRET Not allowed SECRET Not allowed CONFIDENTIAL Allowed provided that it is transmitted using designated device with approval of Head of B D and there are sufficient authentication and transmission encryption security controls and have attained the level of encryption required for CONFIDENTIAL information Usage of VPN is recommended to provide strong authentication and encryption tunnel over WLAN connection In addition proper key management and configuration policies should also be established to complement the technical solution RESTRICTED Allowed provided that there are sufficient authentication and transmission encryption security controls and have attained the level of encryption required for RESTRICTED information Recommend to adopt the same level of encryption required for CONFIDENTIAL information and with proper key management and configuration policies similar to those for CONFIDENTIAL information Unclassified Allowed Following the principle that only authorised parties are permitted to access the network where information is stored
50. 2 7 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 3 4 Beware that when accessing the Internet using IP addresses and domain names of B Ds they may be perceived by others to be representing the Government Use only privately owned email addresses or identities in public forums newsgroup etc for personal purposes Do not execute mobile code or software downloaded from the Internet unless the code is from a known and trusted source Do not visit or download files from doubtful websites all software and files downloaded from the Internet shall be screened and verified with anti virus software Follow the best practices in Section 12 5 PROTECTION AGAINST COMPUTER VIRUS AND MALICIOUS CODE to protect against computer virus and malicious code Social Networking Services Using social networking services SNSs such as social networking sites microblogging sites video and photo sharing sites wikis collaboratively edited web pages discussion forums and blogs are getting popular but they also bring privacy issues security concerns and add new dimensions of security risks Privacy threat User may place too much personal information to the social networking sites allowing a profile to be produced on an individual s behaviour on which decisions detrimental to an individual may be taken Disclosure of sensitive information Post internal or classified information that would bring discredit on or embarrass the G
51. 3 15 5 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 3 2 c Security Working Team Coordinator A Security Working Team Coordinator is responsible to coordinate among the security working team members for managing and controlling the preparation of the policy within the time set by the Security Steering Committee This co ordinator may be managers or officers from departments d IT Security Policy Reviewer It may include staff or group of staff from internal or appointed external qualified consultants who are responsible for reviewing the IT security policy including quality assurance and applicability of the IT security policy The internal or external security consultants auditors can assist in formulating the compliance measure of the IT security policy Permanent establishment of this team may or may not be required depending on the department s own needs The above organisation model is used herein as a sample and individual department may tailor for its own structure or functional units For some departments they may only require a Security Working Team Coordinator to perform all the tasks and propose the policy to their senior management Whilst for other departments a Security Working Team may be sufficient Planning Plans provide information that is a basis for decision making and controlling By planning the necessary resources required and the activities to be undertaken the development of the IT s
52. AM SYSTEM TESTING The need for comprehensive program system testing is obvious Therefore this section will only focus on areas that need to be observed in order to increase the reliability and security of the program system in concern Ref No G3 11 4 IT SECURITY GUIDELINES APPLICATION SECURITY Firstly the user department should carry out user acceptance test in which they are responsible for preparing the test plan and test data Test data should be selected protected and controlled commensurate with its classification carefully AII sensitive content contained in the test data should be removed or modified beyond recognition before use The user department should examine all outputs in detail to ensure that expected results are produced If error messages are encountered they should be able to understand the messages and take corresponding actions to correct them The test plan should cover the following cases e Valid and invalid combinations of data and cases e Data and cases that violate the editing and control rules e Cases for testing the rounding truncation and overflow resulted from arithmetic operations e Cases for testing unexpected input e g overly long input incorrect data type unexpected negative values or date range unexpected characters such as those used by the application for bounding character string input etc Besides user acceptance test there are other tests that are useful to validate the correc
53. CP IP protocol suite for communication Internet connectivity offers enormous benefits in terms of increased access to information However the Internet suffers from significant and widespread security problems The fundamental problem is that the Internet was not designed to be very secure A number of TCP IP services are vulnerable to security threats such as eavesdropping and Ref No G3 12 5 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 3 1 12 3 2 spoofing Electronic message passwords and file transfers can be monitored and captured using readily available software Internet services need stronger authentication and cryptography mechanisms and these mechanisms must be truly interoperable Internet information enquiry or transaction processing requires user authentication One time password and two factor authentication may be required for secure access Audit and backup of authentication information may be required In general Internet security covers a wide range of issues such as identification and authentication computer virus protection software licensing remote access dial up access physical security firewall implementation and other aspects relating to the use of Internet Gateway level Protection Any B D that supports Internet facilities must protect its information and information resources from unauthorised access or public break ins All Internet access from departmental network must
54. ES he B enealth ESTE KAS HKSARGOVT Electronic Health Record eHR Service Provider SP Training Scheme Invitation Document November 2013 The Government of the Hong Kong Special Administrative Region eHR Service Provider Training Scheme Invitation Document TABLE OF CONTENTS I Introduction 2i eere eher eves cessere cricket tue SEEDEN areae i e Cea Ud 3 JP MEM iot cor PR 3 1 2 Background a asse D ER eH S AR HRS EORR DEI academe ave 3 1 3 wCNDS OTTAlip oso sott de teed ah haat Eesti destu eet aces M eee ef nde E 4 2 Service Offerings and Government Support eee eee eee eese teen tenen an 6 2l Serye OHenngs oec geben psu inen ini dolet raat ae boten dics putos ate 6 22 XCGoverment SUPPOUL i renon Red Fer hao ia td dae qe E qe eir So EGOSTE 6 2 95 Business Model docete eh e lr de cu tad drei epee 7 3 eHR SP Training SCHEME osos iti ee tS UA ERES URUR NOSSA Lon C HRS CURE PHA IE PRAE ICH Qo RUNE 8 3 1 Company and Individual Application eene 8 32 Application Tor Vrain esc e ecologico tedio 8 3 9 Duties and Re sponsiDIlitless iicet ee sath Eoo tu ter Phe teca oti Delo Foe iras 10 S MEM LII RTT TN 11 4L rante ADDEOACD t leise tuvo v Cea at afe os tr Uta Envio i gai siterte 11 4 2 Provision of Training Programme sees enne nns It AS ASSESS MENi 4n erosion Dag eames da i enden oat e nae dates 11 Annex A Suggested Agreement Terms eese nte atn ec ir e vino Fev
55. EmaulSecutity iter eee te iie be tree Re dee esie e aee ve E E etre 12 10 1242 Instant MeSSaglng i oett tek eret tee pete qe eere eer evene ep eee e E E a Re T 12 11 12 43 Spam and Phishing et E Reto bte Rb petet teh dete es 12 12 PROTECTION AGAINST COMPUTER VIRUS AND MALICIOUS CODE eere 12 14 1251 User s Controls 555 onn ei el aie mot UE 12 15 12 5 2 LAN System Administrator s Controls eese eene enne ener nnnn nee enne enne 12 16 12 5 3 Detection and Recovery poe iie pete eo dete be ire eerte te tese eb tette EEE E E 12 17 SOFTWARE AND PATCH MANAGEMENT eene nennen nennen eene en ne enne tenetene tren trennen 12 18 12 6 Software Usage noine ee karispa esmee eae is emt eite Tope pe He EA ette Bees de Poen eos 12 18 12 6 2 Software Asset Management ioni rae pere eee ur Ho rere eee 12 19 12 6 3 Patch Management o enormi ere eid eat e ee pt e eet dp eee e e P eer 12 19 WIREEESS SECURTEY 3 5 e teenporn ete eie UHR e e ee cede tue tta Pee dert 12 21 12 7 Wireless NeUWOEIK eei pee oet ect t eat e ee t eee ped re e e ri ertt 12 21 12 7 2 Radio Frequency Identification RFID Security 0 cee ceeeeeeeeeeeeceeseeseeeseesecaecsaecsaecsaeeaeeenes 12 25 CUMBRE 12 27 VOICE OVER IP VOIP SECURITY 44 tereti ettet ded he ere Pre eit Perte 12 28 COMMUNICATION WITH OTHER PARTIES essere trennen trennen reete enne enne ens 12 29 12 9 1 Inter departmental Commu
56. Ensure that security mechanisms are designed to reject further code execution if application failure occurs Proper configuration management Ensure that the application and system are properly and securely configured including turning off all unused services and setting security configurations properly Remove unnecessary items Ensure that unused or less commonly used services protocols ports and functions are disabled to reduce the surface area of attack Unnecessary contents such as platform information in server banners help databases and online software manuals and default or sample files should also be removed from production servers to avoid unnecessary disclosure of system information Data confidentiality Ensure that the sensitive or personal data is encrypted in storage or during transmission Mask the sensitive information when being displayed printed or used for testing where applicable Data authenticity and integrity Ensure that the authenticity and integrity of data are maintained during information exchange Secure in deployment Ensure a prescriptive deployment guide is ready outlining how to deploy each feature of an application securely Ref No G3 IT SECURITY GUIDELINES APPLICATION SECURITY 11 2 PROGRAMMING STANDARD AND CONTROL 11 2 1 Programming Standard Establishment The programming controls to be enforced must achieve at least the following purposes e To ensure that the program conforms to the prog
57. For example configure the device to remove spooled files and other temporary data using a secure overwrite or encrypt the disk for data processing Follow requirements as stipulated in SR if the embedded storage will be used for processing classified information Assign a static IP address for the device Change all default password or Simple Network Management Protocol SNMP strings Whenever possible use SNMP v3 Only allow trusted hosts to manage the device Disable unsecure protocols such as Telnet File Transfer Protocol FTP Dynamic Host Configuration Protocol DHCP Hypertext Transfer Protocol HTTP Use Hypertext Transfer Protocol Secure HTTPS if remote management is needed Enable secure network protocols and services e g IPsec or Secure Internet Printing Protocol IPP whenever possible to prevent unauthorised network interception Access to file shares should be appropriately controlled e g by password protection Firmware should be upgraded as recommended by the manufacturer or support vendor Enable audit logging and review the logs regularly if available 10 8 DATA BACKUP AND RECOVERY A good backup strategy is essential for data security File system backups not only protect data in the event of hardware failure or accidental deletions but also protect information systems against unauthorised changes made by an intruder With a daily copy of data backup it would be easier to revert to the last secured state
58. Identifying who should be involved in the developing process Deciding on the developing schedule Only after the policy has been approved by the Steering Committee will it then be proposed and submitted to the management of the department or related parties for approval This means that the policy so prepared shall conform to the department s own procedures for implementation and further approval Ref No G3 15 4 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS b Members of the committee may include i ii iii iv Executive Management who represents the interests of the departmental goals and objectives and provides overall guidance and assessment of the IT security policy throughout the forming process Examples are senior managers and principal officers from departments Senior User who represents the users of the related systems or applications which may be affected by the IT security policy Examples are the senior officers data system owners and managers from departments Security Officer may be the DSO or any person who is responsible for the security issues of the department and can state the high level security requirements with reference to the Security Regulations law or rules of the Government such as the classification or sensitivity of information Senior Technical any personnel who can provide technical support for various security mechanisms or technological aspects Senior Systems
59. Infrastructure Library ITIL from the United Kingdom s Office of Government Commerce OGC now part of the Cabinet Office eHR SP can also refer to the guidelines published by the Office of the Government Chief Information Officer of HKSARG Page 13 of 17 eHR Service Provider Training Scheme Invitation Document Annex B Training Courses and Materials Basic Level Training Courses Course 1 Overview of eHR 99292992295 What is eHR and the impact on medical practice What is eHR Sharing System Overview of clinics eMR ePR in Hong Kong Current Situation in Hong Kong Benefits of eHR Sharing System Why do we need eHR eHR reference in other countries Overview of Health Informatics Course 2 Introduction of data privacy and security in clinical environment gt gt Practical guide to IT security Best practice of IT security Private data classification Best practice and guidelines when handling data privacy Incident handling Course 3 Basic Clinical Knowledge lt gt 99295 Basic medical concepts when using CMS On ramp Diagnosis Procedure Alert and Allergy Discharge summary eHR Connectivity and patient data sharing Course 4 Introduction to Health Informatics HI gt lt gt lt gt What is Health Informatics HI Utilise HI in clinical environment Basic introduction to HI standards and terminology e g Health Level Seven International HL7 Systematised Nomenclature of Medic
60. L SECURITY This section describes the best practices that can be utilised to physically protect classified information and IT resources in order to minimise the business and operational impact due to nature disasters and trespassing 8 1 ENVIRONMENT The following sections provide guidelines in building a well protected computer environment and maintaining a computer room for operation 8 1 1 Site Preparation As most of the critical IT equipment are normally housed in a data centre or computer room careful site preparation of the data centre or computer room is therefore important Site preparation should include the following aspects e Site selection and accommodation planning e Power supply and electrical requirement e Air conditioning and ventilation e Fire protection detection and suppression e Water leakage and flood control e Physical entry control To start with B Ds should make reference to existing site selection and preparation guidelines for the general requirements and best practices Together with the set of specific facility requirements and the Security Bureau security specification Level I II IIT B Ds can determine all the physical environmental requirements including security requirements prior to construction The following diagram illustrates the typical workflow in determining the physical security requirements For detail security specifications on Level I II III security please refer to document
61. LAs are used to define the expected performance for each required security control describe measurable outcomes and identify remedies and response requirements for any identified instance of non compliance Besides defining SLA the contract should include an escalation process for problem resolution and incident response so that incidents can be handled according to a pre defined process to minimise the impact to the B Ds B Ds should monitor security control compliance of the external service providers and users actively and periodically B Ds should reserve the audit and compliance monitoring rights such as to audit responsibilities defined in the SLA to have those audits carried out by independent third party and to enumerate the statutory rights of auditors Otherwise the external service providers should provide satisfactory security audit certification report periodically to prove the measures put in place are satisfactory In addition B Ds should ensure the adequacy of contingency plan and back up process of the external service provider B Ds should also ensure that external service providers employ adequate security controls in accordance with Government regulations IT security policies and standards Staff of external service providers are subject to equivalent information security requirements and responsibilities as Government staff The information or system owner should be aware of the location of the data being hosted by the serv
62. M messages and retain the messages as business records e Accountability Identity of IM message sender and receiver cannot be verified in public IM network Because of the potential security risks usage of IM should be restricted for business purpose only and requires approval by DITSO If a B D decides to use IM the following security controls should be implemented e Develop IM acceptable usage policy and clearly disseminate to users of IM e Consider implementing an enterprise IM solution instead of using public IM clients Also consider to integrate the enterprise IM system with the B D s existing authentication mechanisms such as the Directory Service Ref No G3 12 11 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Select enterprise IM products that provide strong encryption e Implement IM gateway to enforce IM policy by monitoring the usage managing IM traffic and filtering content to block unwanted messages computer viruses and offensive material and log IM messages for audit trail purpose e Disable all unnecessary features and network services provided by the IM enable all notifications when incoming outgoing messages call files are received sent disable sharing of resources and disable remote activation of microphone and video camera 12 4 3 Spam and Phishing In today s connected world email and other messaging tools are critical business tools However behind the convenience electron
63. Record Management in the Manual of Office Practice should also be addressed In other words the drafting of the policy should consider the following aspects e Goals and direction of the Government of HKSAR e Existing policies rules regulations and laws of the Government of HKSAR e Department s own requirements and needs e Implementation distribution and enforcement issues In fact IT security policy can be very high level and technology neutral or detailed and technology specific IT security policy can be categorised into three basic types e Program level policy It is used to create an organisation s computer security program by assigning program management responsibilities and stating organisation wide computer security purpose and objectives It is a high level policy and is usually broad enough that it requires little modification over time e Issue specific policy It identifies and focuses on areas of current relevance and concern It requires more frequent revision due to changes in technology For example a policy on the proper use of a cutting edge technology whose vulnerabilities are still largely unknown within an organisation Ref No G3 15 1 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 2 15 3 e System specific policy It focuses on policy issues which management has decided for a specific system It addresses only one system while the program level policy and issue specific policy both
64. S and VMs for vulnerabilities Verify security status of each VM before putting into production or after restoring from a snapshot including the updateness of the anti virus solution and patching status Protect against unauthorised access between two VMs Enforce least privilege principle for communication between VMs by disabling unnecessary VM to VM communication if possible Restrict remote access to the management console by authorised personnel only Manage VM images and snapshots with care and encrypt VM images and snapshots whenever possible if sensitive data was involved Log activities for privilege accounts of hypervisor and VM Security logs should include events such as access to VM images and snapshots changes to user access rights modifications of file permission Identify and delete all the image copies including the copies for backup or in failover system when the VM image is no longer needed Ref No G3 12 33 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 13 CLOUD COMPUTING Cloud computing can be viewed as a new way of delivering IT based services to enterprises rather than a new technology on its own For the most part cloud computing uses similar management tools operating systems databases server platforms network infrastructure network protocol storage arrays and so on Therefore security principles in cloud are largely similar to those in traditional IT environment Ho
65. T vendors with necessary knowledge to provide end user support services to Healthcare Providers HCPs on Clinical Management System CMS On ramp installation Upon completion of the training programme eHR SPs shall be able to provide installation services technical support and training to HCPs to facilitate their adoption of CMS On ramp ES fe health EG fg eHR Service Provider Training Scheme Diagram 1 eHH Service Provider Training Scheme Page 3 of 17 eHR Service Provider Training Scheme Invitation Document The objectives of the eHR SP Training Scheme are to provide training to interested IT vendors to deploy and provide implementation services to CMS On ramp and the Communication Module to the eHR Core Sharing Platform for the private healthcare sector encourage interested IT vendors to provide add on and innovative services of CMS On ramp that suit the private healthcare sector and provide training to the private HCPs or their supporting staff who plan to install the CMS On ramp and the Communication Module in house 1 3 CMS On ramp CMS On ramp CMS On ramp is a clinic management system with the ability to share the clinical data of patients with the territory wide patient oriented eHRSS Our vision is to have CMS On ramp a turn key system designed to suit private clinics daily clinical operation workflow The system has already embedded the functions to view and upload patients record to eHRSS
66. T SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY Review the resources requirement such as disk spaces and network capacities of VMs and applications Establish recovery procedure to revert the VMs to known good image Technical Controls Enable VM specific network security features such as host firewall on VMs virtual network configuration and virtual firewall in hypervisor layer Restrict access to the VMs using physical or virtual firewall commensurate with the business need and regularly review the access policy to reflect new business needs Implement hypervisor based network based or host based protection solution for each VM or a cluster of related VMs as appropriate such as deploy anti virus solution firewall to monitor and block malicious traffic Harden the hypervisor and VM instance Configure the host OS with minimum required functions Create a list of expected services and applications or white list for each VM Disable unnecessary services e g clipboard communication ports and virtual hardware e g virtual CDs virtual network adapters to reduce security vulnerabilities Deploy patch management to the hypervisor and VM as if they are physical machines Install all updates promptly to the hypervisor and all VMs including online VMs i e those in use and offline VMs i e those not in use but with their image files kept as backup Use vulnerability management tools to regularly scan the host O
67. Tunnelling Protocol L2TP and Point to Point Tunnelling Protocol PPTP In addition to traditional layer 2 and layer 3 VPN SSL VPN Secure Sockets Layer Virtual Private Network is another VPN technology providing the tunnelling protection In SSL VPN the tunnel rides on TLS Transport Layer Security communication sessions SSL VPN differs from traditional VPN because it can operate without the need of VPN client software while the traditional VPN usually requires client software Setup of VPN is considered to be a viable solution to establish secure communication channel for users to work outside office Before implementing VPN B Ds should evaluate compatibility with the existing network and consider implementing the following VPN security guidelines e Authenticate with either one time password authentication such as a token device or public private key system with a strong passphrase e Disconnect automatically from Government internal network after a pre defined period of inactivity The user must then logon again to reconnect to the network e Disallow dual split tunnelling Only one network connection is allowed e Protect all computers or devices connected to Government internal networks via VPN with personal firewall latest security patches anti virus and malicious code detection and recovery software All these security measures should be activated all the time and with the latest virus signatures and malicious code definiti
68. Y GUIDELINES SCOPE 2 SCOPE This guideline describes security considerations in the following eight areas e Management responsibilities e Physical security e Access control security e Data security e Application security e Communications and operations security e Security risk assessment and auditing e Security incident management Basically these considerations should be taken into account in all phases of the System Development Life Cycle SDLC There are however specific areas in the SDLC phase which needs special attention These areas are highlighted in the chart in the following page Ref No G3 2 1 IT SECURITY GUIDELINES Project Initiation j Project Initiation Feasibility Study v STAGE 0 Feasibility Study Y System Analysis amp Design STAGE 1 Investigation of Current Environment Y STAGE 2 Business System Options Y STAGE 3 Definition of Requirements Data Security Outsourcing Security Y Y Logical System Design STAGE 4 Technical System Communications amp Operations Security Options STAGE 5 Data Security Access Control Security Application Security Implementation STAGE 6 Physical System Design Physical Security Communications amp Operations Security v Y Program System Development Application Security v System
69. address policy from a broad level usually encompassing the entire organisation The choice of developing which type of policy depends on your organisation s requirements However the most important thing is that policy sets the direction The direction can be used as the basis for making other lower level decisions In later sections the term IT SECURITY POLICY refers to a general IT security policy instead of referring to any of the above particular type so as to provide a baseline guidance TOOLS TO IMPLEMENT IT SECURITY POLICY Because policy may be written at a broad level it is essential to develop standards guidelines and procedures to offer users administrators computer personnel and top management a clearer approach to implementing IT security policy and meeting the departmental missions STANDARDS specify a uniform use of specific technologies parameters or processes to be used to secure systems Standardisation can act as a control for IT security policy implementation and are normally compulsory They are mandatory statements which can be measured GUIDELINES are similar to STANDARDS but they are not mandated actions They can assist users administrators and other systems personnel in effectively interpreting and implementing IT security policy They are recommended as effective security practices that should be implemented where such controls are applicable and enforceable Although guidelines are often used to ensure tha
70. ailbreak detection should be incorporated with if available Depending on the vendor of the target mobile device different MDM functions are available in the market Mobile devices are likely to contain or process information that is personal to the owners or tightly tied with them A security in mind approach should be adopted in mobile application development to mitigate privacy risks in a proactive and preventive manner Privacy should be embedded into design and integrated to system Encryption should be provided for storing sensitive data Assume that shared storage is un trust store sensitive data on the server instead of client end device Application should enforce appropriate encryption on the data downloaded or created Data used by mobile application should be kept at minimum e g geo location data or contact information should be discarded after use for the sake of user privacy Transmission of any sensitive data such as personal data or credit card information should be properly protected with encryption If the mobile application needs to access or upload specific information stored in the device contact list location or calendar entries it should be carried out on a permission basis and allow the user to decide whether to continue to use the application OS level settings of the mobile device should be commensurate with the data security level Do not directly manipulate the settings within the mobile application for privacy or
71. aintain an information protection program to assist all staff in the protection of the information and information system they use e Lead in the establishment maintenance and implementation of IT security policies standards guidelines and procedures e Coordinate with other B Ds on IT security issues e Disseminate security alerts on impending and actual threats from the GIRO to responsible parties within the B D e Ensure information security risk assessments and audits are performed as necessary e Initiate investigations and rectification in case of breach of security DITSO may line up an IT security working team within the B D to assist in leading monitoring and coordinating of IT security matters within the B D Departmental Security Officer DSO According to the Security Regulations the Head of B D will designate a Departmental Security Officer DSO to perform the departmental security related duties The DSO will take the role as an executive to e Discharge responsibilities for all aspects of security for the B D e Advise on the set up and review of the security policy The DSO may take on the role of the DITSO Alternatively in those B Ds where someone else is appointed the DITSO shall collaborate with the DSO to oversee the IT security of the B D Departmental Information Security Incident Response Team ISIRT Commander The ISIRT is the central focal point for coordinating the handling of information secur
72. aintenance The following topics will be covered in this section e System specification and design control e Programming standard and control e Program system testing e Change management and control e Web application security e Mobile application security SYSTEM SPECIFICATION AND DESIGN CONTROL In the system specification and design phase checking should be performed to e Ensure that the system designed complies with acceptable accounting policies accounting and application controls and with all appropriate legislative measures e Ensure a threat model is built and threat mitigations are present in all design and functional specifications A minimal threat model can be built by analysing high risk entry points and data in the application e Review the system design with the user for checking out if there are any loopholes in maintaining the integrity of information The user should be encouraged to suggest corrective measures on any deficiency detected e Evaluate with the users on how they will be affected if there is a loss to the data processing capability A contingency plan should be formulated following the evaluation For details on developing contingency plan please refer to Section 7 3 CONTINGENCY MANAGEMENT e Evaluate with the users the sensitivity of their data Information to be discussed includes Level of security to be achieved Origin of the source of data Data fields that each grade of staff in the user
73. ality and integrity of the data if sensitive values have to be stored in client browsers Encrypt pages with sensitive information and prevent caching Encrypt pages containing sensitive information with proper algorithms and keys during transmission e g SSL TLS Use signed Java applet or ActiveX to acquire and display sensitive information Set the appropriate HTTP header attributes to prevent caching by browser or proxy of an individual page wherein the page contains sensitive information Session management Use a session ID that is long complicated and with random numbers so that it is unpredictable Set duration of session ID to as minimum as appropriate to complete the session activity Do not store session ID in URL persistent cookies hidden HTML field nor HTTP headers Consider storing session ID in client browser s session cookies with proper encryption Protect session ID by SSL TLS so that attacker cannot sniff from the network Do not share session ID for multiple connections Ref No G3 11 11 IT SECURITY GUIDELINES APPLICATION SECURITY 11 6 Do not rely on checking IP address of the incoming connection with the session ID because the IP address can be proxied Implement a logout function for the application and idle session timeout When logging off a user or expiring the idle session ensure that not only is the client side cookie cleared if possible but also the server side session state
