ritten nformation security program (wisp)...11. authentication and authorization protocols 12....

22
WRITTEN INFORMATION SECURITY PROGRAM (WISP) I. EXECUTIVE SUMMARY This document details the UMass Boston Written Information Security Program (WISP). The WISP sets forth university procedures for evaluating electronic and physical methods of accessing, collecting, storing, using, transmitting and protecting university information assets and technology resources. The UMass Boston security approach is documented in the Written Information Security Program (WISP). The WISP is based on the principal of implementing controls in layers. The objective is to enable university businesses, students, employees, faculty, partners and customers to conduct research or business, exchange information and ideas in a secure environment where risk is managed carefully, and protection of assets is both comprehensive and pervasive. The WISP is based on the Center for Internet Security (CIS) Cybersecurity Controls Framework (V7.1) (The Framework), published on April 1, 2019 as a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate attacks against systems and networks. Adoption of the WISP ensures that the university implements and maintains effective information security controls that safeguard valuable university assets (information, people and identities, applications and infrastructure). Wil Khouri Assistant Vice Chancellor and Chief Information Security Officer UMASS Boston Information Security Office (ISO) August 2019 Information Technology Services Information Security Office 100 Morrissey Boulevard, Boston, MA 02125

Upload: others

Post on 08-Aug-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WRITTEN INFORMATION SECURITY PROGRAM (WISP) I. EXECUTIVE SUMMARY

This document details the UMass Boston Written Information Security Program (WISP). The WISP sets forth university procedures for evaluating electronic and physical methods of accessing, collecting, storing, using, transmitting and protecting university information assets and technology resources. The UMass Boston security approach is documented in the Written Information Security Program (WISP). The WISP is based on the principal of implementing controls in layers. The objective is to enable university businesses, students, employees, faculty, partners and customers to conduct research or business, exchange information and ideas in a secure environment where risk is managed carefully, and protection of assets is both comprehensive and pervasive. The WISP is based on the Center for Internet Security (CIS) Cybersecurity Controls Framework (V7.1) (The Framework), published on April 1, 2019 as a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate attacks against systems and networks. Adoption of the WISP ensures that the university implements and maintains effective information security controls that safeguard valuable university assets (information, people and identities, applications and infrastructure). Wil Khouri Assistant Vice Chancellor and Chief Information Security Officer UMASS Boston Information Security Office (ISO) August 2019

Information Technology Services Information Security Office 100 Morrissey Boulevard, Boston, MA 02125

Page 2: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

2

II. TABLE OF CONTENTS

I. EXECUTIVE SUMMARY (page 1) II. TABLE OF CONTENTS (page 2) III. VERSION CONTROL (page 2) IV. THE CRITICAL SECURITY CONTROLS V7.1 (THE FRAMEWORK) (page 3)

1. The Framework Goals and Objectives 2. Implementation Groups 3. The CIS 20 Controls

V. SECURITY PROGRAM GOALS AND OBJECTIVES (page 17) 1. Designated Responsibility for the Information Security Program 2. Evaluation of current safeguards and security measures 3. Administrative, Technical and Physical Controls to protect Personal Information 4. Identification of paper, electronic and other records, computing systems, and

storage media, including laptops and portable devices, that contain PII, and the associated reasonably foreseeable risks

5. Employee training 6. Procedures for monitoring Employee compliance with policy and procedure 7. Means for detecting and preventing security system failures 8. Blocking of physical and electronic access to records containing Personally

Identifiable Information 9. Contracts with third party providers; Explicit requirement to maintain safeguards

consistent with those in “Standards for the protection of personal information of residents of the Commonwealth” (201CMR 17.00)

10. Procedure for documenting any actions taken in connection with any breach of security and post-incident review of events and actions taken to improve security

