Security Fundamentals
Security Fundamentals
2)
Security Fundamentals
for AT&T Employees
P a g e |1
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Table of Contents
Document Overview_______________________________________________________________________________ 3
Introduction _____________________________________________________________________________________________ 3
What’s NEW! ______________________________________________________________________________________ 3
Document Structure ____________________________________________________________________________________ 3
Background ______________________________________________________________________________________________ 3
Source Standards _______________________________________________________________________________________ 3
Short Summary ___________________________________________________________________________________ 4
AT&T Information: Classification and Protection _________________________________________________ 4
AT&T Information: High Level Policy and Requirements ________________________________________ 5
Customer Data: Categorization and Protection ____________________________________________________ 5
AT&T Information: Classification and Protection ________________________________________________________ 6
Overview _________________________________________________________________________________________________ 6
Information Custodian _________________________________________________________________________________ 6
Information Classifications ____________________________________________________________________________ 7
Information Classification Markings _________________________________________________________________ 7
Handling Proprietary Information ___________________________________________________________________ 8
AT&T Proprietary (Internal Use Only) Information _________________________________ 8
“Internal Use Only” Printed Material ________________________________________________ 9
AT&T Proprietary (Restricted) ___________________________________________________ 9
“Restricted” Printed Material _____________________________________________________ 10
AT&T Proprietary (Secure Restricted) ___________________________________________ 10
“Secure Restricted” Printed Material _______________________________________________ 11
AT&T Proprietary (Sensitive Personal Information) ________________________________ 11
“Sensitive Personal Information” Printed Material _____________________________________ 14
Transmitting Electronic Information _____________________________________________ 19
AT&T Information: High Level Policy and Requirements ______________________________________________ 22
Overview _______________________________________________________________________________________________ 22
Responsibilities _______________________________________________________________________________________ 22
Compliance __________________________________________________________________ 22
Manager Responsibilities _______________________________________________________ 22
User Responsibilities ___________________________________________________________ 22
Security Training _____________________________________________________________ 22
Suspicious Activity ____________________________________________________________ 22
Reporting Security Flaws _______________________________________________________ 22
UserID and Password_________________________________________________________________________________ 23
AT&T Employee Userid — ATTUID _____________________________________________ 23
Password Rules _______________________________________________________________ 23
Unsuccessful Login Attempts ____________________________________________________ 23
Security on the AT&T Network _____________________________________________________________________ 24
Peer-to-Peer File Sharing _______________________________________________________ 24
Wireless Communication with Peripherals ________________________________________ 24
Email Security ________________________________________________________________ 24
Computer Viruses and Malicious Code ___________________________________________ 25
Security Analysis ______________________________________________________________ 25
Personal Computer Security ________________________________________________________________________ 27
Obtaining Files or Software _____________________________________________________ 27
Non-AT&T Owned Software, Hardware and Media _________________________________ 27
Teleconferencing ______________________________________________________________ 28
Third Party Access to AT&T Resources ___________________________________________ 29
Information Belonging or Pertaining to Customers of AT&T ______________________________________________ 29
Customer Data: Overview ____________________________________________________________________________ 29
Categorization of Customer Data ___________________________________________________________________ 29
Non-Sensitive "Customer Data" Printed Material ________________________________________________ 30
Sensitive "Customer Data" Printed Material ______________________________________________________ 31
Summary of Most Recent ASPR Updates (as of April 23, 2018) ____________________________________________ 34
P a g e |2
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Document Overview
Introduction
This document is a non-technical presentation and extract of security requirements in AT&T Security Policy and Requirements (ASPR) intended for
all AT&T employees, contractors and agents. The information provided in this document are excerpts only. If applicable, please refer to the ASPR
control for full content. It does not supersede official policies, standards or guidelines, but rather includes only information pertinent to every
AT&T employee regardless of level or technical competency. In many places within this document, the actual source documents have other
requirements that are more technical or targeted to specific sub-groups of employees.
Employees, contractors and agents responsible for the technical aspects of securing the AT&T networks or computing systems and applications
must comply with all information security policies published by Chief Security Office (CSO).
In addition to information security standards, employees need to be familiar with the rules for handling official company records published by the
Record and Information Management (RIM) organization.
What’s NEW!
After each publishing cycle—normally twice a year in spring and fall—this document is updated to reflect changes to ASPR. To add value and ease
of reading for our users, we have included a gold star as shown above.
Document Structure
1. Text boxes marked “HINT”, “KEY POINT” or “NOTE” do not come from the source documents listed but are added for clarity or to help
the reader to understand and to comply.
2. Gray bars below paragraph titles or within the text contain references back to the location in the source documents where the
appropriate text originates.
Background
Security is the responsibility of every AT&T employee, contractor and agent. All users must contribute to a safe workplace and all are custodians of
the information they work with even if they are not directly responsible for the security of the networks and devices that contain that information.
Most users work daily with information that AT&T must safeguard from unauthorized access.
Source Standards
The source standards for this document are found in the AT&T Security and Policy Requirements (ASPR) workspace on the eGRC platform. Select
the AT&T Security and Policy Requirements (ASPR) tab.
P a g e |3
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Short Summary
(For full detail review all content in the document)
P a g e |4
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Information: High Level Policy and Requirements
1. All AT&T employees and contractors must comply with the AT&T security standards as set out in the AT&T Security Policy and
Requirements (ASPR) set of documents that are located at http://cso.att.com/ASPRDatabase under the “AT&T Security and Policy
Requirements (ASPR)” tab.
2. All AT&T employees and contractors should annually complete security training as established by CSO and Corporate Compliance.
3. Managers are responsible for confirming business needs for subordinate access to AT&T resources and for ensuring subordinates comply
with ASPR requirements in general.
4. Any potential cyber intrusion, virus or suspicious network activity is to be reported immediately to the ACSIRT team at [email protected], 1-
866-466-2288 prompt 8 (US) or 1-908-234-3327 (International) or visit http://security.att.com/Security/IncidentReporting.html
5. All passwords used on AT&T systems must follow clearly defined set of ASPR requirements and should be managed securely using an
AT&T approved tool, e.g. PassWord Safe
6. Peer-to-Peer file sharing must not be used except where a specific set of requirements are met.
7. Any connections of wireless devices, such as personal digital assistants, cell phone wireless headsets, and computer wireless USB
adapters, to AT&T equipment or networks must be in compliance with ASPR.
8. Any storage of AT&T Proprietary information on electronic media or portable devices such as USB thumb drives, personal digital
assistants and digital cameras, must be controlled by AT&T personnel at all times and must be protected in accordance with ASPR.
9. Personnel using AT&T email systems to send AT&T Proprietary information must implement appropriate security controls as defined by
ASPR to protect electronic mail. In addition, email systems must not be used to send/receive chain letters, hoaxes or virus warnings or to
distribute executable files.
10. AT&T provides anti-virus software and instructions for protection of PCs and software in order to protect against viruses and other
malicious programs. PC desktop support can be contacted for assistance
11. All software used on AT&T owned and managed systems must be approved for use, be properly licensed, be obtained from trusted
sources and be confirmed to be free from viruses and malicious code. All software must be TSS-approved (http://tss.att.com/home.cfm)
unless a TSS exception has been approved prior to use.
12. AT&T owned hardware and software should always be used wherever possible. Any non-AT&T owned hardware and software used to
support AT&T must be authorized for use and must follow ASPR defined requirements.
