PRINCIPLES 2014 Australian Government Information Security Manual

2014
Australian Government
Information Security Manual
PRINCIPLES
2014
Australian Government
Information Security Manual
PRINCIPLES
© Commonwealth of Australia 2014
All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia
licence. For the avoidance of doubt, this means this licence only applies to material as set out in this document.
The details of the relevant licence conditions are available on the Creative Commons website as is the full legal
code for the CC BY 3.0 AU licence.
http://creativecommons.org/licenses/by/3.0/au/deed.en
http://creativecommons.org/licenses/by/3.0/legalcode
Use of the Coat of Arms
The terms under which the Coat of Arms can be used are detailed on the Department of the Prime Minister and
Cabinet’s website.
http://www.dpmc.gov.au/guidelines/index.cfm
Contact us
Inquiries regarding the licence and any use of this document are welcome at:
Australian Signals Directorate
PO Box 5076
Kingston ACT 2604
1300 CYBER1 (1300 292 371)
asd.assist@defence.gov.au
FOREWORD
Foreword
In recent years, the Australian Government has made great advances in bringing its business
online. The benefits of government information and communications technology (ICT) systems
and services becoming increasingly connected will continue as the government makes the
most of new technologies. However, this new, connected way of doing business also creates
opportunities for adversaries to gain an advantage by exploiting these technologies to access
information of national importance.
As our intrusion detection, response, mitigation and threat assessment capabilities continue to
improve, so too do the skills of cyber threat actors. This requires us to be vigilant, flexible and
proactive in our approach to cyber and information security.
A strong security is not a trivial process — it requires ongoing vigilance and resources. By
continually hardening our defences, we have a greater chance of protecting the information
entrusted to us.
The Australian Government Information Security Manual (ISM) comprises three complementary
documents designed to provide greater accessibility and understanding at all levels of
government. This Principles document details the guiding principles and rationale to assist
senior decision makers in developing informed risk–based information security policies within
their organisations.
I commend you on your agency’s efforts to strengthen your cyber and information security
and trust you’ll continue to keep security as an agency priority.
Dr Paul Taloni
Director
Australian Signals Directorate
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
iii

iv
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
CONTENTS
Contents
Forewordiii
INFORMATION SECURITY: COUNTERING THE THREAT 1
The Threat Environment
2
Countering the Cyber Threat
6
The Australian Government Information Security Manual
8
ASD’s Role
10
PRINCIPLES11
Information Security Risk Management
12
Roles and Responsibilities
14
Industry Engagement and Outsourcing
15
Information Security Documentation
17
System Accreditation
19
Information Security Monitoring
22
Cyber Security Incidents
24
Physical Security
27
Personnel Security
29
Communications Infrastructure
31
PSPF Mandatory Requirement INFOSEC 4 Explained
35
Product Security
37
Media Security
39
Software Security
42
Email Security
45
Access Control
47
Secure Administration
49
Cryptography50
Network Security
52
Cross Domain Security
55
Data Transfers and Content Filtering 56
Working Off–Site
57
SUPPORTING INFORMATION
61
Glossary of Terms
63
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
v
INFORMATION
SECURITY:
COUNTERING
THE THREAT
1
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
Information Security: Countering
the Threat
The Threat Environment
DID
D I D YOU
YO U K N
NOW?
OW?
Advances in information and communications technology (ICT) are allowing for greater
accessibility, mobility, convenience, efficiency and productivity across almost all aspects of
Australian life. Australia’s national security, economic prosperity and social wellbeing now
depend on ICT, and the Internet in particular. The security of sensitive government and
commercial information, the security of our digital infrastructure, and public and international
confidence in Australia as a safe place to do business online are critical to our future.
In 2012 there
were 74,000
new unique
malicious web
domains.1
Because any Internet–connected device or computer system is
highly susceptible to malicious cyber activity, our dependence
on ICT also brings greater exposure to threats. The threat is
not limited to classified systems and information. A wide range
of institutions, both public and private, have been subjected to
malicious cyber activities.
Australia continues to be the target of persistent and sophisticated
cyber exploitation activity by malicious actors. The most prevalent
threat to Australian networks is cyber exploitation; that is, activity
by malicious actors to covertly collect information from ICT
systems. Australia is also threatened by the possibility of cyber
attack—offensive activity designed to deny, degrade, disrupt or
destroy information or ICT systems.1
Tools and Techniques
Malicious software (malware) is the main tool used to gain unauthorised access to computers,
steal information and disrupt or disable networks. Since malware—along with instructions
and guidance for its use—is readily available on the Internet, anyone with intent is able to
access the tools and information needed to undertake malicious cyber activity. Examples of
malware include trojans—programs which seem legitimate but provide malicious actors with a
backdoor into systems—as well as spyware, a general term for programs that covertly monitor
and collect information from a system. Information stolen can be used to craft targeted cyber
intrusions, create false identities, or even facilitate access into more valuable commercial or
government systems. Any computer compromised by malware has the potential to be invisibly
conscripted into networks of compromised Internet–connected computers, known as botnets.
Botnets are used to send spam, steal information, distribute malware and conduct attacks on a
larger scale.
1 Symantec Corporation, Internet Security Threat Report 2013, 2013.
2
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
DID
D I D YOU
YO U K N
NOW?
OW?
A commonly used technique to spread malware is social
engineering, in which malicious emails are tailored to
entice the reader to open them. Unsuspecting users may
Healthcare,
be tempted to open malicious email attachments or follow
education and
embedded links to malicious websites—either action could
government
lead to a compromise. These campaigns are becoming
accounted for
increasingly tailored and credible. Malicious emails often
nearly two–thirds
appear to be from someone the reader knows, such as their
employer, colleague or friend. Some even have convincing–
of all identities
looking commercial logos and signatures and target a
2
breached in 2012.
specific personal interest or a subject matter relevant to
their work. Malicious websites can be equally convincing.
They can masquerade as a legitimate site used by an
individual, such as their personal banking website, in order to mislead them into revealing
personal information.2
Actors
The Australian Signals Directorate (ASD), through the Cyber Security Operations Centre
(CSOC), communicates key assessments to government regarding the actors and trends
observed in the Australian cyber threat environment.
Users
DID
D I D YOU
YO U K N
NOW?
OW?
Cyber exploitation and cyber crime are unintentionally enabled by everyday users at home,
at work or on mobile computing devices. Many users still assume that responsibility for
information security rests with the organisations with which they interact, such as banks
and online retailers. However, even the best technical security measures can be defeated
by inappropriate user behaviour. Some users, in particular individuals and small businesses,
are more vulnerable due to a general lack of awareness of cyber threats and relatively low
resources devoted to information security.
In 2012, more
than 80% of the
threats observed
by Sophos were
redirects, mostly
from legitimate
sites that had
been hacked.3
Users are targets in themselves for cyber crimes such as
fraud and identity theft. When compromised, users can also
become unintentional enablers of malicious cyber activity.
The increasingly interconnected nature of our private, public
and work ICT means that malware accidentally downloaded
on one system can quickly lead to the infection of other
devices across different environments. Inadvertently visiting
the wrong website or opening the wrong email attachment
can have wider consequences, including the conscription of
the device into a botnet—which can then be used to facilitate
large–scale cyber crime or cyber attacks—or establish an
access point into a connected personal, commercial or
government system.3
2 Symantec Corporation, Internet Security Threat Report 2013, 2013.
3Sophos, Security Threat Report 2013, 2013.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
3
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
Malicious Actors
DID
D I D YOU
YO U K N
NOW?
OW?
Australia is an attractive target for cyber exploitation due
to its prominent role in the Asia–Pacific region and major
international organisations, and its strong diplomatic,
defence and intelligence relationship with the United States.
Australia’s wealth, resource industries and niche expertise
in some research and development fields also motivate
actors to target Australia. Information collected through
cyber exploitation could be used to gain a relative economic,
diplomatic or political advantage against Australia. It can
also be used to bridge a technological gap. By stealing, for
instance, intellectual property malicious actors are able to
access new technologies while circumventing costly and
lengthy research and development programs. Personal
information gathered, such as financial or medical records, could also be used to enable
malicious activities through techniques such as social engineering. 4
In the first half of
2013 the number
of new mobile
malicious software
samples detected
exceeded 30,000.
The vast majority
of this malware
targeted the
android platform.4
State–sponsored actors work on behalf of a foreign entity and are the most active
malicious adversaries ASD has observed. They are also the most sophisticated and best
resourced adversaries. State–sponsored actors seek national security information to identify
vulnerabilities in our capabilities or to gain a strategic advantage. However, malicious activity
often has an economic focus, with targeting of Australia’s commercial sectors (for example,
the resources, banking and telecommunications sectors) also prevalent.
DID
D I D YOU
YO U K N
NOW?
OW?
Issue–motivated groups often seek to disrupt and
embarrass governments, international organisations
The Australian
and multinational corporations in an expression of anti–
Competition
establishment protest. These groups typically undertake acts
and Consumer
in response to specific controversial events or incidents, or
Commission
to coincide with significant dates or major events. Loosely
reported a loss of
coordinated international hacker groups, such as Anonymous
$93 million as a
and LulzSec, have gained notoriety and demonstrated
result of scams, a
their intent and capability to conduct cyber attacks and
9% increase from
data theft against a wide variety of high‑profile targets,
2011.5
including Australian government agencies. Citing a range
of idealistic motivations, such as fighting for individual
freedoms, calling for government transparency and opposing
censorship, as well as simply for malicious ‘fun’, the groups often exploit common and
relatively unsophisticated techniques to achieve their aims. For the most part, these attacks
have been embarrassing and inconvenient; however, the disclosure of sensitive commercial
or government information can threaten national interests, for example through the loss of
consumer confidence in Australia’s digital economy.5
4 McAffee Labs, McAffee Threats Report: Second Quarter 2013, 2013.
5 Australian Competition Consumer Commission, Targeting Scams: Report of the ACCC on scam activity
in 2012, 2013.
4
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
Cyber criminals are following legitimate businesses online to create new opportunities for
profit. The nature of the Internet—borderless, anonymous, easily accessible and holding high
volumes of financial, commercial and personal information—has boosted the incentives for
committing cyber crime and allowed its organisation to become more audacious, efficient
and effective.
A prolific and increasingly professional underground market of malicious cyber tools and
services exists on the Internet. This market includes the sale or hire of criminal malware and
botnets, guidance, recruitment and trading in stolen information such as credit card details
and intellectual property.
Criminals are becoming less content with simple, indiscriminate spam and fraud attempts, and
are developing sophisticated, customised malware that targets emerging technologies, social
media and mobile computing devices. The last few years have also seen a proliferation of
target–specific malware aimed at, for example, particular banks, types of ATMs and
financial exchanges.
Conclusion
The incentives for, and capability to conduct, malicious activity in cyberspace will be enhanced
by a combination of observed trends.
Motivation is increasing. Australia’s increasing reliance on the Internet is leading to
more high–value information being stored and communicated on Australian government and
commercial networks. This is boosting the incentive to undertake cyber crime or exploitation
for direct monetary profit or indirect economic and political advantage.
Capability is easier to acquire. Acquiring a cyber capability is becoming easier with
increasingly sophisticated tools, information, and guidance readily available online.
New technologies will generate new vulnerabilities. The proliferation of new
technologies will increase the number of potential vulnerabilities. Of note, the growth in cloud
computing and expanding use of mobile computing devices, such as smartphones, laptops
and tablet computers, will generate more platforms—with distinct software, settings and
applications—and more users to exploit.
The spectrum of malicious actors is expanding. The ease of acquiring a cyber capability
coupled with the potential high gains—whether financial, economic, diplomatic or political—is
enticing more actors into malicious cyber activity.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
5
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
Countering the Cyber Threat
Malicious cyber activity will continue to challenge Australia’s national security, economic
prosperity and social wellbeing. As cyber threats become increasingly sophisticated and
targeted, cyber security incidents can have significant and direct impacts on organisations.
However, properly assessing the security risks specific to your organisation can help to
minimise your vulnerability to cyber threats.
Questions Senior Management Need to Consider
Are you confident that your networks are not currently compromised? Is the security culture of
your organisation a strength or a weakness? Here are five questions you should discuss with
your information security team to review your organisation’s security measures.
What would a serious cyber security incident cost our organisation?
Good information security is like an insurance policy. Good security can avoid direct
costs of clean–up and also indirect costs such as downtime, lost productivity and loss
of reputation and confidence in your organisation. If customer records, financial data or
intellectual property were stolen, could you quickly and accurately determine what was lost?
What if you had to take a system offline to conduct a forensic or legal investigation?
Who would benefit from having access to our information?
Your information is valuable. There are many state and non–state actors who would
benefit from having access to your agency’s information. Identify critical information, the
confidentiality, integrity and the availability of which is essential to the ongoing function of
your organisation. It is important to consider the aggregated value of your information, not
only the value of individual records. Every organisation faces different threats and security
risks, and needs to deal with them in different ways.
What makes us secure against threats?
Security is an ongoing process, not a product. As cyber intrusions become more
sophisticated and targeted, so do information security techniques and processes. To secure
your organisation against threats, make sure appropriate security governance, clearly defined
policy, user education and third party assessments are in place, as they are all vital parts of
information security. There is no silver bullet for information security and security products
alone are not a solution.
Is the behaviour of my staff enabling a strong security culture?
