Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet...

29

Transcript of Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet...

Page 1: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional
Victor
Sample
Page 2: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

1 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Table of Contents

Security - Introduction .............................................................................................................. 7 Scope ............................................................................................................................................. 8 Objective ........................................................................................................................................ 9 Applicability ..................................................................................................................................... 9 Best Practices ................................................................................................................................ 10 Web Site Security Flaws ................................................................................................................. 15 ISO 27000 Compliance Process ...................................................................................................... 17 Security General Policy ................................................................................................................... 19 Responsibilities .............................................................................................................................. 22

Minimum and Mandated Security Standard Requirements .................................................... 25 ISO Security Domains .................................................................................................................... 26 ISO 27000 ..................................................................................................................................... 27 Gramm-Leach-Bliley (Financial Services Modernization Act of 1999 ................................................... 33 FTC Information Safeguards ........................................................................................................... 33 Federal Information Processing Standard – FIPS 199 ....................................................................... 34 NIST SP 800-53 ............................................................................................................................. 38 Sarbanes-Oxley Act ........................................................................................................................ 39 California SB 1386 Personal Information Privacy .............................................................................. 39 California Consumer Privacy Act – 2018 .......................................................................................... 39 Massachusetts 201 CMR 17.00 Data Protection Requirements .......................................................... 40 What Google and Other 3rd Parties Know ........................................................................................ 41 Internet Security Myths .................................................................................................................. 42

Vulnerability Analysis and Threat Assessment ....................................................................... 44 Threat and Vulnerability Assessment Tool ....................................................................................... 45 Evaluate Risk ................................................................................................................................. 49

Risk Analysis – IT Applications and Functions ........................................................................ 51 Objective ...................................................................................................................................... 51 Roles and Responsibilities .............................................................................................................. 52 Program Requirements .................................................................................................................. 53 Frequency ..................................................................................................................................... 53 Relationship to Effective Security Design ......................................................................................... 53 Selection of Safeguards .................................................................................................................. 53 Requests for Waiver ...................................................................................................................... 54 Program Basic Elements ................................................................................................................. 54

Staff Member Roles ................................................................................................................. 58 Basic Policies ................................................................................................................................. 59 Security - Responsibilities ............................................................................................................... 60 Determining Sensitive Internet and Information Technology Systems Positions ................................. 61 Personnel Practices ........................................................................................................................ 62 Education and Training .................................................................................................................. 65 Contractor Personnel ..................................................................................................................... 66

Page 3: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 2 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Physical Security ..................................................................................................................... 67 Information Processing Area Classification ....................................................................................... 67 Classification Categories ................................................................................................................. 68 Access Control ............................................................................................................................... 69 Levels of Access Authority .............................................................................................................. 70 Access Control Requirements by Category ....................................................................................... 71 Implementation Requirements ........................................................................................................ 71 Protection of Supporting Utilities ..................................................................................................... 72

Facility Design, Construction, and Operational Considerations .............................................. 73 Building Location ........................................................................................................................... 73 External Characteristics .................................................................................................................. 74 Location of Information Processing Areas ........................................................................................ 75 Construction Standards .................................................................................................................. 75 Water Damage Protection .............................................................................................................. 76 Air Conditioning ............................................................................................................................. 76 Entrances and Exits ....................................................................................................................... 77 Interior Furnishings ....................................................................................................................... 77 Fire ............................................................................................................................................... 78 Electrical ....................................................................................................................................... 82 Air Conditioning ............................................................................................................................. 83 Remote Internet and Information Technology Workstations ............................................................. 83 Lost Equipment ............................................................................................................................. 84 Training, Drills, Maintenance, and Testing ....................................................................................... 85

Media and Documentation ...................................................................................................... 86 Data Storage and Media Protection ................................................................................................. 86 Documentation .............................................................................................................................. 87

Data and Software Security .................................................................................................... 89 Resources to Be Protected ............................................................................................................. 89 Classification ................................................................................................................................. 91 Rights ........................................................................................................................................... 93 Access Control ............................................................................................................................... 94 Internet / Intranet / Terminal Access / Wireless Access.................................................................... 98 Spyware ...................................................................................................................................... 100 Wireless Security Standards ......................................................................................................... 102 Logging and Audit Trail Requirements ........................................................................................... 104 Satisfactory Compliance ............................................................................................................... 107 Violation Reporting and Follow-Up ................................................................................................ 107

Internet and Information Technology Contingency Planning .............................................. 108 Responsibilities ............................................................................................................................ 108 Information Technology ............................................................................................................... 109 Contingency Planning................................................................................................................... 110 Documentation ............................................................................................................................ 110 Contingency Plan Activation and Recovery .................................................................................... 111 Disaster Recovery / Business Continuity and Security Basics ........................................................... 112