P a g e |5
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Information: Classification and Protection
Overview
While working for AT&T, employees, contractors, suppliers and others learn information that AT&T regards as valuable or sensitive. Some of that
information is valuable because it gives AT&T advantages over competing businesses. Information may be regarded as sensitive because it is
personal information about customers or employees. Some information must be protected by law [e.g. US Federal Communications Commission
(FCC) regulations, US Health Insurance Portability and Accountability Act (HIPAA)] or to comply with external standards [e.g. Payment Card Industry
(PCI) Data Security Standards (DSS)]. Employees must know how to protect all this information as required by the company.
AT&T has defined four classifications for its business information along with rules for protecting that information in ASPR-0463: Information
Classification.
Information Custodian
Content Source: ASPR-0190: Custodian
KEY POINT: While AT&T officially and legally owns all its proprietary information, you are a custodian of that information. Both the well-being of
the company and your success on the job depend on how well you perform that role. This applies even to information you may gain by accident.
When an AT&T employee, contractor or agent receives and retains AT&T Proprietary information or customer data, he or she becomes a custodian
of that information and is responsible for protecting its confidentiality, integrity and availability according to the rules and regulations established
by the originator. At a minimum, the custodian is responsible for:
1. Complying with Records & Information Management (see ASPR-0191: Records and Information Management program guidelines on
retention and disposal of company records and information.
2. Providing proper safeguards for the information, including following guidelines in this practice for proper disposal.
3. In those cases where information must be printed from electronic media, the custodian must mark the printed information with the
appropriate classification.
4. Providing proper safeguards for processing equipment, information storage, backup, and recovery.
5. Providing a secure processing environment that can adequately protect the integrity, confidentiality, and availability of information.
6. Administering access requests to information properly authorized by the originator.
7. Using the information only for the purpose intended.
8. Maintaining the integrity, confidentiality, and availability of information accessed.
Being granted access to information does not imply or confer authority to grant other users access to that information beyond the normal
boundaries established for a given classification. This is true whether the information is electronically held, printed, hardcopy, manually prepared,
copied or transmitted.
P a g e |6
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Information Classifications
Content Source: ASPR-0463: Information Classification
Information classification is the framework for evaluating and protecting information and assets that contain information owned and used by the
AT&T companies. Information is categorized into four (4) classifications based on the sensitivity, legal requirement and competitive value of the
information.
All types of information are subject to these requirements, including, but not limited to:
HINT: There’s a web page tool to help you determine the classification of information.
The labels and markings of documents and media influence the manner in which they are safeguarded. They alert information custodians of the
sensitivity of the documents, displays and media so that they can be appropriately secured to the respective requirements.
All hard copy documents (including print outs, copies and faxes), removable media and online applications must display the appropriate label
according to the highest classification of data contained. All company emails containing AT&T proprietary data must also be appropriately classified
and marked. (See ASPR-0209: Specific Markings – 2. E-mail Marking and Footer) Customer data is not required to display any form of AT&T
marking.
Unmarked information does not necessarily mean that the information should not be classified. A failure to classify or mark information does not:
Authorize the release of the unmarked proprietary information.
Decrease the requirements for safeguarding it from unauthorized use modification, destruction or disclosure.
P a g e |7
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Proprietary (Restricted)
Only for use by authorized individuals or any above-designated team(s)
within the AT&T companies and not for general distribution
— OR —
AT&T Proprietary (Restricted) — “Team”
Only for use by authorized individuals or any above-designated team(s)
within the AT&T companies and not for general distribution
NOTE: ASPR permits local language markings in addition to English required markings. See ASPR-1017: Labels and Marking.
HINT: Here’s a copy and paste web page for the marking(s) you need.
Content Source: ASPR-0158: Access Authorization to AT&T Proprietary (Internal Use Only) Information
Internal Use Only information may be shared with any employee with a business need, and may be shared with any non-payroll worker (e.g.
contractor) who is authorized under a Non-Disclosure Agreement.
Modification of this information must be limited to authorized persons because of the potentially wide distribution of this information.
P a g e |8
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
“Internal Use Only” Printed Material
Content Source: ASPR-0170, ASPR-0171, ASPR-0172, ASPR-0173, ASPR-0174
Activity Inside AT&T controlled space Outside AT&T controlled space
Use and storage Should be kept away from visitors who have no Must be secured from unauthorized access.
right to see the information. Must be kept in the direct supervision of the custodian
Not necessary to keep hidden or physically or physically secured (e.g. desk, filing cabinet, safe, car
secured when unattended. trunk/boot, hotel room safe).
Must not leave the direct supervision of the custodian
when traveling on public transport (e.g. taxi trunk/boot,
bus hold/baggage storage, checked baggage on
airplane).
Printing & copying No specific restrictions. Must supervise the printer or copier with a person
authorized for the information.
Distribution No specific controls required when distribution Must use a sealed envelope whenever delivery is to a
is entirely within AT&T controlled space. location external to AT&T controlled space or whenever
the delivery utilizes non-AT&T personnel or service.
Fax Should include a fax transmittal sheet. Should include a fax transmittal sheet.
Must supervise fax machines that are located outside
AT&T controlled space with authorized personnel.
Destruction Must use special bins provided or shred. Must shred.
P a g e |9
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
“Restricted” Printed Material
Content Source: ASPR-0170, ASPR-0171, ASPR-0172, ASPR-0173, ASPR-0174
Activity Inside AT&T controlled space Outside AT&T controlled space
Use and storage Must be kept away from casual observers. Must be kept away from casual observers.
Must be kept in the direct supervision of the Must be kept in the direct supervision of the custodian or
custodian or physically secured (e.g. desk, filing physically secured (e.g. desk, filing cabinet, safe, car
cabinet, safe). trunk/boot, hotel room safe).
If the controlled space is only accessible to the Must not leave the direct supervision of the custodian
designated "Team", it is not necessary to keep when traveling on public transport (e.g. taxi trunk/boot,
hidden or physically secured when unattended. bus hold/baggage storage, checked baggage on airplane).
Printing & copying Must supervise the printer or copier Must supervise the printer or copier with a person
— or — authorized for the information.
Must print/copy in an office/area where access
is limited to authorized personnel.
Distribution Should be hand delivered by originator or Must use at least a single sealed envelope.
custodian.
Should, with the exception of (a) individual customer
Should use double envelopes with the inner information sent to that customer, and (b) individual
envelope marked "Private" when using AT&T employee information sent to that employee:
internal mail. I. Use double envelopes with the inner envelope
marked "Private"
The proprietary banner must not be visibly — and —
displayed on the envelopes. II. Be possible to track the package along its route
— and —
III. Be signed for upon delivery, whenever delivery
is to a location external to AT&T controlled
space or whenever the delivery utilizes non-
AT&T personnel or service.
Content Source: ASPR-0215: Access Authorization to AT&T Proprietary (Secure Restricted) Information
AT&T Proprietary (Secure Restricted) information may only be shared with individuals who have been explicitly authorized.
Each individual requiring access to AT&T Proprietary (Secure Restricted) information must be authorized by an Officer of AT&T (level 6 or higher)
or a designated delegate of an Officer of AT&T (level 6 or higher) prior to being permitted such access. Any delegation of responsibility must be to
a named individual in writing (email is acceptable). Parameters for authorizing individuals must be established as part of any delegation (e.g. to
P a g e | 10
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
include only additional AT&T members). Any change to the parameters that have been delegated (e.g. ability to add non-AT&T members) must
again be in writing (email is acceptable) from the Officer of AT&T (level 6 or higher).
KEY POINT: The specific data elements listed below must be classified and protected as AT&T Proprietary (Sensitive Personal Information).
Complete descriptions for these data elements can be found in ASPR-0206: Pre-Classified Data Elements.
P a g e | 11
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
*Note: Pre-existing data stores holding this data element have until 16th April 2019 to comply with all applicable AT&T Proprietary (Sensitive
Personal Information) requirements.