11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of

assigning/selecting passwords 13. Control of data security passwords 14. Restricting access to PII to active users and active user accounts 15. The University publishes and maintains a records retention and disposition schedule 16. Blocking access after multiple unsuccessful attempts to gain access 17. Unique identifications and passwords 18. Encryption of PII across public and wireless networks 19. Encryption of PII on portable/removable devices 20. Monitoring to alert on occurrence of unauthorized access 21. Firewalls and operating system security patches 22. System security agent software 23. Manage the security life cycle of in-house developed and acquired software in order

to prevent, detect, and correct security weaknesses III. VERSION CONTROL

VERSION UPDATED EXPIRED 2013-R1 March 2013 03/28/2013 2014-R1 April 2014 04/10/2014 2015-R1 August 2015 08/27/2015 2017-R1 May 2017 05/01/2017 2019-R1 December 2019

(Next Rev.) 2020-R1 July 2020

Page 3: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

3

IV. THE CENTER FOR INTERNET SECURITY CONTROLS V7.1 (THE FRAMEWORK)

1. The Framework Goals and Objectives The Framework provides a guide to help institutions understand, communicate and manage their cyber risks. In addition, the Framework provides a mechanism for gathering and organizing existing global cyber security standards and best practices. Additionally, the Framework provides a roadmap based on Framework components to reinforce the connection between business drivers and cybersecurity activities. The Framework includes 20 control areas to evaluate and guide the institution’s security posture and assists in determining actions to improve their environment.

2. Implementation Groups

3. The CIS 20 Controls

Control Control Area Asset Type Function Deliverables

CIS 1

Inventory and Control of Hardware Assets: Actively manage (inventory, track, and correct) all hardware

Devices Identify

1.1 Utilize an active discovery tool to identify devices connected to the organization's network and update the hardware asset inventory.

Devices Identify

1.2 Utilize a passive discovery tool to identify devices connected to the organization's

Page 4: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

4

devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.

network and automatically update the organization's hardware asset inventory.

Devices Identify

1.3 Use Dynamic Host Configuration Protocol (DHCP) logging on all DHCP servers or IP address management tools to update the organization's hardware asset inventory.

Devices Identify

1.4 Maintain an accurate and up-to-date inventory of all technology assets with the potential to store or process information. This inventory shall include all hardware assets, whether connected to the organization's network or not.

Devices Identify

1.5 Ensure that the hardware asset inventory records the network address, hardware address, machine name, data asset owner, and department for each asset and whether the hardware asset has been approved to connect to the network.

Devices Respond

1.6 Ensure that unauthorized assets are either removed from the network, quarantined, or the inventory is updated in a timely manner.

Devices Protect

1.7 Utilize port level access control, following 802.1x standards, to control which devices can authenticate to the network. The authentication system shall be tied into the hardware asset inventory data to ensure only authorized devices can connect to the network.

Devices Protect

1.8 Use client certificates to authenticate hardware assets connecting to the organization's trusted network.

CIS 2

Inventory and Control of Software Assets: Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

Applications Identify

2.1 Maintain an up-to-date list of all authorized software that is required in the enterprise for any business purpose on any business system.

Applications Identify

2.2 Ensure that only software applications or operating systems currently supported and receiving vendor updates are added to the organization's authorized software inventory. Unsupported software should be tagged as unsupported in the inventory system.

Applications Identify

2.3 Utilize software inventory tools throughout the organization to automate the documentation of all software on business systems.

Applications Identify

2.4 The software inventory system should track the name, version, publisher, and install date for all software, including operating systems authorized by the organization.

Applications Identify

2.5 The software inventory system should be tied into the hardware asset inventory, so all devices and associated software are tracked from a single location.

Applications Respond

2.6 Ensure that unauthorized software is either removed or the inventory is updated in a timely manner

Page 5: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

5

Applications Protect

2.7 Utilize application whitelisting technology on all assets to ensure that only authorized software executes, and all unauthorized software is blocked from executing on assets.