Page 4: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 3 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Insurance Requirements ....................................................................................................... 116 Objectives ................................................................................................................................... 116 Responsibilities ............................................................................................................................ 116 Filing a Proof of Loss ................................................................................................................... 117 Risk Analysis Program .................................................................................................................. 117 Purchased Equipment and Systems ............................................................................................... 118 Leased Equipment and Systems ................................................................................................... 118 Media ......................................................................................................................................... 119 Business Interruption ................................................................................................................... 119 Staff Member Dishonesty ............................................................................................................. 120 Errors and Omissions ................................................................................................................... 120

Security Information and Event Management (SIEM) .......................................................... 121 Best Practices for SIEM ................................................................................................................ 122 KPI Metrics for SIEM .................................................................................................................... 123

Identity Protection ................................................................................................................ 124 Identifying Relevant Red Flags ..................................................................................................... 124 Preventing and Mitigating Identity Theft ....................................................................................... 124 Updating the Program .................................................................................................................. 125 Methods for Administering the Program ........................................................................................ 125

Ransomware – HIPAA Guidance ........................................................................................... 126 Required response ....................................................................................................................... 127

Outsourced Services .............................................................................................................. 128 Responsibilities ............................................................................................................................ 129 Outside Service Providers – Including Cloud .................................................................................. 130

Waiver Procedures ................................................................................................................ 132 Purpose and Scope ...................................................................................................................... 132 Policy .......................................................................................................................................... 132 Definition .................................................................................................................................... 132 Responsibilities ............................................................................................................................ 132 Procedure ................................................................................................................................... 133

Incident Reporting Procedure ............................................................................................... 134 Purpose & Scope ......................................................................................................................... 134 Definitions ................................................................................................................................... 134 Responsibilities ............................................................................................................................ 134 Procedure ................................................................................................................................... 135 Analysis/Evaluation ...................................................................................................................... 136

Access Control Guidelines ..................................................................................................... 137 Purpose & Scope ......................................................................................................................... 137 Objectives ................................................................................................................................... 137 Definitions of Access Control Zones .............................................................................................. 138 Responsibilities ............................................................................................................................ 138 Badge Issuance ........................................................................................................................... 141

Page 5: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 4 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Appendix - A .......................................................................................................................... 143 Attached Job Descriptions ............................................................................................................ 143

Chief Security Officer (CSO) Chief Compliance Officer (CCO)

Attached Policies ......................................................................................................................... 143 Blog and Personal Website Policy Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy Mobile Device Policy Physical and Virtual File Server Security Policy Sensitive Information Policy - Credit Card, Social Security, Employee, and Customer Data Travel and Off-Site Meeting Policy

Attached Security Forms .............................................................................................................. 144 Application & File Server Inventory Blog Policy Compliance Agreement BYOD Access and Use Agreement Company Asset Employee Control Log Email Employee Agreement Employee Termination Procedures and Checklist FIPS 199 Assessment Internet Access Request Form Internet and Electronic Communication Employee Agreement Internet use Approval Mobile Device Access and Use Agreement Mobile Device Security and Compliance Checklist New Employee Security Acknowledgment and Release Outsourcing and Cloud Security Compliance Agreement Outsourcing Security Compliance Agreement Preliminary Security Audit Checklist Privacy Compliance Policy Acceptance Agreement Risk Assessment (pdf & docx) Security Access Application Security Audit Report Security Violation Procedures Sensitive Information Policy Compliance Agreement Server Registration Social networking Policy Compliance Agreement Telecommuting Work Agreement Text Messaging Sensitive Information Agreement Threat and Vulnerability Assessment Inventory

Additional Attached Materials ....................................................................................................... 145 Business and IT Impact Questionnaire Threat and Vulnerability Assessment Tool Sarbanes-Oxley Section 404 Check List Excel Spreadsheet

Page 6: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 5 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Appendix - B .......................................................................................................................... 146 Practical Tips for Prevention of Security Breaches and PCI Audit Failure .......................................... 146 Risk Assessment Process .............................................................................................................. 151 Employee Termination Process ..................................................................................................... 154 Security Management Compliance Checklist .................................................................................. 158 Massachusetts 201 CMR 17 Compliance Checklist .......................................................................... 161 User/Customer Sensitive Information and Privacy Bill of Rights ....................................................... 163 General Data Protection Regulation (GDPR) - Checklist .................................................................. 164 HIPAA Audit Program Guide ......................................................................................................... 168 ISO 27000 Security Process Audit Checklist ................................................................................... 173 Firewall Security Requirements ..................................................................................................... 189 Firewall Security Policy Checklist ................................................................................................... 191 BYOD and Mobile Content Best of Breed Security Checklist ............................................................ 192

Revision History .................................................................................................................... 194

Page 7: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 7 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Security - Introduction

This document defines a formal, ENTERPRISE wide program intended to protect Information and data, including Internet and Information Technology systems, resources and assure their availability to support all ENTERPRISE operations.