Table: Customer Privacy – The following “Privacy” related data elements have been pre-classified as follows when they apply to a customer.
Customer
Classification /
Data Element Description Information
Categorization
Type
Customer Web Information about what websites our customers visit and Customer AT&T Proprietary (Sensitive
Browsing History applications they use on our network (wireline and wireless Details Personal Information)
including Wi-Fi); this does not include browsing and activities
associated with customers' use of official AT&T corporate websites
or history captured at the network level prior to “processing” (e.g.
raw data streams not associated with a customer).
Customer Viewing Information about programs watched or recorded, games and Customer AT&T Proprietary (Sensitive
History applications used, etc. (e.g. DIRECTV® (DTV) Set Top Box viewing, Details Personal Information)
DIRECTV NOW® viewing)
Customer Including: Email, text messages, conference call recording, and Customer Data Sensitive Customer Data
“messaging” content voice mail call recording.
P a g e | 12
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Customer
Classification /
Data Element Description Information
Categorization
Type
April 2019 to comply with all applicable Sensitive Customer Data
requirements.
Metadata relating to For example: Email recipients address, text message recipients Customer Restricted Personal
customer “messaging” phone number, conference call attendees phone number, voice Details Information
(as defined above) mail recipients phone number.
Customer Telemetry Automated communications for monitoring by the customer Customer Data Sensitive Customer Data
Data (rather than AT&T). Including all data that is generated by our
customers' use of the Digital Life® service or any other IoT service
Customer Use that is used by the customer to monitor or control the service. For
example, video files.
Note: Pre-existing data stores holding this data element (except for
Digital Life data) have until 16th April 2019 to comply with all
applicable Sensitive Customer Data requirements.
Customer Telemetry Automated communications for monitoring by AT&T. Including all Customer Restricted Personal
Data data that is generated by our customers' use of the Digital Life® Details Information
service or any other IoT service that is used by AT&T to monitor or
AT&T Use control the service. For example, IoT temperature settings that
trigger automated AT&T notifications to the customer.
Customer Usage Information about usage for applications on our customers' Customer Restricted Personal
information for device devices transmitted on our network Details Information
resident applications
Customer Web Under normal operation. Customer Data Not pre-classified.
communications See ASPR-0579: Information
payload Belonging to a Customer of
AT&T.
Customer Use
Customer Web When captured as part of service analysis, e.g. Deep Packet Customer AT&T Proprietary (Sensitive
communications Inspection (DPI) data. See ASPR-0094: Data Capture and Testing. Details Personal Information)
payload
Note: Pre-existing data stores holding this data element have until
AT&T Use 16th April 2019 to comply with all applicable AT&T Proprietary
(Sensitive Personal Information) requirements.
Other customer Any data intended for use by the customer rather than AT&T. For Customer Data Not pre-classified.
generated content. example, video, calendar, contacts.
See ASPR-0579: Information
Belonging to a Customer of
AT&T.
Content Source: ASPR-0160: Access Authorization to AT&T Proprietary (Sensitive Personal Information)
AT&T Proprietary (Sensitive Personal Information) information may only be shared with the explicit permission of the originator.
The right to read or modify this information is limited to those individuals authorized by the data originator.
P a g e | 13
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
“Sensitive Personal Information” Printed Material
Content Source: ASPR-0170, ASPR-0171, ASPR-0172, ASPR-0173, ASPR-0174
Activity Inside AT&T controlled space Outside AT&T controlled space
Use and storage Must be kept away from casual observers. Should never be taken outside AT&T controlled
Must be kept in the direct supervision of the space.
custodian or physically secured (e.g. desk, filing If there is an overriding business need then:
cabinet, safe). a. Must obtain, and retain, written approval from
an Officer of AT&T (Level 6 or higher).
b. Must be kept away from casual observers.
c. Must be kept in the direct supervision of the
custodian or physically secured (e.g. desk, filing
cabinet, safe, car trunk/boot, hotel room safe.
d. Must not leave the direct supervision of the
custodian when traveling on public transport
(e.g. taxi trunk/boot, bus hold/baggage storage,
checked baggage on airplane).
Printing & copying Must supervise the printer or copier Should not print/copy outside AT&T controlled
— or — space.
Must print/copy in an office/area where access is If there is an overriding business need then:
limited to authorized personnel.
Must supervise the printer or copier with a person
authorized for the information.
Should mask or obscure AT&T Proprietary (Sensitive Should mask or obscure AT&T Proprietary (Sensitive
Personal Information) data elements from view Personal Information) data elements from view
unless required by the business process unless required by the business process
Distribution Should be hand delivered by the originator or Should not be distributed outside AT&T controlled
custodian. space except for mailing individual customer bills,
which include customer PINs, for use when
obtaining Customer Service via telephone.
If hand delivery is not feasible then:
I. Approval must be obtained from an
Executive Director (Level 4). In all other cases if there is an overriding business
II. Must use double envelopes with the inner need then:
envelope marked "Private", and be I. Should hand deliver by the originator or
possible to track the package along its custodian.
route, and be signed for upon delivery. If hand delivery is not feasible then
approval must be obtained from an
The proprietary banner must not be visibly displayed Executive Director (Level 4).
on the envelopes. II. Must use double envelopes with the inner
Following the expected delivery timeframe the envelope marked "Private", and be
sender must confirm safe receipt. possible to track the package along its
route, and be signed for upon delivery.
III. The proprietary banner must not be visibly
displayed on the envelopes.
P a g e | 14
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Activity Inside AT&T controlled space Outside AT&T controlled space
Fax Should not be faxed. Should not be faxed.
If there is an overriding business need then: If there is an overriding business need then:
Must obtain approval from an Executive Must obtain approval from an Executive
Director. (Level 4). Approval must be Director. (Level 4). Approval must be
retained for a period of time consistent retained for a period of time consistent
with RIM (see ASPR-0191: Records and with RIM (see ASPR-0191: Records and
Information Management (RIM). Information Management (RIM).
Must verify receiving fax number. Must verify receiving fax number.
Should include a fax transmittal Should include a fax transmittal
statement. statement.
Must only use fax machines that are Must only use fax machines that are
supervised with authorized personnel, or supervised with authorized personnel, or
are located in offices/areas where access is are located in offices/areas where access
limited to authorized personnel, or is limited to authorized personnel, or
validated within a business process. validated within a business process.
Where faxing to a supervised machine, upon Where faxing to a supervised machine, upon
completion the sender must confirm safe receipt. completion the sender must confirm safe receipt.
Destruction Must shred. Must shred.
The following table defines on which types of media and devices AT&T information can and cannot be stored; and what other additional controls,
such as encryption are required when “at rest”.
AT&T Proprietary (Internal Use AT&T Proprietary
Location
Only) (Restricted)
Systems solely within AT&T Encryption not required. Should store non-transient data encrypted.
controlled space
Portable External Storage Devices Encryption not required. Should not be copied from primary sources and stored on such media
(excluding Mobile Computing unless there is a business need.
Devices) Where there is a business need
1. Must store encrypted, with the exception of
or
a. Media that remains in AT&T controlled space as part of a
Removable Portable Media documented business process,
— or —
b. Individual customer information for shipping to
customers on electronic media.
Mobile Computing Devices Encryption not required Must not be stored except where there is a business need.
—————
Where there is a business need then written approval must be
obtained (and retained) from an Officer of AT&T (level 6 or higher), and
must store non- transient data encrypted.
—————
P a g e | 15
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Proprietary (Internal Use AT&T Proprietary
Location
Only) (Restricted)
Systems/devices permanently or Encryption not required Must where Technically Feasible store non- transient data encrypted
temporarily outside AT&T except for systems subject to differing contractual commitments.