74. alling the patch should be assessed by comparing the risk posed by the vulnerability with the risk of installing the patch If a B D decides not to apply a patch due to whatever reasons or if no patch is available DITSO should be consulted and the case should be properly documented B D should also implement other compensating controls such as e Turning off services or capabilities related to the vulnerability e Adapting or adding access controls e Increased monitoring to detect or prevent actual attacks 12 7 WIRELESS SECURITY 12 7 1 Wireless Network Wireless Local Area Network WLAN is a type of local area network that uses high frequency radio waves rather than wires to communicate between devices WLAN isa flexible data communication system used as an alternative to or an extension of a wired LAN Wireless information communication has enabled people to interact more easily and freely With the advent of technology and advances in price performance wireless accessibility is increasingly deployed in the office or in public places WLAN is based on IEEE 802 11 standard Different standards such as 802 112 802 11b 802 11g and 802 11n have evolved supporting different frequency spectrums and bandwidths There are two related IEEE standards 802 1X and 802 11i The 802 1X a port based network access control protocol provides a security framework for IEEE networks including Ethernet and wireless networks The 802 111 standard was
75. also be reviewed regularly to detect anomalies including those attacks intrusions on system software or web applications targeting on end users More and more vendors nowadays adopt or comply with international industry standards such as Common Criteria http www commoncriteriaportal org in building security facilities into their systems Such standards usually have different certifications for systems attaining different levels of security requirements B Ds may consider such certification requirements when assessing the security measures provided by the systems based on their business needs On the other hand all unauthorised accesses to an Information System must be reported and the security violation report should be checked preferably on a daily basis It is also important to establish tight change control procedures for system software for detecting unauthorised usage Most unauthorised users of an information system can be detected via system monitoring Monitoring a system which must be done on a regular basis involves looking at several parts of a system and searching for anything unusual 12 14 3 Tools for Monitoring the System Most operating systems have log files Examination of these log files on a regular basis is often the first line of defence in detecting unauthorised use of the system The following serves as some clues for identifying unauthorised access i Most users typically log in and out at roughly the same
76. an officer has been appointed as the Departmental IT Security Officer DITSO to oversee the IT security of the name of Bureau Department End user diligence is necessary to protect the information or the information systems commensurate with the data classification Each user is accountable to all of his her activities on the information systems Security is the personal responsibility of every user To protect classified or personal information from unauthorised access or unauthorised disclosure prevailing Government security requirements including Security Regulations and Baseline IT Security Policy shall be observed No officer may publish make private copies of or communicate to unauthorised persons any classified document or information obtained in his official capacity unless he is required to do so in the interest of the Government The need to know principle should be applied to all classified information which should be provided only to persons who require it for the efficient discharge of their work and who have authorised access If in any doubt as to whether an officer has authorised access to a particular document or classification or information the Departmental Security Officer should be consulted Users should safe keep and protect computers and storage devices from unauthorised access or disclosure of information under their custody Appropriate security measures should be implemented to protect Government information assets
77. anged regularly In some cases two factor authentication may need to be implemented B Ds should also consider using call back security feature With call back security the answering modem accepts the incoming call and authenticates the user Once the user is Ref No G3 9 11 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 5 5 authenticated the modem disconnects the call and then places a call back to the user using a telephone number in a predefined database The implementation assists in preventing unauthorised access or use of stolen credential Although call back improves security it is susceptible to compromise by call forwarding and should be used together with other security controls such as two factor authentication for dial up connection to sensitive environment Access logs should be kept for every dial up request At least the following information should be recorded date time and duration of access username and the connected communication port The access log should be made available for the inspection when necessary Virtual Private Network Virtual Private Network VPN establishes a secure connection over un trusted network by using a technique called tunnelling Operating on layer 2 or layer 3 s networking protocols tunnelling encapsulates a message packet within an IP Internet Protocol packet for transmission across a network There are three tunnelling protocols Internet Protocol Security IPSEC Layer 2
78. ansmission inside an isolated over trusted LAN network Encryption in Transmission Mandatory Mandatory transmission prohibited over un trusted network Email system for transmission Information system approved by the Government Security Officer subject to the technical endorsement of OGCIO Approved email system Confidential Mail System CMS Information system approved by the Government Security Officer subject to the technical endorsement of OGCIO Approved email system i GCN with encryption feature enabled ii System with PKI encryption or with encryption methods as specified in the SR Processing Only on Information system complied with SR356 Only on Information system complied with SR363 Only on Information system complied with SR367 Computer room requirement Level III Level II Locked room cabinet Ref No G3 10 3 IT SECURITY GUIDELINES DATA SECURITY Remarks 663899 For definition and examples of un trusted network please refer to Section 12 2 2 Transmission of Classified Information The above regulations should also be applied to interim material and information produced in the course of processing Also all sensitive data and system disks shall be removed whenever the computer equipment is no longer used The general principle is that classified messages data documents in whatever form should bear the same classificat
79. aper RFID Journal http www rfidjournal com whitepapers 5 e Guide to Bluetooth Security SP 800 121 NIST http csrc nist gov publications nistpubs 800 121 SP800 121 pdf e Security Bluetooth SIG Inc http developer bluetooth org KnowledgeCenter TechnologyOverview Pages Security aspx e Security Considerations for Voice Over IP Systems SP800 58 NIST http csrc nist gov publications nistpubs 800 58 SP800 58 final pdf e A Complete Guide on IPv6 Attack and Defense The SANS institute http www sans org reading_room whitepapers detection complete guide ipv6 attack defense_33904 e Good Practices Guide for Deploying DNSSEC ENISA http www enisa europa eu activities Resilience and CIIP networks and services resilience dnssec gpgdnssec at_download fullReport e Guiding principles for Cloud Computing Adoption and Use ISACA http www isaca org Knowledge Center Research ResearchDeliverables Pages Guiding Principles for Cloud Computing Adoption and Use aspx Ref No G3 12 40 IT SECURITY GUIDELINES SECURITY RISK ASSESSMENT AND AUDITING 13 13 1 13 2 SECURITY RISK ASSESSMENT AND AUDITING OVERVIEW Security Risk Assessment is a process of evaluating security risks which are related to the use of information technology It shall be performed at least once every two years and shall also be performed before production and prior to major enhancements and changes associated with the sys
80. aration for detection of and response to information security incidents For the plan to be effective drill should be arranged and exercised regularly ADDITIONAL REFERENCES e Publications and Resources Hong Kong Computer Emergency Response Team Coordination Centre HKCERT https www hkcert org Ref No G3 14 1 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 15 1 IT SECURITY POLICY CONSIDERATIONS WHAT AN IT SECURITY POLICY IS Essentially IT security policy sets the minimum standards of a security specification It states what aspects are of paramount importance to the organisation Thus IT security policy can be treated as basic rules which must be observed as mandatory while there can still be other desirable measures to enhance the security Individual departments should identify appropriate opportunities to establish the departmental IT security policy For instance when conducting Information Systems Strategy Study ISSS or when preparing business plans An IT security policy should cover the department s expectations of the proper use of its computer and network resources as well as the procedures to prevent and respond to security incidents During the drafting of the policy the department s own requirements on security should be considered Besides the requirements as specified in the Security Regulation Personal Data Privacy Ordinance Code on Access to Information and Information on
81. are managed by a hypervisor also called virtual machine monitor which controls the flow of instructions between the VMs and the physical hardware e g CPU disk storage memory and network interface cards A hypervisor can run directly on the hardware or runs as an application on top of an existing operating system host OS The VM running on top of the host operating system host OS is called the guest operating system guest OS The security of a virtualised environment is heavily dependent on the individual security of each component from the hypervisor and host OS if applicable to the VMs applications and storage In general a virtualised environment should be secured in the same way as physical machine and following security practices are recommended Management Controls e Maintain up to date inventory records of a virtualised environment including all relevant network and infrastructure components and a list of VM images e Maintain configuration management procedures to cover all the physical and virtual machines in the virtualisation infrastructure e Segregate VM s and create security zones by type of usage e g desktop vs server development phase e g development testing and production and sensitivity of data e g classified data vs unclassified data e Ensure the connection of the virtualised environment to the Government network shall not compromise the existing security level Ref No G3 12 32 I
82. at tere UE 9 4 9 4 2 Password Handling for End Users sssssesseeeeeeeeerene enne trennen trennen rene enne enne 9 5 9 4 3 Password Handling for System Security Administrators essere 9 6 MOBILE COMPUTING AND REMOTE ACCESS esses nennen nennen trennen nr en rennen enne 9 7 9 5 1 Mobile Computing and Communications sese nennen ren rennen enne 9 7 9 5 2 Mobile Device Security susto ett e te ted bo Ret Meet RE RE HS UE Petr ih 9 8 9 5 3 Remote Access Home Office iesene teet ches re tear en eed Ire AREE RD EE deer erben 9 10 95 4 Duabup ACCesSs aee eee eee eR o qtia teet et bete io dens 9 11 9 53 59 Virtual Private Network teet deett eie te petet E ertet ep E EE D EC Rote eri eins 9 12 ADDITIONAL REFERENCES 2 ipee ettet eerte eiue te eese bee reed reb i rete oe ern hes 9 13 OVERALL DATA CONFIDENTIALITY teo ER RR UNE RR UE c eet ecrit ideo 10 2 DATALIBECYCLEMANAGEMBENT itt RE ERU RU iere ete ton onn 10 4 INTEGRITY OE DATA rr itt RP ERUNEER Sides e RU R A A A A EA 10 6 STORAGE NETWORK SECURIT Y once Rete be tU oe ERU ies rtc eee Hit sees 10 6 USER BROFILES AND VIEWS 4 ettescetenuiisecto tides n en Sides eU RU Et RO UE A etieeiiom sen 10 7 DATA ENCRYPTION are t rt etr DR cU t et EUR eio iive bn sn 10 7 10 6 1 Cryptographic Key Managenient ee eee REN EUR endow secu reeeseed etre erect edge 10 8 10 6 2 Encryption Tools ote Ue eec Re EUR E eiiedi N deut
83. ata should not be shared or archived to SNSs unless with explicit approval from data owner SNS users should avoid placing too much personal information to the sites and set appropriate access control to personal profile where appropriate Regular awareness training should be conducted to educate staff about B D s IT Security Policy and strengthen security awareness around the risks associated Moderation is required to filter out comment spam Some of the SNSs may also provide spam control plug ins for automatic filtering comment spam SNS users should check whether providers have channels for reporting abuse and concerns SNS users should use strong authentication where appropriate Strong password should be used and the password should be regularly changed Do not use the same password for various social networking sites SNS users should remain cautious to messages sent by people that you do not know well and should avoid clicking links coming from people or sources you do not know SNS users who need to review the comments should be trained on how to look for suspicious code in a page and the risk related to URL redirection Ref No G3 12 9 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 4 12 4 1 e SNS users should regularly look for related news and updates released by the provider The suggested security setting by respective providers should be followed ELECTRONIC MESSAGING SECURITY Elec
84. below e Keep network simple i e minimise number of network interface points between secured network and other network e Allow only authorised traffic to enter the secured network e Use multiple mechanisms to authenticate user e g password system plus pre registered IP IPX network plus pre registered MAC address terminal number e Manage the network with network management system e Encrypt data with proven encryption algorithm before transmitting over the network Up to date network information in particular the network diagrams should be maintained to reflect the latest network environment for effective security control and securely stored Ref No G3 12 3 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 2 1 Network Security Controls If there is a need to participate in a wide area network consider restricting all access to the local network through a dedicated gateway That is all access to or from local network shall be made through a dedicated gateway that acts as a firewall between the local network and the outside world This system shall be rigorously controlled and password protected and it should be configured to allow only legitimate network traffic from external users to the networks protected by it Compromise of the firewall could result in compromise of the network behind it In addition a two tier firewall architecture should be considered to further protect mission critica
85. c details of internal systems or configurations should be avoided in email headers to avoid the disclosure of system information to external parties B Ds may consider enabling audit trails for any access to email to keep record of each trial of reading or updating by authorised users and for those unauthorised ones Alert report or alarm should be used to report on security incidents In addition user email address list shall be properly maintained by authorised administrators and protected from unauthorised access or modification To enhance the security of the Government email system user authentication such as password should be used for workstations and email accounts to prevent unauthorised access and use Email clients should not automatically process attachments as an attachment may contain hostile scripts or malicious codes Please refer to Section 12 3 2 Client level Protection for details Ref No G3 12 10 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY LAN System administrator should arrange automatic updating of virus signature and malicious code definition for users who use the government email system Users should make sure that the auto protection of the anti virus in their workstation is always enabled whenever they use the system to access any document or information Please refer to Section 12 5 PROTECTION AGAINST COMPUTER VIRUS AND MALICIOUS CODE for details Users should safeguard and change
86. ccordance with the highest classification level of data the SAN device contains If the SAN storage is attached to the server using network protocol e g Gigabit Ethernet SCSI over IP in channel other than fibre channel data transmission shall follow the same security requirements of SR according to the data classification Whereas NAS can be considered as a server which shares files over a network using file sharing protocol such as NFS Network File System or SMB CIFS Server Message Block Common Internet File System The NAS is usually attached with a local hard drive or SAN for data storage Again the NAS server is subject to the security requirements in accordance with the highest classification level of data the NAS server contains Security guidance for storage network security includes but not limited to the following e Change default passwords of storage devices There are studies that mathematical weakness may exist in SHA 1 more secure algorithm such as SHA 2 in particular the SHA 256 should be considered as far as practicable Ref No G3 10 6 IT SECURITY GUIDELINES DATA SECURITY 10 5 10 6 e Do not plug storage management interface into un trusted networks e Protect the management interface of the storage devices so that only authorised staff can manage the devices from specific locations e Use segmentation or authentication for management access e Enforce strict access control on the file sys
87. ced in their protective boxes with the write protect tab if any in the write protect position Keep them away from magnetic electromagnetic fields and heat sources and follow the manufacturer s specifications for storage environment 10 8 3 Server Backup Local server tape drive backup is recommended over backing up of multiple servers through the network as backing up through the network will be much slower and time consuming if the amount of data is very large It would be better to use the differential backup during night time on week days and use full backup on Saturday night when no one will be accessing the server The following is a suggested labelling standard for backup tapes and the use of four sets of backup tapes is suggested Format File Server X Day N where File Server name of the file server e g ITSX001 X F D Full Daily Day Mon Tue Wed Thu Fri Sat N backup set no 1 2 3 4 Example ITSX001 D Tue 1 Most backup software products on the market support both incremental backup and differential backup Incremental backup means only the files modified since the previous full or incremental backup will be backed up Differential backup means all the files modified since the previous full backup will be backed up i e files backed up in the previous differential backup will also be included in the following differential backup Differential backup is highly recommended even th
88. ces so to prevent unauthorised or unnecessary access to paid resources If online payment is required mobile application should provide alternate payment methods that require verification for example Visa Verified MasterCard SecureCode and Payment by Phone Service PPS Use obfuscation software to protect source code leakage and hide the application details as far as possible in case the mobile native applications are not compiled to machine code format so as to prevent reverse engineering by external party to obtain the source code Applications must be designed and provisioned to allow updates for security patches taking into account the requirements for approval by app stores and the extra delay this may imply 11 7 ADDITIONAL REFERENCES Application and Database Security related articles from The SANS Institute http www sans org reading_room whitepapers application A Guide to Building Secure Web Applications and Web Services The Open Web Application Security Project OWASP http www owasp org index php Guide Table of Contents Improving Web Application Security Threats and Countermeasures Microsoft Corporation http msdn microsoft com en us library ms99492 1 aspx Writing Secure Code 2nd Edition by Michael Howard and David LeBlanc from Microsoft Press Security Considerations in the Information System Development Life Cycle The National Institute of Standards and Technology NIST http csrc nis
89. change controls are e To maintain integrity of the program or system e To reduce the exposure to fraud and errors whenever a program or system is amended All changes related to security controls should be identified tested and reviewed to ensure that the system can be effectively protected from attacks or being compromised There should be an established procedure for requesting and approving program system change Changes should only be processed after formal approval as different levels of authority some external to the project team may be established The authorisation should be commensurate with the extent of the changes In any case all changes must go through a single coordinator Operational and administrative procedures as well as audit trail if applicable should also be updated to reflect the changes made Program Cataloguing The basic principle with program cataloguing is that staff of the development or maintenance team are not allowed to introduce any program source or object into the production library nor to copy from the production library Such activities should be performed by a control unit When amendments need to be made production programs are copied to the development library under the custody of the control unit On completion of the amendments the project team should request the control unit to catalogue the program into the production library To facilitate program fallback version control should be in place an
90. channel A hoax computer virus warning is an untrue virus related warning alert started by malicious individuals Hoax message mixes itself together with true computer virus alerts and enlists recipients to pass on to alert those unknowns By forwarding such hoax alarms to others it is likely to cause confusion to the recipients in their attending real computer virus alerts Besides it creates unnecessary traffic on the Government network as well as wastes people s time in reading them Users should not forward any received hoax messages to avoid further spreading Besides relying on technical controls such as installing virus or malicious code detection and recovery protection measures users should beware of their behaviour when using IT Ref No G3 12 14 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY services and facilities and take the responsibility to protect against computer virus and malicious code attacks 12 5 1 User s Controls To protect against computer virus and malicious code users should ensure virus or malicious code detection and recovery protection measure has been installed and running on their workstations and mobile devices Most of the major anti virus software vendors should have equipped their products with the capability to deal with threats from computer worms Trojan horses etc in addition to computer viruses Some products will also provide a certain degree of protection against spyware ad
91. cryptographic techniques back ups and virus protection It should also include rules and advice on connecting mobile facilities to networks and guidance on the use of these facilities in public areas There should also be policy operational plans and procedures developed and implemented for remote access B Ds should only authorise remote access if appropriate security arrangements and controls are in place and complying with the security requirements Appropriate protection of the remote access should be in place e g physical protection against theft of equipment and information proper access controls against unauthorised disclosure of information two factor authentication for remote access to the B D s internal systems Users should be briefed on the security threats and accept their security responsibilities with explicit acknowledgement Ref No G3 9 7 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 5 2 Mobile Device Security Mobile devices are information systems which are capable of storing and processing information plus the fact that their physical locations are not fixed and can be carried around easily Mobile devices often possess networking capabilities such as wired or wireless network connection e g Wi Fi GPRS 3G etc While mobile devices provide portability and convenience to users they can introduce new security risks Users should be aware that mobile devices are susceptible to theft easily Users shoul
92. ctivities At each checkpoint there will be meetings to review the progress and to make any refinements if necessary Regular meetings will also be performed by the Steering Committee as control by reviewing the progress of the working team The planning activities vary a lot depending on how detailed the policy is how sensitive the information is and how much protection intended to have Determination of Security Requirements One of the ways to identify security requirements is by means of risk analysis Risk analysis involves determining what to protect against what to protect it from and how to protect it Itis the process of examining all of risks and ranking those risks by level of severity This process results in making cost effective decisions on what is required to protect The results of risk analysis if performed should be documented together with the Audit Control and Security Requirement of the Feasibility Study or System Analysis amp Design Technical Specification There are three major steps in risk analysis namely e Identifying the assets What to protect e Identifying the threats Against what to protect from e Identifying the impacts How much risk to bear a Identifying the Assets The essential point in this step is to list all the things that are subjected to security threats The following is a list of categories for general reference Hardware CPUs boards keyboards terminals workstati
93. cture and the changes to the existing procedures of DNS management have to be considered Ref No G3 12 31 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 12 e Signing in a testing environment before releasing the system to the external world test the complete system including all the defined procedures under a testing environment e Checking DNS servers verify the external authoritative name servers supporting DNSSEC Key generating and management the procedures to generate publish and manage keys as well as the size and lifespan of the keys should be planned Establishing emergency procedure the procedures to re generate keys and re sign the zone for should be established for case of key compromise VIRTUALISATION Virtualisation refers to the technology of creating and managing one or more virtual machines VMs used for IT development testing or operation A VM could be served as a Workstation a server a storage device or other network resource There are several forms of virtualisation such as full virtualisation server virtualisation desktop virtualisation application virtualisation and operating system virtualisation Before implementing virtualisation environment security risks should be analysed by comparing with options without virtualisation It should be treated as part of the risk management process before vendors or products are selected VMs on a physical machine
94. d token or biometrics technology such as iris retina and fingerprint scanning Most information systems require the use of authentication system to gain access to the system and its files Authentication systems can be as simple as allowing users to enter the system without the need of a password or as complicated as requiring a combination of personal properties like biological recognition systems e g fingerprint handwriting voice and cardkey system such as smart card However many of these authentication mechanisms not only control access to the application but also facilitate better tracing or auditing of application use Authentication can be divided into two types weak or simple authentication mechanisms e g use of passwords or strong authentication mechanisms where an entity does not reveal any secrets during the authentication process e g use of asymmetric cryptosystems where separate keys are used for encryption and decryption Depending on the level of security control required the simplest way is to use password Usage of a password checker on the authentication system can be considered to enforce password composition criteria and to improve password selection quality Another way is to use two factor authentication such as smart cards or tokens that function as a secure container for user identification and other security related information such as encryption keys A protected system cannot be activated until the user pr
95. d user authentication such as with a user ID and password or a personal identification number as far as appropriate to avoid unauthorised access to the services e Disallow H 323 SIP or other VoIP protocols from the data network at the voice gateway which interfaces with the public switched telephone network e Use strong authentication and implement access control to protect the voice gateway system e Protect VoIP traffic through firewalls Ref No G3 12 28 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 9 12 9 1 e Use IPSEC or Secure Shell SSH for all remote management and auditing access e Use encryption at the router or voice gateway to provide for IPSEC tunnelling if necessary e Ensure that adequate physical security should be in place to restrict access to VoIP network components Even if encryption is used physical access to VoIP servers and gateways may allow an attacker to perform traffic analysis e Protect computers which use softphone for VoIP connections with firewall latest security patches virus or malicious code detection measure with latest virus signature and malicious code definitions e Develop contingency plans of making voice calls if VoIP systems become unavailable COMMUNICATION WITH OTHER PARTIES Inter departmental Communication It is becoming more common for B Ds to have network communication with each other in order to exchange information and provide t
96. d access to a particular document or classification or information the Departmental Security Officer should be consulted B Ds shall ensure that personnel security risks are effectively managed The risk of allowing an individual to access classified information should be assessed For example if classified data is properly encrypted and protected from unauthorised access the perceived risk is low Ref No G3 7 4 IT SECURITY GUIDELINES MANAGEMENT RESPONSIBILITIES 7 4 3 7 4 4 Civil servants authorised to access CONFIDENTIAL and above information shall undergo an integrity check as stipulated in Civil Service Branch Circular No 17 94 Integrity Checking For non civil servants appropriate background verification checks should be carried out commensurate with the business requirements the classification of the information that the staff will handle and the perceived risks Background verification checks could include the following having addressed any personal privacy issues Independent identity check Hong Kong Identity Card or passport e Confirmation of claimed academic and professional qualifications e Completeness and accuracy check of the provided curriculum vitae e Availability of employment references e More detailed checks such as credit checks or checks of criminal records if considered necessary For personnel from external service providers a non disclosure agreement should also be signed along with the e
97. d at least two generations of software releases should be maintained Ref No G3 11 6 IT SECURITY GUIDELINES APPLICATION SECURITY 11 4 3 11 5 11 5 1 Hardening of program or system should be performed before production rollout The hardened program system should then be used as baseline for any further changes Installation of Computer Equipment and Software Installation of computer equipment and software should only be done by authorised staff after obtaining approval from the system owner or the responsible manager Equipment or software should only be installed and connected if it does not lead to a compromise of existing security controls All changes made to either equipment or software should be fully documented and tested and an audit trail of all installations and upgrades should be maintained WEB APPLICATION SECURITY Web application is commonly used to provide services to the public and to the Government staff nowadays Web 2 0 applications such as Wiki also create a platform for effective knowledge sharing and contribution Although web application provides convenience and efficiency it is faced with many security threats because the client access can be from anywhere over the Internet The threats originate from the untrustworthy client session less protocols complexity of web technologies and network layer insecurity In web application the client software usually cannot be controlled by the application owne
98. d or held on computers or servers Time stamps or sequence numbers may be employed to ensure the completeness of data or processing Parity checks or control totals should be used to guard against errors in transmission To avoid data tampering during transmission some cryptographic algorithms can be applied Hashing technology can also be used to assure data integrity Examples are digital signatures A digital signature is a data structure which is generated by using some hashing algorithm associated with the public key algorithm A digital signature is created using a private key and only the corresponding public key can be used to verify that signature was really generated by the private key Examples of hashing algorithms are Secure Hash Algorithm SHA and the Digital Signature Algorithm DSA Papers analysing MD5 Message Digest 5 have been published and revealed the weaknesses of MD5 Therefore MD5 should not be used in new systems and MDS in the existing systems should be replaced by stronger hashing algorithms e g SHA 2 10 4 STORAGE NETWORK SECURITY Traditionally all storage devices are directly attached to the computer that uses it However technologies like storage networks are growing popular There are two major technologies in storage networks storage area network SAN and network attached storage NAS SAN is considered as a hard drive of a server computer The SAN device is subject to the security requirements in a