All elements of the ENTERPRISE Security Program should be structured to minimize or prevent damage, which might result from accidental or intentional events, or actions that might breach the confidentiality of ENTERPRISE records, result in fraud or abuse, or delay the accomplishment of ENTERPRISE operations.

The objective of the ENTERPRISE Security Program is to achieve an effective and cost-beneficial security posture for the enterprise's Internet and Information Technology systems. Attainment of this objective requires a balanced combination of problem recognition, resources, and policy to implement an effective program.

The information in this manual:

Applies to all systems 1 and must be considered from a total-system perspective (i.e., the protection of information must be considered from its origination to its final destruction, to include all processes affecting the information)

Should be considered as the minimum standard for all systems and supporting manual activities

Establishes security policies, assigns responsibilities and prescribes procedures for the development and maintenance of ENTERPRISE wide security

Describes the ENTERPRISE security program Complies with the intent of prevailing privacy legislation regarding safeguards and with

certain sections of the foreign corrupt practices act

1 This includes manual, Internet and Information technology systems.

Victor
Sample
Page 8: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 8 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Scope

The scope of this manual is:

Provides uniform policy and centralized guidance for dealing with all known and recognized aspects of security affecting ENTERPRISE and its operations

Provides realistic guidance to ensure that all sensitive information handled by ENTERPRISE automated and manual systems is protected commensurate with the risk of inadvertent or deliberate disclosure, fraud, misappropriation, misuse, sabotage or espionage

Prevents damage to ENTERPRISE business operations due to unauthorized disclosures Assures the individual privacy of ENTERPRISE customers and staff members Protects funds, supplies, and materials from theft, fraud, misappropriation or misuse Protects the property and rights of contractors, vendors and other organizations Provides for the documented, justified selection of physical, technical and

administrative security controls which are cost-effective, prudent and operationally efficient

Provides for the monitoring of the implementation of selected security controls and procedures

Provides for the auditing and reviewing functions necessary to ensure compliance with stated security requirements

Protects contract negotiations and other privileged considerations in dealings with contractors, vendors, media reporters, and others

Protects staff members from the unnecessary temptation to misuse ENTERPRISE resources while fulfilling their normal duties

Protects staff members from suspicion in the event of misuse or abuse by others Ensures the integrity and accuracy of all ENTERPRISE information assets Protect ENTERPRISE information processing operations from incidents of hardware,

software or network failure resulting from human carelessness, intentional abuse or accidental misuse of the system

Ensures the ability of all ENTERPRISE operations to survive business interruptions and to function adequately after recovery

Protects management from charges of imprudence in the event of a compromise of any security system or disaster

Victor
Sample
Page 9: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 9 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Objective

The objective of the ENTERPRISE Security Program is to create an ENTERPRISE environment where, based upon an active and continuous risk analysis program, the following elements of Internet and Information Technology Security can be successfully integrated and implemented:

Denial of access to the Internet and Information Technology systems resources based upon a defined access requirement

A proven ability to audit all transactions and processes impacting ENTERPRISE databases and operational outputs

Both security awareness and staff member programs designed to educate staff members in the ENTERPRISE's security requirements

Traditional physical security controls and accountability with manual as well as automated processes

Systems development review procedures and testing to ensure security in all Internet and Information Technology systems designs and procurements

A program of management reviews and audits to ensure compliance with security controls

A realistic and exercised contingency plan

Applicability

This manual and the ENTERPRISE Security Program apply to all ENTERPRISE activities, departments, and divisions processing and/or utilizing Internet and Information Technology systems resources.

The provisions of this manual apply to all Internet and Information Technology systems resources regardless of application, functional organization, or source of funding.

Internet and Information Technology systems resources include all computer equipment, remote terminals, peripherals, data, software, associated documentation, contractual services, staff members, suppliers, and facilities.

Victor
Sample
Page 10: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 10 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Best Practices

In order to create an environment that is secure, compliant and efficient a number of best practices have proven to be very valuable. Best practices that we have identified fall into the following categories:

Best Practices When Implementing Security Policies and Procedures Best Practices Network Security Management Best Practices to Meet Compliance Requirements Best Practices to Manage Compliance Violations Best Practices Data Destruction and Retention Best Practices to Protect Against Ransomware

Best Practices When Implementing Security Policies and Procedures

After determining the best security policies and procedures, the implementation and deployment of security technologies into the organization begin. This is not a trivial exercise and – if done without both upper management support and end-user understanding – one that will fail.

