SA Security Policy Procedures 125S
SA Security Policy Procedures 125S
The purpose of this document is to outline the security procedures that are enforced within Survey Analytics. The procedures stated here are applicable to all employees of Survey Analytics. There will be no exceptions made to this policy under any circumstances. Any employee found violating this policy will be terminated immediately and access will be revoked.
1. Network Access
a. User Identification and Passwords i. Each user is allocated an individual user name and password. Logon passwords must not be written down or disclosed to another individual. The owner of a particular user name will be held responsible for all actions performed using this user name. ii. Staff must notify the IT Help Desk when moving to a new position or location within Survey Analytics. This ensures that the necessary setups to provide fast access to the most appropriate mail and file servers can be put in place. iii. Management must notify IT of staff changes that might affect security. An example of this would be an individual who has access to restricted confidential client information and moves to another role where this access is not required. iv. All user accounts have the following password settings: 1. Minimum password length of 8 characters; 2. A combination of alpha, numeric and punctuation should be used; 3. Users are forced to change their passwords every (insert number) days; 4. Users cannot repeat passwords; 5. Accounts are locked after (insert number) incorrect login attempts. v. Passwords must not be easily guessed (i.e. names, months of the year, days of the week, usernames, etc. must not be used as passwords). b. Access to Survey Analytics Information i. All information held on the networks including email, file systems
and databases are the property of Survey Analytics and staff should have no expectation of privacy for this data. ii. Although it is not the general practice of Survey Analytics to monitor stored files, email messages and Internet access for their general content, Survey Analytics reserves the right to do so for the protection of staff, for system performance, maintenance, auditing, security or investigative functions (including evidence of unlawful activity or breaches to Survey Analytics policy) and to protect itself from potential corporate liability. iii. Requests to access the computer account of a member of staff who is absent from the office must be directed to the IT Help Desk/relevant IT resource in writing by the "Relevant Manager". The access is given effect by changing the user's password and allowing the "Relevant Manager" or a colleague to access the account directly. Where this access is granted it must be used for enquiry purposes only. iv. Staff must not issue any information to third parties unless they have authorisation to do so.
vii. All computers must be switched off at the end of the day. This
action erases residual information contained in the computer's memory and assists with overnight anti-virus software updates. c. Personal use of computer systems
ii. Staff must not use Survey Analytics systems or the Internet for
commercial activities that are not related to the business of Survey Analytics. d. PC and Notebook Security i. General
1. PCs and notebook computers must not be left unattended for long periods while signed-on e.g. during lunch, coffee breaks etc. Users must either logoff or activate a password-controlled screensaver if they are leaving their PC. The screensaver should be set to activate by default after 10 minutes of inactivity.
2. DATA BACKUPS
a. The IT Department must take regular hot and backups of all production
servers.
i. Hot Backups
1. A hot backup will be taken daily, weekly, and monthly that will be available for restore within 2 hours [Internal SLA]. 2. Hot backups will be available only to system administrators and only for the purpose of a system restore. Under no circumstances will the backups be removed from the server or taken offsite. ii. Offline Backups 1. Rotating offline backups will be executed weekly and monthly and stored to tape. These backups will be taken to an offline storage facility. In case of a catastrophic event, these tapes must be retrievable within 24 hours. [External SLA]
b. Users must always save data and files on the network as opposed to the local hard disk. This ensures that regular backups are taken and are available for recovery purposes. Users should be aware that data saved on the local hard disk is not backed up by the IT Department/relevant IT resource.
3. USER IDENTIFICATION AND PASSWORDS a. All unused usernames must be deleted following an initial period when they are disabled. Managers must inform the IT Help Desk/relevant IT resource when staff leave Survey Analytics to ensure that their usernames are promptly removed.
b. Staff transferring sections within Survey Analytics must have their access
privileges reviewed and altered based on their new responsibilities, following notification to the IT Help Desk/relevant IT resource by the person moving location. c. Usernames must conform to the standard Survey Analytics naming convention. The convention must be used consistently across all applications and platforms.
4. IT Security Responsibilities
e. Survey Analytics hardware and software must have the vendorsupplied default passwords changed on installation. This applies to test as well as live environments. f. Threat Management i. Threats that are identified must be assessed within 24 hours [internal SLA] and an action plan set in place. If action is required, (moderate or high threat level) a solution must be implemented within two weeks [internal SLA].
g. Planned outages for maintenance activities must be scheduled and notified to all Enterprise and Community level subscribers. h. Access logging will be enabled at the OS and Middleware level on all systems so that a consistent audit trail can be re-created. i. All computer and network systems must be configured with UPS backups.
5. Third Party Access
b. Examples of third parties include: i. Software vendor who is providing technical support; ii. Contractor or consultant; iii. Service provider; and
c. Third Party Access can only be provided after the Third Party
has signed a confidentiality agreement that must be included in their formal contract with Survey Analytics. Survey Analytics staff must never permit another individual to utilize their user name to access the Survey Analytics network. d. Further requirements for granting Third Party Access are: i. Risk analysis process; ii. Approval by Data Owner; iii. Approval by the Head of IT/relevant IT resource;
f. Third party access will be audited randomly twice a year for security violations, improper use, and assessment of need. 6. IT Employee Screening a. All employees will be screened via a criminal background check by a third party entity in addition to standard HR screening procedures (ie., employment verification, credit reference, etc). 7. Data Center Access a. Physical access to servers in the data center will be restricted to IT administrators only. b. The Data Center will be monitored 24 hours a day, seven days a week. c. Visitors are not allowed no exceptions. d. IT managers must provide security personal with an updated