Contents |
---|
|
Minimum Network Connectivity Requirements |
|
|
|
|
|
Controls Family |
High |
Medium |
Low |
IS-3 Reference |
Placeholder |
---|---|---|---|---|---|
1. Access control measures for controlled electronic information resources |
Required |
Required |
Required |
III.C.2.b |
|
2. Encrypted transmission of restricted data including passwords |
Required |
Required |
Required |
III.C.2.b.i |
|
3. Software updates / patch management |
Required |
Required |
Required |
III.C.2.c.iv |
|
4. Malicious software protection |
Required |
Required |
Required |
III.C.2.c.iii |
|
5. Removal of unnecessary services |
Required |
Required |
Required |
IV.E |
|
6. Host-based firewalls |
Required |
Required |
Required |
III.C.2.d |
|
7. No unauthorized email relays |
Required |
Required |
Required |
IV.G |
|
8. No unauthorized, unauthenticated proxy servers |
Required |
Required |
Required |
IV.H |
|
9. Physical security and session timeout |
Required |
Required |
Required |
III.C.2.b.ii |
|
Administrative Controls |
|
|
|
|
|
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Placeholder |
Asset inventory and classification; Identification of systems storing and accessing data |
Required |
Required |
Required |
III.B |
|
Risk assessments |
Required |
Recommended |
Recommended |
III.B.1 |
|
Written Information Security Plan |
Required |
Recommended |
Optional |
III.C |
|
Formal proprietor authorization for sharing data |
Required |
Recommended |
Optional |
III.C, 4th paragraph |
|
Procedures to inform staff of information security responsibilities. |
Required |
Required |
Required |
III.C.1.a |
|
Procedures for providing privileged accounts, review of personnel assignments for appropriate classification, security responsibilities, and separation of duties |
Required |
Recommended |
Optional |
III.C.1 |
|
Background checks |
Required |
Recommended |
Optional |
III.C.1.b |
|
Third party agreements with data security language |
Required |
Recommended |
Optional |
III.F |
|
Take appropriate personnel/disciplinary action for violations of law or policy |
Required |
Required |
Required |
III.C.1.c |
|
Education and security awareness training |
Required |
Recommended |
Recommended |
III.E |
|
Operational Controls |
|
|
|
|
|
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Placeholder |
Secure and accountable means of authorization and authentication |
Required |
Required |
Optional |
III.C.2.a |
|
Prompt modification or termination of access or access levels in response to authorization changes |
Required |
Required |
Optional |
III.C.1 |
|
Password guidelines and password vulnerability assessment |
Required |
Required |
Required |
III.C.2.b.i |
|
Delete, redact or de-identify data whenever possible |
Required |
Recommended |
Optional |
III.C |
|
Do not store data on portable devices |
Required |
Recommended |
Optional |
III.C.3.e |
|
/wiki/spaces/SEC/pages/20381772 planning and notification procedures |
Required |
Required |
Required |
III.D |
|
Access and activity audit and logging procedures, including access attempts and privileged access |
Required |
Recommended |
Optional |
III.C.2.b.iii |
|
Application security: |
Required |
Required |
Recommended |
II I.C.2.c.v |
|
Documented change management procedures |
Required |
Recommended |
Optional |
III.C.2.e |
|
Backup systems supporting essential activities |
Required |
Required |
Required |
III.C.2.c.ii |
|
Technical Controls |
|
|
|
|
|
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Placeholder |
Network firewalls and IDS/IPS |
Required |
Recommended |
Optional |
III.C.2.d |
|
Encryption:
|
Required |
Recommended |
Optional |
III.C.2.c.ii |
|
Ensure proper user authentication and authorization for users and administrators on all systems |
Required |
Required |
Recommended |
III.C.2.b |
|
Centralized log management, alerting on improper activity, and log retention |
Required |
Recommended |
Optional |
III.C.2.b |
|
Physical Controls |
|
|
|
|
|
Controls Family |
High |
Medium |
Low |
IS-3 Requirement |
Placeholder |
Physical access controls; Facility access controls |
Required |
Required |
Required |
III.C.3.b |
|
Disposal and re-use: |
Required |
Required |
Recommended |
III.C.3.d |
|
Physical security for portable devices and media |
Required |
Recommended |
Optional |
III.C.3.e |
|
Track reassignment or movement of devices and stock inventories, including financial instruments, such as check stock and produced checks |
Required |
Recommended |
Optional |
III.C.3.c |
|
Document repairs and modifications to physical components of the facility related to security, such as hardware, walls, doors, and locks |
Required |
Recommended |
Optional |
III.C.3.c |
|
Disaster Recovery and Business Continuity Plan |
Required |
Recommended |
Optional |
III.C.3.a |
|
Insurance Requirements
Coverage is dependent upon the existence and adherence to security protocols
outlined in BFB IS-3 or any local procedures not in conflict with BFB IS-3 that have
been implemented for critical system.
Minimum requirements: BUS 80 - Cyber Security Insurance Requirements