Best practices around security policy and procedure deployment include:

Practice – It is imperative that any solution is tested before implementation. Every environment is different and some solutions may interfere with business-critical processes. It is important to understand the unintended results of implementing a security process before making it required.

Upper Management Approval – Upper management must not only be aware of upcoming security initiatives, but most support them wholeheartedly. This is critical when human resource policies come into play that could affect personnel. Upper management support will be necessary to enforce a process that may be time-consuming or require additional resources.

End-User Awareness – End users should be made aware of upcoming changes to security processes. Surprising end-users by changing a process cause fear, confusion, and legitimate frustration. Users should receive awareness as to what is changing and the policies put in place to ensure that the business continues.

Human Resource Policies – Ultimately, human resource policies have to be applied to ensure compliance with security policies. Security processes are often seen as obstructive and employees may try to avoid or circumvent technological solutions. It is imperative that human resource policies are in place to discipline these actions.

Victor
Sample
Page 11: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 44 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Vulnerability Analysis and Threat Assessment

The overall vulnerability analysis and threat assessment process is one that is followed via a structured approach. It is the basis for identifying vulnerabilities and assessing the impacts of existing and new exposures that place ENTERPRISE at risk. The result of this process is to eliminate and/or mitigate unacceptable risk levels within the ENTERPRISE.

Threat / Vulnerability / Risk Process

Set a Risk Level for Each Vulnerability

and Threat – Define Acceptable Levels

of Risk

Define and Implement Solution to Eliminate and/Or Mitigate Risk

to ENTERPRISE for Each High Risk Vulnerability

and/Or Threat

Inventoryand

Identify Threatsand

Vulnerability

Victor
Sample
Page 12: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 49 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Evaluate Risk

Risks are at both physical and electronic locations. The result should be a matrix that is used to identify threat areas via vulnerability analysis and business impact analysis tools. The result will be a matrix like the one shown below

Once every risk has been identified and analyzed using the same method of reporting, then ENTERPRISE has the ability to understand the existing situation.

Impact of a loss is defined as:

Catastrophic - as a result ENTERPRISE could cease to exist and/or would be placed in material legal and/or financial jeopardy.

Very High - as a result, ENTERPRISE would not be able to meet its material contractual and/or service obligations. Or do material damage to ENTERPRISE’s reputation and have major negative long-term implications on ENTERPRISE’s ability to continue being a going concern.

Noticeable - ENTERPRISE would not be able to operate effectively and efficiently, thus reducing productivity and service levels.

Minor - ENTERPRISE would be affected in a minor way with little productivity and/or service level loss.

None - No impact.

Victor
Sample
Page 13: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 50 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Victor
Sample
Page 14: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 93 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Rights

All Internet and Information Technology systems resources should be assigned to an owner; however, this does not imply full rights of ownership (i.e., the enterprise retains the rights to authorize the sale, distribution or destruction of a resource).

The owner is the end-user or person responsible for the assets controlled by a system. Only the identified owner may authorize a user or group of users to access protected resources. Owners of resources are responsible for specifying the:

A degree of protection for that resource Authorized users of that resource Access the authority of each user in accordance with the policies stated in this manual

Systems Applications

Data Production Development Group End Users

Test Software Engineering Application Support Group

Software Production Development Group Development Group

Test Software Engineering Application Support Group

Internet Operation ISP 11 Provider Internet Support Group

Intranet Development ISP Provider Internet Development Group

Commands System Operation Development Group

System Maintenance Software Engineering

Transactions Production Development Group

Test Application Support Group

Address Space (Capacity) Development Group

Documentation Application Support Group

Rights Matrix Table

Only the owner of a resource will have the authority to approve a change to the access control restrictions previously specified for that resource. Owners of data are responsible for reviewing access to that data. Owners are also responsible for determining the following resource characteristics:

Value, importance, and specific business purpose Level of classification in one of the classes

11 ISP – Internet Service Provider this can be an internal group within the enterprise or an outsourced provider.

Victor
Sample
Page 15: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 143 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Appendix - A

Attached Job Descriptions

Chief Security Officer (CSO)

Chief Compliance Officer (CCO)

Attached Policies

To ensure that you have the latest version of several critical IT Infrastructure policies (when this template updates), they are included as separate documents. However, be aware that you will NOT BE notified when the policies below are updated unless this Template is updated.

