The purpose of this policy is to ensure the secure information processing within and related to Inish Education Technology.
This security policy will support the continuous improvement of overall security by further standardising and streamlining all prevention, detection, analysis, and response efforts. It will provide visibility into the immediate threat landscape to identify red flags before they turn into full-blown issues.
This Security Policy applies to all business processes and data, information systems and components, personnel, and physical areas of Inish Education Technology. Specifically it includes:
- Servers, and other devices that provide centralised computing capabilities.
- SAN, NAS, and other devices that provide centralised storage capabilities.
- Desktops, mobile, laptops, and other devices that provide distributed computing capabilities.
- Firewalls, IDP sensors, and other devices that provide dedicated security capabilities.
This Security Policy is a formal set of rules by which those people who are given access to company
technology and information assets must abide.
The Security Policy serves several purposes. The main purpose is to inform company users:
employees, contractors and other authorized users of their obligatory requirements for protecting the
technology and information assets of the company. The Security Policy describes the technology and
information assets that we must protect and identifies many of the threats to those assets.
The Security Policy also describes the user’s responsibilities and privileges and asks the questions:
What is considered acceptable use? What are the rules regarding Internet access? The policy
answers these questions, describes user limitations and informs users there will be penalties for
violation of the policy. This document also contains procedures for responding to incidents that
threaten the security of the company computer systems and network.
What are we protecting?
It is the obligation of all users of the company systems to protect the technology and information
assets of the company. This information must be protected from unauthorised access, theft and
destruction. The technology and information assets of the company are made up of the following
- Computer hardware, CPU, disc, Email, web, application servers, PC systems, application software, system software, etc.
- System Software including: operating systems, database management systems, and backup and restore software, communications protocols, and so forth.
- Application Software: used by the various departments within the company. This includes custom written software applications, and commercial off the shelf software packages.
- Communications Network hardware and software firewalls and associated network management software and tools.
Classification of Information
User information found in computer system files and databases shall be classified as either confidential or non confidential. The company shall classify the information controlled by them. The Data Protection Officer is required to review and approve the classification of the information and determine the appropriate level of security to best protect it.
Classification of Computer Systems
|Red||This system contains confidential information – information that cannot be revealed to personnel outside of the company. Even within the company, access to this information is provided on a “need to know” basis.|
The system provides mission-critical services vital to the operation of the business. Failure of this system may have an adverse financial impact on the business of the company
|Server containing confidential data and other department information on databases. Network routers and firewalls containing confidential routing tables and security information.|
|Green||This system does not contain confidential information or perform critical services, but it provides the ability to access RED systems through the network.||User department PCs used to access Server and application(s). Management workstations used by systems and network administrators.|
|White||This system is not externally accessible. It is on an isolated LAN segment, unable to access RED or GREEN systems. It does not contain sensitive information or perform critical services.||A test system used by system designers and programmers to develop new computer systems.|
|Black||This system is externally accessible. It is isolated from RED or GREEN systems by a firewall. While it performs important services, it does not contain confidential information.||A public Web server with nonsensitive information.|
Externally accessible to public
The system may be accessed via the Internet by persons outside of the company without a logon id or password. The system may be accessed via dial-up connection without providing a logon id or password. It is possible to “ping” the system from the Internet. The system may or may not be behind a firewall. A public Web Server is an example of this type of system.
Non-Public, Externally accessible.
Users of the system must have a valid logon id and password. The system must have at least one level of firewall protection between its network and the Internet. The system may be accessed via the Internet or the private Intranet. A private FTP server used to exchange files with business partners is an example of this type of system.
Internally accessible only
Users of the system must have a valid logon id and password. The system must have at least two levels of firewall protection between its network and the Internet. The system is not visible to Internet users. It may have a private Internet (non-translated) address and it does not respond to a “ping” from the Internet. A private intranet Web Server is an example of this type of system.
Chief Information Officer
The Data Processing Officer shall serve as the Chief Information Officer.
An employee of IT shall be designated as the Security Administrator for the company.
Threats to Security
One of the biggest security threats in a company is its employees. They may do damage to company systems either through incompetence or on purpose. Security needs to be layered to compensate for this as well. We will mitigate these risks in the following ways:
- Only giving out appropriate rights to systems.