99. d risk management related support services They assist in identifying system vulnerabilities and performing security administrative work of the system His her responsibilities also include e Maintain control and access rule to the data and system e Check and manage audit logs e Promote security awareness within the B D The IT Security Administrator may or may not be a technical person but he she should not be the same person as the System Administrator There should be segregation of duties between the IT Security Administrator and the System Administrator Although IT Security Administrator is responsible for managing the audit logs they should not tamper or change any audit log B Ds may appoint an IT Security Auditor who will be responsible for auditing the work of the IT Security Administrators to assure that they perform their duties due diligently Ref No G3 5 6 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION SECURITY 5 3 2 Information Owners Information Owners are the collators and the owners of information stored in information systems Their primary responsibility is to e Determine the data classifications the authorised data usage and the corresponding security requirements for protection of the information 5 3 3 LAN System Administrators LAN System Administrators are responsible for the day to day administration operation and configuration of the computer systems and network
100. d staff before the machines are connected to the Government networks e Request external vendor to perform a computer virus scan with the latest virus signature on user s hard disk after New machine installation Service maintenance nstallation of software Ref No G3 12 16 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY While managing servers LAN system administrators should observe the following security guidelines Boot the server from the primary hard drive If the machine should be booted from removable media like floppy diskettes USB flash drives or hard drives optical disks etc the removable media must be scanned for computer virus before booting This can eliminate boot sector viruses from infecting the server Protect application programs in the server by using access control facility e g directories containing applications should be set to read only In addition access right especially the right to Write and Modify should be granted with least privilege on a need to have basis Consider using document management solution to share common documents so as to minimise the propagation of infected files in an uncontrolled manner Scan all newly installed software before they are released for public use Schedule preferably full system scan to run immediately after the file server start up Follow the guidance in Section 10 8 DATA BACKUP AND RECOVERY to backup data In addition
101. d therefore safeguard the devices and not leave them unattended without proper security measures For instance users should consider using laptop cable locks to physically secure laptop and portable computers Also as mobile devices often possess network connection capabilities they can be used to connect to the Government internal networks and can become a point to breach security such as disclosure of classified information and spreading computer viruses and malicious codes into the Government internal network Users are prohibited from connecting their workstations or devices to external network if these workstations or devices are simultaneously connected to a Government internal networks unless with the approval from the DITSO The following are some management technical and end user controls for consideration Management and Operational Controls Define a usage policy for mobile device to meet the business needs of the B Ds that includes i The types of approved mobile devices and the approval mechanism ii The data classification permitted on each type of mobile device Classified information must not be stored in privately owned mobile devices ii The control mechanism that would be implemented to comply with the SR requirements based on the data classification iv The procedures to ensure timely sanitisation of government data stored in the mobile devices when staff posts out or ceases to provide services e Establi
102. deployment e Ease of use e Key management and recovery e Future needs of access to the information by other staff Related information can be found in the Annex F of the Security Regulations for the recommended minimum encryption key length to be used SECURE PRINTING Hardcopies are often found in the printing device s output tray unprotected leaving unattended printed documents susceptible to unauthorised access An uncontrolled printing environment may introduce risk to confidentiality of classified documents B Ds should take practical precautions to protect documents which are printed scanned copied or faxed Secure printing is to ensure that a printing devices are secured and b printed or transmitted data meets the confidentiality integrity and availability requirements Following practices should be adopted to secure the documents when using such devices e Physically secure the printing device In particular prevent unauthorised access to the storage device e g hard drive if any e The global configuration should be protected from unauthorised access It should be modified via the console by requiring a strong password Ref No G3 10 9 IT SECURITY GUIDELINES DATA SECURITY Limit print copy fax scan services to required protocols Disable all unnecessary protocols services Require user authentication for printing classified documents if available Enable available security features on the device
103. e 8 3 8 1 3 Items for Emergency Use eben eoe Pared eie pe eripe piene 8 3 S L4 TFue FPightng inse eei eda eise Ee ei eic Aves co EEEE E E IE tin iN 8 4 Ref No G3 ii 1 IT SECURITY GUIDELINES CONTENTS 8 2 8 3 8 4 9 9 1 9 2 9 3 9 4 9 5 9 6 10 10 1 10 2 10 3 10 4 10 5 10 6 10 7 10 8 10 9 10 10 11 3 11 4 11 5 11 6 EOUIPMENT SECURTEY oido tosses teme e e pire tr et redet ee e e e ied 8 4 8 21 Equipment and Media Control tese cette et e ete de e ea eR d 8 5 8 2 2 Disposal of Computer Equipment eene nennen een eene emet tenete trennen trennen teen 8 6 PHYSICAL ACCESS CONTROL A bhoh I een ete iei eene i 8 7 ADDITIONALREFERENCGES 55 5 nno ene io ee inerte t e ep eerte 8 8 ACCESS CONTROL SECURITY scccsstissdacicatesdstehiscecseontuisibdstedscavendseatesedeseslenscacencatesseseoces J L DATA ACCESS CONTRODL 5 tte eee PERF Hee tet e prier et epi de LR Re 9 1 O11 Endpoint Access Control ueteri tae pt eter de Y Spe pri Pr Ue gra e cya i Pe a dere del tenes 9 1 9 12 Logical Access Control ertet iere n E rp Lr rhe Ee EIER PES PERLE REN a e edet Debe 9 1 AUTHENTICATION SYSTEM 2 rerit ort asrep r e e te ie e Le rh i E Ean EE a oe S Peste 9 2 USER IDENTIFICATION 2 5 erret e a Rte tr I EIE RETO MR t cos Hee pees nerd 9 3 PASSWORD MANAGEMENT erede erento Pee eet EE e Peer Mo e e MERERI deir IT h 9 4 9 4 Password Selection zi reete et MEE TO Rc e e eR ten te
104. e Auditors Association and the U S Government Accountability Office http www gao gov special pubs mgmtpIn pdf Ref No G3 13 1 IT SECURITY GUIDELINES SECURITY INCIDENT MANAGEMENT 14 14 1 14 2 SECURITY INCIDENT MANAGEMENT OVERVIEW An IT security incident is any adverse event that could pose a threat to the availability integrity and confidentiality of an information system or information asset Examples of security incidents include malicious code attacks unauthorised access or utilisation of services denial of resources compromise of protected system privileges malicious destruction or modification of data intrusion computer virus and hoaxes Every B D should set up its departmental Information Security Incident Response Team ISIRT and appoint a Commander to oversee the handling of all information security incidents An ISIRT Commander is responsible for collaboration with the Government Information Security Response Office GIRO which provides centralised co ordination to B Ds upon happening of an IT security incident in the B D For detailed guidelines and procedures in handling an incident please refer to e Information Security Incident Handling Guidelines G54 http www ogcio gov hk en infrastructure methodology security policy doc g54 pub pdf The document provides a reference for the B Ds to facilitate the development of a departmental security incident handling planning and to be used for prep
105. e invited to attend the training courses The trained staff are required to complete an assessment test after training Training courses will be conducted on an as and when required basis Invitation to attend training will be sent by email Refresher courses will be conducted to provide updated information about the software and the installation procedures Uploading of eHR SP Information After successful completion of the training programme the eHRO will upload the contact details and service offerings of company applicants as eHR SPs to the eHRO website http www ehealth gov hk en home html eHRO will also maintain a register of eHR SPs and the individual applicants who have the completed the training programme When uploading the information eHRO will specify that the list is intended to facilitate the private HCPs to acquire IT services for CMS On ramp application and the Communication Module Private HCPs can choose not to acquire the services of eHR SPs However private HCPs who plan to install CMS On ramp by themselves are required to attend the training courses coordinated by eHRO e the date s on which the staff member of company eHR SP have attended the training programme and the selection and appointment of any company eHR SP in the list is purely a private matter between the private HCP and the company eHR SP and should not be regarded as recommended by the Government The flowchart for application is sh
106. e required 5 Compliance verify that all machines are functioning properly and comply with the related security policies and guidelines In addition the following guidance should be observed regarding patch installation and management e Create and maintain an inventory record of hardware equipment and software packages including the patch management system itself and version numbers of those packages mostly used within the B Ds This inventory record is essential to the patch management process and will enable system administrators to easily monitor and identify relevant vulnerabilities and patches e Define roles and responsibilities associated with patch management including vulnerability monitoring patching etc e Consider standardising the configuration of their information systems Standardised configuration can simplify the patch testing and installation process e Monitor IT security resources for vulnerabilities and patches which are relevant to the B Ds e Define a timeline to react to security advisories relating to the technical configurations of the systems e Identity the associated risks and actions to be taken once a security vulnerability has been confirmed e Assess the impacts associated with installing the security patch when a security patch is available e Test and evaluate patches before they are installed to ensure they are effective if installing patch is not feasible upgrade of the concerned pr
107. e used to overwrite the storage area where the classified information was originally stored in the media Commercial software for such secure deletion is available which conforms to the industry best practice of writing over the storage area several times including writing with different patterns to ensure complete deletion For flash based solid state disks or USB flash drive due to its different internal architecture completely overwriting a particular file may not be feasible it is suggested to sanitise the whole disk instead of individual file to ensure complete erasure of information A system of checks and balances should be maintained to verify the successful completion of the secure deletion process Sample check of the erased media should be performed by another party to ensure all classified information was properly erased To support government computer users to comply with the SR requirements OGCIO has set out the technical standards required regarding the destruction of classified information under the SR For information about the requirements and technical controls for disposing classified information please refer to Annex F of the Security Regulations While there is no specific regulation on the disposal of unclassified information as a good practice to protect data privacy users are advised to adopt similar erasure procedures for RESTRICTED or CONFIDENTIAL information if they believe that the computer or storage media to be d
108. each officer in concern Regular fire drills shall be carried out to allow the officers to practice the routines to be followed when fire breaks out Those operators not being members of the fire fighting party shall be taught on how to operate the fire detection prevention and suppression system and the portable fire extinguishers Hazardous or combustible materials should be stored at a safe distance from the office environment Bulk supplies such as stationery should not be stored in the data centre or computer room Stocks of stationeries to be kept inside the data centre or computer room should not exceed the consumption of a shift Hand held fire extinguishers should be in strategic locations in the computer area They should be tagged for inspection and inspected at least annually Smoke detectors could be installed to supplement the fire suppression systems They should be located high and below the ceiling tiles throughout the computer area and or underneath the raised floor Besides heat detectors could be installed as well They should be located below the ceiling tiles in the computer area The detectors should produce audible alarms when triggered Gas based fire suppression systems are preferred However if water based systems are used dry pipe sprinkling systems are preferred than ordinary water sprinkling systems The systems should be inspected and tested annually In addition the systems should be segmented so that a fire i
109. ecifications are available from SB GSO or Architectural Services Department ASD If wireless communication network will be set up in the site a site survey should be conducted to assure proper area coverage of wireless signal and to determine the appropriate placement of wireless devices Ref No G3 8 2 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 1 2 Housekeeping Proper cleaning procedures for the data centre or computer room must be established Such procedures should include at least the following e Regular cleaning of the external surfaces of the peripherals by operators e Daily emptying of the waste paper bin e Daily vacuum cleaning of the data centre or computer room floor e Daily mopping of the data centre or computer room raised floor e Periodic cleaning of the water pipes e Periodic cleaning of the in house partitions doors lighting fixture and furniture e Periodic inspection and cleaning of the floor void B Ds must regularly inspect the data centre or computer room to ensure the cleaning procedures are followed Unused peripherals or equipment should be disposed of or written off according to Government rules and regulations Hardware or workstation should be well covered when there is any cleaning or maintenance work that causes a lot of dust arouse Eating and drinking in the data centre or computer room should be avoided as far as possible or even prohibited Smoking in the data centre or computer room is st
110. ecurely keep a coverage map of the wireless network including locations of respective access points and SSID information so as to avoid excessive coverage by the wireless signal Search regularly for rogue or unauthorised wireless access points Perform regular IT security risk assessments and audits to identify security vulnerabilities Keep a good inventory of all devices with wireless interface Once a device is reported missing consider modifying the encryption keys and SSID Implement strong physical security controls and user authentication for complementing physical security deficiencies of wireless devices Install access points far from a window or a door to prevent network tapping from publicly accessible area Technical Controls Change network default name at installation SSID should not reflect the name of any B Ds system name or product name model Change product default access point configuration settings which are considered unsecured most of the time for easy deployment Disable all insecure and unused management protocols on access points and configure the required management protocols with least privilege Ensure that all access points have strong unique administration passwords and change the passwords regularly Enable and configure security settings including SSID encryption keys Simple Network Management Protocol SNMP community strings Deploy WPA2 Enterprise or change encryption keys regularly
111. ecurity policy can be monitored and under control The Security Working Team Coordinator will be responsible for planning of the detailed activities which will be controlled and monitored by the Security Steering Committee a Initial Planning It focuses on the goals and objectives of the IT security policy This can help to identify whether the activities undertaken are those necessary ones and can ensure that a common understanding exists among all interested parties The establishment process may be divided into different stages which must be distinct and manageable This plan is probably prepared by the Security Steering Committee The committee shall define the policy scope which may cover certain areas of use and responsibility Examples are Internet IT Security Policy or Security Incident Response Policy b Resource Planning It is used to identify the details of various resources required for developing the IT security policy It can highlight the type amount and period of use of these resources Ref No G3 15 6 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 3 3 including personnel and administrators for different stages of the policy development process Everything to be secured shall have an owner and they shall be involved in the preparation process c Control Planning It is used to control the whole development project by identifying the major control points or checkpoints for different stages of a
112. ed It is also important to recognise that there are always exceptions to every security rule Keep the policy as flexible as possible for an IT security policy to be viable in a longer term The major contents of the IT security policy can include the followings What the policy objectives and scope are Which information resources to protect Whom the policy affects with Who has what authorities and privileges Who can grant authorities and privileges What the minimum measures to protect the information resources are Expectations and procedures for reporting security violations and crimes Specific management and user responsibilities for making security effective Policy effective date and revision dates or interval In order to fill in the above contents below are some sample questions one may need to ask and answer In addition aspects of the particular department shall be considered as well Who is allowed to use the resources To explicitly state who is authorised to use what resources What is the proper use of the resources To provide guidelines for the acceptable use as well as unacceptable use of resources To include types of use that may be restricted To define limits to access and authority Who is authorised to grant access and approve usage Tostate who is authorised to grant access to the services and type of access they are permitted to give Who may have system administration privileges
113. ed e g home computers with mobile devices storing classified or personal data Do not simultaneously connect to external network when the mobile device is connected to a Government internal network Do not process sensitive data in the mobile devices unless with encryption feature turned on or with end to end connection secured Do not open or follow URLs from un trusted sources emails or electronic messages such as SMS MMS Do not allow wireless connections from unknown or un trusted sources to mobile devices Do not try to exploit the operating system of the mobile devices by using unauthorised software in order to gain root access also known as jailbreaking or rooting Such manipulation may introduce unexpected security risk and void the warranty Promptly report and escalate if an information security incident occurs e g loss of mobile device in accordance with the security incident handling procedure 9 5 3 Remote Access Home Office Remote access or home office enables users to work remotely at any time While improving productivity this introduces security risks as they are working on non Government premises To maintain the security of Government infrastructure and information assets B Ds should set up a policy to advise users on how to work remotely and securely B Ds should also provide secured channels for example VPN connections for users to connect to Government internal networks Users shall never c
114. empt to infect your system with malicious codes and or ask you to provide your personal or sensitive information They normally appear as important notices urgent updates or alerts with a deceptive subject line to attract the recipient to believe that the electronic message has come from a trusted source Even more the electronic message may contain a fraudulent link enticing the recipient to a spoofed website luring users to download malicious software onto their computer allowing attackers to remotely control them for use in hacking exploits such as a Distributed Denial of Service DDoS attack Spam or phishing scams are sometimes nearly impossible to distinguish from one and the other and in fact they are used by spammers or attackers as a vehicle to commit illegal activities Spam and phishing messages can degrade network performance and consume substantial memory or disk space in the electronic messaging system Substantial damage could also be resulted if those messages carry attachments that are infected by computer virus or malicious code Both LAN system administrators and end users should consider some countermeasures and observe rules of thumb for protecting from these security threats Ref No G3 12 12 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY LAN System Administrators can consider the following security countermeasures to prevent spam or phishing email Install spam filtering gateway to filter all spam
115. en the reader and the RFID application server Equip RFID environments with special devices to detect unauthorised read attempts or transmissions on tag frequencies These read detectors may be used to detect unauthorised read update attempts on tags if they are used together with specially designed tags that can transmit signals over a reserved frequency indicating that they are being killed or modified Consider using the kill tag approach to protect privacy of the user when the tag information is no longer in use When a tag receives a kill command from a reader it renders itself permanently inoperative To prevent wanton deactivation of tags this kill command can be PIN protected Protect tagged products from being detected by shielding RFID tags in a container made of metal mesh or foil which is known as a Faraday Cage Protect back end database with firewall access control and encryption security controls Ref No G3 12 26 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 7 3 Because RFID tags come in different flavours there is no generic RFID security solution Some low cost passive and basic tags cannot execute standard cryptographic operations like encryption strong pseudorandom number generation and hashing Some tags cost more than basic RFID tags and can perform symmetric key cryptographic operations B Ds wishing to use RFID should therefore evaluate the cost and security implicat
116. ersonal is only recommended for small ad hoc network such as guest WLAN for visitors B Ds should deploy Virtual Private Network VPN on top of wireless network if classified data is to be communicated over wireless networks WPA Wi Fi Protected Access which by default uses Temporal Key Integrity Protocol TKIP for data encryption is a wireless security protocol to fix known security issues of WEP However vulnerability of TKIP has been discovered and rendered TKIP encryption unsecure WPA v2 Wi Fi Protected Access 2 based on IEEE 802 11i has been proposed With WPA v2 only authorised users can access their wireless network with the features of supporting stronger cryptography Advanced Encryption Standard AES stronger authentication control Extensible Authentication Protocol EAP key management replay attack protection and data integrity Ref No G3 12 22 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 7 1 2 Security Controls to Protect Wireless Network B Ds are reminded to not just rely on technical security measures to safeguard their WLANs but also adopt proper management controls to effectively protect their wireless networks The following are some management and technical security controls for consideration Management Controls Define a wireless security policy to address the usage of wireless networks and type of information that can be transmitted over wireless networks Develop and s
117. es e Define and adopt secure coding practices to avoid application defects introduced during development stage e Perform source code review to identify security bugs overlooked during development stage It may focus on input validation information leakage improper error handling object reference resource usages and weak session management e Perform functional security test to ensure that web application behaves as specified in the security requirements such as control flow data flow test Similarly perform risk based test to ensure that common mistakes and suspected software weaknesses such as cross site scripting SQL injection and buffer overflow are mitigated e Include security controls in the system integration testing and user acceptance test e Prepare a security and quality assurance plan and adopt assurance methods such as code review penetration testing user acceptance tests etc e Perform IT security audit before production launch and after major changes to the system e Review application log regularly e Maintain version control and separate environment for development and production at the maintenance and support stage 11 5 4 Web Application Secure Coding The security considerations and principles of a general application design and development described in Section 11 1 1 Security Considerations in Application Design and Development also apply to web application development But since web applications are
118. es Training and education can provide users developers system administrators security administrators and any related parties with the necessary skills and knowledge in implementing the security measures No policy is considered to be implemented unless users or related parties have commitment and communication This means that users and related parties e Are informed of the policy by briefing or orientation when they newly join e Are invited to participate in developing the policy proposals e Are trained in the skills needed to follow the policy e Feel that security measures are created for their own benefit e Are periodically reminded of and refreshed for new issues e Have signed for acknowledgement e Are provided with policy guidance in manageable units Enforcement and Redress It refers to the task of enforcement of rights arising from the policy implementation and redress for violations of those rights Department should set up procedures to provide prompt assistance in investigative matters relating to breaches of security Establish a Departmental Information Security Incident Response Team ISIRT and set up a security incident handling procedure can improve the effectiveness of the policy On going Involvement of All Parties An effective IT security policy will also rely on continuous exchange of information consultation co ordination and co operation among users and departments Injection of knowledge on standards m
119. ese devices should be avoided Staff should justify the need to store classified information to these devices Mobile device and removable media provided by the B D should be used and staff should seek proper authorisation before storing minimum required classified data to the device In order to minimise the risk and consequence of data loss use devices which equip with security measures and use encryption for classified data Staff should remove classified information from the mobile device and removable media once finished using and should ensure all classified data has been completely cleared prior to disposal or re use Some electronic office equipment including multi function printers and photocopiers may have storage media embedded as auxiliary devices which their existence may not be readily apparent to the users B Ds are reminded to review their inventory and make suitable arrangements to ensure the data is handled in accordance with the requirements of Security Regulations and related policies procedures and practices In addition the equipment should be used and managed with care if sensitive or classified information is likely to be stored or processed by them Proper procedures must be established for the storing and handling of backup media Backup media containing business essential and or mission critical information shall be stored at a secure and safe location remote from the site of the equipment Access to the backup media shou
120. esents a token something possessed and a valid password something known For some applications challenge response scheme may be chosen to generate some information or challenges to the user and request for correct response before allowing log in To reduce the possibility of passwords being compromised using brute force attack consecutive unsuccessful log in trials should be controlled This can be accomplished by Ref No G3 9 2 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 3 disabling account upon a limited number of unsuccessful log in attempts Alternatively the mechanism of increasing the time delay between each consecutive login attempt could also be considered to prevent password guessing activity B Ds should ensure that their information systems are implemented with appropriate authentication mechanisms and measures that are commensurate with their security requirements and the sensitivity of the information to be accessed A Risk Assessment Reference Framework for Electronic Authentication has been promulgated which aims to introduce a consistent approach for B Ds reference in deciding the appropriate authentication method for their e government services with a view to providing citizens staff with a consistent experience and interface when transacting electronically with the Government for services of similar authentication requirements B Ds should follow the framework as far as possible in determining and implement
121. ess point s coverage areas to balance the loading and minimise the probability impact of Denial of Service DoS attack e Frase all sensitive information such as system configurations pre shared keys digital certificates and passwords on the devices upon disposal of wireless components End user Controls e Install firewall on wireless clients e g mobile devices e Turn off sharing or tethering at wireless clients e Don t attach the wireless clients to departmental network while it is connected to a third party wireless network e Connect to departmental network resources using VPN e Keep strict control of the wireless interface device e g PCMCIA card and USB token for laptop as access credentials such as SSID and or encryption key are commonly stored on the card e Only enable wireless connections when users need them disable them when they are no longer in use e Follow the guidelines in Section 12 5 PROTECTION AGAINST COMPUTER VIRUS AND MALICIOUS CODE and Section 9 5 2 Mobile Device Security to protect the mobile device 12 7 1 3 Data Transmission Considerations WLAN is generally considered as an un trusted network and should not be used to transmit classified information without proper security controls Network traffic between the WLAN and the internal trusted network shall be encrypted and authenticated The adoption of VPN is a viable option to achieve this kind of end to end security Ref No G3
122. ethods codes of practice and other expertise on IT security from the private sector will also help to keep the IT security policy up to date and relevant ADDITIONAL REFERENCES e Security Policy Issues related articles from The SANS Institute http www sans org reading_room whitepapers policyissues week End Ref No G3 15 13 IT SECURITY GUIDELINES APPENDIX A APPENDIXA SAMPLE IT SECURITY END USER INSTRUCTIONS The document aims to help end users understand their responsibilities in IT security The Instructions are summarised from both the Baseline IT Security Policy S17 and the Security Regulations such that users can have a basic understanding of their security responsibilities related to information system usage B Ds are recommended to make use of the enclosed sample End User Instructions to produce one for their own organisation The Instructions should be customised based on their departmental IT security policy and computer environment B Ds should distribute the document to all existing staff and new staff at first entry and remind the staff regularly for reading the document This End User Instructions document however is not intended as a replacement of the existing security documents in the B D or Government Users are required to read and follow all existing security documents in full Ref No G3 A 1 END USER INSTRUCTIONS ON INFORMATION TECHNOLOGY IT SECURITY YOUR DEPARTMENT NAME Name of