These policies are in a sub-directory title "Policy"

Blog and Personal Website Policy

Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy

Mobile Device Policy

Physical and Virtual File Server Security Policy

Sensitive Information Policy - Credit Card, Social Security, Employee, and Customer Data

Travel and Off-Site Meeting Policy

Victor
Sample
Page 16: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 144 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Attached Security Forms

To ensure that you have the latest version of several critical Security Management Forms (when this template updates), they are included as separate documents. However, be aware that you will NOT BE notified when the policies below are updated unless this Template is updated.

These policies are in a sub-directory title "Forms"

Application & File Server Inventory

Blog Policy Compliance Agreement

BYOD Access and Use Agreement

Company Asset Employee Control Log

Email Employee Agreement

Employee Termination Procedures and Checklist

FIPS 199 Assessment

Internet Access Request Form

Internet and Electronic Communication Employee Agreement

Internet use Approval

Mobile Device Access and Use Agreement

Mobile Device Security and Compliance Checklist

New Employee Security Acknowledgment and Release

Outsourcing and Cloud Security Compliance Agreement

Outsourcing Security Compliance Agreement

Preliminary Security Audit Checklist

Privacy Compliance Policy Acceptance Agreement

Risk Assessment (pdf & docx)

Security Access Application

Security Audit Report

Security Violation Procedures

Sensitive Information Policy Compliance Agreement

Server Registration

Social networking Policy Compliance Agreement

Telecommuting Work Agreement

Text Messaging Sensitive Information Agreement

Threat and Vulnerability Assessment Inventory

Victor
Sample
Page 17: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 145 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Additional Attached Materials

Business and IT Impact Questionnaire

Attached as a separate document

Threat and Vulnerability Assessment Tool

Attached as a separate document

Sarbanes-Oxley Section 404 Check List Excel Spreadsheet

Attached as a separate document

Victor
Sample
Page 18: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 154 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Employee Termination Process

After an employee has terminated (voluntary or involuntary) you can find yourself in the middle of a wrongful termination lawsuit. This can cost the company in both time and money. If you are unlucky, you may be forced to hire the employee back. Using an employee termination checklist can help ensure you follow all the correct procedures when letting someone go.

As you now know, firing or laying off an employee is not as simple as saying “you're fired” or “you are laid-off.” There are legal ramifications and is therefore much more complicated than it appears on the surface.

Compile The Proper Documentation You or your manager should have the right legal documents in place before you begin termination procedures. Be aware that paperwork you use to support the case for firing may end up in a court of law. In other words, make sure it is professional, unbiased and follows company policy.

Prepare The Termination Letter Check with the Human Resources Department. They likely have a template available for you to use. Make sure your attorney reviews it.

Create A Severance Package, Of course, this is only if you are going to offer this employee severance pay or benefits. Again, check with your Human Resources Department and see what the standard severance package should be. You should have this package ready for the employee during the termination meeting. Include a document for the employee to sign before they get the package, which limits or eliminates their rights to sue the company, its employees, and its agents.

Come Up With Additional Agreements As an employer you may wish to have the employee sign an employee termination agreement or a non-compete agreement. Make sure whatever your draft is run by either your Human Resources Personnel or your business attorney.

Prepare An Agenda For The Termination Meeting You must know exactly what you are going to say and how you will say it. Make sure you set up a meeting room ahead of time that is away from the individual's coworkers. Also, have another representative (witness) from the company there. Usually, a member of the Human Resources Department is a good choice.

List Out Those Items The Former Worker Must Return Employee terminations are stressful for both the employer and the employee. During this time, you may forget to ask the worker to return important company property. Recovering it after the employee is gone will prove difficult.

Conduct An Employee Exit Interview It is usually best to have a third party do this for you.

Victor
Sample
Page 19: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 155 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Employment Termination Checklist

Employee Name: ___________________________________________

Date: _____________________________________

Notify Human Resources

_____ Notify HR: As soon as you are aware of and/or receive a letter from an employee that notifies you of the employee's intention to terminate employment, notify your Human Resources office.

_____ Official Notice: If an employee tells you of their intention to leave your employment, ask them to write a resignation letter that states they are leaving and their termination date. (Companies request a minimum of two weeks’ notice, when possible and desirable.)

Permissions Termination

_____Notify Your Network Administrator and Facilities Administrator: As soon as you know that an employee is leaving, notify your Administrator and other appropriate staff members of the date and time on which to terminate the employee's access to computer, telephone systems, and facilities. Arrange for these accounts to be routed so that your organization will not lose contact with clients and customers. Additionally, disable the employee's building entry alarm code and security pass, if applicable.