Controlled Spaces (excluding —————
"Mobile computing devices")
Should store non-transient data encrypted for systems subject to
differing contractual commitments.
Supplier Provided Cloud Services Must store encrypted by the Must store encrypted by the service or on an AT&T system prior to
• Non-AT&T provided Software-as- service or on an AT&T system storage in the cloud (compliance is required by 30th April 2018).
a-Service (E.g. Box, Cisco Spark, prior to storage in the cloud
Microsoft OneDrive, SalesForce, (compliance is required by 30th NOTE: Encryption is not required on the AT&T system prior to
Slack) April 2018). transmission for storage in the cloud.
- or -
• Non-AT&T provided Platform-as- NOTE: Encryption is not
a-Service (E.g. Force.com) required on the AT&T system
- or - prior to transmission for storage
• Non-AT&T provided in the cloud.
Infrastructure-as-a-Service (E.g.
Amazon AWS, Microsoft Azure,
Oracle Public Cloud)
(see ASPR-0431: PS - Partner
Security and ASPR-1027: Supplier
Provided Cloud Service)
Systems solely within AT&T controlled space Should store non-transient data encrypted. Must store non-transient data encrypted.
Portable External Storage Devices (excluding Must not be stored except where there is a Must not be stored except where there is a
Mobile Computing Devices) business need to transfer data between AT&T business need to transfer data between AT&T
locations or storage of backups from official locations or storage of backups from official
or company data centers. company data centers.
Mobile computing devices Must not be stored except where there is a Must store non-transient data encrypted.
business need.
—————
Where there is a business need then written
approval must be obtained (and retained)
from an Officer of AT&T (level 6 or higher), and
must store non- transient data encrypted.
P a g e | 16
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Proprietary AT&T Proprietary
Location
(Secure Restricted) (Sensitive Personal Information)
—————
If a user receives AT&T Proprietary (Secure
Restricted) data in an unsolicited fashion (e.g.
by email) and is not compliant with all of the
above, then the user must delete the data
immediately.
Systems/devices permanently or temporarily Must not be stored except where there is a Must not be stored except where there is a
outside AT&T Controlled Spaces (excluding business need. business need.
Non-AT&T provided file storage services)
Where there is a business need then written Should not be taken outside AT&T controlled
approval must be obtained (and retained) space, but if there is an overriding business
from an Officer of AT&T (Level 6 or higher), need to do so then written approval must be
and must store non-transient data encrypted. obtained (and retained) from an Executive
Director (Level 4), and must store non-
transient data encrypted.
Supplier Provided Cloud Services Must not be stored except where there is a Must not be stored except where there is a
• Non-AT&T provided Software-as-a-Service business need. business need.
(E.g. Box, Cisco Spark, Microsoft OneDrive, ————— —————
SalesForce, Slack) Where there is a business need: Where there is a business need:
- or - •Must store encrypted (compliance is •Must store encrypted (compliance is
• Non-AT&T provided Platform-as-a-Service required by 30th April 2018). required by 30th April 2018).
(E.g. Force.com) •Should encrypt on an AT&T system prior to •Should encrypt on an AT&T system prior to
- or - storage in the cloud. storage in the cloud.
• Non-AT&T provided Infrastructure-as-a- •AT&T should own the encryption key. •AT&T should own the encryption key.
Service (E.g. Amazon AWS, Microsoft Azure, •Written approval must be obtained (and •Written approval must be obtained (and
Oracle Public Cloud) retained) from an Officer of AT&T (level 6 or retained) from an Executive Director (level 4 or
(see ASPR-0431: PS - Partner Security and higher). higher).
ASPR-1027: Supplier Provided Cloud Service)
Systems solely within AT&T controlled space Encryption not required. Must store non-transient data encrypted.
————— —————
Should not be copied from primary sources Should not be copied from primary sources
unless there is a business need. unless there is a business need.
————— —————
Where there is a business need then: Where there is a business need then:
Written approval must be obtained (and Written approval must be obtained (and
retained) from an Executive Director (Level 4) retained) from an Executive Director (Level 4)
Portable External Storage Devices (excluding Should not be copied from primary sources Must not be stored except where there is a
Mobile Computing Devices) and stored on such media unless there is a business need to transfer data between AT&T
business need. locations, storage of backups from official
or ————— company data centers or ship a customer's
Where there is a business need: data to the customer on electronic media.
Removable Portable Media 1. Written approval must be obtained (and —————
retained) from an Executive Where there is a business need to:
P a g e | 17
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Sensitive Customer Data
(When processed by an AT&T service or an
Non-Sensitive Customer Data AT&T employee or contractor)
Location (When processed by an AT&T service or an — or —
AT&T employee or contractor) Any Customer Data from a Conduit
(When processed by an AT&T employee or
contractor)
Mobile computing devices Should store non-transient data encrypted. Must store non-transient data encrypted.
————— —————
Should not be copied from primary sources Should not be copied from primary sources
and stored on such devices unless there is a and stored on such devices unless there is a
business need. business need.
————— —————
Where there is a business need: Where there is a business need:
•Written approval must be obtained (and •Written approval must be obtained (and
retained) from an Executive Director (Level 4) retained) from an Executive Director (Level 4)
•Must store encrypted. •Must store encrypted.
Systems/devices permanently or temporarily Must store non-transient data encrypted. Must not be stored except where there is a
outside AT&T Controlled Spaces (excluding ————— business need.
Non-AT&T provided file storage services) Should not be copied from primary sources —————
unless there is a business need. Where there is a business need:
————— •Written approval must be obtained (and
Where there is a business need: retained) from an Executive Director (Level 4)
•Written approval must be obtained (and •Must store encrypted.
retained) from an Executive Director (Level 4)
•Must store encrypted.
Supplier Provided Cloud Services Must not be stored except where there is a Must not be stored except where there is a
• Non-AT&T provided Software-as-a-Service business need. business need.
(E.g. Box, Cisco Spark, Microsoft OneDrive, ————— —————
SalesForce, Slack) Where there is a business need: Where there is a business need:
- or - •Must store encrypted (compliance is •Must store encrypted (compliance is
• Non-AT&T provided Platform-as-a-Service required by 30th April 2018). required by 30th April 2018).
(E.g. Force.com) •Should encrypt on an AT&T system prior to •Should encrypt on an AT&T system prior to
- or - storage in the cloud. storage in the cloud.
•AT&T should own the encryption key. •AT&T should own the encryption key.
P a g e | 18
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Sensitive Customer Data
(When processed by an AT&T service or an
Non-Sensitive Customer Data AT&T employee or contractor)
Location (When processed by an AT&T service or an — or —
AT&T employee or contractor) Any Customer Data from a Conduit
(When processed by an AT&T employee or
contractor)
• Non-AT&T provided Infrastructure-as-a- •Written approval must be obtained (and •Written approval must be obtained (and
Service (E.g. Amazon AWS, Microsoft Azure, retained) from an Executive Director (level 4 or retained) from an Executive Director (level 4 or
Oracle Public Cloud) higher). higher).
HINT: Please contact your help desk or technical support for assistance in encrypting proprietary information.
KEY POINT: There are many portable devices capable of storing information including USB thumb drives, personal digital assistants and even
digital cameras. Because of their small and transportable nature, they are prone to loss, theft or unauthorized use and access. Any storage of
AT&T Proprietary information on such portable devices must be controlled by AT&T personnel at all times and must be protected in accordance
with ASPR.