Applications Protect

2.8 The organization's application whitelisting software must ensure that only authorized software libraries (such as *.dll, *.ocx, *.so, etc.) are allowed to load into a system process.

Applications Protect

2.9 The organization's application whitelisting software must ensure that only authorized, digitally signed scripts (such as *.ps1, *.py, macros, etc.) are allowed to run on a system.

Applications Protect

2.10 Physically or logically segregated systems should be used to isolate and run software that is required for business operations but incurs higher risk for the organization.

CIS 3

Continuous Vulnerability Management: Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.

Applications Detect

3.1 Utilize an up-to-date Security Content Automation Protocol (SCAP) compliant vulnerability scanning tool to automatically scan all systems on the network on a weekly or more frequent basis to identify all potential vulnerabilities on the organization's systems.

Applications Detect

3.2 Perform authenticated vulnerability scanning with agents running locally on each system or with remote scanners that are configured with elevated rights on the system being tested.

Users Protect

3.3 Use a dedicated account for authenticated vulnerability scans, which should not be used for any other administrative activities and should be tied to specific machines at specific IP addresses.

Applications Protect

3.4 Deploy automated software update tools in order to ensure that the operating systems are running the most recent security updates provided by the software vendor.

Applications Protect

3.5 Deploy automated software update tools in order to ensure that third-party software on all systems is running the most recent security updates provided by the software vendor.

Applications Respond

3.6 Regularly compare the results from consecutive vulnerability scans to verify that vulnerabilities have been remediated in a timely manner.

Applications Respond

3.7 Utilize a risk-rating process to prioritize the remediation of discovered vulnerabilities.

CIS 4

Controlled Use of Administrative Privileges: The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of

Users Detect

4.1 Use automated tools to inventory all administrative accounts, including domain and local accounts, to ensure that only authorized individuals have elevated privileges.

Users Protect

4.2 Before deploying any new asset, change all default passwords to have values consistent with administrative level accounts.

Page 6: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

6

administrative privileges on computers, networks, and applications. Users

Protect

4.3 Ensure that all users with administrative account access use a dedicated or secondary account for elevated activities. This account should only be used for administrative activities and not internet browsing, email, or similar activities.

Users Protect

4.4 Where multi-factor authentication is not supported (such as local administrator, root, or service accounts), accounts will use passwords that are unique to that system.

Users Protect

4.5 Use multi-factor authentication and encrypted channels for all administrative account access.

Users Protect

4.6 Ensure administrators use a dedicated machine for all administrative tasks or tasks requiring administrative access. This machine will be segmented from the organization's primary network and not be allowed Internet access. This machine will not be used for reading e-mail, composing documents, or browsing the Internet.

Users Protect

4.7 Limit access to scripting tools (such as Microsoft® PowerShell and Python) to only administrative or development users with the need to access those capabilities.

Users Detect

4.8 Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges.

Users Detect

4.9 Configure systems to issue a log entry and alert on unsuccessful logins to an administrative account.

CIS 5

Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers: Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.

Applications Protect

5.1 Maintain documented security configuration standards for all authorized operating systems and software.

Applications Protect

5.2 Maintain secure images or templates for all systems in the enterprise based on the organization's approved configuration standards. Any new system deployment or existing system that becomes compromised should be imaged using one of those images or templates.

Applications Protect

5.3 Store the master images and templates on securely configured servers, validated with integrity monitoring tools, to ensure that only authorized changes to the images are possible.

Applications Protect

5.4 Deploy system configuration management tools that will automatically enforce and redeploy configuration settings to systems at regularly scheduled intervals.

Applications Detect

5.5 Utilize a Security Content Automation Protocol (SCAP) compliant configuration monitoring system to verify all security configuration elements, catalog approved exceptions, and alert when unauthorized changes occur.

Page 7: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

7

CIS 6

Maintenance, Monitoring and Analysis of Audit Logs: Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.

Network Detect

6.1 Use at least three synchronized time sources from which all servers and network devices retrieve time information on a regular basis so that timestamps in logs are consistent.