Return of Property

_____ Return of company property: Exiting employees are required to turn in all company books and materials, keys, ID badges, computers, cell phones, and any other company-owned items.

_____ Passwords: Employees should provide their supervisors with passwords and other information pertaining to accessing computer files and telephone messages. (You may want to keep email and phone accounts active for a while to field customer contacts.) In any case, to meet regulatory guidelines you will need to archive all data that can be considered a “business record.”

Status of Benefits

_____ Vacation pay and unused sick time: Terminating employees are paid up to a maximum of 30 days for unused, accrued vacation time. If the employee has used the time not yet accrued, payment to the company for this time is subtracted from the last paycheck. (If your company designates a certain number of sick days and they are accrued, you would also need to pay the employee for the time accrued.)

Victor
Sample
Page 20: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 158 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Security Management Compliance Checklist

This defines the base level of requirements for compliance with most mandated requirements for the security of sensitive information.

Policy & Process Definition

Provisioning Policies - Ability to define rule-based policies to determine the list of applications a user should be provisioned to and his or her entitlements in those applications

Denial Policies - Ability to define what resources and applications should be denied to a user or a set of users, as part of provisioning policies.

Access Policies - Ability to define rule-based policies to determine who has access to which web resources.

Role-Based Access Control (RBAC) - Ability to define provisioning entitlements and access rights in terms of roles. Additional ability to map group membership rules to the roles.

Policy History - Ability to provide complete policy history so that the auditors and administrators may easily find the definition of a policy that was effective on a given day.

Approval Workflows - Ability to request & approve the access to applications or entitlements not acquired through automated provisioning & access policies.

Approval Policies - Ability to define the list of approvers for each resource in provisioning requests. Ability to utilize roles in approval policies.

Administrative Policies - Ability to define rule-based policies for administering various identity entities i.e. roles, organizations, and resources

Segregation of Duty (SOD) Policies - Ability to define policies that prevent a user from acquiring a conflicting combination of roles, resources or entitlements in a single resource.

Preventive Controls

Single Sign-On - Ability to support single sign-on across multiple applications and heterogeneous servers spread across multiple DNS domains extending to partner and consumer applications.

Strong Authentication - Ability to support advanced authentication mechanisms to prevent authentication attacks such as phishing, trojan, proxy attacks, and other threats.

Real-time Fraud Prevention - Ability to perform a sophisticated risk analysis to trigger real-time alerts and follow-up actions (for example, challenge the user) to prevent fraudulent transactions in real-time.

Authoritative Source - Ability to designate a set of resources or applications as the authoritative sources for user provisioning.

Authoritative Reconciliation - Ability to trigger provisioning workflows based on reconciling with authoritative resources.

User On-Boarding Workflow - Ability to define automated or approval based workflows based on provisioning policies to create a user’s accounts in various applications.

Victor
Sample
Page 21: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 163 © 2020 Janco Associates, Inc. – https://www.e-janco.com

User/Customer Sensitive Information and Privacy Bill of Rights

Users and customers of the enterprise’s systems and networks will have the following rights:

Enterprise will provide Users/customers of the enterprise’s systems a privacy policy regarding the data they collect.

Users/customers of the enterprise’s systems have the right to know what type of personally identifiable information is being collected and how long that personally identifiable information is kept by the enterprise and any other related third party.

Users/customers of the enterprise’s systems can expect that an enterprise or related 3rd party that holds their personally identifiable information in connection with a transaction or service is adequately protecting the personally identifiable information from disclosure to unauthorized persons.

Users/customers of the enterprise’s systems will receive notice from an enterprise or related 3rd party, if personally identifiable information was, or is reasonably believed to have been, acquired by an unauthorized person and could result in identity theft or fraud.

If a third party has been breached, the enterprise will report that to the enterprise’s users/customers.

Users/customers of the enterprise’s systems will receive notice from the enterprise in the event of a data breach, by mail or e-mail, and without "unreasonable delay" (never later than 60 days after a breach, unless a criminal investigation is potentially affected.)

Service providers that have obtained personally identifiable from the enterprise will send a notification regarding a data breach of protected information that is held by them, under mandated laws such as SOX, PCI, HIPPA, and other mandated requirements.

Users/customers of the enterprise’s systems will receive a general description of the actions taken by the enterprise to restore the security and confidentiality of the personally identifiable information involved in a data breach.

Users/customers of the enterprise’s systems will be provided at least 12 months of identity theft protection at the enterprise’s expense.

Enterprise will notify users/customers of a summary of the breach as victims of identity theft under the Fair Credit Reporting Act.