(All Employees) – Effective January 1, 2017 all systems must be configured to prevent read or write access to any portable storage such as USB
thumb drives, CDs or DVDs. See ASPR-0222: End User Device Access to External Data Storage and Appendix B.
Completely within AT&T controlled Encryption not required. Should transmit encrypted
facilities and network
Must transmit encrypted all authentication credentials used
to access AT&T Proprietary (Sensitive Personal Information)
or systems containing AT&T Proprietary (Sensitive Personal
Information) with the exception of one-time authentication
credentials created in accordance with ASPR-0445:
Temporary Authentication Credentials which should be
transmitted encrypted.
Partially or completely outside AT&T Should transmit encrypted. If using a dedicated private line or VPN should transmit
controlled facilities and network encrypted.
P a g e | 19
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Proprietary
Location AT&T Proprietary (Internal Use Only)
(Restricted)
Supplier Provided Cloud Services Must transmit encrypted Must transmit encrypted
Non-AT&T provided Software-as-a-
Service (E.g. Box, Cisco Spark,
Microsoft OneDrive, SalesForce,
Slack)
- or -
Non-AT&T provided Platform-as-a-
Service (E.g. Force.com)
- or -
Non-AT&T provided Infrastructure-
as-a-Service (E.g. Amazon AWS,
Microsoft Azure, Oracle Public
Cloud)
(see ASPR-0431: PS - Partner Security
and ASPR-1027: Supplier Provided Cloud
Service)
Completely within AT&T controlled Must transmit encrypted Must transmit encrypted
facilities and network
Partially or completely outside AT&T Must transmit encrypted Must transmit encrypted
controlled facilities and network
Supplier Provided Cloud Services Must transmit encrypted Must transmit encrypted
Non-AT&T provided Software-as-a-
Service (E.g. Box, Cisco Spark,
Microsoft OneDrive, SalesForce,
Slack)
- or -
Non-AT&T provided Platform-as-a-
Service (E.g. Force.com)
- or -
Non-AT&T provided Infrastructure-
as-a-Service (E.g. Amazon AWS,
Microsoft Azure, Oracle Public
Cloud)
(see ASPR-0431: PS - Partner Security
and ASPR-1027: Supplier Provided Cloud
Service)
P a g e | 20
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Sensitive Customer Data
(When processed by an AT&T service or an
Non-Sensitive Customer Data
AT&T employee or contractor)
(When processed by an AT&T
Location — or —
service or an AT&T employee
Any Customer Data from a Conduit
or contractor)
(When processed by an AT&T employee or
contractor)
Completely within AT&T AT&T employees or Encryption not required. Should transmit encrypted.
controlled facilities and contractors with a business
network need
— or —
Between two Systems under
AT&T control
Partially or completely outside AT&T employees or Encryption not required, but Must transmit encrypted.
AT&T controlled facilities and contractors with a business recommended where
network need technically feasible.
— or —
Between two Systems under
AT&T control
The customer's access to Encryption not required, but Should transmit encrypted for Commercial
their own customer details or recommended where email services provided to AT&T customers.
customer data technically feasible. ———
Otherwise, must transmit encrypted.
Supplier Provided Cloud AT&T employees/contractors Must transmit encrypted. Must transmit encrypted.
Services with a business need
Non-AT&T provided
Software-as-a-Service (E.g.
Box, Cisco Spark, Microsoft
OneDrive, SalesForce,
Slack)
- or -
Non-AT&T provided
Platform-as-a-Service (E.g.
Force.com)
- or -
Non-AT&T provided
Infrastructure-as-a-Service
(E.g. Amazon AWS,
Microsoft Azure, Oracle
Public Cloud)
P a g e | 21
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
AT&T Information: High Level Policy and Requirements
Overview
The ASPR contains both general and detailed standards for the entire company to follow in safeguarding company, customer and employee
information, computers and networks, and the good name of the company.
Responsibilities
Compliance
Content Source: ASPR-0481: Statement of Compliance
Compliance with all applicable ASPR requirements is necessary to protect AT&T's corporate assets, as well as, the information and assets of others
AT&T is obligated to protect. They allow the use, access, or disclosure of such assets only in accordance with AT&T corporate interests, as well as,
applicable laws and regulations. Adherence demonstrates a responsible approach by the Company to its fiduciary responsibilities.
Failure to comply with applicable ASPR requirements and/or legally-binding agreement, except where local laws prohibit, can result in violation of
AT&T Code of Business Conduct (COBC).
Manager Responsibilities
Content Source: ASPR-0741: Manager Responsibilities
Managers are responsible for confirming business needs for subordinates, and for contractors the manager sponsors, requesting access to AT&T
resources, except where an attribute based access control (including role based access control).
User Responsibilities
Content Source: ASPR-0030: User Responsibilities
Users must not only comply with all ASPR requirements, but also any security requirements defined by the teams that support their devices.
Where the support teams install utilities on end-user devices in order to meet the ASPR guidelines, these utilities must not be disabled, or
prevented from functioning.
Security Training
Content Source: ASPR-0039: Security Training
All AT&T employees and contractors must complete security training as established by CSO and/or AT&T Corporate Compliance.
Suspicious Activity
Content Source: ASPR-0474: Security Incidents
Any suspicious or unusual activity, which may indicate an attempt to breach the integrity of AT&T's networks and systems, and/or suspected
misuse of company assets must be reported immediately to the AT&T Computer Security Incident Response Team (ACSIRT).
P a g e | 22
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
NOTE: Security flaws in software might be techniques that people can use to bypass built-in security such as authentication or timeouts, or ways
to elevate permissions to update data they should not update.
Password Rules
Content Source: ASPR-0062: Password Changes, ASPR-1010: Password Length and Complexity
a. Passwords must be at least eight (8) characters in length.
b. Passwords must include characters from at least two (2) of these groupings: alpha, numeric, and special characters.
Be cautious of special characters that may have command functions.
c. Passwords must not be the same as the userid with which they are associated.
All users / administrators must comply with the following requirements when selecting passwords.
a. New passwords must not contain a sequence of three (3) or more characters from the previous password.
Passwords must be changed according to the frequencies contained in the table below:
KEY POINT: In most cases, password changing requirements are enforced by AT&T systems.
P a g e | 23
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Security on the AT&T Network
KEY POINT: There are many wireless devices used by consumers including personal digital assistants, wireless headsets for cell phones and
wireless USB adapters for computers. Any connections of these devices to AT&T equipment or networks must be in compliance with ASPR.
Email Security
Content Source: ASPR-0106: Email Security
Administrators and personnel who use electronic mail system to send or receive AT&T Proprietary information must implement appropriate
security controls to assist them in protecting incoming and outgoing messages as follows:
A. The message originator must ensure that it is clearly marked to reflect its proprietary classification.
B. The message originator must ensure that the email ID to which the information is being sent is correct. AT&T personnel should use email
directory searches to verify the recipient's email ID.
C. The recipient of the email message must understand the safeguards associated with the proprietary marking. The originator of the email
message may have to explain the safeguards to the recipient of the email message in advance.
D. If printed, the email message must be protected according to the rules associated with its proprietary marking.
E. The proprietary information must be encrypted in accordance with ASPR-0176: Storage of Electronic Data, ASPR-0179: Transmission of
Electronic Data.
F. AT&T internal mail must not be automatically forwarded out of AT&T's internal network, such as via the Internet, to any other mail
system.
G. AT&T employees and contractors must only use an "att.com" domain email address to conduct AT&T business unless otherwise obligated
to do so on behalf of AT&T through a formal contractual document.
H. AT&T corporate database systems, e.g. WebPhone, GAL or Non Payroll Database, which are used to define the contact details for
personnel performing work on behalf of AT&T must only contain email addresses within the "att.com" domain, e.g. RM-nsp@ att.com).