123. f the systems and data concerned conduct business impact assessment identify recovery time objectives and define minimum service levels DRP provides detailed procedures to facilitate recovery of IT capabilities It will be further elaborated in the next section Disaster Recovery Planning Disaster recovery planning is a process to create a DRP for an information system DRP includes a well planned document to deal with situations when a disaster occurs to an information system and or its primary site whereby the systems and data are totally lost DRP should include detailed backup procedure of the information system and recovery procedure of the information system to an alternate site Consideration should be given to the possibility that the primary site of the information system may not be available for a prolonged period of time after the disaster and that the information system at the alternate site will not be run at an optimal performance level e g the performance degradation may be supplemented by manual procedures The plan should consist of clear identification of the responsibilities persons responsible for each function and contact information The plan should include a recovery strategy with detailed and well tested procedure for data recovery and verification As the purpose of test is to increase the confidence of the accuracy and effectiveness of the procedure it is important to define what is being tested how the test is co
124. f the logon fails for multiple consecutive times 9 Doremind the responsibilities of the users in protecting their passwords System Security Features Following are desirable security features available in some operating and application systems which assist in enforcing some of the recommended password selection criteria It is highly recommended that such features be enabled whenever possible 1 Automatically suspend a user account after a pre defined number of invalid logon attempts 2 Restrict a suspended account to only allow reactivation with manual interventions by the system security administrator 3 Prevent users from using passwords shorter than a pre defined length or re using previously used passwords 4 Allaccounts shall be revoked or disabled after a pre defined period of inactivity by means of security checking by the system application automatically or periodical review manually e g check on last login time by the IT security administrator MOBILE COMPUTING AND REMOTE ACCESS Mobile Computing and Communications A formal usage policy and procedures should be in place and appropriate security measures should be adopted to protect against the risks of using mobile computing and communication facilities It should take into account the risks of working with mobile computing equipment in unprotected environments The policy and procedures should include the requirements for physical protection access controls
125. f the secure deletion process For details on disposing classified information please refer to Section 10 9 INFORMATION ERASURE in this document While there is no specific regulation on the disposal of unclassified information as a good practice to protect data privacy B Ds are advised to adopt the above procedures if they believe that the equipment to be disposed of or reused contains information which may cause data privacy issue if it is not cleared properly Ref No G3 8 6 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 3 PHYSICAL ACCESS CONTROL Staff should be educated not to enter the password in front of unauthorised personnel and to return the cardkeys or access devices when they resign or when they are dismissed Finally the acknowledgement of password and receipt of magnetic cardkeys shall be confined to authorised personnel only and record of passwords shall be securely stored Cardkeys or entrance passwords should not be divulged to any unauthorised person Whenever leaving the workplace the re authentication features such as a password protected screen saver in their workstations should be activated or the logon session connection should be terminated in order to prevent illegal system access attempts For a prolonged period of inactivity the workstation should be switched off to prevent unauthorised system access The display screen of an information system on which classified information can be viewed shall be care
126. for that browser and connections to backend servers are cleaned up Access restriction Ensure that end user account only has the least privilege to access those functions that they are authorised and the account has restricted access to backend database or to run SQL or other OS commands Donot make system calls directly to real file names and directory paths If attackers have access to source codes they may discover system level information Use mapping provided by web server as a layer of filtering Do not place data file temporary or backup files in the same directories of web servers to prevent from unauthorised access Restrict access to application and web server system or configuration files Do not assume that users are unaware of special or hidden URLs or APIs Logging Use POST only to send request because GET request can leave verbose information in the web application server logs Enable web server log and transactions log Build a centralised module for application auditing and reporting Use the most appropriate form of authentication methods to identify and authenticate incoming user requests Consider using server side programming platform with strong sandbox model to protect the application server and session variables such as Java or Net Protect XML data at the same way as protecting HTML traffic and do not include sensitive data in XML document in clear text Restrict the types of files being u
127. ftphone systems which implement VoIP using an ordinary computer with a headset and special software Ref No G3 12 29 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 9 2 12 10 Under this scenario the information system provider should perform a security risk assessment to determine if it needs to refine its security requirements If the outcome is that there is no need to change its security requirements B D of the information system provider should reconcile with users of other B Ds with higher security requirements to either devise alternative access channels for their access or request these users to accommodate with laxer security requirements But if the outcome is that B D of the information system provider needs to strengthen its security requirements additional security controls should be implemented accordingly After strengthening its security requirements if there are still users of other B Ds having higher security requirements B D of the information system provider should reconcile with these users to either devise alternative access channels for their access or request these users to accommodate its laxer security requirements In addition when a B D implements an information system for users of other B Ds to use the B D should treat the incoming requests as coming from un trusted networks Sufficient security controls should be implemented according to the application specific requirement More
128. fully positioned so that unauthorised persons cannot readily view it All staff shall ensure the security of their offices Office that can be directly accessed from public area should be locked up any time when not in use irrespective of how long the period might be A list of authorised personnel to access the data centres computer room or other areas supporting critical activities must be maintained kept up to date and be reviewed periodically If possible ask the cleaning contractor to assign a designated worker to perform the data centre or computer room cleaning and the personal particulars of whom shall be obtained During the maintenance of the information system works performed by external party shall be monitored by the staff responsible Entry by visitors such as vendor support staff maintenance staff project teams or other external parties shall not be allowed unless accompanied by authorised staff People permitted to enter the data centre or computer room shall have their identification card properly displayed so that intruders can be identified easily Moreover a visitor access record shall be kept and properly maintained for audit purpose The access records may include name and organisation of the person visiting signature of the visitor date of access time of entry and departure purpose of visit etc All protected and secured areas in the computer area shall be identified by conspicuous warning notices so as to deter int
129. g Ref No G3 IT SECURITY GUIDELINES DATA SECURITY 10 DATA SECURITY Access to application and data especially classified data should be restricted to those who are authenticated and authorised to access Proper protective measures such as access control and encryption should be adopted to ensure the confidentiality of the data Backup and recovery of data shall be carefully planned to ensure the availability and integrity of the data and software when corruption occurs Other measures like audit trail and network protection should also be adopted The following are examples on protection mechanism Protection System Examples Unauthorised access of the Encrypted password system magnetic cardkey system application or data challenge and response system digital signature file permission access control restricted access to backup data audit log or a combination of these Unauthorised access of the Keyboard lock screen saver with password protection workstation or terminal bootup password and proper access control Unauthorised access of mobile System with encryption capability proper access devices or removable media control and safe custody Disclosure of information on User profiles and views screen saver with password screen protection proper positioning of the display screen timer to disconnect Disclosure of information on Use network that are secured use challenge and transmission response system
130. g firewall malicious code detection and repair software etc for enterprise management Enterprise management means that the software uses a centralised management console to manage all agents of the security software in the organisation It usually provides feature like remote update policy enforcement status query report generation security functions etc It can save deployment time of policy signatures updates enforce a standardised organisational security policy assist in compliance assessment and save effort of LAN system administrators and IT security administrators DMZ is a network added between a protected network and an external network in order to provide an additional layer of security Usually servers providing services to users in the Internet are placed in DMZ Ref No G3 12 4 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 2 2 Transmission of Classified Information 12 3 In accordance with the Security Regulations TOP SECRET SECRET information must be transmitted only when encrypted and inside an isolated wired LAN approved by the Government Security Officer subject to the technical endorsement of OGCIO An isolated LAN refers to a local area network in a single controlled environment that has no connection with other network including connection to other government networks Internet connection and remote access Transmission of CONFIDENTIAL RESTRICTED information must be encr
131. g actually occurred Do not reveal sensitive information such as credit card number HKID personal telephone mobile number credentials and other sensitive information without proper control e g masking Do not include comments about application logic in the HTML response Do not include unnecessary internal system information like internal IP address internal host name internal directory structure etc in the response Do not include verbose error messages of internal server errors such as debug information stack traces to avoid exposing information to attackers Most application web server allows customisation of an error page in case of internal Server error HTTP trust issues Do not trust and rely on HTTP REFERER headers form fields or cookies to make security decisions as any of this data can be spoofed Do not trust these parameters from the client browser unless strong cryptographic technique is used to verify the integrity of the HTTP headers Do not pass HTTP header s parameters directly to system call or database query Do not display HTTP header s parameters directly in the processing response Do not assume hidden parameters cannot be changed by users as hidden parameters can be manipulated easily by attackers Keep sensitive session values on servers to prevent client side modification Do not put sensitive information in any client browser s cookies Use strong cryptographic techniques to protect the confidenti
132. g is required it is necessary to act on both IP versions on any host control systems firewall VPN client IDS IPS and so on In order to mitigate the threats associated with IPv6 the following measures should be taken when implementing IPv6 e Make sure network devices are IPv6 aware and that the installed firewall and IDS IPS can detect and enforce security policy on IPv6 traffic e Switch on IPv6 protection capabilities and security measures on both the firewall and IDS IPS even it is working under an IPv4 environment e Provide IPv6 training to the LAN system administrators DOMAIN NAME SYSTEM SECURITY EXTENSIONS DNSSEC Domain Name System DNS is often subject to man in the middle spoofing and cache poisoning attacks that are hard to defend against Domain Name System Security Extensions DNSSEC adds an additional layer of protection to the network by providing validation of DNS responses It uses public key cryptography to verify the authenticity of a DNS record By checking the digital signature the client computers can trust that information they receive has not been modified or tampered It protects users from being redirected to malicious sites DNSSEC is progressively rolled out to add security to the existing DNS infrastructure B Ds should plan and prepare for DNSSEC deployment For DNSSEC implementation B D should consider Designing a signing system how to integrate the system with the existing DNS archite
133. ghly secure applications as the tracing functionality of the operating system may not have a fine enough granularity to record critical functions of the application There is virtually no limit to the recording of access to records by individual users and the actual updates made However logging routine use can result in a waste of resources and may even obscure irregularities because of the volume generated Therefore self developed audit trails should focus on failed transactions and attempts by users to access objects for which they do not have authorisation Transaction log can contain the following information but are not limited to e Unauthorised update access e Starting ending date and time of activity e User identification for illegal logon e Sign on and sign off activity for illegal logon e Connection session or terminal Ref No G3 12 36 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Computer services such as file copying searching B D should define policies relating to the logging of activities of information systems according to its business needs and data classification The policies shall include but not be limited to the requirement to log successful and unsuccessful log in attempts activities of privileged user IDs changes to user access rights details of password changes modification to software etc The information logged should meet the above requirement at minimum in order
134. ging They are NOT stated here as security requirements but are provided as useful guiding references for developing implementing and understanding security policies The principles listed below are by no means exhaustive Information system security objectives Information system security objectives or goals are described in terms of three overall objectives Confidentiality Integrity and Availability Security policies and measures are developed and implemented according to these objectives These security objectives guide the standards procedures and controls used in all aspects of security design and security solution In short for an information system only authorised users are allowed to know gain access make changes to or delete the information stored or processed by the information system The system should also be accessible and usable upon demand by the authorised users Prevent Detect Respond and Recover Information security is a combination of preventive detective response and recovery measures Preventive measures are for avoiding or deterring the occurrence of an undesirable event Detective measures are for identifying the occurrence of an undesirable event Response measures refer to coordinated response to contain damage when an undesirable event or incident occurs Recovery measures are for restoring the confidentiality integrity and availability of information systems to their expected state Prevention is the fi
135. gregation of Duties rere i HERR ERU RE re CPC EHE Rr oppeactesbegse sp eneeaseees 12 1 12 1 2 Principle of east Privilege ierit rtr HRS er ERU REEF E PER ERE SENE RE e E EE 12 1 12 1 3 Principle of Least Functionalty nee te Eph PRESE erbe ERE ep s EESTE 12 1 12 1 4 Change Management penetret preti oe ee EU DRE RR OEE TEEI SeT SE Es TESE nE hehe pedo 12 1 12 1 5 Operational and Administrative Procedures esses eene een rennen 12 2 12 1 6 Operations Controls ect at phi ee Ree Ee ORO ER enan EE EERIE E E RES IR hehe being 12 2 GENERAL NETWORK PROTECTION nket rette tS ERR E ph ERES REI eB EE Eare EIEEE 12 3 12 2 1 Network Security Controls eese eese tenete ten then tren netten nennen entren N aiee Sees 12 4 12 2 2 Transmission of Classified Information sese neen eene emet tenete 12 5 INTERNET SECURITY ede rece spe won eG preter te ite ae eu aes 12 5 12 3 1 Gateway level Protection ceret rete eter teer Me RM ERE Ed re eR Ene Ere ehe RR 12 6 12 32 Chentlevel Protection e tette ero ER Ret Me M ERES ERR eh Ere eH ee te TRES 12 6 12 3 3 Using Internet Services et en eect ette rhe e Me e PR deren ree RH SERE AIRES 12 7 12 3 4 Social Networking Services esesssssessesseeeeseeer ener teee trennen teste enne en rennen rennen tenen 12 8 ELECTRONIC MESSAGING SECURITY esee enne nene trennen trennen eren enne enne enne nns 12 10 12 41
136. heir information systems as IT services to users of other B Ds Since Baseline IT Security Policy S17 spells out the baseline security requirements all Government information systems regardless of providing services to users within its own B D or to users of other B Ds should comply with the system requirements stated in S17 Users of Government information systems should also comply with the user requirements stated in S17 Nevertheless some B Ds may enforce stronger security requirements than others e g client side program configuration settings network transmission requirements user identification and authentication session handling transaction integrity etc There will be cases where the security requirements of two B Ds are different but they need to inter communicate with each other The following principles should be observed if there are security requirement discrepancies of inter departmental communication e Security requirements of an information system provider is STRONGER than security requirements of users from other B Ds Under this scenario security requirements of the information system provider should dominate with the fact that the B D as the information system provider has legitimate business concerns to raise its security requirements Users of other B Ds will need to follow e Security requirements of an information system provider is WEAKER than security requirements of users from other B Ds So
137. horised process that will have adverse impact on the confidentiality integrity or availability of an Information Systems Examples of malicious codes include computer viruses worms Trojan horses and spyware etc Ref No G3 IT SECURITY GUIDELINES k Mobile Devices Removable Media 4 2 CONVENTIONS N A DEFINITIONS AND CONVENTIONS portable computing and communication devices with information storage and processing capability Examples include portable computers mobile phones tablets digital cameras audio or video recording devices portable electronic storage media such as magnetic optical and flash memory devices which can be inserted into and removed from a computing device Examples include external hard disks or solid state drives floppy disks zip drives optical disks tapes memory cards flash drives and similar USB storage devices 4 3 ABBREVIATIONS AND ACRONYMS BCP Business Continuity Plan CD Compact Disc DMZ Demilitarised Zone DRP Disaster Recovery Plan IDS Intrusion Detection System IM Instant Messaging IPS Intrusion Prevention System LAN Local Area Network LUN Logical Unit Number NAS Network Attached Storage RFID Radio Frequency Identification SAM Software Asset Management SAN Storage Area Network SLA Service Level Agreement SNS Social Networking Service SSL Secure Socket Layer TLS Transport Layer Security URL Uniform Resource Locator USB Universal Serial Bus VPN Virtual P
138. hus the Baseline IT Security Policy can be treated as basic rules which must be observed as mandatory while there can still be other desirable measures to enhance the security Introduces general concepts relating to IT security and elaborates interpretations on the Baseline IT Security Policy It also provides readers some guidelines and considerations in defining security requirements Acts as a supplementary document to T Security Guidelines to provide general guidelines on Internet gateway security These guidelines represent what are regarded as best practices to maintain security risks at an acceptable level under the Internet open platform It is intended for staff who are involved in the operational and technical functions of Internet gateway services Acts as a supplementary document to T Security Guidelines to give an introduction to a generic model for IT security risk assessment and security audit This document does not focus on how to conduct a security risk assessment or audit Rather it provides a reference model to facilitate the alignment on the coverage methodology and deliverables of the services to be provided by independent security consultants or auditors Acts as a supplementary document to T Security Guidelines to provide a reference for the management administration and other technical and operational staff to facilitate the development of security incident handling plan and to be used for preparation for
139. iation of IT security its problems and resolutions His her responsibilities include e Direct and enforce the development of security measures e Provide the necessary resources required for the measures to be implemented e Ensure participation at all levels of management administrative technical and operational staff and provide full support to them Senior management should consider the setting up of an information security steering committee or including information security as one of the regular discussion items in management meetings This will provide an ongoing basis to ensure the alignment of security strategy with business objectives The actual IT Security Management structure may vary according to the circumstances of each organisation Ref No G3 5 4 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE 5 2 2 5 2 3 5 2 4 ON INFORMATION SECURITY Departmental IT Security Officer DITSO Head of B D shall appoint a Departmental IT Security Officer DITSO to be responsible for IT security To better equip the designated DITSOs with security management and related technology knowledge or skills SB and OGCIO will provide training to DITSOs to facilitate them in carrying out their duties B Ds should ensure that the designated DITSOs have duly received such training The roles and responsibilities of DITSO shall be clearly defined which include but are not limited to the following e Establish and m
140. ibited except with proper security safeguard and approval from the DITSO Client level Protection Personal firewalls are effective measures to protect user s workstation from unauthorised network traffic which can be network worms or other forms of malicious code attacks It resides on user s workstation and provides firewall services between the workstation and Ref No G3 12 6 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 3 3 the network Personal firewall controls network traffic by asking for user s authorisation before allowing the network traffic entering into or leaving user s workstation Some even provide application level protection that ensures only authorised processes will run on user s workstation LAN System administrators are recommended to install personal firewall on computers that may directly connect to un trusted networks like the Internet or third party networks Most personal firewalls can act in either stand alone configuration or in agent configuration where the personal firewall policy can be centrally managed and enforced Besides considering personal firewall protection web browsers running on user s workstation should be properly configured As web browsers are the primary interface with the Internet poorly configured web browsers can allow malicious code to be downloaded onto user s workstations B Ds can refer to the following guidelines when configuring web browsers e Disable a
141. ic messaging can carry viruses spam worms inappropriate images and other damaging content that can seriously compromise your information assets and networks Given the ease and power of electronic messaging tools and increasing popularity of Internet services such as SNS B Ds should be aware of the potential security threats associated with the use of these tools Spammers and attackers are always using tricks such as spam and phishing scams to perform fraudulent activities Spam refers to bulk unsolicited electronic messages sent in the form of email fax or short message etc regardless of whether the recipients have given any consent to receive such or even after the recipients have requested not to receive such any more In general spammers send such messages to a big pool of recipients expecting that some would be interested in their products or information and respond to their messages offers Spam includes legitimate advertisements misleading advertisements and even phishing messages designed to trick recipients into giving up personal and financial information Phishing attacks involve the mass distribution of fraudulent electronic messages with return addresses links and branding which appear to come from legitimate organisations such as banks insurance agencies retailers or credit card companies Phishing scams may be circulated in the same mass mailing format as spam It involves the use of social engineering techniques in an att
142. ice provider and ensure that measures are implemented to comply with relevant security requirements and local laws Ref No G3 7 2 IT SECURITY GUIDELINES MANAGEMENT RESPONSIBILITIES 7 3 7 3 1 CONTINGENCY MANAGEMENT Information systems are vulnerable to a variety of disruptions ranging from mild e g short term power outage disk drive failure to severe disruptions e g equipment destruction fire natural disasters While many of these vulnerabilities may be minimised or eliminated through management operational and technical controls it is virtually impossible to completely eliminate all risks B Ds should develop an IT contingency plan to enable sustained execution of mission critical processes and information systems in the event of a disastrous disruption IT contingency planning refers to interim measures to recover IT services following an emergency or system disruption Interim measures may include the relocation of information systems and operations to an alternate site the recovery of IT services using alternate equipment or the performance of IT services using manual methods There are different types of contingency plans for information systems The two most common ones are Business Continuity Plan BCP and Disaster Recovery Plan DRP BCP focuses on sustaining an organisation s critical business processes during and after a disruption In BCP system owners from the business side should assess the criticality o
143. ill be divided into Basic and Advanced Level Training Basic Level training courses are designed to equip the participants with essential and overview of eHR basic clinical terms medical standards and terminology as well as data privacy and security in clinical environment Advanced Level training courses are designed to provide specific knowledge of CMS On ramp such as installation and implementation of the application and the communication module to eHR Core sharing system considerations for development of add ons for CMS On ramp etc Further studies on the message and terminology used in eHR will also be covered The courses covered by the training programme and the training materials to be provided are at Annex B 4 2 Provision of Training Programme One full set of training programme comprising both Basic and Advanced Level courses will be arranged in 2014 Training courses will then be arranged on an as and when required basis Whenever there are sufficient requests training courses will be arranged and the eHRO will invite nominations from all eHR SPs via email eHR SP will have to attend refresher training course on a need basis This would facilitate the staff to refresh the knowledge and acquire the latest update of the eHRSS 4 3 Assessment Assessment on the trainees understanding of the training courses will be arranged after the training The assessment may be in a form of multiple choice questions or a practical hand on
144. ily guessed password administrator a user s login name cisco a vendor s name peter chan a person s name aaaaaaaa repeating the same letter abcdefgh consecutive letters 23456789 consecutive numbers qwertyui Adjacent keys on the keyboard computer a dictionary word computer12 simple variation of a dictionary word cOmput3r simple variation of a dictionary word with o substituted by 0 and e substituted by 3 9 4 2 Password Handling for End Users The password mechanisms are subjected to the same vulnerabilities as those of the operating system namely poor password selection by users disclosure of passwords and password guessing programs Ref No G3 9 5 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY DON Ts 1 Do not write down your password unless with sufficient protection 2 Do not tell or give out your passwords even for a very good reason 3 Do not display your password on the monitor 4 Do not send your password unencrypted especially via Internet email 5 Do not select the remember your password feature associated with websites that contain your personal particulars e g ID card number and disable this feature in your browser software People with physical access to your system may access to the information contained in these sites 6 Do not store your password in any media unless it is protected from unauthorised access e g protected with access control or have the pass
145. ine Clinical Terms SNOMED CT Page 14 of 17 eHR Service Provider Training Scheme Invitation Document Advanced Level Training Courses Course 1 Course 2 Course 3 Course 4 Course 5 Overview of CMS On ramp Bi ee e eue ads Background of CMS On ramp Functions of CMS On ramp Common system configuration Reports in CMS On ramp Best Practices with CMS On ramp Data import and export Database Backup and restore Implementing CMS On ramp in private clinics 999929925425 Hardware and software requirement Application installation Application configuration eHR components installation Application version updating Basic performance tuning Security and Risk Assessment SRA guidelines Unwind procedure Problem identification and basic problem solving Implementing Communication Module to eHR Core 929 What is Encapsulated Linkage Security Application ELSA ELSA installation Implementation procedure of ELSA Problem identification and basic problem solving Message and Terminology Standards in eHR Importance of medical message and terminology standards gt HL7 International Classification of Diseases tenth Revision ICD 10 SNOMED CT Other common terminology standard Messages standard for data upload to eHRSS All about eHR SP Role and responsibility of eHR SP Eligibility of eHR SP Workflow on how to become a eHR SP eHR SP Compliance Page 15 of 17 eHR Service Provider
146. ing the electronic authentication requirements of their e government services USER IDENTIFICATION Identity Management is a combination of processes and technologies to manage and secure access to the information and resources of an organisation while also protecting users profiles It includes the entire process of deciding who should get what access to which resources providing changing and terminating such access when appropriate managing the process and monitoring it for compliance with policies For authentication identity management supports the concept of single sign on in which a user presenting with a single credential can be granted access to authorised data applications and systems Since a user essentially only needs to remember one credential for single sign on an attacker who can compromise the credential can break in to all systems authorised to the user Therefore extra security measures are required to protect the credentials when implementing single sign on Strong password policy and frequent password changes should be enforced to deter password attacks Additional authentication methods such as biometrics or two factor authentication could also be considered to strengthen the authentication process Functions requiring another level of authorisation should implement re authentication To prevent illegal system access attempt if there has been no activity for a predefined period of time re authentication should be acti
147. ion It is very important to ensure the protection and management of keys Furthermore it is dangerous to distribute the decryption key along with the encrypted file during file distribution since one may obtain the decryption key and easily open the file Key management should be documented and performed properly in accordance with e Key storage The master cryptographic key should be stored securely such as by placing it within a hardware security module or a trusted platform module and should not leave the security storage for the master key s service life e Key recovery Assess the need on having recoverable key If considered necessary cryptographic keys should be recoverable by authorised personnel only The key recovery password should be protected by at least two levels of independent access controls and limited to personnel authorised for the task of information recovery e Key backup The cryptographic key should be backed up with proper protection e A documented process should be established to access the backed up keys e Key transfer Cryptographic keys should never be transported together with the data or media e Logging transactions e All access to the key recovery passwords should be recorded in an audit trail e All access to the backed up key should be recorded in an audit trail Encryption Tools B Ds should refer to the guidelines of Security Regulations to select encryption tools for their inf