Staff education is key. It only takes one malicious email attachment to be opened or one
malicious website to be accessed to potentially compromise your whole business. Effectively
trained staff enable a strong security culture. Responsibility for information is shared amongst
all members of your organisation, so all staff should be aware of the threat to reduce the
security risk of valued information being stolen.
6
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
Are we ready to respond to a cyber security incident?
Will a compromise affect your continuity? Sadly, many organisations generally do not
take information security seriously until they have been compromised. Your systems could be
taken offline by an attack, for example through a Denial of Service attack (an attempt to flood
networks with unwanted traffic to disrupt or degrade services), affecting the availability and
resilience of your network. Having access to current threat information, including the likelihood
and consequences, will enable informed risk assessments. By assessing the risk and allocating
adequate resources to protect your information security assets, your organisation can build a
stronger security foundation and improve resilience.
Most organisations conduct fire drills—perhaps it’s also time to test your resilience against a
serious cyber security incident.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
7
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
The Australian Government Information
Security Manual
The ISM, issued by ASD, is the Government’s flagship product designed to assist Australian
government agencies in applying a risk–based approach to protecting their information and
ICT systems. This manual supports the guiding principles and strategic priorities outlined in
the Australian Government Cyber Security Strategy by providing detailed information about
the cyber security threat, as well as assisting agencies in determining appropriate controls to
protect their information and systems.
While there are other standards and guidelines designed to protect information systems, the
advice in the ISM is specifically based on activity observed by ASD on Australian government
networks.
Format
The ISM is comprised of a high level ‘principles based’ document and a detailed Controls
manual, further complemented by an ‘Executive Companion’. This format is designed to be
more accessible to a wider audience across all levels of government to improve awareness of
information security issues.
Information Security Manual
This product suite targets different areas of your agency to ensure that key decision makers
across government are made aware of and involved in countering threats to their information
and ICT systems.
Executive
Companion
Information Security
Principles
Information Security
Controls
Device Specific Guides
Protect Publications
Australian Communication Security Instructions
8
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
These products are designed to complement each other and provide agencies with the
necessary information to make informed decisions based on their own business requirements,
specific circumstances and risk appetite.
The Executive Companion is targeted towards the most senior executives in each agency,
such as Deputy Secretaries, Secretaries and Chief Executive Officers, and comprises broader
strategic messaging about key information security issues.
The Principles document is aimed at Security Executives, Chief Information Security Officers,
Chief Information Officers and senior decision makers across government and focuses on
providing agencies with a better understanding of the cyber threat environment and rationale
to assist agencies in developing informed information security policies within
their organisations.
The Controls manual is aimed at IT Security Advisors, IT Security Managers and security
practitioners across government. This manual provides a set of detailed controls that, when
implemented, will help agencies adhere to the higher level Principles document.
ASD information security policies and guidance produced in addition to this manual may
address device and scenario–specific security risks to government information and systems.
Not all ISM requirements can be implemented on all devices or in all environments. Where
stipulated, these take precedence over the platform non–specific advice in this manual.
ASD produces information security policies and guidance in addition to this manual, such as
Australian Communications Security Instructions (ACSI), consumer guides, hardening guides
and Protect publications.
Compliance
The ISM provides agencies with a set of detailed controls that can be implemented to mitigate
risks to their information and systems. Agencies are encouraged to make informed, risk–based
decisions specific to their unique environments, circumstances and risk appetite.
There are two categories of compliance associated with the controls in this manual—‘must’
and ‘should’. These compliance requirements are determined according to the degree of
security risk an agency will be accepting by not implementing the associated control. ASD’s
assessment of whether a control is a ‘must’ or a ‘should’ is based on ASD’s experience in
providing cyber and information security advice and assistance to the Australian government
and reflect what ASD assesses the risk level to be. Agencies may have differing risk
environments and requirements, and may have other mitigations in place to reduce the
residual risk to an acceptable level.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
9
I N F O R M AT I O N S E C U R I TY: C O U N T E R I N G T H E T H R E AT
ASD’s Role
What ASD can do for you
As directed by the Intelligence Services Act 2001, ASD provides foreign signals intelligence
as well as advice and assistance on matters relating to the security and integrity of electronic
information. These twin missions complement each other, with the skillsets and capabilities
required to be an expert at one being precisely those required to master the other. It is the
same reasoning why Australia’s signals intelligence and information security functions were co–
located in the Defence Signals Bureau—the forerunner of ASD—more than 60 years ago.
As the Commonwealth authority on information security, and informed by its signals
intelligence expertise and capabilities, ASD can provide agencies with advice and assistance
as well as further information on the cyber threat. ASD conducts a number of workshops
and forums with IT Security Advisors throughout the year to facilitate open discussion on
countering the cyber threat. These discussions focus on the challenges faced by Australian
government agencies in protecting their information and systems.
The CSOC, located in ASD, provides coordinated operational responses to cyber security
incidents of national importance. The CSOC is a resource designed to serve all government
agencies and has embedded representation from the Australian Defence Force, Defence
Intelligence Organisation, Australian Security Intelligence Organisation, Australian Federal
Police and CERT Australia.
What you can do for ASD
Successfully protecting Australian networks from an increasingly sophisticated and persistent
cyber threat requires strong collaboration. While ASD can provide technical advice and
assistance, we can not tackle this challenge alone. Reporting of cyber security incidents
provides ASD with greater visibility of the threat environment and assists in the prevention of
cyber intrusions on Australian government networks.
While the information in the ISM is extensive, it represents advice at a point in time as
technology and the threat environment continue to evolve. Please keep us informed on how
we can continue to provide tailored advice that best meets the needs and requirements of
your agency. ASD will focus on providing advice according to where it is most needed.
Contact
For all urgent and operational enquiries:
• Phone 1300 CYBER1 (1300 292 371) and select 1 at any time.
• Fill out a cyber security incident report form on the OnSecure website
(www.onsecure.gov.au).
For all non–urgent and general enquiries:
• Phone 1300 CYBER1 (1300 292 371) and select 2 at any time.
• Use the Advice and Assistance form on the OnSecure website. Australian Government–
sponsored customers who do not have an OnSecure account should apply for one.
• Email: asd.assist@defence.gov.au.
10
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
PRINCIPLES
11
P rinciples : I nformation S ecurity R isk M anagement
Principles
Information Security Risk Management
Rationale
Risk management is the process of identifying risk, assessing risk, and taking steps to reduce
risk to an acceptable level.
The ISM is designed as a tool to assist Australian government agencies to risk–manage
the protection of their information and systems. It represents best practice in mitigating or
minimising the threat to Australian government systems. However, there is no one–size–fits–all
approach to information security. Taking a risk management approach to information security
provides agencies with the flexibility to allow for differences in their environment when making
security decisions. Agencies will have different security requirements, business needs and risk
appetites from one another. It may not be possible or appropriate for an agency to implement
all security controls included in the Controls manual.
Information security risk management requires agencies to understand the security risks they
face, to make informed decisions when using technology. Understanding the risk environment
specific to your agency will also enable greater flexibility and adaptability in responding to
changes to that environment as the threat landscape evolves.
Scope
This chapter describes the expectations on Australian government agencies in taking a risk
management approach to information security.
Principles
1.
Requirement to Adopt a Risk Management Approach
Provide accountable authorities with a holistic understanding of their security
posture by incorporating information security into an agency’s broader risk
management practices.
It is a mandatory requirement of the Australian Government Protective Security Policy
Framework that agencies adopt a risk management approach to cover all areas of protective
security across their organisation. Since an agency’s risk owner is accountable for an
information or cyber security incident, it is important they are made aware of any residual
risks to agency information and systems through a formal approval process. Information
security should therefore be incorporated into an agency’s broader risk management practices.
12
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : I nformation S ecurity R isk M anagement
2.
Information Security Risk Management Process
Implement a risk management approach to information security by identifying,
analysing, evaluating and, where appropriate, treating security risks to information
and systems.
Risk management allows agencies to balance the operational and economic costs of
information security measures with the need to protect the information and systems that
support their organisational functions.
The process of identifying, analysing and evaluating information security risks can help
agencies select security controls suitable for their unique business environments. Risks
deemed unacceptable are treated by implementing appropriate security measures. Risks
deemed acceptable, as well as any residual security risks, are formally accepted by an
appropriate authority.
The ISM communicates potential information security risks faced by Australian government
agencies. It can assist agencies in understanding the consequences of non–compliance with
advised security controls and whether such non–compliance presents an acceptable level of
risk. The ISM Controls manual provides guidance on appropriate risk mitigation strategies.
As a whole–of–government policy document, the advice in the ISM is necessarily device and
agency non–specific. Not all ISM requirements can be implemented on all devices or in all
environments. In these cases, device–specific advice issued by ASD may take precedence
over the advice in the ISM. Agencies should familiarise themselves with other documentation
suites issued by ASD. Relevant documentation is referenced in each section of the ISM
Controls manual.
References
Further information on risk management and protective security requirements can be found in
the Australian Government Protective Security Policy Framework, available at
www.protectivesecurity.gov.au.
For further guidance please refer to the Australian Standard for Risk Management AS/NZS
ISO 31000:2009, the Australian Standards HB 167:2006 Security risk management and HB
327:2010 Communicating and consulting about risk.
The Protective Security Training College, managed by the Attorney–General’s Department,
provides formal training opportunities on the subject of security risk management:
www.ag.gov.au/NationalSecurity/ProtectiveSecurityTraining/Pages/default.aspx.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
13
P rinciples : R oles and R esponsibilities
Roles and Responsibilities
DID
D I D YOU
YO U K N
NOW?
OW?
Rationale
The leadership of a
Chief Information
Security Officer or
equivalent position
can substantially
reduce the overall
cost of data
breaches.6
Managing information security at the senior executive level
provides agencies with strategic–level guidance that ensures
compliance with national policy, standards, regulation and
legislation. Further, senior support best ensures an agency’s
ability to restore business–critical services to an operational
state in the event of a disaster.
Duties should be assigned to individuals with an appropriate
level of authority, access to information and resources,
technical expertise and time to dedicate to meeting these
responsibilities. Agencies should also ensure there is
sufficient separation of duties to provide quality assurance
and avoid any actual or perceived conflict of interest.6
Scope
This chapter describes roles and responsibilities concerning information security.
Principles
1.
Visibility
Provide personnel, including decision makers, with sufficient information to
perform their duties by adopting a robust and effective governance framework.
An effective information security governance framework will provide decision makers with a
current, accurate and holistic understanding of the threat environment, enabling them to make
informed risk–based decisions in relation to information security. It is also important to ensure
that this information is passed to system owners and stakeholders and that it is considered
during accreditation activities.
2.
Accountability
Ensure duties are undertaken at an appropriate level and conducted accountably by
adopting a governance framework with clearly defined roles and responsibilities.
A strong governance framework will promote accountability and ensure that all duties are
appointed to individuals with an appropriate level of authority.
3.
Probity
Reduce the likelihood of an actual or perceived conflict of interest by maintaining
clear separation of duties.
The separation of duties can prevent an actual or perceived conflict of interest. For instance,
there can be a conflict of interest in a system owner assessing the security of their own system.
References
Nil.
6 Ponemon Institute, 2009 Annual Study: Cost of a Data Breach — Understanding Financial Impact,
Customer Turnover and Preventative Solutions, 2010.
14
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : I ndustry E ngagement and O utsourcing
Industry Engagement and Outsourcing
Rationale
Outsourcing can be a cost–effective option for providing information technology services and
functions in an agency, as well as potentially delivering a superior service. However, it can also
affect an agency’s risk profile and control over its threat environment. Storing data in multiple
disparate locations and allowing more people to access agency information can significantly
increase the potential for network infection and information loss or compromise.
DID
D I D YOU
YO U K N
NOW?
OW?
Cloud computing—abstracted, scalable ICT
infrastructure that can be leased to customers
In 2011, 41% of data
on a ‘pay as you go’ basis—will be one of the
breaches were caused
most significant shifts in ICT in the next decade.
by a third party,
Circumventing the need for infrastructure management
namely outsourcers,
has clear financial and operational benefits for
cloud providers or
agencies. However, due to the Internet–connected
business partners that
nature of cloud computing, any data stored on this
handled or accessed
type of network is vulnerable to malicious cyber
the organisation's
activity. Moreover, the physical data storage location—
information.7
and the people responsible—will not necessarily be
known to the customer. This diminishes customer
control over threat mitigation and response and
increases the threat from malicious insiders. The Attorney–General’s Department has produced
a document outlining the Australian Government Policy and Risk management guidelines for
the storage and processing of Australian Government information in outsourced or offshore
ICT arrangements. This guidance should be consulted in addition to ASD’s Cloud Computing
Security Considerations, when considering outsourcing agency ICT functions.7
Scope
This chapter provides information on outsourcing information technology services and
functions to industry, as well as providing them with access to information in order to
undertake their duties.
Principles
1.
Industry Engagement and Outsourcing
Maintain the confidentiality, integrity and availability of information by ensuring
agency approved security measures are implemented by service providers handling
agency information, and that sensitive or classified information remains within
Australian borders at all times.
Ensuring that service provider systems are located in Australia and are accredited to the same
minimum standard as the sponsoring agency’s systems provides assurance that sensitive or
classified information is receiving an appropriate level of protection. The risk of a malicious
actor accessing agency information greatly increases if the information is stored or transmitted
outside Australian borders.