Network Detect

6.2 Ensure that local logging has been enabled on all systems and networking devices.

Network Detect

6.3 Enable system logging to include detailed information such as a event source, date, user, timestamp, source addresses, destination addresses, and other useful elements.

Network Detect

6.4 Ensure that all systems that store logs have adequate storage space for the logs generated.

Network Detect

6.5 Ensure that appropriate logs are being aggregated to a central log management system for analysis and review.

Network Detect

6.6 Deploy Security Information and Event Management (SIEM) or log analytic tool for log correlation and analysis.

Network Detect

6.7 On a regular basis, review logs to identify anomalies or abnormal events.

Network Detect

6.8 On a regular basis, tune your SIEM system to better identify actionable events and decrease event noise.

CIS 7

Email and Web Browser Protection: Minimize the attack surface and the opportunities for attackers to manipulate human behavior though their interaction with web browsers and email systems.

Applications Protect

7.1 Ensure that only fully supported web browsers and email clients are allowed to execute in the organization, ideally only using the latest version of the browsers and email clients provided by the vendor.

Applications Protect

7.2 Uninstall or disable any unauthorized browser or email client plugins or add-on applications.

Applications Protect

7.3 Ensure that only authorized scripting languages are able to run in all web browsers and email clients.

Network Protect

7.4 Enforce network-based URL filters that limit a system's ability to connect to websites not approved by the organization. This filtering shall be enforced for each of the organization's systems, whether they are physically at an organization's facilities or not.

Network Protect

7.5 Subscribe to URL-categorization services to ensure that they are up-to-date with the most recent website category definitions available. Uncategorized sites shall be blocked by default.

Network Detect

7.6 Log all URL requests from each of the organization's systems, whether on-site or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.

Network Protect

7.7 Use Domain Name System (DNS) filtering services to help block access to known malicious domains.

Page 8: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

8

Network Protect

7.8 To lower the chance of spoofed or modified emails from valid domains, implement Domain-based Message Authentication, Reporting and Conformance (DMARC) policy and verification, starting by implementing the Sender Policy Framework (SPF) and the Domain Keys Identified Mail (DKIM) standards.

Network Protect

7.9 Block all email attachments entering the organization's email gateway if the file types are unnecessary for the organization's business.

Network Protect

7.10 Use sandboxing to analyze and block inbound email attachments with malicious behavior.

CIS 8

Malware Defenses: Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action.

Devices Protect

8.1 Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization's workstations and servers.

Devices Protect

8.2 Ensure that the organization's anti-malware software updates its scanning engine and signature database on a regular basis.

Devices Protect

8.3 Enable anti-exploitation features such as Data Execution Prevention (DEP) or Address Space Layout Randomization (ASLR) that are available in an operating system or deploy appropriate toolkits that can be configured to apply protection to a broader set of applications and executables.

Devices Detect

8.4 Configure devices so that they automatically conduct an anti-malware scan of removable media when inserted or connected.

Devices Protect

8.5 Configure devices to not auto-run content from removable media.

Devices Detect

8.6 Send all malware detection events to enterprise anti-malware administration tools and event log servers for analysis and alerting.

Network Detect

8.7 Enable Domain Name System (DNS) query logging to detect hostname lookups for known malicious domains.

Devices Detect

8.8 Enable command-line audit logging for command shells, such as Microsoft PowerShell and Bash.

CIS 9

Limitation and Control of Network Ports, Protocols, and Services: Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on networked devices in order to minimize windows

Devices Identify

9.1 Associate active ports, services, and protocols to the hardware assets in the asset inventory.

Devices Protect

9.2 Ensure that only network ports, protocols, and services listening on a system with validated business needs are running on each system.

Devices Detect

9.3 Perform automated port scans on a regular basis against all systems and alert if unauthorized ports are detected on a system.