Other email address domains may be used for personnel employed by or affiliated with an External Entity (e.g. business partners, joint
venture partners, subsidiaries, contractors, vendors, suppliers) that is covered by a legal agreement that contains the Supplier
Information Security Requirements (found at: http://cso.att.com/ContractSecurity/Main.html ).
Note: Databases used for other purposes, such as customer/supplier contact, may contain non "att.com" domain addresses.
P a g e | 24
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
K. Unsuccessful "non-delivery report" messages:
1. May be sent in reply to emails received from internal or external email sources.
2. May be received for emails sent to internal or external email destinations.
L. The sender's display name:
1. May be sent in emails destined to internal or external email destinations.
2. May be received for emails sent by internal or external email destinations.
M. AT&T e-mail systems are not to be used to send, forward or reply to chain letters, hoaxes or virus warnings.
N. AT&T e-mail systems are not to be used to distribute executable files (see ASPR-0109 Distribution of Software).
HINT: AT&T routinely and automatically blocks email attachments with certain file extensions. CSO website has a webpage with complete and
current details.
All supported platforms must use the latest version of the endpoint security software when made available. For advice on what platforms are
supported, contact GET ETO Security or Chief Security Office (CSO) AV teams.
Where the installation of endpoint security software would not be allowed in accordance with vendor support terms (see ASPR-0108: Authorized
Software Use) for that platform, e.g., an appliance or router, then contact GET ETO Security or Chief Security Office (CSO) AV team for direction on
what compensating controls must be used.
Security Analysis
Content Source: ASPR-0018: Security Analysis
Performing security analysis of AT&T networks, computers, applications or services is the responsibility of AT&T. Using external vendors or
consultants to perform security analysis on AT&T computing resources is expressly prohibited unless written approval has been obtained from
AT&T CSO. Regardless of who performs the security analysis, results of any of these tests or analyses are AT&T property, and must be classified as
AT&T Proprietary (Restricted) information (see ASPR-0152: AT&T Proprietary (Restricted)).
Security analysis must take place in accordance with the following tables:
NOTES:
1. See CSO Security Compliance and Vulnerability Management (CSO SCVM) website for further information.
2. Compliance with the following tables is not required until 30th April 2018.
P a g e | 25
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
(Operating within Supplier (See ASPR-0021: Application
Provided Cloud Service) Inventory Database of
Record)
Will perform compliance Will perform compliance Annually (PCI Internet Facing
CSO
validation and oversight. validation and oversight. Only)
Vendor to provide
Vendor to provide Vendor to provide
3rd Party Applications verification status that
verification status that verification status that
Developed or Customized vulnerability scanning is
vulnerability scanning is part vulnerability scanning is part
for AT&T part of their standard
BU process.
of their standard process. of their standard process.
See:
ASPR-0299: Service Realization
ASPR-0306: Service Realization: Service Test Phase
Application development, see the Application Security Standards baseline
ASPR-0422: Application and Data Security: Assessment, Testing, Packaging and Mobile Code Controls for Development of Applications for
Handheld Mobile Systems
P a g e | 26
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Personal Computer Security
KEY POINT: Any files obtained from un-trusted sources on the Internet, must be verified to be free of malicious code before being used.
P a g e | 27
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
device as a matter of last resort. The authorization must be maintained in writing (email acceptable) by the officer and must be reauthorized every
twelve (12) months.
AT&T reserves all rights with regard to its data, and data for which it is responsible, and as such reserves the right to inspect, examine or
forensically investigate all non-AT&T owned hardware, software, media and associated data used in support of AT&T business just as it would for
AT&T owned hardware, software and media.
Teleconferencing
Content Source: ASPR-0291: Teleconferencing: AT&T Proprietary (Internal Use Only)
Where a conference call or online meeting will discuss only AT&T Proprietary (Internal Use Only) information, the following requirements apply:
a. The meeting invitation must state the classification of information that will be discussed.
b. Except for normal business-as-usual meetings, such as staff meetings or regular project meetings, the conference host should state the
classification of information to the attendees at the start of the meeting. Some judgment and discretion is permitted.
c. When a meeting is to be recorded, the host must state the classification of information at the start of the meeting.
d. Except for normal business-as-usual meetings, such as staff meetings or regular project meetings, the Host should ask that only people
with a reason to hear the information stay on the call. Some judgment and discretion is permitted.
e. Any attendee must state if he or she knows that someone is on the call who should not be attending.
See:
ASPR-0194: Non-Disclosure Agreements (NDA)
ASPR-0195: Sharing Information
ASPR-0196: External Disclosure of AT&T Proprietary Information
ASPR-0292: Teleconferencing: More Restrictive Classifications
P a g e | 28
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
f. The meeting must not continue if there is uncertainty about the appropriateness of anyone attending the meeting. All unknown
attendees must be identified.
g. The meeting may continue once it is clear that anyone not authorized has left the meeting.
3. During the Meeting
a. Attendees must try to be aware of the presence of unauthorized individuals in the vicinity when listening to the audio portion of a
conference over speaker-phone or computer speakers.
b. Attendees must not view the meeting presentation in public places or in places where unauthorized persons may observe the
meeting content.
c. Attendees must not use speakerphones in public places or in places where unauthorized persons may overhear the meeting.
d. Attendees in open spaces in AT&T facilities must consider turning off monitors or flipping down laptop screens when walking away
from their desk during the meeting.
HINTS:
“Customer Data” is primarily the customer's own data which may transit AT&T systems or networks, but which AT&T would not normally
read, interpret or process.
“Customer Details” includes information that AT&T would know through its relationship with the customer.
P a g e | 29
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
For all services or service subsets that process Customer Data (this excludes Customer Data that is transmitted within a conduit), the Service Owner
together with the Business Unit's Legal Counsel must determine whether or not the Customer Data concerned will be considered sensitive. The
determination of whether the Customer Data is "sensitive" or "not sensitive" must be documented in the service description.
Customer Data under AT&T control must not be accessible to anyone other than those explicitly authorized by the customer, or those AT&T
employees and contractors with a business need (e.g. service provisioning, problem determination and resolution).
If there is an overriding business need then: If there is an overriding business need then:
Must obtain (and retain) approval from an Must obtain (and retain) approval from an
Executive Director (Level 4) Executive Director (Level 4)
— and — — and —
Must supervise the printer or copier, Must supervise the printer or copier,
— OR — — OR —
Must print or copy in an office or area where Must print or copy in an office or area where
access is limited to authorized personnel. access is limited to authorized personnel.
Any copies of customer data created for AT&T Any copies of customer data created for AT&T
employee/contractor use must be destroyed when no employee/contractor use must be destroyed when no
longer required (see ASPR-0174: Destruction of Hard Copy longer required (see ASPR-0174: Destruction of Hard Copy
Information. Information.
Distribution Should be hand delivered by originator or custodian. Should not be distributed outside AT&T controlled space.
If there is an overriding business need then: If there is an overriding business need then:
a. Must obtain approval from an Executive Director. a. Must obtain approval from an Executive Director.
(Level 4). Approval must be retained for a period (Level 4). Approval must be retained for a period
of time consistent with RIM (see ASPR-0191: of time consistent with RIM (see ASPR-0191:
Records and Information Management (RIM). Records and Information Management (RIM).
b. Must verify receiving fax number. b. Must verify receiving fax number.
c. Should include a fax transmittal statement. c. Should include a fax transmittal statement.
d. Must only use fax machines that are supervised d. Must only use fax machines that are supervised
with authorized personnel, or are located in with authorized personnel, or are located in
offices/areas where access is limited to offices/areas where access is limited to
authorized personnel, or validated within a authorized personnel, or validated within a
business process. business process.