148. ion Backup There are many ways to back up a workstation common options include a Backup using local backup device Workstation data can be backed up as frequent as required Users can take the active role for backing up their data Or a scheduler can be used to back up the data to local backup device e g tape drive at regular intervals b Backup using workstation backup agent and central network backup Most server backup software products provide the function to back up data that reside on connected workstations Workstation data can be backed up to the server backup device following the client backup schedule defined by the LAN administrator This can be done without interruption to user after office hours or lunch time but the workstation will have to leave powered on during the backup c Backup using central network backup with vital data copied to server Workstation data can be copied to a server and the server will be backed up according to its regular backup schedule Users can take the active role for copying their data to the server Or a scheduler can be used to copy data to the server at regular intervals to match with the backup schedule on the server Ref No G3 10 13 IT SECURITY GUIDELINES DATA SECURITY 10 9 INFORMATION ERASURE All classified and personal data must be erased before the media computer equipment and electronic office equipment are to be reused transferred or disposed This includes equipme
149. ion as they would be for the paper equivalent and they should be protected accordingly as stated in the Security Regulations B Ds shall advise their business partners contractors or outsourced staff to comply with the guidance in the Security Regulations in storing processing and transmitting data owned by Government 10 2 DATA LIFE CYCLE MANAGEMENT Data life cycle management is a policy and procedure based approach to managing data throughout its life cycle from creation and initial storage to the time when it becomes obsolete and is destroyed It aims to provide framework for data management and provide cost effective solution for risk mitigation and to reduce the risk of data loss or leakage The life cycle includes six phases namely create store use share archive and destroy Appropriate procedures and practices should be deployed to properly protect the data at different phases Create It applies to creating or changing a data or content element Creation is the generation of new digital content or the alteration updating of existing content either structured or unstructured In this stage the information should be classified and appropriate security measures should be determined Store It refers to the act of committing data to structured or unstructured storage such as database or files Appropriate security controls including access controls encryption and rights management commensurate with the classification of the data
150. ion of a development or testing environment should be avoided for systems exposed to the Internet For operational systems other system utilities such as compilers should be restricted from unauthorised access unless such access is technically or operationally necessary and when such access is allowed control mechanism should be in place Production data shall not be used for testing purposes The use of operational databases containing personal or sensitive information for testing purposes should be avoided If this Ref No G3 11 5 IT SECURITY GUIDELINES APPLICATION SECURITY 11 4 11 4 1 11 4 2 cannot be avoided proper approval should be obtained The following controls should be applied e Personal data shall be de personalised before use e Classified information shall be removed or modified before use e All these data should be cleared immediately after testing CHANGE MANAGEMENT AND CONTROL This section is to ensure that changes to all information processing facilities are authorised and well tested All proposed program system changes or enhancements should be checked to ensure they are not compromising security of the system itself or its operating environment Staff should receive appropriate training to ensure sufficient awareness of their security responsibilities and impact of any security changes and usage on the information systems Program System Change Control The objectives of maintaining program system
151. ion shall not be processed in privately owned computers or mobile devices CONFIDENTIAL or RESTRICTED information shall not be processed in privately owned computers or mobile devices unless authorised by the Head of B D All CONFIDENTIAL or RESTRICTED information shall be encrypted when stored in mobile devices or removable media issued to individual officer authorisation from Head of B D should be sought for storing CONFIDENTIAL information When working in public areas users should avoid working on sensitive documents to reduce the risk of exposing to unauthorised parties Users should also avoid using public printers If printing is necessary the printout should be picked up quickly Furthermore users should protect the remote computers with password enabled screen saver and never leave the computers unattended For remote access to information system containing classified information B Ds should log the access activities with regular review to identify any potential unauthorised access Users should reference the guidelines in Section 8 2 EQUIPMENT SECURITY when using mobile devices at remote office Dial up Access Dial up access is one form of remote access over a public telephone network Only authorised persons should be allowed with dial up access B Ds should keep an updated inventory of their dial up access points and modem lines Dial up access is advised to be safeguarded by user authentication and dial up passwords should be ch
152. ions as well as understand the limitations of different RFID technologies and solutions Bluetooth Bluetooth is an open standard based on IEEE 802 15 for short range transmission of digital voice and data that supports point to point and multipoint applications Bluetooth can be used to establish a wireless personal area network to connect disparate devices e g mobile phones PDAs printers faxes etc together wirelessly in a small environment such as an office or home Product developers that use Bluetooth wireless technology in their products have several options for implementing security There are three modes of security for Bluetooth access between two devices e Security Mode 1 non secure e Security Mode 2 service level enforced security e Security Mode 3 link level enforced security Devices and services also have different security levels For devices there are 2 levels trusted device and un trusted device A trusted device having been paired with one s other device has unrestricted access to all services With regard to services three security levels are defined services that require authorisation and authentication services that require authentication only and services that are open to all devices B Ds using Bluetooth to connect mobile device to Government networks should ensure that the usage is controlled for business purposes only The same management operational and technical controls described in Sectio
153. isk assessment should be performed before production and prior to major enhancements and changes associated with the cloud systems or applications If a cloud service provider does not allow clients to directly conduct security risk assessment and audit on it it should be requested to provide third party audit reports which meet industry standards and satisfy B D s requirements B D and the cloud service provider need to agree in advance to what extent the B D has accessibility to the cloud service provider to audit and verify the existence and effectiveness of security controls specified in the SLA Both sides should agree how to collect store and share compliance evidence e g audit logs activity reports system configurations B D should be well aware of the overall incident handling procedures of the service provider and should also ensure that the steps to be taken by the service provider and the timing of response in a security incident satisfy B D s requirements Information security incidents that originated from the cloud service provider s infrastructure might have an impact on the B D s resources and they should be reported to the B D with sufficient details Technical Controls Due to multi tenancy nature in a cloud environment the risks of unauthorised physical access by unknown co tenants or third parties become one of the most security concerns Adequate physical security measures in a cloud data centre could protect agai
154. isposed of or re used contains information which will cause data privacy problems if it is not erased properly ADDITIONAL REFERENCES e Backup Strategies related articles from The SANS Institute http www sans org reading_room whitepapers backup e Encryption and VPNs The SANS Institute http www sans org reading_room whitepapers vpns e Information Lifecycle Management Cloud Security Alliance https wiki cloudsecurityalliance org guidance index php Information_Lifecycle_Man agement e Information centric Security Securosis https securosis com tag information centric security Ref No G3 10 15 IT SECURITY GUIDELINES APPLICATION SECURITY 11 APPLICATION SECURITY Good application design not only provides workable solutions to users problems but also provides a secured environment for them to work in Security and privacy should be introduced early and throughout all phases of the development process The security facilities provided by the operating system should be utilised Other than that the application itself should build in additional security measures depending on the vulnerability of the system and the sensitivity of the data it is dealing with Security measures related to data like password mechanisms audit trails and data backup and recovery have been discussed in Section 10 DATA SECURITY This section mainly discusses security issues related to application system development and m
155. it hard for intruders to predict the actions ADDITIONAL REFERENCES e Email Issues related articles from The SANS Institute http www sans org reading_room whitepapers email e Firewall amp Perimeter Protection related articles from The SANS Institute http www sans org reading_room whitepapers firewalls e Instant Messaging Rules A Business Guide to Managing Policies Security and Legal Issues for Safe IM Communication Nancy Flynn American Management Association e Threat Intelligence Library McAfee Labs http www mcafee com us mcafee labs threat intelligence aspx Ref No G3 12 39 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY e Security Response Symantec Corporation http www symantec com business security_response index jsp e Hoax warning F Secure http www f secure com virus info hoax e Security Wi Fi Alliance http www wi fi org security e Establishing Wireless Robust Security Networks A Guide to IEEE 802 111 SP 800 97 NIST http csrc nist gov publications nistpubs 800 97 SP800 97 pdf e Guide to Securing Legacy IEEE 802 11 Wireless Networks SP 800 48 Rev 1 NIST http csrc nist gov publications nistpubs 800 48 rev 1 SP800 48r1 pdf e RFID Security and Privacy A Research Survey Ari Juels RSA Laboratories http www rsa com rsalabs staff bios ajuels publications pdfs rfid_survey_28_09_05 pdf e Security White P
156. ity incidents occurring within the respective B D Heads of B D should designate an officer from the senior management to be the ISIRT Commander The ISIRT Commander should Ref No G3 5 5 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE 5 3 5 3 1 ON INFORMATION SECURITY have the authority to appoint core team members for the ISIRT The responsibilities of an ISIRT Commander include e Provide overall supervision and co ordination of information security incident handling for all information systems within the B D e Make decisions on critical matters such as damage containment system recovery the engagement of external parties and the extent of involvement and service resumption logistics after recovery etc e Trigger the departmental disaster recovery procedure where appropriate depending on the impact of the incident on the business operation of the B D e Provide management endorsement on the provision of resources for the incident handling process e Provide management endorsement in respect of the line to take for publicity on the incident e Collaborate with GIRO in the reporting of information security incidents for central recording and necessary follow up actions e Facilitate experience and information sharing within the B D on information security incident handling and related matters OTHER ROLES IT Security Administrators IT Security Administrators are responsible for providing security an
157. ivity In Government of Hong Kong Special Administrative Region sensitive data are classified to following four categories according to the requirements of the Security Regulations e TOP SECRET e SECRET e CONFIDENTIAL e RESTRICTED The controls of classified documents are detailed in Chapter IV of the same document Chapter IX of the Security Regulations defines regulations related to but not limited to storage transmission processing and destruction of classified data Essentially it is the responsibility of the B D to understand and follow the regulations stated To protect classified data from unauthorised access or unintended disclosure B Ds should identify the possible avenues of data breaches and consider implementing data leakage prevention solutions to monitor and protect classified data while at rest in storage in use at endpoint or in transit with external communications In accordance with Security Regulations 161 d iii all personal data should be classified RESTRICTED at least depending on the nature and sensitivity of the personal data concerned and the harm that could result from unauthorised or accidental access processing erasure or other use of the personal data a higher classification and appropriate security measures may be required B Ds shall ensure compliance with the Personal Data Privacy Ordinance particularly the Data Protection Principle 4 on security of personal data when handling personal data A
158. kup data especially for mission critical information Devices and Media for Data Backup There are quite a lot of devices available for data backup and recovery such as magnetic disks optical disks and digital data storage tapes The most commonly used medium for server backup is tape as it is relatively cheap for the capacity provided Tape magazine or automatic tape changer may also be used if the data volume is very large that spans multiple tapes in one backup session To take advantage of tape changers your backup software must have tape changer option to support them For workstation backup many devices are available as the amount of data that requires to be backed up will be generally lesser than that of a server Tape is still the relatively cheapest device when a large amount of data is going to be backed up Most workstation backup software supports both backup to tape and backup to removable optical storage media Regular cleaning of tape drive s head is required The cleaning frequency depends on factors like the operating environment and operational backup restore scan tape etc Ref No G3 10 11 IT SECURITY GUIDELINES DATA SECURITY frequency Some tape drives have indicators to remind user to clean its head after certain number of runs Documentation of tape drive should be referred for more information Proper storage and maintenance of backup media are also important The media should be properly labelled and pla
159. l IT security policy Members of the task force may include as simple as one person or as structured as a well organised IT Security Policy Group It depends on the level of details and the scope covered The policy task force may include empowered representatives from groups of staff or users such as e Human resources e Legal and regulatory matters e Information systems e Public relations e Security e Line of business Such task force can also be constructed with well defined roles and responsibilities of each team member The set of activities required to develop the IT security policy can then be defined and carried out under a properly managed environment The development may consist of the following activities e Create a security task force such as an IT Security Policy Group e Plan for the various activities and resources e Determine the security requirements e Construct an IT security policy framework e Evaluate and review the IT security policy The task force is expected to go through several iterations of review and refinement before a complete policy is developed The following sections suggest a rather structured approach of forming IT security policy for reference Organisation of the group and the development process may vary from one department to another according to specific departmental requirements Organisation of IT Security Policy Group As policy drafting review and enforcement involves the acceptance and s
160. l services or facilities shall identify and assess the risks to the government data and business operations All data to be handled should be clearly and properly classified Security protections commensurate with the data classification and business requirements shall be documented and implemented with the defined security responsibilities with those external services providers Security privileges for access should only be granted on a need to know basis The security roles and responsibilities of the external service provider B Ds and end users pertaining to the outsourced information system should be clearly defined and documented B Ds should note that although development implementation and or maintenance of an information system can be outsourced the overall responsibility of the information system remains under B Ds When preparing the outsourcing service contract B Ds should define the security requirements of the information systems to be outsourced These requirements should form the basis of the tendering process and as part of the performance metrics The outsourcing contract should include requirements for the staff of external service providers to sign non disclosure agreement to protect sensitive data in the systems Confidentiality and non disclosure agreements shall be properly managed and reviewed when changes occur that affect the security requirement The contract should also include a set of service level agreements SLAs S
161. l systems In this architecture two firewalls are used external firewall and internal firewall The external firewall protects a DMZ from the Internet and the internal firewall further protects the internal networks In this design even if external users compromised the servers in the DMZ the internal firewall can still protect the servers workstations in the internal networks Other than the firewall system considerations should also include encryption algorithms for passwords sent across networks and a secure process identification system so that applications dispersed throughout a network can know who they are talking to Installation of a NIDS or NIPS on the network helps to detect if there is an attack happening on the network An IDS monitors packets on the network wire and attempts to discover if a hacker cracker is attempting to break into a system or cause a denial of service attack An alert will be sent to the IT administrator once an attack is detected by the IDS such that the system downtime and potential service impact can be minimised IPS performs similar functions as IDS but in addition it provides proactive response to stop the source of attacks or to minimise the impact of the attacks Configuration of IDS and IPS require tuning of signature and recognition patterns to reduce false alarms B Ds have the overall responsibility to protect data information system and network A B D should acquire security software e
162. ld only be done via a librarian as far as possible Other staff including operators programmers and contractors should not be allowed to have access to the media library or off site storage room under normal circumstances Movement of media IN OUT of a library or off site storage should be properly logged Unless permission is granted any staff should not be allowed to leave the data centre or computer room with any media To facilitate the detection of loss of media the storage rack can indicate some sort of markings labels at the vacant slot positions Periodic inventory check is necessary to detect any loss or destruction Ref No G3 8 5 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 2 2 Transportation of backup media manuals to and from off site must be properly handled The cases carrying the media should be shockproof heatproof water proof and should be able to withstand magnetic interference In addition B Ds should consider protecting the media from theft by encrypting the data in the storage media splitting the media into multiple parts and transported by different people All media containing classified information must be handled strictly in accordance with the procedures set out in the Security Regulations In case of problems queries can be addressed to the Department Security Officer or Government Security Officer The construction of external media library should have the same fireproof rating as the data centre
163. loyment guidelines assessment test papers etc eHR SP will be provided with the following documentations a a copy of the object code of the CMS On ramp and the Communication Module instructions on how to get or download such software b a soft copy of the Installation Guide specifying the deployment procedures and service standards c a soft copy of the IT Security Guide attached at Annex C of this document to assist eHR SP to protect the CMS On ramp the Communication Module eHR SP s data and patients data and Page 6 of 17 eHR Service Provider Training Scheme Invitation Document d other related documentation Other Documentation issued from time to time The Installation Guide IT Security Guide and Other Documentation are collectively known as the User Documentation and are provided for eHR SP s internal use only eHR SP may only make such copies of the User Documentation and any previous versions thereof for internal training purposes and to carry out the duties as an eHR SP and not otherwise 2 3 Business Model The Government will provide CMS On ramp application and the Communication Module to private HCPs free of charge The Government also will not charge eHR SPs and the private HCPs for attendance of training programmes The Government will not mandate the private HCPs to procure the services of eHR SPs but will provide training and make available the contact details and service offerings of
164. mployment contract if he she will access classified information or system Security Requirements in Contracts Controls should be in place to administer access to information systems by external consultants contractors and temporary staff Generally all security requirements resulting from third party access or internal controls shall be reflected in the third party contract or other forms of agreement For example if there is a special need in protecting the confidentiality of information non disclosure agreements should be established and signed Access by external consultants contractors outsourced staff and temporary staff to information and information systems owned or in custody of the B D shall not be provided until the appropriate controls have been implemented and a contract has been signed defining the terms for access As a basic principle all security policies procedures as well as checks and balance of an information system adopted for in house staff should also apply to all external consultants contractors outsourced staff and temporary staff engaged in Government work Indemnity Against Damage or Loss It should be ensured that appropriate and effective indemnity clauses are included in all contracts for external services to protect the Government from damage or loss resulting from disruption of services or malpractice of contractors staff Ref No G3 7 5 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 PHYSICA
165. n 9 5 2 Mobile Device Security apply to Bluetooth security In addition B Ds should implement the following technical controls e Select obfuscated device identity ID of the Bluetooth devices the device ID should not reveal information about the Government or B D e Enable proper authentication in the device to prevent connections from unauthorised devices Only permit connection to known devices e Select hard to guess PIN and avoid weak PIN e Change default PIN e g 0000 e Configure encryption key sizes to the maximum allowable e Establish a minimum key size for any key negotiation process 7 About 10 meters 30 feet can be extended to 100 meters Ref No G3 12 27 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 8 e Put the Bluetooth device into a non discoverable state so that the device is invisible to other Bluetooth devices e Un pair the lost or stolen Bluetooth device with all the devices to which it was previously paired e Do not accept files transmitted via Bluetooth devices from unknown or suspicious entities e Ensure that mobile devices with Bluetooth interfaces are configured with power on password to prevent unauthorised access if lost or stolen VOICE OVER IP VOIP SECURITY Voice over IP VoIP technology unites the telephony and data worlds It enables the transfer of voice data over a packet switched network VoIP allows phone calls faxes and voice traffic
166. n one area will not activate all suppression systems in the office environment EQUIPMENT SECURITY This section provides security guidelines in handling computer equipment in operation and disposal Ref No G3 8 4 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 2 1 Equipment and Media Control All information systems shall be placed in a secure environment or attended by staff to prevent unauthorised access Regular inspection of equipment and communication facilities shall be performed to ensure continuous availability and failure detection Proper controls should be implemented when taking IT equipment away from sites For non fixture type of IT equipment such as mobile devices B Ds can consider keeping an authorised equipment list and periodically performing inventory check for the status of such IT equipment For removable media such as universal serial bus USB flash drives stored with classified data B Ds can consider implementing similar controls For fixture type of IT equipment B Ds can consider adopting a check in check out process or inventory documentation measures to identify which IT equipment has been taken away Nevertheless staff taking IT equipment off site should also ensure that IT equipment is not left unattended in public places to protect against loss and theft It is risky to store data to mobile device and removable media as they are small and can be easily lost or stolen Storing classified information to th
167. n systems including service accounts or user accounts created for B D users or citizens using government services B Ds should carefully define and document password policy for each category of accounts balancing the security requirements and operational efficiency Passwords shall always be well protected When held in storage security controls such as access control and encryption can be applied to protect passwords As passwords are considered as key credentials logging into a system passwords shall be encrypted when transmitting over an un trusted communication network If password encryption is not implementable B Ds should consider implementing compensating controls such as changing the password more frequently Password Selection It is important to define a good set of rules for password selection and distribute these rules to all users If possible the software which sets user passwords should be modified to enforce password rules according to the IT security policy Some guidelines for password selection are provided below DON Ts 1 Do not use your login name in any form as is reversed capitalised doubled etc 2 Do not use your first middle or last name in any form 3 Do not use your spouse s or child s name 4 Do not use other information easily obtained about you This includes ID card numbers licence plate numbers telephone numbers birth dates the name of the street you live on etc Do not use a pass
168. nd mobile devices are installed with virus or malicious code detection and recovery protection measures Virus signature and malicious code definition update should be configured as automatic and the update frequency should be at least on daily basis If automatic update is not possible LAN System Administrators should perform manual update at least once a week and whenever necessary The virus or malicious code detection and recovery protection measures should support enterprise management to facilitate central management Please refer to Section 12 2 1 Network Security Controls for more details about enterprise management LAN System administrators should also consider implementing the following technical controls e Enable anti virus protection on all local area network servers personal computers mobile devices and computers connecting to the Government internal network via a remote access channel e Enable anti virus protection to scan all incoming traffic from Internet The gateway should be configured to stop traffic with malicious content quarantine drop them and create audit logs for future references e Apply information security considerations and procedures to computer equipment and software under development or being used for testing purposes A less stable environment is likely to be more vulnerable to attacks unless proper control is applied e Perform full system scans for all computers of staff contractors or outsource
169. nducted and the expected result from the test In addition all necessary materials and documents in recovering the data should be prepared Arrangement of telecommunication network services at the alternate site should be made beforehand The plan should also include procedure to resume data back to the primary site when the primary site is restored after the disaster Ref No G3 7 3 IT SECURITY GUIDELINES MANAGEMENT RESPONSIBILITIES 7 4 7 4 1 7 4 2 B Ds should determine if their DRPs are adequate to address for possible disasters DRP should be maintained with updated information especially when there are changes to the information system at the primary site Scheduled disaster recovery drill is a good way to test for the accuracy and effectiveness of DRP But since carrying out a disaster recovery can be time consuming and may affect normal operations B Ds need to determine the frequency of conducting drills according to their business environment HUMAN RESOURCES SECURITY Training Proper security training and updates on IT security policy should be provided to all staff regularly including users developers system administrators security administrators and staff of external parties who are engaged in Government work to strengthen their awareness on information security The awareness training can be in any form such as classroom training computer based training or self paced learning An assessment may be conducted to e
170. ng ISIRTS of different B Ds and the HKCERT The core members of GIRO comprise representatives from e Office of the Government Chief Information Officer OGCIO e Security Bureau SB e Hong Kong Police Force HKPF Bureaux Departments B Ds are responsible for the security protection of their information assets and information systems The roles and responsibilities of IT security staff within a B D are detailed in Section 5 2 DEPARTMENTAL IT SECURITY ORGANISATION DEPARTMENTAL IT SECURITY ORGANISATION This section explains the individual role and responsibility of a departmental IT Security organisation In order to have sufficient segregation of duties multiple roles should not be assigned to an individual unless there is a resource limitation Ref No G3 5 3 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION SECURITY The following diagram describes a sample Departmental IT Security organisational framework Senior Departmental Departmental Departmental Manasc mert IT Security Security ISIRT 9 Officer Officer Commander Application IT Security Information LAN System Development amp Users Administrators Owners Administrators Maintenance Team An Example Organisation Chart for Departmental IT Security Management 5 2 1 Senior Management The senior management of B Ds shall have an apprec
171. nication eese ener nene tene neen srei reete Erter ene 12 29 12 9 2 Communication with External Parties ee eecceseceseceecssecssecaeecseeeseceaeeseeeseeeseeessessecaecsaecnaecnaeeaee 12 30 INTERNET PROTOCOL VERSION 6 IPV6 SECURITY serene nennen rennen ens 12 30 DOMAIN NAME SYSTEM SECURITY EXTENSIONS DNSSEC eese rennen 12 31 VIRTUALISATION niter pen DU em Depas 12 32 CLOUD EO I d BH h N E ropa ERUIT nne 12 34 MONITORING E EA E E Dn 12 36 I2JA I Logging 26 er A A A A he See E iO 12 36 12 14 2 Monitoring the System sioe E A repr ipee ER Rip E R EEE pees 12 38 12 14 3 Tools for Monitoring the System 0 0 ee eee esscesecesecesecesecssecaeecseceaeseeeseeceseeeecesscsecsaecsaecsaecsaeenaeaes 12 38 12 14 4 Varying the Monitoring Schedule sess eene nennen nennen 12 39 ADDITIONAL REFERENCES 5 inen ERU Cea NH RERO Pip 12 39 SECURITY RISK ASSESSMENT AND AUDITING e eeeeee eere en nennen neenseeeees 13 1 OVERVIEW iubere EAR REESE 13 1 ADDITIONAL REFERENCES 5 epp certet toco Dre Qe HERR oar iusto ened E Ae de eure iets eee 13 1 SECURITY INCIDENT MANAGEMENT eeeeee sees enses enses snse en seneensenssnsessenseesesses 14 1 OVERVIEW tern rh tree Oo nt abe let in e e eet one dete orb ade De ecole 14 1 ADDITIONAL REBERENCES nee Dti eerte eet paire tr aetna doen 14 1 IT SECURITY POLICY CONSIDERATIONS
172. nsitive information are located in the internal network with additional protection The internal and external firewalls should be from different vendors or types so that the firewalls will not have the same vulnerability For example the external firewall can be a web application firewall while the internal firewall can be a network layer stateful inspection firewall Network intrusion detection system NIDS intrusion prevention system NIPS should be installed to detect prevent attacks or suspicious traffic in the DMZ Alerts and reports from the NIDS NIPS should be actively reviewed to identify attacks at the earliest possible moments In addition NIDS NIPS should always be updated with latest attack signatures provided by the vendor Reverse proxy server may be considered It acts as a single point to provide all web applications services to the users Details such as the actual number and platform of the web or application servers are hidden from users This provides additional security controls because the reverse proxy server can perform checks against security attacks at a centralised location However reverse proxy server is not easily scalable For web application servers which only serve internal users and have no connection to external network since the level of external threats are limited B Ds may consider implementing fewer security protection measures such as implementing just one layer of firewall to segregate the web server from
