IT Security Policy - Information Security Management System (ISMS)
IT Security Policy - Information Security Management System (ISMS)
(ISMS)
Policy Statement
To ensure that UNSW information can be used when required with the
confidence that it is accurate and complete, and that it is adequately protected
from misuse, unauthorised disclosure, damage or loss. The policy reinforces
the value of data and information to UNSW.
The IT Security Policy sets out management’s information security direction and
is the backbone of the UNSW Information Security Management System
Purpose (ISMS). The purpose of the ISMS is to proactively and actively identify, mitigate,
monitor and manage information security vulnerabilities, threats and risks in
order to protect UNSW and its assets, information and data.
The ISMS sets the intent and establishes the direction and principles for the
protection of UNSW’s IT assets. This is to enable continuous improvement of
UNSW security capability and resilience to emerging and evolving security
threats.
This policy applies to all users of UNSW ICT resources – including (but not
limited to) staff (including casuals), students, consultants and contractors, third
Scope parties, agency staff, alumni, associates and honoraries, conjoint appointments
and visitors to UNSW. This applies to all UNSW IT Assets and all devices
connected to the UNSW network.
Policy Provisions
Contents
1. Preamble ...................................................................................................................... 2
2. Policy Statements ........................................................................................................ 2
2.1 Data Backup ...................................................................................................... 2
2.2 Data Security ..................................................................................................... 2
2.3 Security Incident Management .......................................................................... 3
2.4 Vulnerability Management ................................................................................. 3
2.5 User Access Management................................................................................. 3
2.6 Logging and Monitoring ..................................................................................... 3
2.7 Cloud Security ................................................................................................... 4
2.8 IT Asset Management........................................................................................ 4
2.9 Change Management ........................................................................................ 4
2.10 IT System Acquisition & Development .............................................................. 4
2.11 Web Application Security ................................................................................... 5
2.12 Physical Security ............................................................................................... 5
2.13 Bring Your Own Device (BYOD) ........................................................................ 5
2.14 End User Protection........................................................................................... 5
2.15 Network Security................................................................................................ 6
2.16 IT Recovery ....................................................................................................... 6
1. Preamble
The University of New South Wales (UNSW) values the use of information technology in
supporting the mission of the University. Our academic services gain strength and currency
from our research activities, strong industry links and our international nature. UNSW has
strong engagements with partnerships from both local and global communities allowing UNSW
to share knowledge, debate and research outcomes.
In this context, UNSW information, whether managed and residing on UNSW resources or
held in trust and managed by third parties or business partners, is an important asset that
must be protected. Any person or organisation that uses or holds in trust these assets has a
responsibility to maintain and safeguard them.
2. Policy Statements
Backups are an essential control and safeguard to ensure availability of UNSW information
being stored, processed or transmitted via information technology communication systems.
Statement: Data must be backed up on a regular basis, protected from unauthorised access
or modification during storage, and available to be recovered in a timely manner in the event
of incident or disaster. See Data Backup Standard ITSS_01
Statement: Encryption techniques must be used for protecting sensitive data during
transmission and storage. See Data Security Standard ITSS_02
Well designed, understood tools and processes will help contain, preserve (legal / forensic
purposes) and limit any damage resulting from a security incident.
Statement: Incident detection mechanisms such as security event logging and antivirus must
be implemented for all IT systems. All potential security incidents must be handled
appropriately following a formalised security incident handling process. See Security Incident
Management Standard ITSS_03
Statement: All user access related requests (e.g. adding new users, updating access
privileges, and revoking user access rights) must be logged, assessed and approved in
accordance with defined user access management process. See User Access Management
Standard ITSS_05
The timely detection of information security incidents relies on comprehensive security log
data being available from information technology communication systems.
Statement: Key security-related events such as user privilege changes must be recorded in
logs, protected against unauthorised changes and analysed on a regular basis in order to
This requirement is closely related to “Third Party Risk Management (See 5.20)”. Additionally,
cloud service providers have been known to change practices with minimal notice. These
impacts need to be managed or mitigated in our agreements to meet UNSW service
expectations.
Statement: UNSW sponsored and endorsed cloud based services must be consumed
following a formalised risk assessment to identify the necessary security controls that must be
established by the Cloud Service Provider and UNSW to manage security risks to an
acceptable level. See Cloud Security Standard_ITSS_07 and Data Handling Guidelines.