7 Ponemon Institute, Cost of a Data Breach Study, 2012.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
15
P rinciples : I ndustry E ngagement and O utsourcing
References
Additional information regarding cloud computing security considerations can be found on the
ASD website at www.asd.gov.au/infosec/cloudsecurity.htm.
The Australian Government Information Management Office (AGIMO) is the lead agency for
whole–of government policy on cloud computing. Relevant documentation can be found at
www.finance.gov.au/cloud/.
The Attorney–General’s Department’s Australian Government Policy and Risk management
guidelines for the storage and processing of Australian Government information in outsourced
or offshore ICT arrangements can be found at
www.protectivesecurity.gov.au/informationsecurity/Pages/Supporting-guidelines-toinformation-security-(including-the-classification-system).aspx.
Better practice guidance developed by the Attorney–General’s Department can be found in
Security of Outsourced Services and Functions at www.protectivesecurity.gov.au.
16
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : I nformation S ecurity D ocumentation
Information Security Documentation
Rationale
Documentation is vital to any information security regime, as it supports the accurate and
consistent application of policy and procedures within an agency. Documentation also provides
increased accountability and a standard against which compliance can be measured.
The following suite of documents forms the Information Security Management Framework,
as mandated in the Australian Government Information Security Management Protocol of the
Australian Government Protective Security Policy Framework:
1. Information security policy. To set the strategic direction for an agency’s information
security and allow management to communicate its goals and expectations.
2. Security risk management plan. To identify security risks and appropriate mitigation
measures for systems and determine a risk tolerance threshold, ensuring risks are able to
be managed in a coordinated and consistent manner across an agency.
3. System security plan. To ensure specific security measures for the implementation and
operation of a specific system are adequately communicated and considered.
4. Standard operating procedures. To assist personnel to follow security procedures in an
appropriate and uniform manner, with a minimum level of confusion.
5. Incident response plan. To communicate which actions to take in response to a cyber
security incident, with sufficient flexibility, scope and detail to address the majority of
incidents which could arise.
6. Emergency procedures. To ensure information and systems are properly secured before
personnel evacuate a facility, as emergency situations can be exploited as an opportunity
for a malicious actor to gain access to systems.
7. Business continuity and disaster recovery plans. To help maintain security in the face of
unexpected events and changes by ensuring critical functions continue to operate when
a system is working in a degraded state or reducing the time between when a disaster
occurs and critical functions being restored.8
DID
D I D YOU
YO U K N
NOW?
OW?
To avoid confusion and ensure information security policy and procedures are properly applied,
it is essential that all documents work in concert with, and not contradict, each other. Clear
and logical wording will ensure the documents are easy to use and, consequently, effective.
Three out of four companies across ten countries—including Australia—have
security policies in place.
However, 40% of employees and 20% of IT professionals did not know that the
security policies existed.8
8CISCO, Annual Security Report, 2008.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
17
P rinciples : I nformation S ecurity D ocumentation
The cyber threat environment is dynamic—so too are agency business requirements. If an
agency fails to keep its information security documentation current through regular reviews
to reflect the changing environment, their security measures and processes may cease
to be effective. In that situation, resources could be devoted to areas that have reduced
effectiveness, or are no longer relevant.
Scope
This chapter describes the development of information security documentation for systems.
Principles
1.
Information Security Documentation
Apply agency policy and procedures consistently and accountably by adopting a
comprehensive suite of information security documentation, which is regularly
reviewed and tailored to specific systems and user roles.
An appropriate and interconnected suite of information security documentation assists in the
proper, consistent and accountable application of policy and procedures within an agency.
Agencies need to communicate new or altered policies and procedures to stakeholders to
ensure they are properly implemented.
References
Information on the development of security risk management plans can be found in the
Information Security Risk Management Guidelines available from Standards Australia at
www.standards.org.au.
Information relating to the Information Security Management Framework is contained in
the Australian Government Information Security Management Protocol of the Australian
Government Protective Security Policy Framework, which can be found at
www.protectivesecurity.gov.au.
18
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : S ystem A ccreditation
System Accreditation
Rationale
Accreditation is the process by which an appropriate authority formally recognises and accepts
that residual risks on a system are appropriate for the classification of the information that it
processes, stores or communicates. Agencies must accredit all systems before they can be put
into operation. Accreditation provides agencies with assurance that either sufficient security
measures have been put in place on their systems or deficiencies in such measures have
been accepted by an appropriate authority. The following diagram shows, at a high level, the
process of accreditation:
System Owner
Accreditation
Authority
Certification
Authority
Assessor
Requests
accreditation
Requests
reaccreditation
Requests
certification
Requests audit
Conducts first
stage audit
Implements
controls
Conducts second
stage audit
Assess audit
report and
residual risk
Awards
certification
Assesses
certification report
Assesses residual
risk and other
factors
Awards
accreditation
Operates system
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
19
P rinciples : S ystem A ccreditation
The accreditation process does not only apply to new systems. It is important that systems are
reaccredited as the information technology and cyber threat environments continue to evolve.
Performing regular accreditation facilitates understanding of a current system's security
environment and provides assurance that information systems are of a standard that meet
the agency’s security requirements. Once a system has been accredited, conducting continual
monitoring activities will assist in assessing changes to its environment and operation to
determine the implications for the risk profile and accreditation status of the system.
When accrediting a system, it is also important to remain aware of legislative and policy
requirements if a system is connecting to another party. Agencies should ensure they are
aware of the security measures the other party has implemented to protect their information,
and accept any risks associated with connecting to such systems. Further, it is vital that
Australian citizens maintain control of systems that process, store and communicate Australian
Eyes Only (AUSTEO) and Australian Government Access Only (AGAO) information.
Scope
This chapter describes the accreditation framework for systems and agencies’ responsibilities.
Principles
1.
Accreditation Framework
Ensure that an appropriate level of security is being applied to agency systems,
and that any residual risks have been accepted, by adopting a robust accreditation
framework.
An appropriate accreditation framework will comprise clear lines of accountability and a
segregation of roles and responsibilities to provide agencies with an impartial mechanism to
assess the security of their systems.
2.
Conducting Audits
Certify agency systems under the accreditation framework by conducting
impartial audits.
The aim of an audit is to review the system architecture (including the information security
documentation) and assess the actual implementation, appropriateness and effectiveness
of controls for a system. Audits are typically undertaken by Information Security Registered
Assessors.
The outcome of an audit is a report to the certification authority describing areas of
compliance and non–compliance for a system and any suggested remediation actions. The
compliance report helps the certification authority assess the residual risk relating to the
operation of a system following the audit and any remediation activities the system owner may
have undertaken.
3.
Conducting Certifications
Independently verify the integrity and accept the outcome of an audit by certifying
a system as part of the accreditation framework.
20
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : S ystem A ccreditation
Certification provides the accreditation authority with information on the security posture of
a system. This allows the accreditation authority to make an informed decision on whether
the residual risk of allowing the system to operate is acceptable. The certification authority is
typically the officer responsible for overseeing information technology security management
across the agency. However, ASD acts as the certification authority in the case of TOP
SECRET systems.
Certification for a system will be awarded once a certification authority is satisfied that the
system has been appropriately audited and the controls identified by the system owner have
been implemented and are operating effectively. The certification authority can then make a
recommendation to the accreditation authority on whether to award accreditation or not based
on an assessment of the residual risk relating to the operation of the system.
4.
Conducting Accreditations
Accept that the residual security risks on an agency system are appropriate for the
information it processes, stores or communicates by accrediting the system before
being put into operation.
Accreditation of a system ensures that either sufficient security measures have been put in
place or that deficiencies in such measures have been accepted by an appropriate authority.
An accreditation authority awards approval to operate the system and is typically the agency
head or at least a senior executive who has an appropriate level of understanding of the risks
they are accepting on behalf of the agency. The exception is for TOP SECRET systems, for
which ASD is the accreditation authority.
References
Policy and Procedures for the Information Security Registered Assessor Program contains a
definition of the range of activities Information Security Registered Assessors are authorised to
perform. It can be obtained from ASD’s website at www.asd.gov.au/infosec/irap.htm.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
21
P rinciples : I nformation S ecurity M onitoring
Information Security Monitoring
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Information security is a continual process, one that extends beyond ensuring that a system is
secure at the time of deployment. Vulnerabilities can be introduced into a system through poor
design, planning, implementation, change management or maintenance, as well as through
changes in technology or attack vectors. Unmitigated vulnerabilities provide the means for a
malicious actor to compromise systems and information.
During a 2011 information
systems audit, 14 out of
15 Western Australian
government agencies
failed to detect, prevent
or respond to suspicious
scans of their Internet
sites seeking to identify
security weaknesses.9
Information security monitoring practices can help
ensure that new vulnerabilities are addressed and
security is maintained through unforeseen events
and changes, whether internal to the system or in
the system’s operating environment. Such practices
allow agencies to be proactive in identifying,
prioritising and responding to risks. Measures to
monitor and manage vulnerabilities in, and changes
to, a system can provide an agency with valuable
information about its level of exposure to threats, as
well as assisting agencies in keeping up to date with
industry and product advances.9
Scope
This chapter describes the importance of vulnerability management activities and robust
change management processes.
Principles
1.
Vulnerability Management
Maintain the security posture of systems by implementing appropriate vulnerability
management practices.
Vulnerability management activities, such as regular vulnerability assessments, analysis
and mitigation, assist in maintaining system security as threat environments change over
time. Vulnerability assessments allow agencies to identify security weaknesses caused by
misconfigurations, bugs or flaws. Once a vulnerability is detected, an agency is able to
determine a way forward through vulnerability analysis, assessing the vulnerability’s potential
impact and available mitigation strategies. Vulnerability mitigation is the process of applying
the chosen mitigations in an effective and timely manner in order to eliminate or minimise
the risk.
9 Auditor General of Western Australia, Information Systems Audit Report (Report 4), June 2011.
22
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : I nformation S ecurity M onitoring
2.
Change Management
Ensure an agency’s approved security risk threshold is maintained when
implementing system changes by applying appropriate change management
processes.
Implementing changes to a system can impact upon its overall risk. A sound change
management process ensures changes are made in an accountable manner with due
consideration and with appropriate approval.
It also provides agencies with the opportunity to, if necessary, initiate a reaccreditation
process or apply vulnerability management practices, minimising the risk of system security
degrading over time.
References
Nil.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
23
P rinciples : C yber S ecurity I ncidents
Cyber Security Incidents
Rationale
Cyber security incidents have the potential to cause significant damage to agency business
functions or to the broader government and can result in financial loss, loss of customer
confidence and negatively impact the reputation of an agency or government.
DID
D I D YOU
YO U K N
NOW?
OW?
Agencies can lessen the impact, and the immediate and long term response costs, of a cyber
security incident by investing in effective measures to detect, prevent, report and manage
cyber security incidents. Such measures can help identify gaps in information security policies
and procedures, and assist in the development of additional measures required to prevent
future incidents occurring.
22 Australian
companies in a 2011
study lost between
3,200 and 65,000
individual records from
data breach incidents,
with an average
organisation cost
per breach of $2.16
million.10
The development of a robust cyber security incident
management and response plan positions an agency to
detect threats and respond swiftly and appropriately in
the event of a cyber security incident. Having sound and
up to date knowledge of the affected system will enable
an agency to quickly identify the cause and extent of the
incident and restore the system to an operational and
secure state as soon as possible.10
Additionally, actively monitoring the cyber security threat
environment and actioning advice provided by ASD will
assist in evolving agency understanding of the cyber
threat and help inform agency incident
response planning.
Users of an agency system should be considered an important and integrated element of
any agency’s cyber security detection and response strategy. Many potential cyber security
incidents are noticed by users before security staff are alerted by technical measures. For this
to happen, users must receive training on information security, including how to recognise and
respond to potential cyber incidents, and be provided with a process to report any observed
or suspected security incidents. In addition, users need to be aware of how to respond to
incidents in an appropriate manner. This can assist an agency in recording all cyber security
incidents—particularly those which a security manager or system owner fail to notice—as well
as ensuring that any digital evidence relating to an incident is managed so that it remains
accessible and usable for as long as it is needed. This includes ensuring that metadata about
the digital records, who used them, and how they were used is retained.
Scope
This chapter describes the detection, reporting and management of cyber security incidents.
10 Ponemon Institute, 2011 Cost of a Data Breach Australia, 2012.
24
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : C yber S ecurity I ncidents
Principles
1.
Detection
Reduce the impact and time taken to resolve cyber security incidents by
implementing proper procedures and appropriately configured technical measures.
Early cyber security incident detection allows for early response and resolution. Detection tools
and procedures work to mitigate the most common methods of attack used to exploit systems.
Measures for detecting cyber security incidents include intrusion detection strategies, malicious
code countermeasures, audit analysis and system integrity checking. However, automated
tools are only as good as the analysis they provide. If tools are not adequately configured
to assess potential security risks then it will not be evident when a weakness emerges.
Additionally, regular updates to detection tools to include new known vulnerabilities will help
avoid a degradation in their effectiveness over time.
2.
Reporting
DID
D I D YOU
YO U K N
NOW?
OW?
Maintain an up to date and accurate understanding of the cyber threat environment
specific to your network and contribute to the overall cyber threat picture by
implementing internal and external cyber reporting procedures.