173. nst trespassing activities to the computing resources at the physical layer If there is special requirement of not sharing equipment or equipment racks with application systems of other B Ds or application owners due to the sensitivity of data or other security requirements an isolated area or equivalent measures should consider be provided by the premise provider to segregate the application owner s data and resources from others In a cloud environment authentication and authorisation on logical access control should be clearly defined such as who should be granted with the rights to access the data what their access rights are and under what conditions these access rights are provided The cloud services should enable support on various strong authentication options for use in accessing sensitive data Regardless of public or private cloud it is critical to acquire the log data that offers a clear view into the operational and security events B Ds should define the log requirements For public cloud services B Ds should understand whether the provider could supply the required log data Classified data should be protected through encryption both at rest and in transit in a cloud environment The cryptographic keys should be managed and protected properly Key management on storage should be enforced and keys are desirable to be managed in the custody of the B D The data on backup media held by the cloud service provider could commingle
174. nsure user awareness for information security requirements and responsibilities There are handy training resources available on the Cyber Learning Centre Plus CLC Plus of the Civil Service Training and Development Institute providing general IT security related courseware as well as self assessment package to participants Moreover B Ds may make reference to the resources when providing tailor made training and materials to their staff or contractors in accordance with its own business and operation requirements Proper education and training should also be provided to the system administrators in implementing the IT security procedures System administrators should know how to protect their own systems from attack and unauthorised use They should have a defined procedure for reporting security problems Personnel Security To protect classified information from unauthorised access or unauthorised disclosure relevant clauses in Security Regulations shall be observed No officer may publish make private copies of or communicate to unauthorised persons any classified document or information obtained in his official capacity unless he is required to do so in the interest of the Government The need to know principle should be applied to all classified information which should be provided only to persons who require it for the efficient discharge of their work and who have authorised access If in any doubt as to whether an officer has authorise
175. nt that may have storage media embedded as auxiliary devices whose existence may not be readily apparent to the users including multi function printers and photocopiers Typical examples of erasure include degaussing or overwriting disks and tapes Destruction or erasure of information resource must comply with the Security Regulations The Security Regulations provide clear guidelines and requirements on the classification and handling of government information B D should refer to SR377 and SR378 with regard to destruction of classified information stored in information systems All classified information stored in information systems shall be completely cleared from the storage media before disposal or re use If for any reason this is not feasible or the media contains damaged or unusable tracks and sectors which may inhibit the overwriting process or overwriting is not possible e g optical disk or inadequate e g magnetic tape floppy disk the media unit must be physically destroyed to prevent the recovery of the classified information Degaussing demagnetising reduces the magnetic flux of the magnetic media to virtual zero by applying a reverse magnetising field Degaussing hard drives often destroys the drive s timing tracks and disk drive motor Therefore hard drives cannot be reused after degaussing Below are major considerations regarding the use of degaussing e The resistance of a magnetic media to demagnetisation is the coerci
176. ny active content options e g Java JavaScript and ActiveX in the electronic message application or browser except when communicating with a trusted source e Use up to date browser versions and apply latest security patches e Disable password auto complete or password remembering feature e Enable pop up blocking feature except when communicating with trusted sites e Remove regularly cache files or temporary files of the browsers to protect data privacy e Disable automatic installation of plug ins add ons or software User education and awareness training are also important to alert users the importance of using properly configured web browsers Using Internet Services Staff should be authorised to use the Government Internet access service only if the service can assist them in carrying out their official duties By default staff should be denied access for Internet service unless they are granted with authorisation B Ds should define acceptable Internet usage behaviours for their users Some recommended security guidelines for the acceptable usage behaviours are e Comply with the requirements in the Security Regulations in transmitting classified information e Beware that the privacy and confidentiality of information sent over the Internet cannot be guaranteed Proper security measures should be used e Disable password remembering feature at web pages e Disable Internet connection when not in use Ref No G3 1
177. ocesses which interact with information systems Roles and responsibilities should be clearly defined identified and authorised at a level commensurate with the sensitivity of information Auditability helps to reconstruct the complete behavioral history of a system and hence is useful to discover and investigate for a system during a security incident Accountability is often accomplished by uniquely identifying a single individual so as to enable tracing his her activities on the information system Ref No G3 6 2 IT SECURITY GUIDELINES MANAGEMENT RESPONSIBILITIES 7 1 7 1 1 7 2 MANAGEMENT RESPONSIBILITIES GENERAL MANAGEMENT This section summarises some key principles and best practices concerning the issue of checks and balance in information security management and aims to provide B Ds with a focused appreciation of and references on the subject matter By applying some simple measures B Ds should be able to effectively mitigate and control potential information security risks associated with human and or operation problems to an acceptable and manageable level B Ds are advised to consider the following best practices for possible adoption with regard to their individual business and operation environments Clear Policies and Procedures Management should establish clear policies and supporting procedures regarding the use of information systems so as to set out clearly the allowed and disallowed actions on their info
178. oduct to eliminate security problem should be considered or alternate security controls should be implemented e Apply the security patches through an established change control process e Regularly review the patch management process to measure its effectiveness and efficiency e Educate users to be highly aware of the importance of IT security and patch management to their daily operation e Perform security risk assessment regularly e g using vulnerability scanning tools host based or network based to identify patch inadequacy or system mis configuration e Consider acquisition of a patch management system that supports the full patch management cycle to ease the manual administration work and reduce patch deployment testing time Proper security measures should also be applied to the patch management system Depending on the nature of information systems their risk level can be different For example an information system for internal use faces fewer threats than an information system directly facing the Internet serving the public Depending on the risk level B Ds should determine the appropriate patch management strategy including patch checking and Ref No G3 12 20 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY patching frequency for their systems In essence information systems of high risk should be addressed first When evaluating whether to apply a security patch the risks associated with inst
179. of the data be necessary to recover an application system the updates or backup copies of them and the data backup should be stored together e Multiple generations of backup copies should be maintained This would provide additional flexibility and resilience to the recovery process A grandfather father son scheme for maintaining backup copies should be considered such that two sets viz the last and the last but one of backup copies are always maintained together with the current operational copy of data and programs The updates to bring the backup copies to the current operational state shall of course also be maintained and stored with the backup copies e At least three generations of the backups should be kept However if daily backups are taken it may be easier administratively to retain six or seven generations For example a Monday s daily backup should be kept until the following Monday when it can be overwritten Month end and year end copies of files may be retained for longer period as required e Magnetic tapes magnetic optical disks or cartridges used for backup should be tested periodically to ensure that they could be restored when needed e If an auto tape changer is implemented it should be noted that the delivery turnaround time for an off site storage location will be lengthened as tapes are not immediately relocated A balance point should be struck between the operation convenience and the availability of bac
180. on Ordinance Cap 310 c Comply with IT Security Guide Page 12 of 17 eHR Service Provider Training Scheme Invitation Document d e f g h i U k Report any breach of information security and leakage of confidential information incidents and event as soon as possible to eHRO Apply Best Industry Practice for IT operations administration and support Devise formal processes for risk management e g backup server to prevent business interruption data encryption to protect confidential data application and data backup to prevent data loss due to hardware or software failure uninterrupted power supply UPS for power supply failure etc Apply proper change management and control by documenting and tracking any changes that may affect the integrity and stability of CMS On ramp and Communication Module application and computer system Obtain data on need to know basis only and avoid transfer data to anyone else other than those need to know Follow the modification rules and certification processes as set out in CMS On ramp for system enhancement Comply with the Personal Data Privacy Ordinance Cap 486 and the Electronic Health Record Sharing System Ordinance in Hong Kong and be responsible for any confidential data leakage and Install proper software license when supporting the private healthcare providers One of the examples are the Information Technology
181. on with a data life cycle Phases of Data Security Requirements Life Cycle Create e Assign proper data classification to the data e Specify necessary security measures for the data commensurate with the data classification as well as other contractual or legal requirements e Determine whether classification marking is needed e Determine the retention period for the data Store e Do not store classified information in privately owned computer resources e Encrypt classified information during storage even for RESTRICTED information when stored in mobile devices or removable media issued to individual officer Use Share e Apply need to know and least privilege principles when need to access the data e Encrypt classified information when transmitted over un trusted network e Track all activities in relation to share access of CONFIDENTIAL or above information by audit trail and logical access control software Archive e Apply same security controls as Store when putting classified information into archives e Maintain a record of repositories where classified information being stored Destroy e Perform proper data sanitisation disposal on devices storing classified data Ref No G3 10 5 IT SECURITY GUIDELINES DATA SECURITY 10 3 INTEGRITY OF DATA The source destination and processes applied to the information must be assured Untrustworthy software should not be use
182. onnect unauthorised computer resources including those privately owned to Government internal network unless approved by the Head of B D for operational necessities Ref No G3 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 5 4 Usage of remote access software to connect to a departmental server or PC directly is not recommended This can be a backdoor access by attackers to bypass firewall router protection to the information system If there is a business need to use remote access software proper security controls include logging feature should be in place The remote access software should be enabled with idle timeout control to avoid unauthorised access Remote computers should be properly protected such as by installation of personal firewall anti virus software and malicious code detection and repair measure All these security features should be activated all the time and with the latest virus signatures and malicious code definitions applied Besides latest security patches shall be applied to these remote computers A full system scan should be performed to detect any computer virus and malicious code in these remote computers before connecting to Government internal network To avoid information leakage users should minimise storing Government information on remote or portable computers Classified information shall not be stored in privately owned computer mobile devices or removable media TOP SECRET or SECRET informat
183. ons e Seek approval from the Head of B D before using privately owned computer resources to access Government internal network or information assets The usage of these computer resources shall comply with Government IT security requirements Ref No G3 9 12 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY Provide logging and auditing functions to record network connection especially for failed access attempt The log should be reviewed regularly to identify any suspicious activities Remind users with VPN privileges that they are accountable for the proper use of the account ensuring that unauthorised users cannot use the account to access Government internal networks Educate LAN system administrator supporting staff as well as remote users to ensure that they follow the security best practices and policies during the implementation and usage of VPN Install gateway level firewalls to control network traffic from VPN clients to authorised information systems or servers 9 6 ADDITIONAL REFERENCES Information on Role Based Access Control RBAC the National Institute of Standards and Technology NIST of the U S Department of Energy http csrc nist gov groups SNS rbac Authentication related articles from The SANS Institute http www sans org reading_room whitepapers authentication Logging Technology and Techniques related articles from The SANS Institute http www sans org reading_room whitepapers loggin
184. ons personal computers printers disk drives communication lines terminal servers routers hubs gateways servers modems Software source programs object programs utilities diagnostic programs operating systems communication program firewall software Ref No G3 15 7 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS Data during execution stored on line archived off line backups audit logs databases in transit over communication media any information resident within the organisation People users people needed to run systems Documentation on programs hardware systems local administrative procedures Supplies paper forms ribbons magnetic optical or solid state devices Based on the list of assets an information asset inventory can be prepared to keep an accurate inventory with the following information for each asset Designated owner of the information General support system or critical major application Physical or logical location Inventory item number if applicable such as bar code or serial number b Identifying the Threats Once the assets requiring protection are identified it is necessary to identify threats to those assets The threats can then be examined to determine what potential for loss exists It helps to consider what threats to protect assets from There are generally two basic types of threats accidental threats and intentional threats
185. opriate When password is used it is also important to follow the practices in password selection and handling described in Section 9 4 PASSWORD MANAGEMENT B Ds shall comply with the requirements in Chapter IX of the Security Regulations to handle classified data Please refer to Section 10 1 OVERALL DATA CONFIDENTIALITY for the summary of requirements for data handling Besides user passwords that are used for authentication or administration should be hashed or encrypted in storage If encryption is used keys used for performing encryption symmetric key only or decryption must be kept secret and should not be disclosed to unauthorised users Ref No G3 10 7 IT SECURITY GUIDELINES DATA SECURITY 10 6 1 10 6 2 Cryptographic Key Management The term key here refers to a code that is used in respect of classified information for authentication decryption or generation of a digital signature as defined in the SR350 c This code is usually generated by mathematical algorithms These kinds of algorithms are often called cryptographic algorithms These generated keys are called cryptographic keys In accordance with the SR371 for keys that are used for the processing of information classified CONFIDENTIAL or above they shall be stored separately from the corresponding encrypted information These keys may be stored inside chips of smart cards tokens or disks etc and are used for authentication and or decrypting informat
186. or an investigation if required In accordance with Chapter IX of the Security Regulations systems containing information classified as CONFIDENTIAL or above require mandatory audit trail on all shared access to the data Audit trail and logging features should be enabled on standalone PC or workstation when classified data is stored on its hard drive Information systems shall synchronise its clock with a trusted time server periodically at least once per month B Ds should use the clock synchronisation service from GNET or use the time server of Hong Kong Observatory via the Network Time Protocol NTP Authentication in NTP can be considered to enhance security in clock synchronisation process System time for all machines may not necessarily be identical Depending on the type and precision requirements of an information system time deviation should be controlled within a reasonable limit With a synchronised clock audit trails can then have a trusted timestamp and event correlation can be made easier Besides audit trails will be more credible during incident investigation Ref No G3 12 37 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY Information about the time synchronisation service of Hong Kong Observatory is available at http www hko gov hk nts ntime htm 12 14 2 Monitoring the System In addition to the application log server system log e g firewall logs web access logs system event logs shall
187. or computer room The rating for fireproof safe for keeping vital media should reach the standard for keeping magnetic media To safeguard tape contents from being erased or overwritten when a tape is accidentally mounted for use all write permit rings should be removed from the tapes on the tape racks Disposal of Computer Equipment Physical disposal of computer or electronic office equipment containing non volatile data storage capabilities must be checked and examined to ensure all information has been removed Destruction overwriting or reformatting of media must be approved and performed with appropriate facilities or techniques Procedures of destruction must comply with the regulations stated in the Security Regulations B Ds are advised to follow the necessary steps below to ensure the secure deletion of information before the disposal or re use of their equipment e Users should check whether classified information had previously been processed and or kept in the equipment If in doubt it should be assumed that it had e User is responsible for removal of sensitive data from the equipment when the data is no longer required and secure storage of the equipment until disposal or for any other processing e User should acquire appropriate secure deletion software to completely clear or erase all the classified information in the equipment e B D should maintain a system of checks and balances to verify its successful completion o
188. or interfacing with external systems Information systems infrastructure could be partitioned using either physical or logical means to segregate environments with different risk level For example consider any data you receive from an external system including input from users to be insecure and a source of attack Multi level of defenses should be considered Information resources should be partitioned according to needs different access controls and level of protections could be applied to defend potential attacks Resilience for critical information systems All critical information systems need to be resilient to stand against major disruptive events with measures in place to detect disruption minimise damage and rapidly respond and recover The resilience of an information system refers to its ability to continue to operate under adverse condition or stress even if in a degraded or debilitated state while maintaining essential operational capabilities It also includes the recovery of the system to an effective operational posture in a time frame consistent with business needs e Auditability and Accountability Security requires auditability and accountability Auditability refers to the ability to verify the activities in an information system Evidence used for verification can take form of audit trails system logs alarms or other notifications Accountability refers to the ability to audit the actions of all parties and pr
189. or medium provided the following conditions are met a the particular item has not been specifically indicated to be excluded and is therefore not to be copied or distributed b the copying is not done for the purpose of creating copies for sale c the materials must be reproduced accurately and must not be used in a misleading context and d the copies shall be accompanied by the words copied distributed with the permission of the Government of the Hong Kong Special Administrative Region All rights reserved If you wish to make copies for purposes other than that permitted above you should seek permission by contacting the Office of the Government Chief Information Officer Ref No G3 i 1 IT SECURITY GUIDELINES CONTENTS 2 2 1 3 3 1 3 2 4 4 1 4 3 5 5 1 5 2 5 3 7 2 7 3 7 4 TABLE OF CONTENTS IT SECURITY DOCUMENT OVERVIEW ieiesseeeeeeeeeeeen trennen ees ea o r Ea E a nein nein enne ene 2 3 STANDARDS AND GUIDBEINES 4t t ere tte he He t e or eddie 3 1 OTHER REFERENCES heroe rone onere dte eerte e operto 3 1 DEFINITIONS AND CONVENTIONS sciccscsssescstacctvesstesesssadsssvedediconscercosesevoseesecusdevectocssovecves Mo d DEFINITIONS sachs nitet te tee P et e GEH ote npe ideae 4 1 CONVENTIONS EP 4 2 ABBREVIATIONS AND ACRONYMS tite eerte eere Tbe hebr prp Y epo rhe e Ere re terit e ER ei re RE Debet 4 2 GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION SECURITY
190. or remedial actions taken for dealing with security findings When any part of the cloud service is outsourced define clearly the security requirements implement security measures so as to meet government security requirements commensurate with the involved data classification and sensitivity Ensure external threats are properly addressed by the service provider B Ds should apply due diligence and oversight for external service providers satisfying the business security and privacy needs The ownership of the data stored in the cloud should be clearly defined and agreed with the service provider Disaster recovery plan and business contingency plan should be developed to cater for unavailability of the cloud service An exit strategy including the arrangement of copying out and erasure of data should be formulated Roles and responsibilities should be clearly defined in a multi tenancy cloud environment Cloud service providers should be requested to have robust segregation of job duties Request non disclosure agreement from the external service providers and ensure they have proper human resource management Internal and external staff Ref No G3 12 34 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY including subcontractors of the cloud service should be well trained in order to ascertain their security awareness and understanding of the security requirements As with other in house applications a security r
191. ords in accordance with the departmental password management requirements e g at least six alphabetic and non alphabetic characters numerals or punctuation and change your password periodically If you suspect a password has been compromised change it immediately and report to your supervisor Use separate passwords for systems with different security requirements e g the password of your official email account should be different with your personal email account Apply latest security patches and regularly remove cache files or temporary files to protect data privacy Be aware that it is dangerous to download files from the Internet unless the file is from a known and trusted source Install virus malicious code detection measure with latest signatures and definition files to perform scanning including email downloaded file files in removable media or mobile device before use Spam email should be ignored or deleted Beware of phishing email which could lead to virus infection or even security breach Protect wireless or mobile devices by use of encryption to protect data transmitted and use of password protected features to protect against unauthorised usage Disable wireless and mobile services when there is no need to use them Spam email refers to flooding of an email account with many unwanted message such as advertisement Phishing email refers to email imitating to be sent from a person you knew which attempts
192. ormation systems In some countries the encryption software and hardware requires exporting licence or approval The selection and use of encryption software or Ref No G3 10 8 IT SECURITY GUIDELINES DATA SECURITY 10 7 hardware shall be considered carefully to avoid breaking these foreign regulations Care shall be taken in selecting software programs or utilities such as the mailing system which may adopt different encryption algorithms Nevertheless the choice of encryption tools shall meet the requirements of Security Regulations if acquisition of particular encryption tools may break the foreign regulations B D should seek alternatives to acquire similar encryption tools But there are trade offs in using encryption including user friendliness of the application simplicity of the application performance of the application the cost of the application the time and effort spent on the application and the ability to reveal the information in case the key is not available or provided Depending on the purpose of the encryption there are products designed for encryption only while others support encryption and digital signature Some are more suitable for encrypting documents for storage and some are better for transmission than others B D may consider the following during the selection of encryption products e Encryption algorithms and key lengths supported e Operation requirements e Handling of temporary files e Ease of
193. ost based IDSes IPSes consult several types of log files kernel system server network firewall and more and compare the logs against an internal database of common signatures for known attacks Host based IDSes IPSes can also verify data integrity of important files and executables The IDS IPS will check a database of sensitive files pre selected by the user and creates a checksum of each file with a message file digest utility such as md5sum or shalsum The IDS IPS then stores the sums in a plain text file and periodically compares the file checksums against the values in the text file If any of the files checksums do not match then the IDS IPS will alert the administrator by email or pager Other tools would also be available from external vendors and public software distribution sites 12 14 4 Varying the Monitoring Schedule 12 15 Despite the advantages that regular system monitoring provides some intruders will be aware of the standard logging mechanisms in use on systems they are attacking They will actively pursue and attempt to disable monitoring mechanisms Regular monitoring does not provide full guarantee that the system is secure nor should monitoring be considered an infallible method of detecting unauthorised use Varying the monitoring schedule should always be considered To minimise the chance of illegal access monitoring commands should be executed more frequently and at different times throughout the day making
194. ough it may use more backup media because it is easier to rebuild the file server based on one full backup plus the latest differential backup Ref No G3 10 12 IT SECURITY GUIDELINES DATA SECURITY In this case 24 unattended backup schedules need to be created This means that the LAN system administrator will just have to mount the tape write enabled before leaving the office for the day and check that the backup runs are successful on the following working day With automatic tape changers with adequate slots manual mounting of tapes can be less frequent say once a week The LAN system administrator should check the logs of the backup runs daily to ensure that everything is running fine There may be a need to keep a tape for each month or any special occasion in a safe when documents need to be deleted every month If the time required for backing up the server is too long that exceeds the site s allowable backup time frame data on the production server to be backed up can be copied to a dedicated backup server and let the backup task run on the dedicated server However the security level of this dedicated backup server should be retained as the same of the production server to avoid any potential security breach or unauthorised access Server backup software is operating system version specific Most backup software products also provide disaster recovery option for faster and more reliable system recovery 10 8 4 Workstat
195. over additional measure to ensure proper user behaviour should also be implemented e g auto session timeout instead of assuming users of other B Ds will behave and follow their own IT security policy Communication with External Parties Network communication with external parties such as non Government Organisations NGO Government related organisations outsourcers or external service providers should be treated as un trusted Therefore B Ds should follow relevant IT security policy when connecting to or exchanging information over communication networks with external parties Sufficient security controls should be implemented according to the application specific requirement Information should be passed to external parties only on a need to know basis B Ds should ensure that arrangement for the protections of classified information comply as far as possible with the standards adopted within the Government The external parties should be imposed the obligation not to disclose the classified information to third parties by entering into non disclosure agreement and or indemnity with the Government as appropriate INTERNET PROTOCOL VERSION 6 IPV6 SECURITY The prevailing Internet protocol standard is IPv4 Internet Protocol version 4 There are well known limitations of IPv4 including the limited IP address space and the security exposures IPv4 specifies a 32 bit IP address field Available address spaces are rapidly running out
196. overnment Malicious content As usually SNSs are rich in content with many applications developed by different parties there may not be sufficient controls or scrutiny before use Attackers are able to create customised applications that appear to be legitimate while infecting the users computer without their knowledge Internal systems data are exposed to risk if these unknown applications are used Social engineering attacks SNS builds online communities of people with certain level of interpersonal trust Malicious people might impersonate a trusted person of the users and then convince them to disclose sensitive information In addition attacks like viruses Trojans or rumours can be spread easily and rapidly when some social engineering skills are used In consideration of the high risk and unforeseeable threats that may be introduced by SNSs B Ds should seriously assess the associated risk and estimate the potential impact before using such services When SNSs are used by B Ds for official purpose the following controls should be considered Management Controls Usage policies should be established sensitive information should not be disclosed in SNSs Any information that may cause embarrassment or discredit to Government shall not be revealed when engaged in SNSs Ref No G3 12 8 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY It is not recommended to treat the information published to SNSs as info