- Not sharing accounts to access systems. Never allowing login information to be shared with co-workers.
- Removing or limiting access to systems in the eventuality of employees being separated or disciplined.
- Keeping detailed system logs on all computer activity.
- Physically securing computer assets, so that only staff with appropriate need can access.
Amateur Hackers and Vandals
These people are the most common type of attackers on the Internet. The probability of attack is
extremely high and there is also likely to be a large number of attacks. These are usually crimes of
opportunity. Amateur hackers scan the Internet for well known security holes that have not been
plugged. Web servers and electronic mail are their favorite targets. Once they find a weakness they
will exploit it to plant viruses, Trojan horses, or use the resources of your system for their own means.
If they do not find an obvious weakness they are likely to move on to an easier target.
Criminal Hackers and Saboteurs:
The probability of this type of attack is low, but not entirely unlikely given the amount of sensitive information contained in databases. The skill of these attackers is medium to high as they are likely to be trained in the use of the latest hacker tools. The attacks are well planned and are based on any weaknesses discovered that will allow a foothold into the network.
This section establishes usage policy for the computer systems, networks and information resources of the company office. It pertains to all employees and contractors who use the computer systems, networks, and information resources as business partners, and individuals who are granted access to the network for the business purposes of the company.
User accounts on company computer systems are to be used only for business of the company and not to be used for personal activities. Unauthorised use of the system may be in violation of the law, constitutes theft and can be punishable by law. Therefore, unauthorised use of the company computing system and facilities may constitute grounds for either civil or criminal prosecution.
Users are personally responsible for protecting all confidential information used and/or stored on their accounts. This includes their logon IDs and passwords. Furthermore they are prohibited from making unauthorised copies of such confidential information and/or distributing it to unauthorised persons outside of the company.
Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of the system; divert system resources to their own use; or gain access to company systems for which they do not have authorisation.
Users shall not attach unauthorised devices on their PCs or workstations, unless they have received specific authorisation from the employees’ manager and/or the company IT designee.
Users shall not download unauthorised software from the Internet onto their PCs or workstations.
Users are required to report any weaknesses in the company computer security, any incidents of misuse or violation of this policy to their immediate supervisor.
All users are expected to have knowledge of these security policies and are required to report violations to the Security Administrator. Furthermore, all users must conform to the Acceptable Use Policy defined in this document. The company has established the following user groups and defined the access privileges and responsibilities:
|User Category||Privileges and Responsibilities|
|Department Users (Employees)||Access to application and databases as required for job function. (RED and/or GREEN cleared)|
|System Administrators||Access to computer systems, routers, hubs, and other infrastructure technology required for job function. Access to confidential information on a “need to know” basis only|
|Security Administrator||Highest level of security clearance. Allowed access to all computer systems, databases, firewalls, and network devices as required for job function.|
|Systems Analyst / Programmer||Access to applications and databases as required for specific job function. Not authorised to access routers, firewalls, or other network devices.|
|Contractors / Consultants||Access to applications and databases as required for specific job functions. Access to routers and firewall only if required for job function. Knowledge of security policies. Access to company information and systems must be approved in writing by the company director/CEO|
|Other agencies and Business Partners||Access allowed to selected applications only when contract or inter-agency access agreement is in place or required by applicable laws.|
|General Public||Access is limited to applications running on public Web servers. The general public will not be allowed to access confidential information.|
Monitoring Use of Computer Systems
The company has the right and capability to monitor electronic information created and/or communicated by persons using company computer systems and networks, including e-mail messages and usage of the Internet. It is not the company policy or intent to continuously monitor all computer usage by employees or other users of the company computer systems and network.
However, users of the systems should be aware that the company may monitor usage, including, but not limited to, patterns of usage of the Internet (e.g. site accessed, on-line length, time of day access), and employees’ electronic files and messages to the extent necessary to ensure that the Internet and other electronic communications are being used in compliance with the law and with company policy.
A fundamental component of our Security Policy is controlling access to the critical information resources that require protection from unauthorised disclosure or modification. The fundamental meaning of access control is that permissions are assigned to individuals or systems that are authorised to access specific resources. Access controls exist at various layers of the system, including the network. Access control is implemented by logon ID and password. At the application and database level, other access control methods can be implemented to further restrict access. The application and database systems can limit the number of applications and databases available to users based on their job requirements.