85% of data
breaches in 2011
took weeks or
more to discover.
In fact, over half
of the breaches
took months to
discover.11
Robust measures for reporting cyber security incidents can
provide management with a means to assess the overall
damage to a system and to take remedial action, including
seeking advice from ASD if necessary.11
The ASD–established Cyber Security Incident Reporting
Scheme assists in maintaining an accurate threat
environment picture for systems across government.
ASD uses cyber security incident reports as the basis for
recognising trends, identifying and responding to incidents,
and for developing new policies, procedures, techniques
and training to prevent the recurrence of similar incidents
across government. Reporting cyber security incidents to
ASD through the appropriate channels ensures proper and timely assistance can be provided.
Reporting any cyber security incident involving the loss or misuse of cryptographic keying
material is critical, as system users rely on this technology for the confidentiality and integrity
of their secure communications.
3.
Management
Enable necessary information to be retained to resolve current, or mitigate future,
cyber security incidents by implementing appropriate management procedures.
Proper management of cyber security incidents—such as recording incidents, designating
responsibilities, handling and containing data spills and malicious code infections, and securing
the integrity of evidence—can help resolve current and prevent future occurrences. Recording
cyber security incidents can highlight the nature and frequency of incidents, to assist in taking
corrective action and informing future risk assessments for systems.
11Verizon, 2012 Data Breach Investigations Report, 2012.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
25
P rinciples : C yber S ecurity I ncidents
Using the information gained during an incident can better prepare an agency for handling
future incidents and provide stronger protection for systems and information. Maintaining
the integrity of evidence—such as logs, audit trails and other detection tool outputs—after
an incident ensures better assistance can be provided. Protecting digital evidence is not
only important for investigations leading to criminal prosecution, but is vital to ASD when
responding to and investigating cyber security incidents. Moreover, agencies are required
under the Archives Act 1983 to retain records such as event logs and audit trails for specific
minimum periods.
References
Further information on minimum retention periods for Commonwealth records is provided in
the National Archives of Australia’s Administrative Functions Disposal Authority, which can be
found at
www.naa.gov.au/records-management/agency/keep-destroy-transfer/agency-ra/index.aspx.
26
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : P hysical S ecurity
Physical Security
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Physical security is fundamental to all security efforts. Without adequate physical security
controls, all other information security measures are considerably more difficult, if not
impossible, to initiate. Physical security requires that equipment and infrastructure be
safeguarded in a way that minimises the risk of resource theft, destruction or tampering, for
example by limiting access to areas housing network infrastructure.
30% of IT
professionals
interviewed in
Australia had
encountered issues
with people having
unauthorised
physical and
network access.12
Physical security can not only assist in preventing malicious
damage, but also reduces the risk of accidents and
inadvertent errors affecting a system.
A single layer of physical security, such as an identification
pass that allows building access, is insufficient to mitigate
the risk of compromise. A layered approach to physical
security works to progressively limit access to systems and
infrastructure to authorised personnel only, and prevent a
shortfall in one security layer from leading to a wider, more
serious failure. This is a practical example of the defence–
in–depth concept being applied to the information security
space. As an example of a layered approach, an agency
could require identification passes for building access as well as targeted swipe access to
specific rooms which accommodate lockable containers for storing information or equipment.12
Scope
This chapter outlines the physical security requirements for ICT systems and should be read
in conjunction with the physical security components of the Australian Government Protective
Security Policy Framework.
Principles
1.
Physical Security for Systems
Limit access to facilities, servers, network devices, ICT equipment and media to
authorised personnel only by applying appropriate physical security controls in
accordance with the Australian Government Protective Security Policy Framework.
The application of defence–in–depth to the protection of systems is enhanced through the use
of successive layers of physical security, designed to limit access to those with the need and
appropriate authorisation to access facilities, systems, network infrastructure, ICT equipment
and media.
12CISCO, Data Leakage Worldwide: Common Risks and Mistakes Employees Make, 2008.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
27
P rinciples : P hysical S ecurity
References
Physical security requirements and guidance can be found in the Australian Government
Protective Security Policy Framework available at www.protectivesecurity.gov.au.
In addition, the Security Equipment Catalogue, produced by the Security Construction and
Equipment Committee (SCEC), provides a list of security products and vendor contact details.
28
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : P ersonnel S ecurity
Personnel Security
Rationale
Personnel security refers to measures which work to manage the risk of a trusted insider using
their legitimate access to an agency’s facilities, assets, systems or people for illicit gain or to
cause harm, whether intentional or inadvertent. Implementing a personnel security framework
assists agencies in identifying any ‘inside threats’ they could confront, and provides the tools
to manage the associated risks.
Personnel security is about being educated, informed and proactive. By accessing an
agency’s information systems, employees are able to identify and understand procedures
and vulnerabilities, and know how and when they can be exploited. Legitimate access can be
abused or poor access controls can be manipulated to gain unauthorised access. Together
with an intent to commit theft, sabotage or to disclose sensitive or classified information, an
employee can cause significant damage to an agency’s reputation, operations, productivity
or finances. Appointing suitable and trustworthy personnel to operate, maintain and access
information systems creates the first line of defence in an agency’s security posture.
On the other hand, personnel can cause unintentional harm if they are unaware of their
security responsibilities and role in protecting an agency’s systems and information. If policies
are to be successful in preventing the compromise or unauthorised disclosure of information,
they need to be adopted and practiced by all agency personnel on a daily basis. For example,
social engineering campaigns aim to exploit weaknesses in personal judgment and decision–
making to compromise or gain access to an agency’s system or information. Fostering a
culture of security awareness and responsibility through effective training and awareness
programs is vital in ensuring individuals make the security decisions expected of them.
Scope
This chapter describes information security awareness and training for personnel, and the
responsibilities of personnel using Internet services.
Principles
1.
Information Security Awareness and Training
Foster an effective security culture within an agency by providing all personnel
with ongoing information security awareness and training, tailored to system user
roles and responsibilities.
Fostering an effective security culture through tailored education plays a major role in
protecting agency systems and information from attack or compromise. Information security
awareness and training programs can educate system users, security practitioners and senior
decision–makers on the cyber threat environment, as well as generate support for agency
security requirements and familiarise users with their roles and responsibilities. The degree
and content of the programs will depend on the objectives of the agency, as well as the
classification of the systems involved.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
29
P rinciples : P ersonnel S ecurity
2.
Using the Internet
DID
D I D YOU
YO U K N
NOW?
OW?
Ensure personnel are able to use Internet services in a responsible, accountable
and security conscious manner by adopting effective usage policies and controls.
85% of all
malicious
software—
including viruses,
worms, spyware,
adware and
Trojans—comes
from the web.13
Some Internet services, such as public web–based email and
peer–to–peer applications, can allow personnel to bypass
security measures that agencies have put in place to protect
their systems. For example, when personnel receive files via
peer–to–peer file–sharing applications, instant messaging
or chat, they are often able to evade established security
measures for detecting and quarantining malicious code.
Further, some peer–to–peer Voice over Internet Protocol
(VoIP) applications, such as Skype, use protocols which
bypass firewalls, creating a vulnerable access point into the
system. Public web–based email can be easily exploited as a
backdoor entry route for malware.13
Agency staff need to be aware that any personal information they post on websites could
be used to inform phishing scams, or to develop a detailed profile of their life and hobbies
in order to build a trust relationship with them or associates. The relationship could then be
used to elicit government information from them or implant malware on systems by inducing
them to, for example, open emails or visit websites with malicious content. Even unclassified
information that appears to be benign in isolation could, when combined with other
information, have a considerable security impact.
Agencies can help to facilitate secure use of the Internet by implementing measures that
ensure Internet services and applications available to personnel are appropriately scanned for
malicious code and subject to inspection by intrusion detection systems.
References
For all other guidance on personnel security requirements, please refer to the Australian
Government Personnel Security Core Policy and the Australian Government Personnel Security
Management Protocol of the Australian Government Protective Security Policy Framework,
which can be found at www.protectivesecurity.gov.au.
For information on the personnel security threat environment, please refer to The Insider
Threat to Business– A personnel security handbook, as released by the Attorney‑General’s
Department. This can be found under the ‘Security’ heading at
www.tisn.gov.au/Pages/Publications-by-topic.aspx.
Information on the policy and regulations governing the disclosure and use of government
information by personnel can be found in the Managing Official Information section of APS
Values and Code of Conduct in Practice, located at
www.apsc.gov.au/publications-and-media/current-publications/aps-values-and-code-ofconduct-in-practice.
13Sophos, Security Threat Report 2012 — Seeing the Threats Through the Hype, 2012.
30
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : C ommunications I nfrastructure
Communications Infrastructure
Rationale
With the proliferation of system connections across government, a robust cable management
regime can help agencies maintain the integrity and availability of their communications
infrastructure and the confidentiality and integrity of their information. Proper cable
management can minimise the likelihood of unauthorised personnel inadvertently or
deliberately accessing system cables. Laying cables in a controlled manner and ensuring
they are appropriately labelled, separated and accessible for visual inspection can help
detect any covert tampering or access to system cables that may otherwise result in long
term unauthorised access to corporate information by a malicious actor, or damage to
communications infrastructure that could impact the availability of system information.
Appropriate cable labelling can also prevent data spills by accidentally connecting one system
to another of a lesser classification.
Moreover, investment in adequate cable infrastructure and appropriate cable management
practices can result in considerable long term efficiencies over the life of an installation, as
technology and system requirements continue to evolve. For instance, initial investment
in fibre cable not only protects against unforseen threats, but enables information to be
communicated at higher classifications in the future.
Implementing accessible and visible cable infrastructure can significantly reduce expenses
resulting from future upgrades, accreditation, fault finding, configuration management and
regular inspection for tampering or degradation.
Compromising emanations from equipment and cables provides an opportunity for classified
or sensitive information to be intercepted. Some environments—such as mobile platforms and
deployable assets that process classified information—are particularly susceptible, and could
be seriously affected if compromised by an emanation security attack. ASD maintains up to
date emanation security threat assessments for relevant agencies to use when determining
emanation security measures and maintaining the confidentiality and availability of classified
systems. Having sound cable infrastructure and installation methodology provides protection in
the case that an agency’s emanation security threat increases.
Scope
This chapter describes the importance of securing communications infrastructure through
cable management and emanation security practices.
Principles
1.
Cable Management
Protect sensitive or classified information by applying appropriate cable
management practices.
Appropriate cable management practices can assist an agency to protect its information by
minimising the likelihood of unauthorised personnel inadvertently or deliberately accessing
system cables.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
31
P rinciples : C ommunications I nfrastructure
2.
Emanation Security
Minimise the disclosure of classified or sensitive information from compromising
emanations by implementing appropriate countermeasures informed by current
ASD emanation security threat assessments.
Reducing emanations to an acceptable level minimises the risk that an agency’s information
will be intercepted and its systems compromised. ASD maintains up to date emanation security
threat assessments for relevant agencies to use when determining emanation
security measures.
References
Additional information on conducting an emanation security threat assessment is found in
the latest version of Australian Communications Security Instruction 71—Guidelines for the
Installation of Communication and Information Processing Equipment and Systems.
Additional information on cables and separation standards, as well as the potential dangers
of operating radio frequency transmitters near systems is documented in the latest version
of Australian Communications Security Instruction 61—A Guide to the Assessment of
Electromagnetic Security in Military and High–Risk Environments.
32
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : C ommunications S ystems and D evices
Communications Systems and Devices
Rationale
Communications systems and devices can act as a digital gateway for information coming
into and going out of a network, and can facilitate the disclosure of classified or sensitive
information, whether inadvertent or intentional. In some cases these devices could provide an
access point into any system to which the device connects.
Effective governance, including device usage policies and procedures, plays a vital role in
minimising the likelihood of data spills by ensuring personnel have sufficient knowledge of the
risk to, and methods to protect, classified and sensitive information which is being scanned,
copied, printed or communicated. Additionally, properly considering the physical positioning of
devices can reduce the potential of unauthorised access and modification.
Scope
This chapter describes the importance of implementing measures which facilitate the secure
use of radio frequency and infrared devices, fax machines, multifunction devices, as well as
fixed telephones and the systems to which they connect.
Principles
1.
Radio Frequency and Infrared Devices
Reduce the risk of data spills by implementing measures to prevent, detect and
respond to the unauthorised or unsecure use of radio frequency and infrared
communications devices.
Transmissions from radio frequency and infrared devices, for example Bluetooth and wireless
keyboards, can create an emanation security risk if not appropriately secured, positioned or
configured. Radio frequency devices are also capable of automatically connecting to systems
and potentially becoming unauthorised data storage devices. Moreover, the wireless transfer of
information can serve as an illicit entry point for an entire network.
Appropriately configuring wireless networks, positioning devices to restrict communications
from being transmitted into an unsecured space and using radio frequency shielding on
facilities will assist agencies in limiting wireless communications to areas under their control.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
33
P rinciples : C ommunications S ystems and D evices
2.
Fax Machines and Multifunction Devices
Maintain the confidentiality of sensitive or classified information by appropriately
configuring, and developing a proper usage policy for, fax machines and
multifunction devices.
DID
D I D YOU
YO U K N
NOW?
OW?