Statement: In the context of this policy, an IT asset is any UNSW owned or managed device
or service that connects to or is used by UNSW in its business, research, teaching and
learning activities such as data link, physical device, application (including firmware), database
and middleware. See IT Asset Management Standard ITSS_08
Based on Data Classification, Asset Owners must implement appropriate ISMS and Data
Handling controls to maintain Confidentiality, Integrity and Availability of UNSW Data.
Statement: Any change to UNSW production information systems must be logged and
assessed for security and risk impact as documented in the UNSW Change Management
Process. The requirements, risk and impact of each request must be evaluated and the
proposed risk mitigation solution must be documented and approved. See Change
Management Standard ITSS_09
Statement: Web applications need to be designed, built and tested (verified) to ensure
security is applied at all layers of the application and technology. Assessment and design
guidelines provide controls to be followed when developing UNSW internet-facing (Web)
applications. See Web Application Security Standard ITSS_11
Statement: The facilities (e.g., data centres, computer rooms etc.) where critical information is
stored or processed, must be constructed and arranged in a way that data is adequately
protected from physical and environmental threats. See Physical Security Standard ITSS_12
This Policy and associated Guideline recognises this need and provides the requirements to
manage the risks associated with “BYOD”.
Statement: UNSW staff, students and authorised users connecting personally owned devices
to the UNSW networks must comply with secure practices to ensure the security of UNSW
networks and UNSW data in their devices. See Bring Your Own Device Guideline ITSS_13
Consequently end user protection is critical to ensuring a robust, reliable and secure IT
environment. Failing to do so can result in an information security incident, causing financial
and/or reputational loss to UNSW.
Statement: UNSW network architecture must commensurate with current and future business
requirements as well as with emerging security threats. Appropriate controls must be
established to ensure security of UNSW data in private and public networks, and the
protection of IT services from unauthorised access. See Network Security Standard ITSS_15
2.16 IT Recovery
Service availability is critical for UNSW Information Technology communications, infrastructure,
systems and applications. This Policy ensures that processes are in place to ensure UNSW’s
ability to recover from system and environmental failures, and regular testing of these
processes is afforded.
Statement: An IT Recovery Plan and relative process must be in place to enable the recovery
of business critical UNSW services in a timely manner, to minimise the effect of IT disruptions
and to maintain resilience before, during, and after a disruption. See IT Recovery Standard
ITSS_16
Statement: Information security risk must be identified, mitigated and monitored through a
formalised risk management process.
Compliance with UNSW ISMS must be measured and monitored to ensure that UNSW
Divisions and Faculties abide by ISMS’s security controls. See Information Security Risk and
Compliance Management Standard ITSS_17
Statement: All UNSW staff (Including casuals), consultants, contractors, third parties, agency
staff, associates, honoraries, and conjoint appointments must be subject to appropriate
security processes before, during and after the termination of their employment. See Human
Resources Security Standard ITSS_18
Statement: All users who have access to UNSW’s IT systems and services must adhere to
specific rules regarding use of UNSW resources, their internet and email usage as well as
when interacting with social media. See IT Acceptable Use Standard ITSS_19
Statement: Security risks arising from UNSW contracted third parties (i.e., suppliers, vendors
etc.) who maintain direct or indirect access to UNSW IT systems and data must be
operationally and contractually controlled. See Third Party Risk Management Standard
ITSS_20
4. Implementation
The implementation of the IT Security Policy will be achieved by performing an assessment of
existing IT Security Practices, against the relevant ISMS controls and necessary remediation
of any perceived deviations.
Roles and responsibilities are set out in the ISMS Framework Security Roles and
Responsibilities document.
4.2 Support & Advice
The contact for support and advice relevant to this Policy is the [email protected]
5. Review
The IT Security Policy is an active document and must be subject to independent review.
Management review must be conducted according to UNSW Governance Support Process.
This Policy will be reviewed by the Chief Digital Officer every three years from the effective
date.
6. Acknowledgements
The following sources have been consulted for the development to this policy:
• ISO/IEC FDIS 27001:2013
• COBIT 5 for Information Security
• Australian Government, Department of Defence Information Security Manual
Accountabilities
Supporting Information
Supporting Documents IT Security Standards: ITSS_01 to ITSS_20
1.0 VCAC
2.1 Head, Governance Support 18 February 2010 18 February 2010 Sections 3.1, 5, 12
3.0 President & Vice-Chancellor 7 June 2016 7 June 2016 Full review