User System and Network Access – Normal User Identification
All users will be required to have a unique logon ID and password for access to systems. The user’s password should be kept confidential and MUST NOT be shared with management & supervisory personnel and/or any other employee whatsoever. All users must comply with the appropriate rules regarding the creation and maintenance of passwords:
- Users will not be allowed to logon as a System Administrator. Users who need this level of access to production systems must request a Special Access account as outlined elsewhere in this document.
- Employee Logon IDs and passwords will be deactivated as soon as possible if the employee is terminated, fired, suspended, placed on leave, or otherwise leaves the employment of the company office.
- Supervisors / Managers shall immediately and directly contact the company IT Manager to report change in employee status that requires terminating or modifying employee logon access privileges.
- Employees who forget their password must call the IT department to get a new password assigned to their account. The employee must identify himself/herself by (e.g. employee number) to the IT department.
- Employees will be responsible for all transactions occurring during Logon sessions initiated by use of the employee’s password and ID. Employees shall not logon to a computer and then allow another individual to use the computer or otherwise share access to the computer systems.
System Administrator Access
System Administrators, network administrators, and security administrators will have (type of access)
access to host systems, routers, hubs, and firewalls as required to fulfill the duties of their job.
All system administrator passwords will be DELETED immediately after any employee who has
access to such passwords is terminated, fired, or otherwise leaves the employment of the company.
Connecting to Third-Party Networks
This policy is established to ensure a secure method of connectivity provided between the company
and all third-part companies and other entities required to electronically exchange information with
“Third-party” refers to vendors, consultants and business partners doing business with the company, and other partners that have a need to exchange information with the company. Third-party network connections are to be used only by the employees of the third-party, only for the business purposes of the company. The third-party company will ensure that only authorised users will be allowed to access information on the company network. The third-party will not allow Internet traffic or other private network traffic to flow into the network. A third-party network connection is defined as a permitted connection to the companies servers and services
- A network connection will terminate on a (to be specified) date and the third-party will be subject to standard company authentication rules.
This policy applies to all third-party connection requests and any existing third-party connections. In cases where the existing third-party network connections do not meet the requirements outlined in this document, they will be re-designed as needed.
All requests for third-party connections must be made by submitting a written request and be approved by the company.
Only authorised persons may remotely access the company network. Remote access is provided to those employees, contractors and business partners of the company that have a legitimate business need to exchange information, copy files or programs, or access computer applications. Authorised connection can be remote PC to the network or a remote network to company network connection.
The only acceptable method of remotely connecting into the internal network is using a secure ID.
Penalty for Security Violation
The company takes the issue of security seriously. Those people who use the technology and information resources of company must be aware that they can be disciplined if they violate this policy. Upon violation of this policy, an employee of company may be subject to discipline up to and including discharge. The specific discipline imposed will be determined by a case-by-case basis, taking into consideration the nature and severity of the violation of the Security Policy.
In a case where the accused person is not an employee of company the matter shall be submitted to the CEO. The Data Protection Officer may refer the information to law enforcement agencies and/or prosecutors for consideration as to whether criminal charges should be filed against the alleged violator(s).
Security Incident Handling Procedures
This section provides some policy guidelines and procedures for handling security incidents. The term “security incident” is defined as any irregular or adverse event that threatens the security, integrity, or availability of the information resources on any part of the company network. Some examples of security incidents are:
- Illegal access of a company computer system. For example, a hacker logs onto a production server and copies the password file.
- Damage to a company computer system or network caused by illegal access. Releasing a virus or worm would be an example.
- Denial of service attack against a company web server. For example, a hacker initiates a flood of packets against a Web server designed to cause the system to crash.
- Malicious use of system resources to launch an attack against other computer outside of the company network. For example, the system administrator notices a connection to an unknown network and a strange process accumulating a lot of server time.
Employees, who believe their terminal or computer systems have been subjected to a security incident, or has otherwise been improperly accessed or used, should report the situation to their Data Protection Officer immediately. The employee shall not turn off the computer or delete suspicious files. Leaving the computer in the condition it was in when the security incident was discovered will assist in identifying the source of the problem and in determining the steps that should be taken to remedy the problem.