Fax machines and multifunction devices (MFDs)
are capable of communicating classified
In early 2011, the City of
information across a connected network. These
York Council in the United
devices can therefore facilitate data spills, for
Kingdom was penalised by the
instance by personnel scanning, copying or
Information Commissioner’s
sending information at a classification higher than
Office after papers containing
that of the network the devices are connected
sensitive personal data were
to. Developing an agency policy governing the
mistakenly collected from a
use of fax machines and MFDs can help prevent
shared printer and posted to
actions which can lead to the unauthorised
the wrong person.14
access to, and disclosure of, classified or sensitive
information. In addition, when a device is
connected to a computer network, it can become a bridge and therefore a potential vector
to access information which has been scanned, copied or printed. Properly configuring fax
machines and MFDs will assist in preventing malicious or inadvertent data spills. 14
3.
Telephones and Telephone Systems
Maintain the confidentiality of classified or sensitive information by developing a
usage policy governing, and appropriately configuring, telephones and telephone
systems.
The improper configuration and use of telephones and telephone systems can expose classified
or sensitive information to those not authorised to hear it. Telephones pose increased audio,
and, in the case of video conferencing, visual security risks, and information communicated
over unsecure telephone networks is exposed to interception. These risks can be reduced
by ensuring personnel are aware of their environment and given guidance regarding the
appropriate levels of information which can be discussed on particular telephone systems, as
well as implementing measures such as encryption and off–hook security—for instance, by
limiting the time an active microphone is open.
References
For more information relating to wireless communications and connectivity, please refer to the
Working Off–Site chapter of this document.
14 United Kingdom Information Commissioner's Office, News Release: Council printer mix–up breached
data protection laws, 5 April 2011.
34
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : P S P F M andatory R equirement I N F O S E C 4 E x plained
PSPF Mandatory Requirement INFOSEC 4
Explained
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Australian Government Protective Security Policy Framework (PSPF) mandatory requirement
INFOSEC 4 requires agencies to implement ASD’s Strategies to Mitigate Targeted Cyber
Intrusions (the Strategies) as outlined in the ISM Controls manual. To satisfy INFOSEC 4,
agencies are required to implement the Top 4 of the Strategies.
When implemented
as a package, ASD's
Top 4 mitigation
strategies would
have prevented
at least 85% of
intrusions ASD
responds to.
The Strategies were developed in order to mitigate
the most common cyber security threat being faced by
Australian government agencies at this point in time:
targeted cyber intrusions from the Internet to the work
station. The strategies represent a layered defence
designed to protect the workstation, and by extension the
corporate network, from targeted cyber intrusions. While
no single strategy can prevent malicious activity, at least
85% of the incidents that ASD responds to could have been
prevented by implementing the Top 4. As such, the PSPF
now requires government agencies to implement the Top 4.
The Top 4 Strategies are:
1. application whitelisting
2. patch applications
3. patch operating systems
4. minimise administrative privileges.
A list of the technical controls required in order to implement the Top 4 is outlined in the
PSPF Mandatory Requirement INFOSEC 4 Explained chapter of the Controls manual. The
implementation of the remaining Strategies is also strongly recommended, however these can
be prioritised based on business requirements and the risk profile of each system.
Scope
This chapter outlines the ISM controls that agencies must implement in order to be compliant
with PSPF mandatory requirement INFOSEC 4.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
35
P rinciples : P S P F M andatory R equirement I N F O S E C 4 E x plained
Principles
1.
Controls to meet PSPF requirement INFOSEC 4
Reduce the risk of targeted cyber intrusions by implementing the Top 4 of ASD’s
Strategies to Mitigate Targeted Cyber Intrusions where applicable.
As the Strategies are designed to mitigate targeted content–based intrusions (that is email
and web pages), priority for implementing the Top 4 Strategies should therefore be placed
on Australian government systems that are able to receive emails or browse web content
originating from a different security domain, particularly from the Internet.
Other systems will benefit from implementing the Top 4, and the Top 35 Strategies more
broadly, however there may be circumstances where the risks or business impact of
implementing the Strategies outweighs the benefit, and other security controls may have
greater relevance. In such circumstances, agencies should apply appropriate risk management
practices as outlined in the ISM.
Under the PSPF, non–compliance with any mandatory requirements must be reported to
an agency’s relevant portfolio minister, and also to ASD for matters relating to the ISM.
Compliance reporting to the relevant portfolio minister is not intended as an extra step in the
system accreditation process, nor is it assumed compliance must be gained before authority to
operate can be granted to a system.
References
Further information on the Strategies can be found in the following ASD Protect publications
available through the OnSecure portal and the ASD website at:
www.asd.gov.au/infosec/top35mitigationstrategies.htm.
•
Strategies to Mitigate Targeted Cyber Intrusions
•
Strategies to Mitigate Targeted Cyber Intrusions—Mitigation Details
•
Top 4 Strategies to Mitigate Targeted Cyber Intrusions: Mandatory Requirement Explained
•
Top 4 in a Linux Environment
•
Application Whitelisting Explained
•
Assessing Vulnerabilities and Patches
•
Minimising Administrative Privileges Explained.
Further guidance on protective security policy and the PSPF is available at
www.protectivesecurity.gov.au.
36
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : P roduct S ecurity
Product Security
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
ICT security products, by default, do not provide security out–of–the–box and may contain
flaws or vulnerabilities which are able to be exploited by a malicious actor. With the
proliferation of product choices, it is increasingly difficult for agencies to know not only which
ICT security products are safe to use, but also which provide the most effective functionality
for their business needs and threat environment.
17% of IT
professionals
stated that
the use of
unauthorised
programs resulted
in as many as
half of their
company’s data
loss incidents.15
Agencies need confidence that the ICT security products
they select and use meet their organisational security needs,
address known vulnerabilities and remain secure given the
changing threat environment. An impartial evaluation of
the security product by an independent entity can assist in
achieving this confidence by verifying the security claims of a
product vendor and testing for vulnerabilities.15
ASD maintains and publishes the Evaluated Products List
(EPL)—which comprises evaluation and certification results
performed by ASD, the Australasian Information Security
Evaluation Program (AISEP) or from an ASD recognised
foreign scheme—to provide agencies with a list of
independently evaluated products to select from.
Products that have been formally evaluated can help increase an agency’s confidence that
a product will work as expected, but within a clearly defined set of constraints. Using an
evaluated product in a different way from which it was tested could introduce threats and
vulnerabilities that were not considered by the initial evaluation. In particular, greater product
convergence and inter–network connectivity means that many ICT security products require
third party hardware and software to operate, which can introduce new vulnerabilities that
may not have been tested for. Therefore, residual security risks still need to be acknowledged
and accepted when selecting and using products listed on the EPL.
Scope
This chapter describes the merit of applying ASD’s recommended risk–based processes to the
selection, acquisition, installation and configuration of ICT products which provide security
functions for the protection of information, as well as the value in following appropriate
labelling, maintenance, sanitisation and disposal procedures for such products.
15CISCO, Data Leakage Worldwide: Common Risks and Mistakes Employees Make, 2008.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
37
P rinciples : P roduct S ecurity
Principles
1.
Product Security Lifecycle
Securely select, acquire, install, configure, label, maintain, repair, sanitise and
dispose of ICT products that provide information security functionality by applying
ASD’s recommended risk–based processes.
ASD publishes a list of evaluated products on the EPL to assist agencies in making risk–based
decisions for acquiring ICT security products. Selecting an ICT security product which has
been evaluated by ASD or another recognised scheme provides an agency with confidence that
the product will meet its business needs and accepted risk profile, and prevent unintended
software possibly containing malicious code from being installed.
Protective marking labels help determine appropriate handling, usage, sanitisation, disposal
or destruction requirements based on classification. Ensuring that technicians who are given
access to ICT products are either cleared or appropriately escorted, as well as sanitising or
declassifying products when taking the product off–site for repair or maintenance, reduces
the risk of unauthorised disclosure of classified or sensitive information. Following proper
sanitisation and disposal procedures also mitigates the risk of inadvertently releasing classified
information into the public domain.
2.
High Assurance Products
Seek ASD approval or guidance as appropriate before acquiring, configuring,
delivering, repairing, labelling, patching and disposing of High Assurance products.
Given the potential threat vectors and the value of the information being protected, ASD is
required to direct, and in some cases authorise, actions taken in regard to High Assurance
products. ASD guidance and authorisation helps ensure that the functionality and integrity
of such products are not degraded, for example when undertaking repairs or applying
external labels, as well as preventing opportunities for a malicious actor to gain insight into
government capabilities, such as through improper product disposal practices.
References
For further information on the AISEP and the EPL, please visit ASD’s website at
www.asd.gov.au/infosec.
38
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : M edia S ecurity
Media Security
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Instituting and maintaining a comprehensive media control program, including protecting
media according to the classification of the information it stores, can help agencies mitigate
the risk of disclosing classified or sensitive information. Best practice media security can help
protect against not only current exploits, but also exploits that could emerge in the future.
In a research experiment, the
Sophos Australia office discovered
that 66% of the 50 USB drives they
purchased from a public transport
provider were infected with malicious
software. They were able to uncover
information about many of the
former owners of the devices, as
well as their family, friends and
colleages.16
There are a number of security risks
agencies should be aware of when using
media. For instance, some operating
systems provide the functionality to
automatically run certain types of
programs that reside on media. While this
was designed for a legitimate purpose, it
can also be used for malicious purposes or
lead to inadvertent compromise.
If this functionality remains enabled,
malware can execute as soon as media
is connected to a system. Coupled with
the ability to insert media of a higher classification into a system of lower classification,
sensitive or classified information could be disclosed. Known vulnerabilities have also been
demonstrated where malicious actors can connect a device to a locked workstation and still
gain access to encryption keys. Furthermore, devices that have direct access to the system
memory can allow a malicious actor to read or write any content to memory that they desire.
The best defence against this vulnerability is to disable access to relevant ports, using either
software controls or by physically damaging the ports so that devices cannot be connected.
Implementing technical measures to ensure certain types of media need to be explicitly
approved for use in a classified environment provides an additional layer of user awareness
and security, in case users are unaware of, or choose to ignore, media security requirements.
Following sound security practices when connecting, storing, transferring, sanitising,
destroying or disposing of media plays a major role in preventing classified and sensitive data
spills and avoiding malicious attacks.
Documenting such policies and procedures will ensure they are carried out in accordance with
agency expectations.
Scope
This chapter describes the value of implementing appropriate media handling, usage,
sanitisation, destruction and disposal practices.16
16Sophos, Security Threat Report 2012 — Seeing the Threats Through the Hype, 2012.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
39
P rinciples : M edia S ecurity
Principles
1.
Media Handling
Establish a removable media policy to provide oversight and accountability for
agency information transported or transferred between systems on removable
media. Maintain confidentiality by accurately classifying, reclassifying
(following appropriate sanitisation or destruction procedures or changes to data
classification), labelling and registering media in accordance with the information
it stores.
Accurately classifying media provides appropriate protections for the information it stores.
Media that is not correctly classified carries a greater risk of being mishandled and accessed
by unauthorised persons. Labelling helps personnel to identify the classification and ensure
the media is afforded the appropriate level of security. A sound process for registering and
accounting for media helps minimise the likelihood of unauthorised disclosure of
classified information.
2.
Media Usage
Maintain the confidentiality of stored information by implementing and
documenting appropriate standards for connecting, storing and transferring media.
Implementing controlled and accountable processes for using media can minimise the risk of
unauthorised access and disclosure by preventing classified media from being connected to
systems of a lesser classification, as well as protecting information which is being stored or
transferred within a media device.
3.
Media Sanitisation
Reduce the likelihood of a data spill by implementing proper processes for
sanitising—that is, securely overwriting information on—media that is either no
longer required or before reuse.
Approved sanitisation methods provide a high level of assurance that no remnant data is
on the media. Sanitising media before reuse ensures that information is not inadvertently
accessed by an unauthorised individual or protected by insufficient security measures.
Independent verification provides assurance that the process was conducted correctly. It is
important to note that some media is not able to be sanitised because of the way information
is stored, for example microform and printer ribbons.
4.
Media Destruction
Prevent unauthorised access to stored classified or sensitive information by
destroying media that cannot be sanitised—under proper supervision and using
documented procedures, appropriate equipment and waste management and
transportation processes.
Media destruction methods are designed to ensure that recovery of data is impossible or
impractical. There are some types of, and specific circumstances under which, media cannot
be sanitised and therefore, if no longer required, must be destroyed.
40
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : M edia S ecurity
5.
Media Disposal
Minimise the likelihood of a data spill when media is released into the public
domain by declassification and a formal administrative decision to approve its
disposal—by an appropriate authority and according to an agency’s documented
procedures.
Appropriate media disposal practices are essential in ensuring that classified information
is not accidentally disclosed. Media can be disposed of only after it has been sanitised or
destroyed to a point where it no longer contains sensitive or classified information. A formal
administrative decision needs to be made to complete the declassification process and to allow
media to be released into the public domain.
References
Nil.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
41
P rinciples : S oftware S ecurity
Software Security
Rationale
Software may contain flaws and vulnerabilities which are able to be exploited by a malicious
actor. These vulnerabilities can not only be used to gain unauthorised access to classified
or sensitive information, but also to undermine the integrity or availability of an agency’s
information—such as by targeting an agency’s public website to disrupt access or modify its
content for malicious purposes.
DID
D I D YOU
YO U K N
NOW?
OW?