197. overnment prestige or public image Violations of individual privacy rights may also violate the Personal Data Privacy Ordinance Details of the data protection principles in the Ordinance can be found at http www pcpd org hk english ordinance section 76 html and http www pcpd org hk english ordinance section 77 html 15 3 4 Construction of an IT Security Policy Framework After gathering and ranking the security requirements the policy can be grounded in good sense A common way is to use a hierarchical approach by first defining the overall scope and then breaking the scope into various components Examples of events are Describe the overall security program objectives or scope Itemise the results of risk analysis including the threats responding to and the corresponding safeguards Define roles and responsibilities of various parties for the implementation and maintenance of such safeguards Define appropriate and inappropriate behaviour for users so that the evidence can be used in court if security violations occur Address internal and external issues Be consistent and associated with a code of conduct laws regulations and policies for individuals or groups to make reference to for example the Code on Access to Information Ref No G3 15 10 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS IT security policy shall also address those procedures and behaviours that can be chang
198. own at Diagram 4 Page 9 of 17 eHR Service Provider Training Scheme Invitation Document Fillin eHR SP Application Form Submit via Mail to eHRO Fax 852 2102 2570 Email eHR fhb gov hk Staff to attend training Completed training as eHR Service Provider Contact details for Company eHR SP uploaded to eHR Office website www ehealth gov_hk Diagram 4 _e HR SP Application Workflow 3 3 Duties and Responsibilities 3 3 1 Service Agreement with Private Healthcare Provider The selection and appointment of any company eHR SP is purely a private matter between the private HCP and the company eHR SP Private HCP acquiring the services may sign a service agreement with the selected company eHR SP Some suggested terms to be included in the service agreement for system security and privacy protection purposes are at Annex A 3 3 2 Attend Refresher Training Course Company eHR SPs have to attend refresher course on an as and when required basis The eHR SPs failure to attend the refresher course will lead to removal of contact details of the companies at the eHRO website 3 3 3 Withdrawal Company eHR SPs can withdraw from the Scheme anytime by sending a written notice to the eHRO eHRO will remove the contact details of the company as an eHR SP at the eHRO website accordingly Page 10 of 17 eHR Service Provider Training Scheme Invitation Document 4 Training 4 1 Training Approach The training courses for eHR SPs w
199. plement SAM measures conduct software audits as well as install SAM tools 12 6 3 Patch Management Many security advisories of vendors are publishing to announce software vulnerabilities Therefore a responsive patch management process becomes critical in maintaining the security of information systems With the increase in vulnerabilities discovered and the corresponding patches released it is essential that system administrators should manage the patching process in a systematic and controlled way Successful patch management requires a robust process This process the patch management lifecycle includes multiple steps that are described below Patch acquisition select and download appropriate patches and prepare them for deployment 2 Testing perform testing to determine whether the patches contain components that conflict with other patches key enterprise applications or even entire environment baselines 3 Risk assessment assess the risks and impacts associated with installing the patch and identify actions to be taken Asking questions such as will the functionality of system application be affected Does the system require reboot after installing the patch which affects service availability Ref No G3 12 19 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 4 Deployment deploy patches to the target machines and make sure that patches are only installed on machines where they ar
200. ploaded to the server Uploading executable programs or scripts should be controlled Keep abreast of the emerging risks associated with new web technologies such as Asynchronous JavaScript and XML AJAX JavaScript Object Notation JSON and HTMLS MOBILE APPLICATION SECURITY As mobile devices are getting more popular mobile applications may be developed for internal or public use Mobile devices as being mobile have a higher risk of loss or theft Adequate protection should be built in to minimise the loss of sensitive data on device Mobile applications are subject to the same security considerations and risks as other applications and thus most general coding best practices are also relevant to mobile coding such as input validation and output encoding run application with the minimum required privilege and etc However due to wildly varying use cases usage patterns and various mobile platforms developers should consider more than just the apps Developers of mobile applications should also take note of the remote web services Ref No G3 11 12 IT SECURITY GUIDELINES APPLICATION SECURITY platform integration issues and insecurity of the mobile devices Some additional best practices for creating a secure mobile application are provided below At the early design stage mobile device management MDM features such as remote locking wiping password enforcement software patch distribution policy management and j
201. ppropriate security measures should be adopted to protect personal data from unauthorised or accidental access processing erasure or other use For details of six Data Protection Principles please refer to Principles 1 to 3 at http www pcpd org hk english ordinance section_76 html and Principles 4 to 6 at http www pcpd org hk english ordinance section 77 html Information without any security classification should also be protected from unintentional disclosure B Ds should always bear in mind to protect the confidentiality integrity and availability of data Security measures should be considered and implemented as appropriate to preserve the confidentiality integrity and availability of information while it is being processed in transit and in storage Ref No G3 10 2 IT SECURITY GUIDELINES DATA SECURITY The key requirements in Chapter IX of the Security Regulations in regards to data handling are summarised in the following table Security TOP SECRET CONFIDENTIAL RESTRICTED Requirement SECRET Encryption in Mandatory Mandatory Recommended storage Mandatory in mobile device removable media issued to individual officer Shared access Prohibited Prohibited Allowed unless authorised unless authorised Shared access Audit trail and Audit trail and Recommended tracking Logical access Logical access control software control software Encryption in Mandatory and only Recommended Recommended tr
202. puter viruses and malicious codes Perform full system scans on mobile devices for malware before connecting them to Government internal networks Install personal firewall software whenever feasible to protect from network intrusions Disable unnecessary network services such as Wi Fi infrared IR ports and Bluetooth when not in use to avoid being detected as attack points Enable authentication whenever feasible when connecting to synchronisation software Avoid storing passwords of other systems e g email ATM card network login etc on mobile devices without proper security measures Consider using security measures such as biometric user authentication and tamper proof smart cards to further protect the mobile devices where applicable Consider deploying a Mobile Device Management MDM solution to centrally manage all approved mobile devices to define enforce and monitor the mobile device policies with the following features i Configure device settings according to access right of user group operating system or model of mobile devices ii Enforce security controls such as access authentication single or multilevel inactivity timeout strong password storage encryption or device wipe after specified number of failed login attempts ii Manage configuration profiles to simplify the provision of new devices and deactivation of devices and to restrict the devices accessing to the Government internal networks
203. r Therefore input from the client software cannot be completely trusted and processed directly as an attacker can forge as a legitimate client masquerade a user identity create fraudulent message and cookies or include links of malicious sites Besides HTTP is a session less protocol It is susceptible to replay and injection attacks Messages in HTTP can easily be modified spoofed and sniffed Because of the complexity of web technologies conducting a detailed security analysis is not easy and straightforward Therefore web application should be designed properly to mitigate the security risks The following sections describe the web application security reference architecture web server software security guidelines web application development process and web application secure coding best practices Web Application Security Architecture A typical web application architecture contains 3 tiers separating an external facing web server application server and database server as shown in the diagram below With such a tier based architecture even if an attacker compromises the external facing web server from outside the attacker still has to find ways to attack the internal network Ref No G3 11 7 IT SECURITY GUIDELINES APPLICATION SECURITY The external facing web server should be confined within a demilitarised zone DMZ which is a special network segment containing servers with access to Internet services Servers with se
204. ram specification and includes no undocumented features outside its functions e To ensure the program adheres to the necessary programming standard e To prevent and detect fraud A programming standard should be established to facilitate the development and maintenance of programs Having established such a standard the next important thing is to ensure that it is adhered to 11 2 2 Division of Labour For risky and sensitive systems it may be necessary to divide those programs dealing with very sensitive information into units of modules and segments Assign the modules and segments to several programmers This is to serve two main purposes e Separation of programming responsibilities makes it more difficult for the dishonest programmer to incur program faults into the system because he does not have control over the other units of program He has to work in collusion with others in order to be successful e The division of program into smaller units also increases the opportunity for detecting programming fraud The units can be analysed and reviewed in much greater detail When reviewing each unit of a program the one responsible should ensure that e Programming standards are observed e Controls specified in the program specification have been incorporated e The program meets the technical design as well as security requirements and that there is no hard to follow suspicious and unexplained code in the unit 11 3 PROGR
205. red on the computers is unquestionable Generally there are three instances in which information is vulnerable to disclosure e When the information is stored on an information system e When the information is in transit to another system on the network e When the information is stored on backup media The first type of instances can be controlled by file permissions access control lists and other similar mechanisms The second type can be controlled by transmission through dedicated leased lines or password protected dial up lines and the last type by restricting access to the backup media by locking them in a safe for example All three cases can be supplemented by using encryption mechanisms The advantage of using encryption is that even if other access control mechanisms are compromised by an intruder the data is still unusable This is particularly important when there is external connection with the Internet or public network The risk of disclosure may be higher then Information in transit may be vulnerable to interception as well Several solutions to this exist ranging from simply encrypting files before transferring them end to end encryption to special network hardware which encrypts everything it sends without user intervention secure links Denial of Service Many people rely on services provided by the computers computer networks to perform their jobs efficiently If these services are not available a loss in
206. rictly prohibited The service utilities must be regularly inspected to ensure continuous availability and failure detection Besides regular maintenance and testing should be arranged for all service utilities including air conditioning equipment fire detection prevention and suppression system standby power supply system power conditioning system water sensing system and temperature sensing system All maintenance work carried out must be recorded Apart from the service utilities emergency exits locks and alarms shall also be regularly checked 8 1 3 Items for Emergency Use The data centre or computer room should be equipped with the following things for emergency use e Plastic sheets large enough for covering the computer equipment in case of water seepage from the ceiling e Raised floor panel lifter sucker e Battery supported fluorescent lanterns in case of power failure The locations of these items should be made known to all operations personnel and should not be removed from their designated locations without permission Ref No G3 8 3 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 2 At least one telephone line must be installed in each of the console area and help desk area inside the data centre or computer room production control office and operation management support office Fire Fighting A fire fighting party should be organised in each operating shift with well defined responsibility assigned to
207. risation Ensure that proper access control is implemented to enforce the privileges and access rights of the users The use of CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart should be considered for public web services providing controls for input submission Proper session management Ensure that applications have proper and secure session management to protect the sessions from unauthorised access modification or hijacking Protection measures include generating unpredictable session identifiers securing the communication channel limiting the session lifetime encrypting sensitive session contents applying appropriate logout function and idle session timeout and filtering invalid sessions Input validation Ensure that strict validation is applied to all input of the application whenever the source is outside trust boundary such that any unexpected input e g overly long input incorrect data type unexpected negative values or date range unexpected characters such as those used by the application for bounding character string input etc are handled properly and would not become a means for an attack against the application Proper error handling Ensure that the application will provide meaningful error message that is helpful to the user or the support staff yet ensuring that no sensitive information will be disclosed Ensure that errors are detected reported and handled properly Fail securely
208. rivate Network WLAN Wireless Local Area Network Ref No G3 4 2 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION SECURITY 5 GOVERNMENT ORGANISATION STRUCTURE ON INFORMATION SECURITY 5 1 GOVERNMENT INFORMATION SECURITY MANAGEMENT FRAMEWORK In coordinating and promoting IT security in the Government an Information Security Management Framework comprising the following four parties has been established e Information Security Management Committee SMC e IT Security Working Group ITSWG e Government Information Security Incident Response Office GIRO e Bureaux Departments Information Security Management Committee ISMC Government Information Security Incident Response Office GIRO IT Security Working Group ITSWG Bureaux Departments Departmental Departmental IT Security Officer DITSO Information Security Incident Response Team ISIRT Government Information Security Management Framework The roles of each party are explained in details in the following sections Ref No G3 5 1 IT SECURITY GUIDELINES GOVERNMENT ORGANISATION STRUCTURE 5 1 1 ON INFORMATION SECURITY Information Security Management Committee ISMC A central organisation Information Security Management Committee ISMC was established in April 2000 to oversee the IT security within the whole government The committee meets on a
209. rmation of record or official Disclaimers should be made on the profiles to state that official information can be found at B D s official website It is prohibited to use SNSs to gather personal information unless with sound justifications Risk assessment for each SNS to use for official communications should be conducted so as to determine whether public comments are allowed or even necessary Incident handling plan should be developed to handle possible compromises of passwords content subject to attack and change etc Operational Controls B D may consider using a computer outside the B D internal network for managing and maintaining their service in SNSs Alternatively the use of desktop virtualisation technologies will allow users to view potentially malicious websites in a virtualised sandbox The inclusion of third party applications on official profile pages is not recommended unless the application provider can be trusted e g other governmental agency or well known commercial vendor The use of licensing agreements should be considered to help control distribution and use of the published content Whenever possible disclaimers should be made on the profiles in social networking sites to state that official information can be found at B D s official website End user Controls SNS users should have high security awareness about what information to share with whom they can share it and what not to share Official d
210. rmation systems This should normally be covered in the departmental IT Security Policy They should also include in their policies a provision advising staff that if they contravene any provision of the policy they may be subject to different levels of disciplinary or punitive actions depending on the severity of the breach Assigning Responsibility A senior and key personnel in the B D should be assigned the responsibility for ensuring that the appropriate policies and procedures are developed and applied and that the necessary checks and balance on the proper administration and operation of the policies and procedures are in place Information Dissemination An effective information dissemination mechanism should be in place to ensure that all personnel involved are fully aware of the respective policies and procedures governing their authority and usage of the information systems OUTSOURCING SECURITY When an information system is outsourced to external service provider proper security management processes must be in place to protect the data as well as to mitigate the security risks associated with outsourced IT projects services Outsourcing or external service providers when engaged in Government work shall observe and comply with B Ds departmental IT security policy and other information security requirements issued Ref No G3 7 1 IT SECURITY GUIDELINES MANAGEMENT RESPONSIBILITIES by the Government B Ds utilising externa
211. rst line of defence Deployment of proper security protection and measures helps to reduce risks of security incidents However when the prevention safeguards are defeated B Ds should be able to detect security incidents rapidly and respond quickly to contain damage The information systems and data should be recovered in a timely manner Therefore B Ds are required to designate appropriate personnel to manage IT security as well as plan for the information security incident handling Protection of information while being processed in transit and in storage Security measures should be considered and implemented as appropriate to preserve the confidentiality integrity and availability of information while it is being processed in transit and in storage Wireless network without protection is vulnerable to attacks security measures must be adopted when transmitting classified information Ref No G3 6 1 IT SECURITY GUIDELINES CORE SECURITY PRINCIPLES When B Ds formulate security measures they should carefully consider and assess the risk of unauthorised modification destruction or disclosure of information and denial of access to information in different states e External systems are assumed to be insecure In general an external system or entity that is not under your direct control should be considered insecure Additional security measures are required when your information assets or information systems are located in
212. rusion by strangers On the other hand the passage between the data centre computer room and the data control office if any should not be publicly accessible in order to avoid the taking away of material from the data centre computer room without being noticed All protected and secured areas in the computer area should be physically locked and periodically checked so that unauthorised users cannot enter the computer area easily Examples of acceptable locks are but not limited to bolting door locks cipher locks electronic door locks and biometrics door locks Ref No G3 8 7 IT SECURITY GUIDELINES PHYSICAL SECURITY 8 4 B Ds can consider installing video cameras or closed circuit TV to monitor the computer area hosting critical sensitive systems and have video images recorded The view of cameras should cover the whole computer area The recording of the camera should be retained for at least a month for possible future playback Besides intruder detection systems can be considered to be installed for areas hosting critical sensitive systems Safekeeping of classified materials shall comply with the Security Regulations to prevent unauthorised access and disclosure For example TOP SECRET documents shall be kept in a safe with a combination lock inside a strong room while SECRET documents shall be kept either in a safe fitted with a combination lock or in a steel cabinet fitted with a locking bar and padlock inside a strong room
213. rypted or that is encrypted with poor cryptographic techniques and transmitted between two wireless devices may be intercepted and disclosed Denial of service DoS attacks may be directed at wireless connections or devices Wired Equivalent Privacy WEP protocol was originally designed to give wireless networks an equivalent level of security as wired networks It relies on a secret key to encrypt network packets transmitted between a wireless client and an access point However WEP has been proven to contain weaknesses Attackers equipped with tools and a moderate amount of technical knowledge could gain unauthorised access to a WLAN even if it is protected by WEP Protection by a stronger wireless security protocol such as WPA Wi Fi Protected Access or preferably WPA v2 WPA2 should be considered but by no means should such wireless security protocol be solely relied upon to protect data confidentiality and integrity as new weaknesses of these protocols may be discovered in the future There are two versions of WPA2 WPA2 Personal and WPA2 Enterprise WPA2 Personal authenticates users for network access using a pre shared password while WPA2 Enterprise authenticates through a Remote Authentication Dial In User Service RADIUS authentication server Although the setup for WPA2 Enterprise is more complicated it is recommended because it provides additional security and offers better centralised control over access to the WLAN WPA2 P
214. s Use of Web Application Firewalls OWASP http www owasp org index php Category OWASP Best Practices Use of Web A pplication Firewalls e Ten Best Practices for Enterprise Intrusion Prevention Ryan L Information System Security Magazine http www infosectoday com Articles IPSChecklist htm e Build Security In Best practices Department of Homeland Security https buildsecurityin us cert gov bsi articles best practices html Mobile Application Security e Mobile security project OWASP https www owasp org index php OW ASP_Mobile_Security_Project e Mobile Web Application Best Practices W3C http www w3 org TR mwabp e iOS5 Hardening Configuration Guide Department of Defense Australia Government http www dsd gov au publications OS5 Hardening Guide pdf Ref No G3 11 15 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 12 1 12 1 1 12 1 2 12 1 3 12 1 4 COMMUNICATIONS amp OPERATIONS SECURITY OPERATIONS MANAGEMENT Segregation of Duties Segregation of duties is the practice of dividing the steps in a function among different individuals so as to keep out the possibility of a single individual from subverting a process There should be sufficient segregation of duties with roles and responsibilities clearly defined so as to minimise the chance that a single individual will have the authority to execute all security functions of an information s
215. se 5 7 RIEN DE 5 7 CORE SECURITY PRINCIPLES tos inth eto orae pps eh oa eyed ea apu a eost iet asit ense OTI MANAGEMENT RESPONSIBILITIES eere sees esee en ense en ene es senssnsensenseesesseesess 771 GENERAL MANAGEMENT 5 rrr treten ee eer Ge tet p OP ER et i PROPERE 7 1 TAL Clear Policies and Procedures itt tette perte De phe eR eripe detiene 7 1 7 12 Assipumg Responsibility rnit rrt rr ET rie EAER EFE HR PERDRE 7 1 7 1 3 Information Diss mination eee rient Yt ee rte e Reg e Lope EEr Nee eripe detiene 7 1 OUTSOURCING SECUNRTTY 4 5 pr etit ree p PUR oe Dep t iecit eet ereptus 7 1 CONTINGENCY MANAGEMENT iit eerie ee rh i rper rip Yo ee Ee eg ER e Lope be Ree e eee i Ei 7 3 7 3 1 Disaster Recovery Planning ocn eet Ye E erroe Ee et e ope re erede lien 7 3 HUMAN RESOURCES SECURITY aeri irr a esre n de ipe EEEE a ero Le Ee RS e Re EE RE rhet S 7 4 TAI Cramigins eene oU RE NRI Meters 7 4 744 2 Personnel Security nenne DP UI ORO EMI VE 7 4 7 4 3 Security Requirements in Contracts sssini eien neoni enne nennen trennen rene enne ens 7 5 7 4 4 Indemnity Against Damage or Loss enne nene neen trennen reete en rennen enne 7 5 ENVIRONMENT iii ieteetech Pete ici teh rete E eei te hte rect qe P E geste be E Ped ce e ee 8 1 S l Sue Preparation iei deca Ite ett i Bd PH Tha eee rect ee ie eee zoe irte ie pen 8 1 84 2 Housekeeping ine ete e RO cedri eet cb Ier ei edi tod rt e OI e eite bade ea
216. security reasons Such manipulation is easily taken for granted by attackers to gain access without knowledge of user Users should be well informed before they install or use an application on what information the application would access or upload and for what purpose If personal information is involved a personal information collection statement should be provided Assuming the potential risk of exposing personal information such as contact data associated with new web technologies execution from un trusted or unknown codes should be used with caution For example whenever possible use JSON parser instead of Javascript inherent function for parsing and executing with data It should be kept in mind that mobile device can easily be lost or stolen Developers should ensure that user authenticator or session token can be revoked quickly in the event of reported lost stolen device and always make use of latest security mechanism provided by mobile platform for instance keychain management to protect user login credentials and hardware encryption that is keyed with combination of device key and user s chosen device lock code Stolen password provides unauthorised access not only to backend service but also potentially many other services accounts used by the user Since a majority of the users store and reuse their passwords in the mobile device mobile application should not store passwords or long term session IDs without appropriate encr
217. sh an asset management process for tracking all approved mobile devices This includes for example the procedure of assigning a device to a staff the inventory control of the device and the procedure of returning a device when the staff no longer needs it Perform risk assessments prior to deployment of new mobile devices and implement a continuous risk monitoring program for evaluating changes in or new risks associated with mobile devices Define incident handling procedures for lost or stolen devices and in particular on the procedure of how to remotely wipe erase the data stored on these devices Ref No G3 9 8 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY Provide security awareness training to staff before they use mobile devices at work Customise awareness training for security topics related to the risks and policies associated with the approved mobile device and its security components being used Technical Controls Enable password protection feature of mobile devices to protect against unauthorised access Encrypt classified data stored in mobile devices in accordance with the Security Regulations requirements Encrypt classified data before transmitting over an un trusted network e g wireless network in accordance with the Security Regulations requirements Implement proper security measures such as enable with anti virus and malicious code detection and repair mechanism to protect the devices against com
218. shing messages because most return addresses are not legitimate and would only result in the generation of non delivery messages thus increasing the amount of undesired traffic and allow the spammers to obtain a validated email address for future spamming Use email filtering tools in email software to block or screen out spam by defining some simple filtering rules Ensure that computer applied with the latest security patches and virus signature to reduce the chance of being affected by fraudulent electronic message or websites riding on software vulnerabilities Report the incident to the LAN system administrator immediately if users suspect or discover electronic messages containing computer viruses or phishing attacks Ref No G3 12 13 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY 12 5 PROTECTION AGAINST COMPUTER VIRUS AND MALICIOUS CODE Malicious code refers to a broad category of software threats that can cause damages or undesirable effect to computers or networks Potential damages include modifying data destroying data stealing data allowing unauthorised access to the system popping up unwanted screens and doing things that user does not intend to do Examples of malicious codes include computer viruses network worms Trojan horses logic bombs spyware adware and backdoor programs As they pose serious threats to software and information processing facilities precautions are required to preven
219. should operators be allowed to make program modification even under the supervision of programmers because this is a serious breach of segregation of duties Besides it provides opportunities for operators to perpetrate frauds Those opportunities can further be eliminated by rotating the operators among shifts rotating their responsibilities and prohibiting them from working alone Control of System Programmers System programmers although responsible for maintaining the system software should not be allowed to perform any update unless authorised Journal should also be available for logging every job being run in the system such that by going through the log illegal actions taken by the system programmers can be identified While the system programmers shall be controlled for his activities he should be encouraged to report any faults or loopholes detected in the system and how they can be manipulated for security violation GENERAL NETWORK PROTECTION With networked or distributed applications the security of multiple systems and the security of the interconnecting network are equally important especially if public access wide area networks are used The risks of connecting to outside networks shall be weighed against the benefits It may be desirable to limit connection to outside networks to those hosts that do not store sensitive material and keep vital machines isolated Some network protection guidelines are provided
220. t and detect malicious codes Computer virus is a common form of malicious code It is a program that infects a computer by attaching itself to another program and propagating itself when that program is executed Another form of malicious code is network worm which is a computer program that can make copies of itself and spread itself through connected systems consuming resources in affected computers or causing other damages Trojans become a prominent malicious code threat that users unwittingly install onto their computers through either opening email attachments or downloading from the Internet Trojans are often downloaded and installed by other malicious code as well Traditionally malicious codes are spread via two main channels a Data transmitted through network b Removable media Recently the attacks have evolved to become more automatic and progressive New forms of attacks can be a combination of several types of malicious actions For example some type of mass mailing virus with spoofing characteristics may take advantage of reported system vulnerabilities and scan across the network for vulnerable systems Upon infecting a compromised system not only will the worm continue scan and exploit other systems at randomly generated IP addresses it can also inject computer viruses and spyware programs onto the compromised system and use its built in mass mailing technique to spoof as legitimate email to further spread via email
221. t gov publications nistpubs 800 64 Rev2 SP800 64 Revision2 pdf The Trustworthy Computing Security Development Lifecycle Microsoft Corporation http msdn microsoft com en us library ms995349 aspx Ref No G3 11 14 IT SECURITY GUIDELINES APPLICATION SECURITY Application Design and Security e 2011 CWE SANS Top 25 Most Dangerous Software Error The MITRE Corporate http cwe mitre org top25 e Insecure Configuration Management OWASP http www owasp org index php Insecure_Configuration_Management e Web Application Firewall Evaluation Criteria version 1 0 Web Application Security Consortium http www webappsec org projects wafec e Security Development Lifecycle for Agile Development Microsoft http msdn microsoft com en us library windows desktop ee790621 aspx e A Security Analysis of Next Generation Web Standards ENISA http people cs kuleuven be lieven desmet research publications docs NG_Web_Sec urity pdf Application Testing e Risk based and Functional Security Testing Michael C C and Radosevich W https buildsecurityin us cert gov dais y bsi articles best practices testing 255 BSI html e OWASP Testing Guide version 3 0 OWASP https www owasp org images 8 89 OW ASP Testing Guide V3 pdf e OWASP Code Review Guide version 1 1 OWASP https www owasp org images 2 2e OW ASP Code Review Guide V1 1 pdf Security Best Practices e OWASP Best Practice