Victor
Sample
Page 22: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 164 © 2020 Janco Associates, Inc. – https://www.e-janco.com

General Data Protection Regulation (GDPR) - Checklist

The General Data Protection Regulation (GDPR) sets specific compliance requirements on how your business does business with enterprises and individuals in the EU.

The EU requires that enterprises need to have consent or legitimate interests to use personal data. Whether you rely on consent or legitimate interests for your marketing, you need to do similar things to make sure you are GDPR compliant:

Be clear with individuals why you need their data at the point of collection Always use clear and concise language appropriate for your target audience Provide information at the point the data is collected. It cannot be hidden in small print. Give individuals control over their data. They should be able to decide whether to share

their personal data with you or not. Under the GDPR principle of accountability, you should be able to demonstrate that you

are compliant. This means recording the legal grounds for processing an individual’s personal data.

Why Data is Captured

In order to capture personal data the enterprise needs to demonstrate that they have a valid business or marketing reason to capture and retain data on an individual

Validated that legitimate interests are the most appropriate lawful basis for processing Communicate how or why there is a need for an individual’s personal data when it is

collected Utilize a layered privacy notice/policy - A layered privacy notice puts the most important

information upfront and then there is a more detailed privacy policy underneath it Inform Individuals on what the plan is for their data when it is collected Allow individuals to "opt-out" of marketing Collect the minimum data necessary and delete records after use

o Data needed for a suppression file can be kept. o Have a valid reason to process an individual’s personal data using your legal

legitimate interests. For example, an individual may have acquired a product, therefore, the business can market similar products to the customer

Victor
Sample
Page 23: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 194 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Revision History

Version 2020-01

Updated to meet the latest compliance mandates including CCPA Included Detail Job Descriptions

o Chief Security Officer (CSO) o Chief Compliance Officer (CCO)

Included Policy – Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy as a standalone item.

Updated all electronic forms to current versions Updated all attached policies to current versions

Version 2019

Updated to meet the latest compliance mandates Updated forms as a separate attached PDF file Updated all attached policies as separate items

Version 2018 – 07

Added section to cover the New California Consumer Privacy Act – Defines consumer rights and business responsibilities.

Change the Version numbering system for the Security Manual Template

Version 12.2

Added section on GDPR compliance requirements checklist Updated all policies to meet the latest compliance requirements All of the electronic forms were updated

Version 12.1

Added full policies as separate documents in the basic download o Blog and Personal Website Policy o Mobile Device Policy o Physical and Virtual File Server Security Policy o Sensitive Information Policy - Credit Card, Social Security, Employee, and

Customer Data o Travel and Off-Site Meeting Policy

Updated best practices to include lessons learned from the extended and multiple business interruptions in the late summer and early fall of 2017

Page 24: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 195 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 12.0

Added Section on Security Information and Event Management (SEIM) - includes best practices

Added section on Identity Protection Updated 25 included electronic forms Updated mandated compliance requirement Added eReader version to the product offering

Version 11.4

Added section on Ransomware – HIPAA guidance Updated compliance requirement

Version 11.3

Added section on 10 Best Practices for Ransomware Protection Updated to meet the latest mandated compliance requirements and ISO standards Added section on Practical Tips for Prevention of Security Breaches and PCI Audit

Failures Added section on the risk assessment process

Version 11.2

Added User/Customer Sensitive Information and Privacy Bill of Rights

Version 11.1

Added Best Practices Section Added Electronic forms for: Mobile Device Security and Compliance Checklist Outsourcing and Cloud Security Compliance Agreement Server Registration Text Messaging and Sensitive Information Agreement Updated Electronic Forms Updated Graphics Reviewed and updated to meet all mandated government and international standard

requirements All of the supplemental materials have been updated Business Impact Analysis Questionnaire SOX Compliance Checklist PCI Audit Program Threat Assessment and Vulnerability Tool Kit

Version 11.0

Added Firewall Requirements list Added Firewall Policy Security Checklist Updated to meet all ISO requirements

Page 25: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 196 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 10.3

Updated to reflect Cloud requirements Updated to reflect new and old storage technologies Updated BYOD Use Agreement Form Added BYOD and Mobile Content Best of Breed Security Checklist

Version 10.2

Added Physical and Virtual Server Security Policy Added Server Registration electronic form Updated headers and footers to facilitate easier customization by the user

Version 10.1

Updated with the new Threat and Vulnerability Assessment Tool Updated some of the graphics

Version 10.0

Added section on FIPS 199 Added section on NIS SP 800-53 Added Electronic Forms FIPS 199 Assessment Electronic Form

Version 9.2

Updated the Threat and Vulnerability Assessment to include mobile devices and BYODs Added Electronic form BYOD Access and Use Agreement