Installing antivirus software and software–based firewalls that limit inbound and outbound
network connections are good first steps in reducing the risk of compromise. However,
software security degrades over time as malicious actors discover new vulnerabilities and
exploits, and these measures cannot be relied upon by themselves to protect workstations.
Ensuring software and operating system patches are up to date, and antivirus and other
security software is appropriately maintained with the latest signatures, helps address new
vulnerabilities as they emerge.
Web applications
are the third
most common
intrusion
vector and are
associated with
more than one
third of total data
loss.17
Agencies can also implement measures to help protect their
systems from unknown vulnerabilities, such as malicious code
not yet identified by antivirus or software vendors.
Restricting the running of applications on a system to only
those that are specifically authorised provides increased
protection against the execution and spread of malware. This
is known as application whitelisting.
Moreover, by limiting the promulgation of information about
what software has been installed on systems, agencies can
help prevent a malicious actor from gaining knowledge of how
to tailor potential attacks to exploit a particular vulnerability.
Database systems contain a wealth of information, and are therefore highly desirable targets
for cyber intruders, as compromising them can have significant and immediate payoffs.
Implementing appropriate security controls will reduce the risk of unauthorised individuals
accessing agency information held in databases, and accordingly reduce the risk involved with
data aggregation.17
Scope
This chapter describes the importance of implementing and maintaining proper software
security on agency systems.
17Verizon, Data Breach Investigations Report, 2012.
42
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : S oftware S ecurity
Principles
1.
Software Security
Maintain the confidentiality, integrity and availability of agency information and
protect against the execution and spread of malware by implementing appropriate
software security measures on systems.
Software vulnerabilities can be exploited by a malicious actor to gain access to agency
information or to undermine its confidentiality, integrity or availability. Measures such as
segregating networks and systems or limiting system privileges will assist in minimising the
spread of malicious code or the damage it could do to an agency’s system. Even though web
applications may only contain information authorised for release into the public domain, it is
important to ensure security measures are incorporated to protect the integrity and availability
of the information and the systems it is hosted on and connected to.
2.
Known Vulnerabilities
DID
D I D YOU
YO U K N
NOW?
OW?
Maximise software effectiveness and minimise vulnerabilities by implementing
and routinely updating preventative measures, such as applying system and
software patches, keeping antivirus signatures up to date and only running
supported software.
3.
In April 2013, more than 600,000
Mac users found themselves
recruited into the global
Flashplayer botnet due to a Java
vulnerability left unpatched on OS
X for far too long. Within weeks,
another vulnerability was found in
Java's secure application sandbox
for versions 5, 6 and 7. This new
exploit put 1 billion devices at
risk.18
Software security will degrade over time as
malicious actors continue to discover new
vulnerabilities and exploits. It is important
that agencies monitor available information
regarding new known vulnerabilities
and apply the security patches released
to address them as part of their risk
management program.
Patching operating systems and applications
are highly effective measures to prevent
malicious actors from exploiting known
vulnerabilities. Accordingly, these are two of
the Top 4 Strategies in ASD’s list of Strategies
to Mitigate Targeted Cyber Intrusions.18
Unknown Vulnerabilities
Maintain the confidentiality, integrity and availability of an agency’s information
by removing, disabling and preventing the execution of unauthorised, unused or
undesired software or software functionality wherever possible.
Restricting access to or disabling unauthorised, unused or undesired software or functionality
effectively limits a malicious actor’s opportunity to exploit software vulnerabilities. Application
whitelisting, which enables only specifically selected applications to be activated, is one of
the most effective approaches in countering unknown risks. An average system user requires
access to only a few applications, or groups of applications, in order to conduct their business.
18Sophos, Security Threat Report 2013, 2013
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
43
P rinciples : S oftware S ecurity
Restricting the user’s permissions to running a limited set of trusted applications significantly
reduces the opportunities available for attacking a system and provides an effective
mechanism to prevent system compromise due to the execution of unauthorised or malicious
software. Accordingly, application whitelisting is one of the Top 4 Strategies in ASD’s list of
Strategies to Mitigate Targeted Cyber Intrusions.
4.
Databases
Protect database systems and their contents from theft, corruption, loss and
unauthorised access by hardening through technical measures, administrator and
user policies and regular audits.
Using supported and patched database software, securely configuring database software and
stringently controlling database access will assist in protecting the contents of databases.
Assessing agency business requirements before storing sensitive information on databases is
imperative, as this can impact an agency’s risk profile. Additionally, removing pre–configured
default settings and placing database servers on a different network segment to agency
corporate workstations will improve database security.
References
Further guidance on ASD’s Strategies to Mitigate Targeted Cyber Intrusions can be found at
www.asd.gov.au/infosec/top35mitigationstrategies.htm.
44
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : E mail S ecurity
Email Security
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Email, because it enables the communication of information into and out of an agency, by
nature is insecure. Poor email security practices and implementation can lead to unauthorised
individuals easily gaining access to sensitive or classified agency information in emails
themselves, or through network compromise. Socially engineered emails are one of the most
common techniques used to spread malware on agency networks. This technique relies on
a user opening a malicious link or attachment. Motivated malicious actors can use these
methods to establish doorways into agency networks, which can result in agency information
being stolen, altered or even made unavailable. Agencies
can minimise their vulnerability to socially engineered
emails by properly implementing, monitoring and
The Public Sector was
maintaining the configuration of email servers, software
the industry most
and email applications. These measures will make it
targeted in August
difficult for malicious emails to enter an agency network
2013, with one in
and be delivered to users.
every 76.7 emails
being a socially–
engineered email.19
However, even with appropriate technical measures
in place, educating users to be aware of the threat of
malicious emails is one of the most important factors in
improving email security.
Scope
This chapter describes the value of the secure implementation and use of email on
agency networks.19
Principles
1.
Email Security
Protect the confidentiality, integrity and availability of information, and ensure
information can only be accessed by those intended and authorised to do so, by
implementing an email usage policy and applying appropriate security controls to
email applications and infrastructure.
Protectively marking all electronic–based information is critical for allowing appropriate
email security measures to be applied. Protective markings go a long way in preventing
unauthorised information from being released into the public domain. Applying appropriate
protective markings to emails will also assist in preventing the confidentiality of information
being inadvertently compromised as a result of activating automatic forwarding of sensitive or
classified emails.
19Symantec, Symantec Intelligence Report June 2011, 2011.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
45
P rinciples : E mail S ecurity
Securely configuring email infrastructure (such as blocking inbound and outbound email
with a protective marking higher than the classification of the receiving system) can protect
against data spills or the potential interception or compromise of information. Implementing
identification controls, such as digital signatures and Sender Policy Framework (SPF), can
also aid in the detection of spoofed emails that may contain malicious code designed to
compromise a network. In the case of SPF, the SPF record specifies a list of IP addresses or
domains that are allowed to send email from a specific domain. If the email server that sent
the email is not in the list, the verification fails.
Email messages are often routed through many email servers when travelling from sender to
recipient. For this reason, it is vital for agencies to put stringent measures in place to check
for malicious content (for instance, through a content filter) and confirm the validity of emails.
Socially engineered emails are one of the most common techniques used to spread malware.
Once technical measures fail, users are the last line of defence in ensuring a socially
engineered email does not lead to malware being installed on a workstation. Agencies need
to ensure their users are aware of the threat and educated on how to detect and report
suspicious emails. It is important, therefore, to implement an agency email usage policy and
communicate agency expectations and processes to their users.
References
Further information on Government–approved email marking standards can be found in
AGIMO’s Email Protective Marking Standard for the Australian Government
www.finance.gov.au/files/2012/04/EPMS2012.3.pdf.
Additionally, the implementation guide for the Email Protective Marking Standard for the
Australian Government is available at
www.finance.gov.au/files/2012/04/email_pmsig.pdf.
46
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : A ccess C ontrol
Access Control
Rationale
Agencies can manage access to system information through appropriate access controls,
restricting system access to authorised and successfully identified and authenticated users.
The automatic logging and subsequent auditing of information relating to network activities
will also increase the likelihood that malicious behaviour will be detected.
DID
D I D YOU
YO U K N
NOW?
OW?
44% of data
breaches are
a result of
exploitation
of default or
guessable
credentials.20
DID
D I D YOU
YO U K N
NOW?
OW?
Giving each user a unique identification ensures accountability and
enables agencies to attribute actions undertaken within a session to
specific personnel. Ensuring that users provide sufficient evidence
to verify their identity can also reduce the likelihood of a malicious
actor successfully masquerading as an authorised user—such as
a social engineering attack aimed at an agency service desk to
request a password reset for a system account.
In 2012, Russian
cybercriminals
posted nearly 6.5
million LinkedIn
passwords on the
Internet. Teams of
hackers had cracked
more than 60% of
these passwords
within days.21
Passwords and passphrases are common authentication techniques
which enable an agency to verify the stated identity of a user.
However, given the ever‑increasing processing power of home
computers, length and complexity requirements for passphrases will also continue to increase
to provide agencies with adequate protection against basic techniques such as brute–force
attacks—a simple six–letter password can be brute‑forced in minutes by software freely
available on the Internet. Agencies can mitigate this by implementing additional authentication
measures, such as multi–factor authentication, which requires the presentation of at least
two different kinds of evidence that someone is who they say they are. This can be achieved
through various means, including biometrics, cryptographic tokens and smartcards.20
Authorisation is the core of access control as it enforces
the need–to–know principle. Authorisation is two–fold.
Firstly, an individual needs to be authorised to have access
to a system, and secondly they need to be authorised
to access specific applications, databases or information
resources on a system. This is often achieved by using
access control lists.
User credentials should be given additional protection to
reduce the risk of a malicious actor finding and using the
information to access a system under the guise of a valid
user.
Scope
This chapter describes the importance of managing user access to system information and the
automatic logging and auditing of network activities.21
20Verizon, 2012 Data Breach Investigations Report, 2012.
21Sophos, Security Threat Report 2013, 2013
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
47
P rinciples : A ccess C ontrol
Principles
1.
Identification and Authentication
Ensure that access to a system is limited to users and devices that are authorised
to access it by adopting appropriate identification and authentication practices
and controls.
Strong identification and authentication mechanisms significantly reduce the risk that
unauthorised users will gain access to a system.
2.
System Access
Protect the confidentiality, integrity and availability of information on systems by
limiting authorisation to those with appropriate security clearances, briefings and a
demonstrated need–to–know.
Managing authorisations of users through the use of access controls on a system helps enforce
the need–to–know principle.
3.
Event Logging and Auditing
Detect and attribute any violations of information security policy—including cyber
security incidents, breaches and intrusions—by maintaining, auditing and ensuring
the availability and integrity of event logs.
DID
D I D YOU
YO U K N
NOW?
OW?
Event logging and auditing helps raise the security posture of a system by increasing the
accountability for all user actions, thereby improving the chances that malicious behaviour will
be detected. Agencies should ensure sufficient detail is recorded in order for the logs to be
useful when reviewed and determine an appropriate length of time for them to be retained.
Conducting audits of event logs should be seen as an integral part of system maintenance,
since they will help detect and attribute any violations of information security policy, including
cyber security incidents, breaches and intrusions. Agencies are required under the Archives Act
1983 to retain event logs and audit trails for a minimum of seven years.22
In 2012, a major data storage site admitted that usernames and passwords stolen
from other websites had been used to sign into a small number of its accounts.
One employee of the site had used the same password for all of their accounts,
including their work account with access to sensitive data. When the password
was stolen elsewhere, the attacker discovered that it could be used against the
data storage site.22
References
Further information on minimum retention periods for Commonwealth records is provided in
the National Archives of Australia’s Administrative Functions Disposal Authority, which can be
found at
www.naa.gov.au/records-management/agency/keep-destroy-transfer/agency-ra/index.aspx.
22Sophos, Security Threat Report 2013, 2013
48
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : S ecure A dministration
Secure Administration
Rationale
Secure enterprise administration allows agencies to be resilient in the face of malicious cyber
intrusions by protecting privileged machines and accounts from compromise, as well as making
an adversary's movement through a network more difficult.
By implementing technical controls and configuring networks to improve administration
security, it is more likely the secure administration system will withstand a cyber intrusion.
This can limit damage and can make incident response far more agile, allowing remediation
work to be completed faster.
Scope
This chapter describes the importance of applying security controls and processes to improve
The security of administrative credentials, infrastructure and actions performed on a network
or system.
Principles
1.
Secure Administration
Increase the level of assurance that administrator activities and credentials will
not be compromised during a malicious cyber intrusion by implementing robust
technical controls and processes.
One of the greatest threats to the security of a network is the compromise of a workstation
used for IT administration. Providing a physically separate workstation with robust technical
controls in place to administrators responsible for critical assets, in addition to their
workstation used for unprivileged access, provides greater assurance that administrator
activities and credentials will not be compromised.
References
Nil. 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
49
P rinciples : C ryptography
Cryptography
Rationale
Cryptography is primarily used to restrict access to information to authorised users. First and
foremost, encryption improves confidentiality, providing protection to classified or sensitive
information by making it unreadable to all but authorised users.
More broadly, cryptography can also provide:
•
Data integrity: protecting information from accidental or deliberate manipulation. It
provides users with assurance that information has not been modified.
•
Authentication: ensuring that a person or entity is who they claim to be. A robust
authentication system is essential for protecting access to IT systems.
•
Non–repudiation: proof that a user performed an action, such as sending a message,
and preventing them from denying that they did so.