Where faxing to a supervised machine, upon completion Where faxing to a supervised machine, upon completion
the sender must confirm safe receipt. the sender must confirm safe receipt.
Destruction Must shred. Must shred.
If there is an overriding business need then: If there is an overriding business need then:
Must obtain (and retain) approval from an Must obtain (and retain) approval from an
Executive Director (Level 4) Executive Director (Level 4)
— and — — and —
P a g e | 31
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Activity Inside AT&T controlled space Outside AT&T controlled space
Must supervise the printer or copier, Must supervise the printer or copier,
— OR — — OR —
Must print or copy in an office or area where Must print or copy in an office or area where
access is limited to authorized personnel. access is limited to authorized personnel.
Any copies of customer data created for AT&T Any copies of customer data created for AT&T
employee/contractor use must be destroyed when no employee/contractor use must be destroyed when no
longer required (see ASPR-0174: Destruction of Hard Copy longer required (see ASPR-0174: Destruction of Hard Copy
Information. Information.
Distribution Should be hand delivered by originator or custodian. Should not be distributed outside AT&T controlled space.
If hand delivery is not feasible then: If there is an overriding business need then:
i. Approval must be obtained from an Executive Must obtain (and retain) approval from an
Director (Level 4). Executive Director (Level 4).
ii. Must use double envelopes with the inner Should, with the exception of individual Customer
envelope marked "Private" and be possible to track Data sent to customers:
the package along its route, and be signed for upon i. Use double envelopes with the inner
delivery. envelope marked "Private"
— and —
Markings (See ASPR-1017: Labels and Marking) must not be ii. Be possible to track the package along its
visibly displayed on the envelopes. Following the expected route
delivery timeframe the sender must confirm safe receipt. — and —
iii. Be signed for upon delivery whenever
delivery is to a location external to AT&T
controlled space or whenever the delivery
utilizes non-AT&T personnel or service.
a. Must obtain approval from an Executive Director. a. Must obtain approval from an Executive Director.
(Level 4). Approval must be retained for a period (Level 4). Approval must be retained for a period
of time consistent with RIM (see ASPR-0191: of time consistent with RIM (see ASPR-0191:
Records and Information Management (RIM). Records and Information Management (RIM).
b. Must verify receiving fax number. b. Must verify receiving fax number.
c. Should include a fax transmittal statement. c. Should include a fax transmittal statement.
d. Must only use fax machines that are supervised d. Must only use fax machines that are supervised
with authorized personnel, or are located in with authorized personnel, or are located in
offices/areas where access is limited to authorized offices/areas where access is limited to authorized
personnel, or validated within a business process. personnel, or validated within a business process.
Where faxing to a supervised machine, upon completion Where faxing to a supervised machine, upon completion
the sender must confirm safe receipt. the sender must confirm safe receipt.
Destruction Must shred. Must shred.
P a g e | 32
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
P a g e | 33
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date: April 23, 2018 (version 5.2)
Modification
Area MR Change Classification Topic / Key Words ASPR Record
Request
1 Technology High: Significant Financial or Operational Impact Inspected Network Access Program (INAP) ASPR-0020 MR-18124863
2 Technology Moderate: Notable Business As Usual Impact Clarify which systems need to display a warning notice ASPR-0089 MR-14151045
3 Technology Moderate: Notable Business As Usual Impact Clarify Self Signed Certificate requirements ASPR-0269 MR-16439185
4 Technology Moderate: Notable Business As Usual Impact Update SSL and TLS requirements ASPR-0252 MR-16737092
Technology Moderate: Notable Business As Usual Impact Update SSL and TLS requirements 04.03 AT&T Commercial MR-16737092
5 Packet Networks: Origin of
Communications Sessions
Technology Moderate: Notable Business As Usual Impact Update SSL and TLS requirements 4.06.02 WebSphere MQ: MR-16737092
6
Midrange Security settings
Technology Low: Information or Clarification Change Hypervisor separation 2.01 Virtual Machine (VM): MR-18111393
7
Platform Virtualization
8 Technology Low: Information or Clarification Change ASPR-0020 MR-16341650
Update system inventory email
Data Low: Information or Clarification Change SPI Data Element - Background Checks ASPR-0206 MR-18453163
9
10 Process Moderate: Notable Business As Usual Impact Ensure AT&T Asset Protection are not impeded in investigations ASPR-0229 MR-16307146
11 Process Moderate: Notable Business As Usual Impact Ensure AT&T Asset Protection are not impeded in investigations ASPR-0094 MR-16307146
12 Process Moderate: Notable Business As Usual Impact Ensure AT&T Asset Protection are not impeded in investigations ASPR-0401 MR-16307146
13 Process Moderate: Notable Business As Usual Impact Ensure AT&T Asset Protection are not impeded in investigations ASPR-0576 MR-16307146
14 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0052 MR-16671957
15 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0055 MR-16671957
16 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0352 MR-16671957
17 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0312 MR-16671957
18 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0043 MR-16671957
19 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0044 MR-16671957
20 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0045 MR-16671957
21 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0046 MR-16671957
P a g e | 34
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
22 Process Moderate: Notable Business As Usual Impact Allow non-management employee access review and approval ASPR-0047 MR-16671957
23 Process Moderate: Notable Business As Usual Impact Reduce approver level for remote access requests ASPR-0472 MR-16672087
24 Process Moderate: Notable Business As Usual Impact Update "Federation" terms clarify exception ASPR-0056 MR-17777141
25 Process Moderate: Notable Business As Usual Impact Update "Federation" terms clarify exception ASPR-0558 MR-17777141
Process Moderate: Notable Business As Usual Impact Purchased Products and Application Security Requirements ASPR-0643 MR-18450809
26
(PPASR) - includes FOSS
Process Moderate: Notable Business As Usual Impact Purchased Products and Application Security Requirements ASPR-0108 MR-18450809
27
(PPASR) - includes FOSS
Process Moderate: Notable Business As Usual Impact Purchased Products and Application Security Requirements ASPR-0110 MR-18450809
28 (PPASR) - includes FOSS
Process Moderate: Notable Business As Usual Impact Purchased Products and Application Security Requirements ASPR-0431 MR-18450809
29 (PPASR) - includes FOSS
30 Process Low: Information or Clarification Change Clarify incident response actions ASPR-0233 MR-14567458
31 Process Low: Information or Clarification Change Include CSO Cyber Forensics role in security intrusions ASPR-0231 MR-15845383
32 Process Low: Information or Clarification Change Include CSO Cyber Forensics role in security intrusions ASPR-0230 MR-15845383
33 Process Low: Information or Clarification Change Include CSO Cyber Forensics role in security intrusions ASPR-0134 MR-15845383
34 Process Low: Information or Clarification Change Include CSO Cyber Forensics role in security intrusions ASPR-0239 MR-15845383
35 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0299 MR-6592595
36 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0302 MR-6592595
37 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0303 MR-6592595
38 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0304 MR-6592595
39 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0305 MR-6592595
40 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0306 MR-6592595
41 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0307 MR-6592595
42 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0308 MR-6592595
43 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0746 MR-6592595
44 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0314 MR-6592595
45 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0315 MR-6592595
46 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0316 MR-6592595
47 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0122 MR-6592595
48 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0364 MR-6592595
49 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0018 MR-6592595
50 Process Low: Information or Clarification Change Merge Application Security baseline into Service Realization ASPR-0009 MR-6592595
P a g e | 35
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
51 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0474 MR-16736856
52 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0227 MR-16736856
53 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0228 MR-16736856
54 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0232 MR-16736856
55 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0234 MR-16736856