Version 9.1

Added Electronic form Employee Termination Checklist Added Best Practices Section to Meet Compliance Requirements

Page 26: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 197 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 9.0

Updated Sensitive Information Policy Added Electronic Forms Blog Policy Compliance Company Asset Employee Control Log Email - Employee Acknowledgment Internet Access Request Internet Use Approval Internet & Electronic Communication - Employee Acknowledgment Mobile Device Access and Use Agreement New Employee Security Acknowledgement and Release Preliminary Security Audit Checklist Security Access Application Security Audit Report Security Violation Reporting Sensitive Information Policy Compliance Agreement

Version 8.3

Added policy for Mobile Device Access and Use Added Mobil Device Assess and Use Agreement Form Added Enterprise Owned Equipment Inventory Form Updated CSS Stylesheet

Version 8.2

Updated the Threat and Vulnerability Assessment Tool

Version 8.1

Add section on Best Practices When Implementing Security Policies and Procedures. Added section on Skype Updated Sensitive Information section Added section on enterprise website security flaws Corrected minor errata

Version 8.0

Updated Fire Suppression Section Updated for ISO compliance and security domain definition

Log management section expanded

Page 27: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 198 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 7.3

Updated Business and IT Impact Questionnaire Updated for COBIT compliance Updated for PCI-DSS compliance Updated for US state-level compliance (New York, Massachusetts, and California) Update for ISO security requirements

Version 7.2

Updated to comply with CobiT requirements Added Security Management Compliance Checklist Added Massachusetts Data Protection Requirements Section Added Massachusetts 201 CMR 17 Compliance Checklist

Version 7.1

Corrected minor errata Added Employee Termination Process Added Employee Termination Checklist Forms Added Employee Termination Form

Version 7.0

Update to reflect latest PCI-DSS requirements Forms Updated Security Violation Form Inspection Checklist New Employee Security Form Internet & Electronic Communication - Employee Acknowledgment

(short form) Internet Use Approval Form Internet Access Request Form Security Access Application Form Updated ISO 27000 Security Process Audit Checklist Updated to CSS Style Sheet

Version 6.5

Updated Threat and Vulnerability Assessment tool to include a detail work plan for the assessment process.

Updated Threat and Vulnerability Assessment tool to include a definition of the safeguards that should be included.

Threat and Vulnerability Assessment tool provided in PDF, WORD 2003, WORD 2007, EXCEL 2003, and EXCEL 2007 formats.

Page 28: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 199 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 6.4

Added Firewall Security Policy Checklist Blog Policy and Bog Forms added WORD 2007 Style Sheet Added Updated Cloud security

Version 6.3

Best Practices Updated Added section with a summary of the ISO 27000 Series standards Updated the template to comply with ISO 27000 Series Standards (27001 and 27002) Disaster Recovery Plan Basics Section Added Wireless Security Standards Added Updated Business Impact and IT Questionnaire Corrected various errata

Version 6.2

Sensitive Information Policy Updated Best Practices Added Wireless and VPN Added Payment Card Industry Data Security Standard Added Added separate document PCI DSS Audit Program Internet and Email Communication Updated Email Forwarding Added Travel, Laptop, PDA, and Off-Site Meetings Updated Laptop and PDA Security Added Wireless and VPN Added

Version 6.1

Added HIPAA Audit Program Added ISO 17799 Security Audit Check List

Page 29: Janco's CIO and IT Manager Best Practices Templates and Tools - … · 2020-05-26 · Internet Security Myths ... software or network failure resulting from human carelessness, intentional

Page 200 © 2020 Janco Associates, Inc. – https://www.e-janco.com

Version 6.0

Added section defining ISO 17799 requirements Modified entire template to be ISO 17799 compliant Added Best Data Deletion and Retention Practices Added Spyware Best Practices and Removal Created version of Template that is in WORD 2007 format New Forms Internet Use Approval Form Internet Access Request Form Updated forms Internet Usage Policy – Employee Acknowledgement (short form) Email Usage Policy – Employee Acknowledgement (short form)

Version 5.1

New section on Internet, email, and Electronic Communication New forms Internet Usage Policy – Employee Acknowledgement Email Usage Policy – Employee Acknowledgement

Version 5.0

New section on Sensitive Information New forms Checklist For Separating Employees Supervisor Checklist For Separating Employees

Version 4.1

New section on Lost Equipment New section on Termination Deciding whether to fire Carrying out the fire decision New attached Excel spreadsheet internal controls checklist for Sarbanes-Oxley section

404 compliance.

Version 4.0

New section on Travel and Off-Site Meetings Updated Inspection Check List Form