Using approved encryption does not reduce the consequences of a successful attack and, in
effect no real–world product can ever be guaranteed to be free of vulnerabilities.
DID
D I D YOU
YO U K N
NOW?
OW?
Before approving cryptographic algorithms for use, ASD conducts a meticulous evaluation of
those already scrutinised by industry and academic communities in a practical and theoretical
setting, which have not been found to be susceptible to any feasible attacks. However, there
can be no guarantee of security against presently unknown attacks. It is vital that agencies
remain aware of what is possible as the information technology environment continues to
develop and change.
A survey in 2008
conducted by the
Identity Theft Resource
Centre found that
82% of respondents
who had lost data
said that encryption
could have prevented
the data from being
compromised.
Using any cryptographic product, algorithm or protocol
is not sufficient in itself to adequately reduce the
likelihood of compromise. Unapproved or inappropriately
configured cryptographic algorithms and protocols can
carry a significant level of risk. In particular, installing
a cryptographic capability can increase security
confidence within an agency and change user behaviour
by promoting the view that more sensitive or classified
information is now able to be stored and communicated
securely. If this capability is poorly configured, it can lead
to an actual reduction in overall security, as the system
may be used to carry more sensitive information with
little to no genuine improvement to security.
Further, some common protocols have known impacts on other security operations, for
example, restricting an agency’s ability to inspect encrypted messages and attachments for
inappropriate content, or scan files for viruses and malicious code. To maximise the benefit of
cryptographic capabilities, agencies should only use ASD Approved Cryptographic Algorithms
and Protocols, ensuring that they are configured appropriately, and be aware of any known
restrictions or vulnerabilities.
50
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : C ryptography
Scope
This chapter describes the use of ASD Approved Cryptographic Algorithms and Protocols to
encrypt information, and the management of cryptographic systems.
Principles
1.
Protecting Information at Rest
Maintain the confidentiality and integrity of classified or sensitive information at
rest using an appropriate ASD Approved Cryptographic Algorithm.
Encrypting information at rest can be used to reduce physical storage and handling
requirements, as well as maintain its confidentiality.
2.
Protecting Information in Transit
Maintain the confidentiality and integrity of classified or sensitive information in
transit using ASD Approved and appropriately configured Cryptographic Protocols
implementing an ASD Approved Cryptographic Algorithm.
Encrypting information in transit, using ASD Approved Cryptographic Protocols which
implement an ASD Approved Cryptographic Algorithm, can be used to protect classified or
sensitive information being communicated over unclassified or public networks. Unapproved
or incorrectly configured cryptographic protocols, in combination with an assumed level of
security confidence, can represent a significant security risk.
3.
Availability of Information
Ensure encrypted information is accessible to those that require it when they
require it by implementing appropriate procedures and controls for data recovery.
Cryptographic products which provide a means of data recovery can allow for retrieval of
information in circumstances where the encryption key is unavailable due to loss, damage
or failure.
4.
Management of Cryptographic Systems
Maintain the integrity of cryptographic systems, and hence the confidentiality and
integrity of the information being protected, by applying appropriate governance
and personnel and physical security measures.
Appropriate security measures are crucial in safeguarding cryptographic systems and their
material from compromise.
References
ASD Approved Cryptographic Algorithms and Protocols are listed in the Cryptography chapter
of the ISM Controls manual.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
51
P rinciples : N etwork S ecurity
Network Security
Rationale
DID
D I D YOU
YO U K N
NOW?
OW?
Agency networks can contain sensitive, classified and business–critical information and
services. Malicious actors look for ways to exploit weaknesses in an agency’s network to gain
unauthorised access, disrupt legitimate access, or modify such information and services. If
a malicious actor has limited opportunities to connect to a given network, they have limited
opportunities to compromise that network.
In 2011,
94% of
all data
compromised
involved
servers.23
Agencies can structure and configure their networks to reduce the
number of potential entry points that could be used by a malicious
actor to gain unauthorised access to information or disrupt agency
services.
It is also important to consider not just the risks from
vulnerabilities in an agency controlled network, but also in external
networks. For instance, when devices connect to non–agency
controlled wireless networks, particularly public wireless networks,
they may be exposed to viruses, malware or other malicious code
circulating on the network. If the device becomes infected and is
later connected to an agency controlled network then malicious code can enter the network
and steal sensitive information or disrupt the agency’s systems.23
Scope
This chapter describes the importance of securely deploying, configuring and managing
network devices and infrastructure.
Principles
1.
Network Management
Ensure all sections of an agency’s network comply with information security
policies, and that network vulnerabilities are identified and addressed, by adopting
appropriate network management practices.
Central management will help ensure that all sections of the network comply with information
security policies. Network documentation, that is updated as changes are made, will assist
system administrators to completely understand and adequately protect the network.
Appropriate intrusion detection and prevention mechanisms and the logging of network
activity, such as recording the occurrence of blocked emails or monitoring suspicious network
traffic, can assist agencies to prevent, detect and respond to cyber security incidents. Regular
audits, security reviews and vulnerability analysis activities can assist agencies in avoiding
security degradation over time as the information technology and threat environment evolves.
Transferring data between systems in a controlled and accountable manner can reduce the risk
of data spills and introduction of malicious code to a system.
23 McAffee Labs, McAffee Threats Report: First Quarter 2013, 2013.
52
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : N etwork S ecurity
2.
Network Design and Configuration
Reduce opportunities for a malicious actor to compromise or gain unauthorised
access to sensitive or classified information through the secure design and
configuration of agency networks.
Implementing strong network authentication controls and minimising unnecessary access
points (for instance, by disabling unused physical ports, filtering unnecessary content and
applying network access controls) will reduce the opportunities from which an attack could
be launched.
DID
D I D YOU
YO U K N
NOW?
OW?
Agencies should be aware of the inherent risks in connecting specific devices to a network.
For instance, softphones (software applications which allow a workstation to act as a VoIP
phone, such as Skype) can introduce additional vulnerabilities into the network as they do not
separate voice from data, as hardware–based IP phones do. This can provide a malicious actor
with access to an agency’s voice network via their data network.
During September and October 2012, a series of Distributed Denial of Service
(DDoS) attacks on U.S—based financial institutions prevented legitimate bank
customers from accessing their websites for hours in some severe cases. The
2013 Cisco Annual Security Report described these attacks as ‘premeditated,
focused, advertised before the fact, and executed to the letter.’ 24
When using wireless networks, network segregation, changing default settings, authentication,
encryption and securing devices used to access wireless networks will significantly reduce the
risk of compromise.24
Scanning imported data for malicious content reduces the risk of a system being infected, thus
maintaining its confidentiality, integrity and availability.
3.
Network Infrastructure
Maintain the confidentiality, integrity and availability of information by applying a
defence–in–depth approach to the secure deployment of network infrastructure.
Minimising network complexity and physically separating sections of a network can reduce the
number of potential access points that could be used to gain unauthorised access to sensitive
or classified information, and makes it difficult for an intruder to propagate once inside the
network. Physically or logically separating sections of a network can also help ensure the
availability of information and services when other sections of the network may have been
affected — by a Distributed Denial of Service attack for example (an attempt to flood networks
with unwanted traffic to disrupt or degrade services). Further, building redundancies into an
agency’s network, for example through the use of multiple internet links, can help increase the
complexity required for a successful Distributed Denial of Service attack, as well as increasing
the agency’s response options.
24Verizon, 2012 Data Breach Investigations Report, 2012.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
53
P rinciples : N etwork S ecurity
Separating sections of a network is essential to enable agencies to implement a defence–
in–depth approach to network security. Network segmentation is one of the most effective
methods to prevent a cyber intruder from propagating inside a network. If implemented
correctly, it can be significantly more difficult for an intruder to find and access their target
information and move undetected around the network. Logging functionality in network
segmentation technologies can prove extremely valuable in detecting an intrusion and, in the
event of a compromise, isolating a compromised device from the rest of the network.
References
Nil.
54
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : C ross D omain S ecurity
Cross Domain Security
Rationale
Connecting a security domain to another security domain, which includes connecting to the
Internet, poses significant risks to an agency’s information. Gateways and cross domain
security measures can mitigate these risks by securely managing data flows between different
security domains.
Applying robust security measures including content filters and firewalls to gateway systems
will reduce the risk of malicious content entering the security domain or information being
accessed by those unauthorised to do so. Physically locating all gateway components inside an
appropriately secure area also reduces the risk of unauthorised access to the devices. Further,
providing a sufficient logging and audit capability can assist an agency in detecting and
responding to cyber security incidents and attempted network intrusions, allowing the agency
to implement countermeasures to reduce the risk of future attempts.
Scope
This chapter describes the importance of securely transferring information to and from a
security domain through a gateway, including using cross domain solutions.
Principles
1.
Gateway Security
Protect the confidentiality, integrity and availability of information on agency
networks by appropriately deploying and configuring gateways.
Given the criticality of gateways in controlling the flow of information between security
domains, poor configuration or management of a gateway can have serious consequences,
potentially providing a malicious actor with access to an agency’s entire network.
2.
Cross Domain Security
Ensure the secure transfer of information between security domains with a high
level of assurance by implementing security–enforcing mechanisms.
Connecting systems with differing security policies poses significant risks. For classified
networks, using a cross domain solution comprising ASD evaluated products will help
protect the confidentiality, integrity and availability of information being transferred between
security domains.
3.
Maintenance and Review
Identify and mitigate security risks as early as possible by maintaining and regularly
reviewing gateway architecture. This includes undertaking routine testing and
regular security risk assessments and ensuring that any residual risks are accepted.
Changes to a security domain connected to a gateway can potentially affect the security
posture of other connected security domains.
References
Nil.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
55
P rinciples : D ata T ransfers and C ontent F iltering
Data Transfers and Content Filtering
Rationale
When data is moved from one security domain to another there is a risk of intentionally or
unintentionally causing a data spill or allowing malicious or unauthorised content to enter
a security domain. Two activities help reduce the risk of unauthorised or malicious content
transiting the boundary: implementing a data transfer policy which ensures that content leaves
a security domain in a secure manner and, applying content filtering which allows security
policies to be run on material entering and leaving a security domain.
Scope
This chapter describes the importance of performing data transfers and content filtering in a
secure manner.
Principles
1.
Data Transfers
Mitigate the risk of data spills of sensitive or classified information to systems not
accredited to handle the data by having a policy governing data transfers and a
procedure in place for authorising and importing or exporting the data to a system.
A data transfer authorisation system will not only hold users accountable for data they transfer
between systems but give agencies an opportunity to scan the data for malicious and active
content and check that the classification of the data is appropriate for the destination system.
2.
Content Filtering
Implement content filtering techniques to reduce the risk of unauthorised or
malicious content transiting a security domain boundary.
Blocking or allowing data transiting a security domain boundary based on its content can
increase the level of assurance that information transiting a security domain is legitimate
and benign. There are a number of techniques that may constitute content filtering, both to
prevent suspicious data and malicious content from entering a security domain and to restrict
the export of data to appropriate content.
References
Nil.
56
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : W orking O ff – S ite
Working Off–Site
Rationale
The use of mobile devices has become essential to everyday communication. Mobile devices
can provide employees with access to email, the Internet and even agency systems, allowing
them to work from home, an airport lounge or hotel room. They provide greater accessibility,
mobility, convenience and, importantly, efficiency.
While agencies should naturally embrace the potential of mobile devices, it is important to
understand and evaluate the risks associated with their use and how they impact an agency’s
security risk profile.
Once a mobile device leaves a controlled office environment, it also leaves behind the
protection that environment affords. Some of the best qualities of mobile devices, such as
their portability and capacity for use outside the office, have introduced new risks. The more
capable these devices are of helping users access and use data, the more capable they are of
being manipulated by malicious actors for the same end.
Poorly controlled mobile devices are particularly vulnerable to loss and compromise, and may
provide a malicious actor with an access point into an agency’s system. For instance, users
who access websites and web–based email from their mobile devices can make themselves
vulnerable to Internet–based threats, such as malware. The employee can then inadvertently
expose the corporate network to these threats when he or she connects to the agency’s
system from the same device. Further, agencies that allow business use of personal mobile
devices can introduce significant risks to their information, as personal devices often do
not have sufficient inbuilt security features enabled, such as authentication controls and
encryption. These risks apply equally for workstations installed for home–based work. Privacy
rights should also be considered by agencies permitting the use of personal devices for
business purposes, as access to records in the event of an incident can be restricted due to
privacy concerns.
Agencies must also consider their obligations under relevant legislation, such as government
data retention requirements under the Archives Act 1983.
It is important for agencies to identify the circumstances where the liability and security risks
of using mobile devices outweigh the benefits. In particular, mobile devices carrying highly
classified information should not be used outside of appropriately certified facilities, as the risk
of classified information being overheard or observed is considered too high.
Although mobile networking alters the risks associated with various threats to security,
the overall security objectives remain the same as with wired networks: maintaining
confidentiality, integrity and availability of systems and their information. To reduce the risks of
use, it is critical that agencies develop and implement policies to ensure users protect mobile
devices in an appropriate manner when they are used outside controlled facilities, and that
personnel working from home or outside the office protect information in the same manner as
in the office environment.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
57
P rinciples : W orking O ff – S ite
Scope
This chapter describes managing the use of mobile devices and accessing information from
unsecured locations and home environments.