222. t specific security measures are not overlooked they cannot cover every instance PROCEDURES are the detailed steps or instructions to be followed by users system administrators and other system operations personnel to accomplish a particular security related task and assist in complying with IT security policy standards and guidelines In order to promote flexibility and cost effectiveness a mixed use of POLICY STANDARDS GUIDELINES and PROCEDURES may be promulgated throughout a department as they are closely related to each other HOW TO DEVELOP AN IT SECURITY POLICY Policy creation shall be a joint effort of technical persons who understand the full ramifications of the proposed policy and the implementation of the policy and decision makers who have the power to enforce the policy A policy must be implementable and enforceable Ref No G3 15 2 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS 15 3 1 Since an IT security policy can affect everyone in an organisation every user should be involved when establishing the policy though in a variety of ways depending on their level of responsibility The key element is making sure everyone knows their own responsibility in security related issues Developing an IT security policy requires to undergo a series of activities step by step The first step is to form an IT security policy task force to assume an overall responsibility to define and upkeep the departmenta
223. tems are located should also be managed based on the same principle Formal procedures should be in place to control the allocation of access rights to information systems and services The procedures should cover all stages in the life cycle of user access from the initial registration of new users password delivery password reset to the final de registration of users who no longer require access to information systems and services Endpoint Access Control Data access to end user device including mobile devices or removable media should be properly controlled According to different assessed risk levels B Ds may consider to apply appropriate measures for protection in the following aspects e Control the usage of different ports such as USB FireWire Wi Fi network parallel port serial port PC Card slot formerly known as PCMCIA slot infrared and Bluetooth e Enforce and update security policy to all endpoints e Identify control and manage the use of mobile devices and removable media e Prevent data copy to any unauthorised mobile devices and removable media e Apply data encryption on mobile devices and removable media issued to individuals e Provide audit trail information on the usage of mobile devices and removable media e Prevent introduction of malware to the corporate network Logical Access Control Logical access control refers to the controls to IT resources other than physical access control such as restricted
224. tems of the storage devices in the storage network e Use zoning to enforce access control of all communication e Use LUN masking to hide LUNs Logical Unit Number from specific servers e Secure any system connected to the storage network USER PROFILES AND VIEWS In addition to user identification and authentication mechanisms most database management systems also allow users to be classified such that individual users may be enabled to merely access data or to perform a certain limited function This permission can be given with respect to a whole database or even to selected fields of a database Granularity of access is added to database access control by the use of logical views so that the user views only the part of the database he she is authorised to access User profiles should be well protected and should not be accessed by unauthorised persons DATA ENCRYPTION Encryption techniques are used to protect the data and enforce confidentiality during transmission and storage Many schemes exist for encryption of files such as using the program s own encryption feature external hardware device secret key encryption and public key encryption The primary use of an application s e g word processor password protection feature is to provide protection on the file and prevent unauthorised access Users should encrypt the file instead of using only password in order to protect the sensitive information as appr
225. tems or applications It can be used as a baseline for showing the amount of change since the last assessment and how much more change is required in order to meet the security requirements Security Audit is a process or event with the IT security policy or standards as a basis to determine the overall state of the existing protection and to verify whether the existing protection has been performed properly It targets at finding out whether the current environment is securely protected in accordance with the defined IT security policy B Ds shall identify and document all relevant statutory regulatory and contractual requirements applicable to the operations of each information system The security of information systems should be regularly reviewed Such reviews should be performed against the appropriate security policies and information systems should be audited for compliance with applicable security implementation standards and documented security controls Before performing a security assessment or audit B Ds should define the scope the budget and the duration allowed for the assessment or audit For guidelines on assessment and auditing methods model please refer to document e Security Risk Assessment amp Audit Guidelines G51 http www ogcio gov hk en infrastructure methodology security policy doc g51 pub pdf ADDITIONAL REFERENCES e Management Planning Guide for Information Systems Security Auditing the National Stat
226. ter virus or malicious code further Users should report the incident to the management and LAN System Administrator immediately The OGCIO Central Computer Centre Helpdesk ccc hd ogcio gov hk can provide technical assistance in investigating suspected computer virus and malicious code incidents Users may also use anti virus software available in the market to clear the computer virus on their own Clearing a computer virus or malicious code does not necessarily imply that contaminated or deleted files can be recovered or retrieved The most effective way for recovering corrupted files is to replace them with the original copies Therefore regular backup should be done and sufficient backup copies should be kept to facilitate file recovery whenever necessary After clearing computer virus or malicious code from a computer users should perform a complete scan on the computer and other storage media to ensure that they are free of computer virus and malicious code Failure to do this may lead to resurrection of computer virus or malicious code 12 6 SOFTWARE AND PATCH MANAGEMENT To avoid attacks through known issues or vulnerabilities LAN system administrators should apply latest security patches hot fixes released by product vendors to the operating systems and or applications of the information systems or implement other compensating security measures B Ds should ensure that their LAN system administrators are well informed with the latest
227. thorised creation deletion modification access of files Alerts and reports from the HIDS HIPS should be actively reviewed to identify security attacks at the earliest possible moment In addition HIDS HIPS should always be updated with latest signatures provided by the vendor if appropriate Configure web server software to prevent leaking information like web server software version internal IP address directory structure etc Disable or remove unnecessary modules and default or sample files from the web server software Restrict web crawling for the contents which are not supposed to be searched or archived by public search engines Identify application files on the web server and protect them with access control Backup the private key for the server certification and protect it against unauthorised access when using SSL 11 5 3 Web Application Development Process The security controls of web application should be analysed and defined during early stage of the software development with the following considerations Follow the security guidance of general application design and development in Section 11 1 1 Security Considerations in Application Design and Development Ensure that security requirements are well defined and prioritised for the web applications Ref No G3 IT SECURITY GUIDELINES APPLICATION SECURITY e Perform IT security risk assessment for critical systems during design and implementation stag
228. time each day An account logged in outside the normal time for the account may be in use by an intruder ii Accounting records if any can also be used to determine usage patterns for the system unusual accounting records may indicate unauthorised use of the system iii System logging facilities should be checked for unusual error messages from system software For example a large number of failed login attempts in a short period of time may indicate someone trying to guess passwords iv Operating system commands which list currently executing processes can be used to detect users running programs they are not authorised to use as well as to detect unauthorised programs which have been started by an intruder Ref No G3 12 38 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY Other monitoring tools would be constructed using standard operating system software by using several often unrelated programs together For example checklists of file ownership s and permission settings can be constructed and stored off line These lists can then be reconstructed periodically and compared against the master checklist Differences may indicate that unauthorised modifications have been made to the system A host based intrusion detection system IDS or intrusion prevention system IPS analyses several areas to determine misuse malicious or abusive activity inside the network or intrusion breaches from the outside H
229. tness of system functionalities Unit test is the testing of an individual program or module to ensure that the internal operation of a program performs according to specification Interface test is a hardware or software test that evaluates the connection of two or more components that pass information from one to another System test is a series of tests designed to ensure that the modified program interacts correctly with other system components Stress test or load test is used to determine the stability of a given system by loading the system beyond its normal operational capacity in order to observe the results Regression test is process of rerunning a portion of a test scenario or test plan to ensure that changes or corrections have not introduced new errors Each test record should be documented stating the content of the record and its purpose during testing The documentation for the transaction file should also contain a section on the expected results after application of the transactions which are then used for system testing Whenever the system is changed the same files are used for rerun and the two sets of outputs are compared The amendment would only be accepted if no discrepancy is identified For testing and development systems access should be restricted from unauthorised persons and unnecessary network connections such as the Internet Besides system names which attract attackers attention such as those producing the impress
230. to be relayed over Intranet and Internet Current VoIP systems use either a proprietary protocol or one of two standards namely H 323 and the Session Initiation Protocol SIP VoIP can provide more flexible service at lower cost but there are tradeoffs that shall be considered VoIP systems are considered to be more vulnerable than conventional telephone systems because they are tied in to the data network resulting in additional security weaknesses and avenues of attacks In a conventional office telephone system intercepting conversations requires physical access to telephone lines or compromise of the office private branch exchange PBX But for VoIP voices that converted into IP packets may travel through many network access points and therefore expose to more attack points for interception by intruders In fact all security risks associated with Internet protocol such as computer virus Denial of Service and man in the middle attacks also apply to VoIP B Ds should understand and manage the risk associated with VoIP B Ds should develop appropriate network architecture to support the usage of VoIP with the following considerations e Separate voice and data on logically different networks if feasible e Separate servers for TCP IP services such as DHCP and DNS for VoIP and data networks if feasible to minimise the impact if a server is out of service e Implement device authentication e g using the MAC address of an IP phone an
231. tronic messaging e g email instant messaging is a key enabling technology for internal and external communication For internal users there are various mailing products running on the Government internal network Formal request must be made for applying an email account Authentication encryption and digital signature services should be available for email over the Internet as well as email on internal network It is recommended that the electronic messaging containing sensitive information shall be encrypted during transmission or storage In accordance with the Security Regulations on internal communication the Confidential Mail System CMS is a designated email system in the Government to facilitate exchange of email messages and documents with CONFIDENTIAL classification within the Government network The exchange of email over Internet whether signed or encrypted shall not be assumed to be of equivalent security status as the CMS This is because the Internet electronic messaging services may not fulfil the security requirements as stipulated in Security Regulations for handling of CONFIDENTIAL information Email Security Email servers and clients should be properly configured before connecting to Internet Standard SMTP mail provides no integrity checking Internet email addresses are easily spoofed There is usually no guarantee of delivery with Internet mail If technically and operationally feasible information revealing the specifi
232. upport of various parties the forming of a specialised team is particularly useful and effective Below is a sample of such organisation model Ref No G3 15 3 IT SECURITY GUIDELINES IT SECURITY POLICY CONSIDERATIONS a Security Steering Committee Executive Senior Security Senior Management User Officer Technical Ve See i ee a es EA P E RCM i 0 c Security Security Working Team Coordinator Pm EMI Policy Reviewer Security Working Team Technical Lese Operational System Personnel Personnel Developers Sample Organisation Model of IT Security Policy Group Security Steering Committee A department can first organise a Security Steering Committee A Security Steering Committee has the ultimate responsibility for developing the IT security policy Its members have the responsibilities to decide the start and termination of the development and to formulate a security working team The Steering Committee is not involved in the detailed preparation activities but is the one who sets up high level guidelines and requirements and who makes the key decision to evaluate and agree on the formulation of an IT security policy Examples of tasks performed by Security Steering Committee are Determining requirements for policy Meeting organisational or departmental policy needs Getting agreement on security objectives
233. vated or the logon session or connection should be terminated Automatic time out facility such as password protected screen saver should be deployed Individual accountability should be established so the respective staff be responsible for his or her actions For information systems accountability can be accomplished by identifying and authenticating users of the system with the use of a user identity user ID which uniquely identifies a single individual such that subsequent tracing of the user s activities on the system is possible in case an incident occurs or a violation of the IT security policy is detected Ref No G3 9 3 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 4 9 4 1 Unless it is unavoidable due to business needs e g demonstration systems or it cannot be implemented on an information system shared or group user IDs are prohibited Any exemption to this requirement must obtain explicit approval from the DITSO with supporting reason B D should justify the usage of shared accounts against the security risks that a system may expose to If a staff s user ID password becomes unusable and he she requests for a new one the legitimacy of the user should be confirmed before renewing or re activating the account PASSWORD MANAGEMENT A password is secret word or code used to serve as a security measure against unauthorised access to data There might be various categories of computer accounts designed for informatio
234. ve and passive RFID tag reader or transceiver reads and writes tag data Back end database stores records associated with tag contents Each of these three components can pose privacy and security issues with RFID systems Unprotected RFID tags are especially vulnerable to physical attacks counterfeiting spoofing eavesdropping traffic analysis or denial of service attacks In terms of privacy RFID tags should not compromise the privacy of their holders Information should not be leaked to unauthorised readers nor should it be possible to build long term tracking associations between tags and holders In terms of security RFID tag contents should be protected by access control Mutual authentication between tags and readers is necessary to build trust relationship In general the following security guidelines can be used as reference to mitigate the security risks regarding the usage of RFID Use a password to protect the tag data to prevent tags from being read without owner s permission Provide physical locking of tag memory so that the chip is read only and has information stored on it during the manufacturing process to provide a proof of origin Encrypt tag data using asymmetric cryptography to verify the authenticity of information Protect readers by rejecting tag replies with anomalous response times or signal power levels according to the physical properties of tags Verify reader s identity when transmitting data betwe
235. vity of the magnetic media and is measured in Oersteds In order to completely erase the content on the magnetic media e g hard drive the degausser should produce a magnetic field recommended to be at least 1 5 times higher than the coercivity of the media e For degaussing hard drives with very high coercivity ratings it may be necessary to remove the magnetic platters from the hard drive s housing e Besides the degausser should also be periodically tested accordingly to manufacturer s directions to ensure that it functions properly e If the degaussing process is outsourced it should be ensured that comparable arrangements are in place to ensure that the same protections as above are provided During the degaussing process the degaussers have to be operated at their full magnetic field strength The product manufacturer s directions must be followed carefully since deviations from an approved method could leave significant portions of data remaining on the magnetic media A normal delete command merely prevents further file access by deleting the pointer to the file in an electronic storage medium the content of the file is not actually cleared or erased Even a general disk formatting operation is not capable of completely erasing the data to an extent which prevents data recovery Ref No G3 10 14 IT SECURITY GUIDELINES DATA SECURITY 10 10 In order to comply with the SR requirements appropriate tools should b
236. ware But if the virus signature malicious code definition are not updated the protection software will not be able to detect and guard against the latest computer virus and malicious code attacks Users should therefore regularly update virus signature and malicious code definition and detection and repair engine Update should be configured as automatic and update frequency should be at least on daily basis If automatic update is not possible e g mobile device which are often not attached to networks update should be done manually at least once a week Users should also note that from time to time there could be ad hoc and serious virus outbreaks If so users should follow the instructions and immediately update with the latest virus signature and malicious code definition in order to protect against virus outbreak The following are other recommended security guidelines to protect against computer virus and malicious code e Enable real time detection to scan computer virus and malicious code for active processes executables and document files that are being processed Also schedule full system scan to run regularly based on operational needs e Check any files on storage media and files received over networks against computer virus and malicious codes before use e Avoid opening suspicious electronic messages and do not follow URL links from un trusted sources to avoid being re directed to malicious websites e Check electronic
237. wever because of the cloud service models and deployment models used and the technologies used to enable cloud services certain risks in a traditional IT environment may become relatively more significant Following security controls are recommended for handling such risks Management Controls Before engaging the service plan the business needs requirements on service and data confidentiality integrity availability and privacy aspects Define a service level agreement SLA with the service provider if applicable Departmental security policy should be reviewed and modified with the necessary adjustments for protecting data to ensure the security controls are effective when deploying business applications in a cloud environment Potential impacts of storing data in different physical locations and jurisdictions as well as in a shared environment collocated with data from other clients should be analysed in detail and the relevant procedures should be identified Enhancement to the security measures should be considered to compensate for any areas outside B D s direct control Cloud services should be checked to ensure the compliance of globally recognised industry security standards such as ISO 27001 Compliance certificates and reports should be requested from cloud service providers for verification on their validity If possible cloud service providers should be requested to provide third party audit reports with documentation f
238. with other cloud tenant s data Regular backup for all operational data at client side is Ref No G3 12 35 IT SECURITY GUIDELINES COMMUNICATIONS amp OPERATIONS SECURITY advised Recovery tests should be conducted to assure that recovery to the most up to date state is possible e Secure software development lifecycle processes e g security design review should be applied to applications built on the cloud platform to make application less vulnerable to potential threats after release Credentials should be kept securely to help prevent unauthorised access to as well as illicit tampering of application programs and control files End user Controls e Awareness training should be provided to end users on the secure use of cloud services such as the use of encrypted network or two factor authentication to access the data on cloud e Staff should only use approved cloud services e Staff should not upload any classified or personal data without prior approval 12 14 MONITORING 12 14 1 Logging An audit trail shows how the system is being used from day to day Depending upon the configuration of audit log system audit log files may show a range of access attempts of which abnormal system usage can be derived For more complicated applications they should have their own auditing or tracing functions in order to give more information on individual use or misuse of the application This mechanism is virtually essential for hi
239. with the system security and interoperability standards in place This system will be made available to provide low investment cost access for private solo or group practice HCPs CMS On ramp is designed to suit the private clinics daily clinical operation workflow including patient registration and appointment clinical documentation drug allergy checking prescription dispensary and clinical administration functions The functions that CMS On ramp may support are illustrated in the diagram below 2 RC Management Clinician Structured Allergy and Alert Consultation Diagnosis and Prescription Drug Procurement Drug Inventory Management Dispensary Appointment Booking Basic Billing Healthy Patient Diagram 2 Functions of CMS On ramp Page 4 of 17 eHR Service Provider Training Scheme Invitation Document Communication Module The Communication Module supports e the communication with eHRSS using ebXML messaging format and ebMS communication protocol or Web Services in SSL e the authentication of Certified eMR Systems the establishment of secured communication channel between eHRSS and Certified Electronic Medical Record eMR Systems and the provision of patch management for eHR Software including the Communication Module itself update CMS On ramp can be connected to the eHR Core Sharing Platform with the installation of the Communication Module
240. word encrypted DOs 1 Do change your password regularly for example every 90 days 2 Dochange the default or initial password the first time you login 3 Dochange your password immediately if you suspect that it has been compromised Once done notify the system security administrator for further follow up actions 9 4 3 Password Handling for System Security Administrators DON Ts Do not disclose or reset a password on a user s behalf unless his her identity can be verified 2 Do not allow the password file to be publicly readable 3 Do not send passwords to users unencrypted especially via email DOs 1 Do choose good passwords as initial passwords for accounts according to the above password selection criteria 2 Douse different passwords as initial passwords for different accounts 3 Dorequest the user to change the initial password immediately upon receiving the new password 4 Dochange all system or vendor supplied default passwords including service accounts after installation of a new system 5 Do request users to change their passwords periodically 6 Do encrypt passwords during transmission over un trusted networks 7 Do scramble passwords with one way functions If possible do use salting to scramble passwords so that same passwords will produce different scrambled outputs Ref No G3 9 6 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY 9 5 9 5 1 8 Do deactivate a user account i
241. word with the same letter like aaaaaa Nn Do not use consecutive letters or numbers like abcdefgh or 23456789 7 Do not use adjacent keys on the keyboard like qwertyui Ref No G3 9 4 IT SECURITY GUIDELINES ACCESS CONTROL SECURITY Do not use a word that can be found in an English or foreign language dictionary Do not use a word in reverse that can be found in an English or foreign language dictionary 10 Do not use a well known abbreviation This includes abbreviation of B D name project name etc 11 Do not use a simple variation of anything described in 1 10 above Simple variations include appending or prepending digits or symbols or substituting characters like 3 for E for S and 0 for O 12 Do not use a password with fewer than six characters 13 Do not reuse recently used passwords DOs 1 Douse a password with a mix of at least six mixed case alphabetic characters numerals and special characters 2 Douse different passwords for different systems with respect to their different security requirements and value of information assets to be protected 3 Do use a password that is difficult to guess but easy for you to remember so you do not have to write it down 4 Douse a password that you can type quickly without having to look at the keyboard so that passers by cannot see what you are typing Examples of Bad Passwords password the most eas
242. y with data privacy and security policies when providing services to private HCPs e itis willing to send at least two staff to attend the eHR SP training programme and it is registered under the Companies Ordinance Cap 32 or alternatively possesses a valid Business Registration Certificate issued by the Commissioner of Inland Revenue Individual Application For Private Healthcare Provider e he she is a private HCP or is nominated by a private HCP who will join eHRSS e he she will be responsible for installing CMS On ramp application and the Communication Module for the private HCP and e he she is willing to attend the eHR SP training programme 3 2 Application for Training Application Procedure Application for eHR SP training can be submitted throughout the year Applicants should submit the completed application form together with a copy of the Business Registration Certificate and or the Certificate of Incorporation of IT vendor for company registration and of HCP for individual application Application can be submitted by post facsimile or electronic mail to eHRO The Application Form can be downloaded from the eHRO website http www ehealth gov hk en home html Page 8 of 17 eHR Service Provider Training Scheme Invitation Document Provision of Training A committee comprising representatives from relevant organisations will assess each application Company and individual passing the assessment will b
243. ypted when transmitted over an un trusted communication network Examples of un trusted communication network include e Internet e Network that uses public telecommunication line e g leased line dial up connection e Wireless network e Metro Ethernet To be considered as a trusted communication network the network should be e Protected within a physically secured area to prevent the data passing through the network from being accessed modified or deleted by unauthorised person e Secured well from unauthorised tampering for example through locking of network equipment and protection of LAN ports e Equipped with a well defined IT security policy to control the proper configuration and administration of network equipment and settings Communication over un trusted communication networks poses security risks because a malicious attacker may capture sensitive information and even break into the Government network by exploiting vulnerabilities of the un trusted communication networks Since the security requirements to communicate over a trusted and un trusted network are different it is important for B Ds to differentiate the nature of a communication network in order to apply necessary security measures Networks that do not fall under the definition of trusted communication network are considered as un trusted communication networks INTERNET SECURITY The Internet is a world wide network of networks that often uses the T
244. yption or hashing Session of mobile application is generally longer than other application in the sake of user convenience To circumvent privilege escalation never use device ID or Ref No G3 11 13 IT SECURITY GUIDELINES APPLICATION SECURITY subscriber ID as sole authenticator or session token Developer should consider using authentication that ties back to the user identity rather than device identity and using additional authentication factors for applications giving access to sensitive data or interface where possible Most mobile applications interact with the backend services All back end services for mobile applications should be assessed for vulnerabilities periodically and ensure that the back end platform server is running with a hardened configuration with the latest security patches applied Security scan with latest virus signature should be provided on installation of the mobile native application to the mobile device Since mobile device is capable of using multiple transport carriers including mobile telecommunication network Wi Fi or Bluetooth applications should enforce the use of an end to end secure channel when sending sensitive on wire air Some mobile applications provide programmatic access to premium rate phone calls SMS roaming data etc Developers should implement security controls such as using a white list model by default for paid resource addressing or authenticate all API calls to paid resour
245. ystem In situations where a segregation of duties is not practicable due to reasons such as limited number of staff available or other technical limitations compensating controls should be put in place to provide the equivalent safeguard e g by maintaining appropriate logging on critical operations conducted by the staff together with random inspection or regular review on the log file Principle of Least Privilege B D should ensure that the least privilege principle is followed when assigning resources and privileges of information systems to users as well as technical support staff This includes restricting a user s access e g to data files to IT services and facilities or to computer equipment or type of access e g read write execute delete to the minimum necessary to perform his or her duties Principle of Least Functionality Information systems should be configured to provide only essential capabilities and specifically prohibits or restricts the use of functions ports protocols and or services The functions and services provided should be carefully reviewed to determine which functions and services are candidates for elimination Administrators should consider disabling unused or unnecessary physical and logical ports and protocols e g USB port FTP SSH on information system components to prevent unauthorised connection of devices unauthorised transfer of information or unauthorised tunnelling Change Management

Download Pdf Manuals

image

Related Search

Related Contents

アクティビティーノート〈第199 号〉  Software SmartControl - Manual  Sistema Integrado de Administração Escolar  MB SAFETY`  Sony DAV-SA30/SA35K User's Manual  Rear Window and CaptiView Display Closed Caption User Manual  iPh。ne・スマ一トフォン車載ホ丿~ダ一 取扱説明書  easyTek™ - Siemens  LE PETIT BONHOMMIEN  1 Le rapport d`activités Voir aussi la fiche « PSSM ». Extrait du Code  

Copyright © All rights reserved.
Failed to retrieve file