56 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0235 MR-16736856
57 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0236 MR-16736856
58 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0237 MR-16736856
59 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0238 MR-16736856
60 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0142 MR-16736856
61 Usability Low: Information or Clarification Change Improve Security Incident linkages ASPR-0381 MR-16736856
Usability Low: Information or Clarification Change Improve Security Incident linkages 2.5 WLAN: Reporting MR-16736856
62 Suspicious Access Points
(APs) and Unusual Activity
63 Usability Low: Information or Clarification Change Improve Security Incident linkages 2 AS/400 Server: Policy MR-16736856
Usability Low: Information or Clarification Change Improve Security Incident linkages 1.4 z/OS Mainframe: MR-16736856
64
Incidents
65 Usability Low: Information or Clarification Change External regulations (e.g. GDPR, HIPAA, PCI, SOX) ASPR-0481 MR-16737090
66 Usability Low: Information or Clarification Change External regulations (e.g. GDPR, HIPAA, PCI, SOX) ASPR-0061 MR-16737090
67 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0600 MR-17092637
68 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0601 MR-17092637
69 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0603 MR-17092637
70 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0604 MR-17092637
71 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0606 MR-17092637
72 Usability Low: Information or Clarification Change Correct AT&T Security Gateway references ASPR-0642 MR-17092637
73 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0130 MR-17166430
74 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0131 MR-17166430
75 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0132 MR-17166430
76 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0135 MR-17166430
77 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0133 MR-17166430
78 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0136 MR-17166430
79 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0137 MR-17166430
80 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0138 MR-17166430
P a g e | 36
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
81 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0139 MR-17166430
82 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0140 MR-17166430
83 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0141 MR-17166430
84 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0143 MR-17166430
85 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0144 MR-17166430
86 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0152 MR-17166430
87 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0378 MR-17166430
88 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0380 MR-17166430
89 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0602 MR-17166430
90 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0129 MR-17166430
91 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0350 MR-17166430
92 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0360 MR-17166430
93 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0362 MR-17166430
94 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0402 MR-17166430
95 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0417 MR-17166430
96 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0467 MR-17166430
97 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0605 MR-17166430
98 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0700 MR-17166430
99 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0744 MR-17166430
100 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-0802 MR-17166430
Usability Low: Information or Clarification Change Update Security Audit Log titles 2.01.03 DB2: Review and MR-17166430
101 Retention of Audit Data
Usability Low: Information or Clarification Change Update Security Audit Log titles 4.02.01 MongoDB: Security MR-17166430
102 Logging and Auditing
Usability Low: Information or Clarification Change Update Security Audit Log titles 04.02.01 Couchbase: MR-17166430
103 Security Logging and
Auditing
Usability Low: Information or Clarification Change Update Security Audit Log titles 4.10.2 Oracle: Audit MR-17166430
104
Statements
Usability Low: Information or Clarification Change Update Security Audit Log titles 4.08.4 Oracle: MR-17166430
105
remote_login_passwordfile
Usability Low: Information or Clarification Change Update Security Audit Log titles 04.03.01 Internet of Things MR-17166430
106 (IoT): Tamper Resistance
Requirements
P a g e | 37
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
Usability Low: Information or Clarification Change Update Security Audit Log titles 04.03.03 Internet of Things MR-17166430
107 (IoT): Communications
Requirements
Usability Low: Information or Clarification Change Update Security Audit Log titles 04.03.08 Internet of Things MR-17166430
108 (IoT): Additional
Requirements
Usability Low: Information or Clarification Change Update Security Audit Log titles 02.04.07 Container MR-17166430
Virtualization: Running
109
Containers – Security Agent
and Managing Server
Usability Low: Information or Clarification Change Update Security Audit Log titles 02.01 AT&T Commercial MR-17166430
110 Packet Networks: AAA for
Network Elements
Usability Low: Information or Clarification Change Update Security Audit Log titles 2.04.01 Virtual Machine MR-17166430
111 (VM): Configure Syslog
Logging
Usability Low: Information or Clarification Change Update Security Audit Log titles 4.08 WebSphere MQ: MR-17166430
112 Security Logging and
Auditing
Usability Low: Information or Clarification Change Update Security Audit Log titles 03.05.01 Network Element MR-17166430
113
Access Security: Audit Logs
Usability Low: Information or Clarification Change Update Security Audit Log titles 2.1.8 Mac OS X: Audit MR-17166430
114
Logging
115 Usability Low: Information or Clarification Change Update Security Audit Log titles ASPR-1021 MR-17166430
116 Usability Low: Information or Clarification Change Remove reference to Data Management Policy (DMP) ASPR-0579 MR-18074215
117 Usability Low: Information or Clarification Change Cross reference two control standards and bold "must" ASPR-0017 MR-18280259
118 Usability Low: Information or Clarification Change Cross reference two control standards and bold "must" ASPR-0740 MR-18280259
119 Usability Low: Information or Clarification Change Cross reference two control standards and bold "must" ASPR-0634 MR-18280259
120 Usability Internal Tracking Only: Formatting Changes Fix broken links - Glossary Terms and Control Standards ASPR-0109 MR-18284445
121 Usability Internal Tracking Only: Formatting Changes Fix broken links - Glossary Terms and Control Standards ASPR-0111 MR-18284445
122 Usability Internal Tracking Only: Formatting Changes Fix broken links - Glossary Terms and Control Standards ASPR-0349 MR-18284445
123 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0099 MR-18284445
124 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0167 MR-18284445
125 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0175 MR-18284445
126 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0189 MR-18284445
127 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0190 MR-18284445
128 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0432 MR-18284445
129 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-0465 MR-18284445
P a g e | 38
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement
Security Fundamentals for AT&T Employees — Issue Date April 23, 2018 (version 5.1)
130 Usability Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards ASPR-1080 MR-18284445
131 ASPR Glossary High: Major Policy Changes Inspected Network Access Program (INAP) 4 Glossary Terms MR-18124863
132 ASPR Glossary Moderate: Notable Business As Usual Impact Clarify Self Signed Certificate requirements 2 Glossary Terms MR-16439185
133 ASPR Glossary Moderate: Notable Business As Usual Impact Update SSL and TLS requirements 1 Glossary Term MR-16737092
134 ASPR Glossary Low: Information or Clarification Change Hypervisor separation 3 Glossary Terms MR-18111393
135 ASPR Glossary Moderate: Notable Business As Usual Impact Pseudonymization, Re-Identification, etc. 13 Glossary Terms MR-18283876
ASPR Glossary Moderate: Notable Business As Usual Impact Update "Federation" terms clarify exception 4 Glossary Terms MR-17777141
136
ASPR Glossary Moderate: Notable Business As Usual Impact Purchased Products and Application Security Requirements 8 Glossary Terms MR-18450809
137 (PPASR) - includes FOSS
138 ASPR Glossary Low: Information or Clarification Change Merge Application Security baseline into Service Realization 5 Glossary Terms MR-6592595
139 ASPR Glossary Low: Information or Clarification Change Improve Security Incident linkages 2 Glossary Terms MR-16736856
140 ASPR Glossary Low: Information or Clarification Change Update "Customer Proprietary Network Information (CPNI)" 1 Glossary Term MR-17123490
141 ASPR Glossary Low: Information or Clarification Change Update "Resource" 1 Glossary Term MR-18280261
142 ASPR Glossary Internal Tracking Only: No Substantive Change Fix broken links - Glossary Terms and Control Standards 11 Glossary Terms MR-18284445
P a g e | 39
AT&T Proprietary (Internal Use Only)
Not for use or disclosure outside the AT&T companies except under written agreement