Principles
1.
Acceptable Use
Prevent mobile devices from becoming a security risk to the system or network
they connect to by implementing, and educating personnel on, an effective mobile
device usage policy.
DID
D I D YOU
YO U K N
NOW?
OW?
Information being communicated via a mobile device outside a controlled facility can be more
easily overheard or observed by those not authorised to do so. An agency policy governing
the use of mobile devices can help build awareness of the elevated risks relating to their use,
and ensure confidentiality and integrity of information is maintained. Under an acceptable use
policy, personnel need to know the classification of information which the device has been
approved to process or communicate before use.25
A Symantec
study found a
25% increase in
the number of
vulnerabilities in
mobile devices
between 2011 and
2012.25
Using mobile devices for both personal and business
purposes can make them more susceptible to Internet–
based threats. For instance, during personal web–
browsing, personnel are more likely to open unidentified
links or visit unfamiliar sites, which can bring about the
spread of malware. Users also need to be aware that
mobile applications can contain malicious code or malicious
content that is installed along with the legitimate software.
Malware can provide an entry route into the associated
business network as well as access to information stored
or communicated on the mobile device.
Connecting mobile devices to an unknown or untrusted source (for charging or to provide
network connectivity) can also pose a security risk to an agency. For example, if a smartphone
is plugged into an unknown computer via a USB cable to charge, then the contents of the
device could be compromised or malware loaded onto the device. For the same reason,
agency users should not allow unknown or untrusted people to connect a mobile device to
their laptop.
2.
Mobile Device Configuration
Limit situations, or mitigate the consequences of situations, where a user loses
control over a mobile device by securely configuring the device and implementing
appropriate processes.
Most mobile devices have been designed for use outside the office and thus can be more
easily accessed or stolen. Emergency destruction procedures and lost device labels can help
reduce the risk of data spills when a mobile device is lost or compromised.
Proper encryption technology can enhance the security of information stored on a mobile
device and help protect sensitive or classified information being communicated wirelessly or
over unsecured public infrastructure from unauthorised access.
25 Symantec Corporation, Internet Security Threat Report 2013, 2013.
58
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
P rinciples : W orking O ff – S ite
3.
Wireless Communications and Connectivity
DID
D I D YOU
YO U K N
NOW?
OW?
Protect sensitive or classified information from unauthorised access by only enabling
wireless communications on a mobile device that are needed and can be secured.
4.
More than 200,000 mobile
phones are reported lost
or stolen each year in
Australia. This equates
to 4,000 each week, or
one mobile phone every 3
minutes.26
Wireless networks do not have the inbuilt physical
security of wired networks, providing malicious
actors with greater opportunities to connect to
agency networks remotely. The wireless transfer
of information, for instance through Bluetooth,
infrared or Wi–Fi, can serve as an illicit entry point
for an entire network. When using public wireless
access points, malicious actors can easily intercept
information being communicated, including secure
log–on details, using basic software available on
the Internet.
Upkeep and Maintenance
Maintain the integrity and confidentiality of the information stored or communicated
on a mobile device by conducting regular audits and security updates.
Although agencies may initially provide a secure mobile device, the state of security may
degrade over time. It is important for agencies to remain aware of new vulnerabilities as
the information technology environment evolves. Keeping security software up to date
will protect the mobile device from new variants of malware and viruses that threaten an
agency’s critical information.26
5.
Working From Home
Prevent systems or mobile devices from becoming a weak link in an agency
system’s security by ensuring that home environments used for business purposes
meet the minimum security requirements in the Australian Government Physical
Security Management Protocol of the Australian Government Protective Security
Policy Framework.
If sensitive or classified information is being accessed by personnel working from home,
specifically when information systems and devices are used, it needs to be afforded the same
protection as in the office environment.
References
Information relating to physical security is contained in the Australian Government Physical
Security Management Protocol of the Protective Security Policy Framework, which can be found
at www.protectivesecurity.gov.au.
For further information on working from home see the Australian Government Physical Security
Management Guidelines—Working Away From the Office, which can be found at
www.protectivesecurity.gov.au.
Information on enterprise mobility considerations can be found in ASD’s Protect publication
Risk Management of Enterprise Mobility including Bring Your Own Device (BYOD) at
www.asd.gov.au.
26 Australian Mobile Telecommunications Association, FAQs on Mobile Security, found at www.amta.org.au.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
59
SUPPORTING
INFORMATION
61
S U P P O RT I N G I N F O R M AT I O N
Supporting Information
Glossary of Terms
TERM
MEANING
access control
Enabling the authorised use of a resource while preventing
unauthorised use or use in an unauthorised manner.
accreditation
A procedure by which an authoritative body gives formal
recognition, approval and acceptance of the associated residual
security risk with the operation of a system.
accreditation authority
The authoritative body associated with accreditation
activities. Advice on who should be recognised as an agency's
accreditation authority can be found in the Conducting
Accreditation section of the ISM Controls manual.
agency
Includes all Australian government departments, authorities,
agencies or other bodies established in relation to public
purposes, including departments and authorities staffed under
the Public Service Act 1999, the Financial Management and
Accountability Act 1997 or the Commonwealth Authorities and
Companies Act 1997.
agency head
The government employee with ultimate responsibly for the secure
operation of agency functions, whether performed in–house
or outsourced.
application whitelisting
An approach in which all executables and applications are
prevented from running by default, with an explicitly defined set
of executables allowed to execute.
audit
An independent review of validity, accuracy and reliability of
information contained on a system. In the context of conducting
system accreditations, an audit is an examination and
verification of an agency’s systems and procedures, measured
against predetermined standards.
Australiasian
Information Security
Evaluation
Program (AISEP)
A program under which evaluations are performed by impartial
companies against the Common Criteria. The results of these
evaluations are then certified by ASD, which is responsible for
the overall operation of the program.
authentication
Verifying the identity of a user, process or device as a
prerequisite to allowing access to resources in a system.
availability
The assurance that systems are available and accessible by
authorised entities when required.
62
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
S U P P O RT I N G I N F O R M AT I O N
TERM
MEANING
certification
A procedure by which a formal assurance statement is given that
a deliverable conforms to a specified standard.
certification authority
An official with the authority to assert that a system complies
with prescribed controls in a standard.
classification
The categorisation of information or systems according to the
business impact level associated with information or a system.
classified information
Government information that requires protection from
unauthorised disclosure.
confidentiality
The assurance that information is disclosed only to
authorised entities.
cross domain solution
An information security system capable of implementing
comprehensive data flow security policies with a high level of
trust between two or more differing security domains.
cryptographic algorithm
An algorithm used to perform cryptographic functions such as
encryption, integrity, authentication, digital signatures or key
establishment.
cryptographic protocol
An agreed standard for secure communication between two or
more entities to provide confidentiality, integrity, authentication
and non–repudiation of information.
cyber security
Security measures relating to the confidentiality, availability
and integrity of information that is processed, stored and
communicated by electronic or similar means.
cyber security event
An identified occurrence of a system, service or network state
indicating a possible breach of information security policy or
failure of safeguards, or a previously unknown situation that may
be security relevant.
cyber security incident
A single or a series of unwanted or unexpected cyber security
events that have a significant probability of compromising
business operations and threatening information security.
Cyber Security Incident
Reporting scheme
A scheme established by ASD to collect information on cyber
security incidents that affect government systems.
data spill
The accidental or deliberate exposure of classified, sensitive
or official information into an uncontrolled or unauthorised
environment or to persons without a need–to–know.
emanation security
The countermeasure employed to reduce classified emanations
from a facility and its systems to an acceptable level. Emanations
can be in the form of radio frequency energy, sound waves or
optical signals.
declassification
A process whereby information is reduced to an unclassified state
and an administrative decision is made to formally authorise its
release into the public domain.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
63
S U P P O RT I N G I N F O R M AT I O N
TERM
MEANING
Distributed Denial of
Service (DDoS)
The compromise of availability of IT systems, where multiple
systems are used to compromise the targeted systems.
firewall
A system designed to prevent unauthorised access to or from a
network or system.
gateway
Gateways securely manage data flows between connected
networks from different security domains. Refer to the Cross
Domain Security chapter of ISM Controls manual for further
information.
handling requirements
An agreed standard for the storage and dissemination of
classified or sensitive information to ensure its protection. This
can include electronic information, paper–based information or
media containing information.
hardware
A generic term for any physical component of information and
communication technology.
ICT system
A related set of hardware and software used for the processing,
storage or communication of information and the governance
framework in which it operates.
infrared device
Devices such as mice, keyboards, pointing devices and mobile
devices that have an infrared communications capability.
information security
The protection of information and information systems from
unauthorised access, use, disclosure, disruption, modification or
destruction in order to provide confidentiality, integrity
and availability.
Information Security
Registered Assessor
Program
An ASD initiative designed to register suitably qualified
information security assessors to carry out specific types of
security assessments, including for gateways and information
systems up to the SECRET classification level.
integrity
The assurance that information is unmodified.
malware
Malicious software used to gain unauthorised access to
computers, steal information and disrupt or disable networks.
Types of malware include logic bombs, trapdoors, Trojans,
viruses and worms.
media
A generic term for hardware that is used to store information,
such as USB sticks, portable hard drives, CDs and DVDs.
media destruction
The process of physically damaging the media with the objective
of making the data stored on it inaccessible. To destroy media
effectively, only the actual material in which the data is stored
needs to be destroyed.
media disposal
The process of relinquishing control of media when no longer
required, in a manner that ensures that no data can be recovered
from the media.
64
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
S U P P O RT I N G I N F O R M AT I O N
TERM
MEANING
media sanitisation
The process of erasing or overwriting data stored on media so
the data cannot be retrieved or reconstructed.
metadata
Information that describes data. This can include how the data
was created, the time and date of creation, the author of the
data and the location on a network where the data was created.
mobile device
A portable computing or communications device with information
storage capability that can be used from a non–fixed location.
Mobile devices include mobile phones, smartphones, portable
electronic devices, personal digital assistants, laptops, netbooks,
tablet computers and other portable Internet–connected devices.
multifunction devices
The class of devices that combines printing, scanning, copying,
faxing or voice messaging functionality in the one device.
These devices are often designed to connect to computer and
telephone networks simultaneously.
need–to–know
The principle of telling a person only the information they require
to fulfil their role.
network device
Any device designed to facilitate the communication of
information destined for multiple users. For example:
cryptographic devices, firewalls, routers, switches and hubs.
network infrastructure
The infrastructure used to carry information between
workstations and servers or other network devices.
patch
A piece of software designed to fix problems with, or update,
a computer program or its supporting data. This includes fixing
security vulnerabilities and other program deficiencies and
improving the usability or performance of the software.
Protective Security Policy
Framework (PSPF)
Produced by the Attorney–General’s Department, the Australian
Government Protective Security Policy Framework sets out the
Australian Government’s protective security requirements for the
protection of its people, information and assets (replaced
the PSM).
product
Technology, whether hardware or software, which enables the
electronic storage, retrieval, manipulation, transmission or receipt
of information in a digital form.
reaccreditation
A procedure by which an authoritative body gives formal
recognition, approval and acceptance of the associated residual
security risk with the continued operation of a system.
risk
The chance of something happening that will affect objectives—it
is measured in terms of event likelihood and consequence.
risk acceptance
An informed decision to accept risk.
risk analysis
The systematic process to understand the nature, and deduce
the level, of risk.
2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L | P R I N C I P L E S
65
S U P P O RT I N G I N F O R M AT I O N
TERM
MEANING
risk appetite
Statements that communicate the expectations of an agency’s
senior management about the agency’s risk tolerance—these
criteria help an agency identify risk and prepare appropriate
treatments, and provide a benchmark against which the success
of mitigations can be measured.
risk management
The process of identifying risk, assessing risk, and taking steps
to reduce risk to an acceptable level.
risk mitigation
Actions taken to lessen the likelihood, negative consequences, or
both, associated with a risk.
residual risk
The remaining level of risk after risk treatments have
been implemented.
security domain(s)
A security domain is a system or collection of systems operating
under a security policy that defines the security to be applied
to information on the system or systems. That security may be
represented by a classification, caveat or releasability marking
with or across classifications.
sensitive information
Either unclassified or classified information identified as requiring
extra protections (e.g. compartmented or Dissemination Limiting
Marker information).
softphone
A software application that allows a workstation to act as a Voice
over Internet Protocol (VoIP) phone, using either a built–in or an
externally connected microphone and speaker (e.g. Skype).
system
A related set of hardware and software used for the processing,
storage or communication of information and the governance
framework in which it operates.
threat
Any circumstance or event with the potential to harm an
information system through unauthorised access, destruction,
disclosure, modification of data, and/or denial of service. Threats
arise from human actions and natural events.
user
An entity authorised to access an information system.
vulnerability
In the context of information security, a vulnerability is
a weakness in system security requirements, design,
implementation or operation that could be accidentally triggered
or intentionally exploited and result in a violation of the system’s
security policy.
wireless access point
A device which enables communications between wireless clients.
It is typically also the device which connects the wireless local
area network to the wired local area network.
workstation
A stand–alone or networked single–user computer.
66
P R I N C I P L E S | 2 0 1 4 I N F O R M AT I O N S E C U R I TY M A N U A L
asd.gov.au
ASD | REVEAL THEIR SECRETS—PROTEC T OUR OWN