Page 9: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

9

of vulnerability available to attackers. Devices

Protect

9.4 Apply host-based firewalls or port-filtering tools on end systems, with a default-deny rule that drops all traffic except those services and ports that are explicitly allowed.

Devices Protect

9.5 Place application firewalls in front of any critical servers to verify and validate the traffic going to the server. Any unauthorized traffic should be blocked and logged.

CIS 10

Data Recovery Capabilities: The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it.

Data Protect

10.1 Ensure that all system data is automatically backed up on a regular basis.

Data Protect

10.2 Ensure that all of the organization's key systems are backed up as a complete system, through processes such as imaging, to enable the quick recovery of an entire system.

Data Protect 10.3 Test Data on Backup Media

Data Protect

10.4 Ensure that backups are properly protected via physical security or encryption when they are stored, as well as when they are moved across the network. This includes remote backups and cloud services.

Data Protect

10.5 Ensure that all backups have at least one offline (i.e., not accessible via a network connection) backup destination.

CIS 11

Secure Configuration for Network Devices, such as Firewalls, Routers and Switches: Establish, implement, and actively manage (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.

Network Identify

11.1 Maintain documented security configuration standards for all authorized network devices.

Network Identify

11.2 All configuration rules that allow traffic to flow through network devices should be documented in a configuration management system with a specific business reason for each rule, a specific individual’s name responsible for that business need, and an expected duration of the need.

Network Detect

11.3 Compare all network device configuration against approved security configurations defined for each network device in use, and alert when any deviations are discovered.

Network Protect

11.4 Install the latest stable version of any security-related updates on all network devices.

Network Protect

11.5 Manage all network devices using multi-factor authentication and encrypted sessions.

Network Protect

11.6 Ensure network engineers use a dedicated machine for all administrative tasks or tasks requiring elevated access. This machine shall be segmented from the organization's primary network and not be allowed Internet access. This machine shall not be used for reading email, composing documents, or surfing the Internet.

Network Protect

11.7 Manage the network infrastructure across network connections that are separated from the business use of that network, relying on separate VLANs or, preferably, on entirely

Page 10: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

10

different physical connectivity for management sessions for network devices.

CIS 12

Boundary Defense: Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

Network Identify

12.1 Maintain an up-to-date inventory of all of the organization's network boundaries.

Network Detect

12.2 Perform regular scans from outside each trusted network boundary to detect any unauthorized connections which are accessible across the boundary.

Network Protect

12.3 Deny communications with known malicious or unused Internet IP addresses and limit access only to trusted and necessary IP address ranges at each of the organization's network boundaries.

Network Protect

12.4 Deny communication over unauthorized TCP or UDP ports or application traffic to ensure that only authorized protocols are allowed to cross the network boundary in or out of the network at each of the organization's network boundaries.

Network Detect

12.5 Configure monitoring systems to record network packets passing through the boundary at each of the organization's network boundaries.

Network Detect

12.6 Deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack mechanisms and detect compromise of these systems at each of the organization's network boundaries.

Network Protect

12.7 Deploy network-based Intrusion Prevention Systems (IPS) to block malicious network traffic at each of the organization's network boundaries.

Network Detect

12.8 Enable the collection of NetFlow and logging data on all network boundary devices.

Network Detect

12.9 Ensure that all network traffic to or from the Internet passes through an authenticated application layer proxy that is configured to filter unauthorized connections.

Network Detect

12.10 Decrypt all encrypted network traffic at the boundary proxy prior to analyzing the content. However, the organization may use whitelists of allowed sites that can be accessed through the proxy without decrypting the traffic.

Users Protect

12.11 Require all remote login access to the organization's network to encrypt data in transit and use multi-factor authentication.

Devices Protect

12.12 Scan all enterprise devices remotely logging into the organization's network prior to accessing the network to ensure that each of the organization's security policies has been enforced in the same manner as local network devices.

CIS 13 Data Protection:

Data Identify

13.1 Maintain an inventory of all sensitive information stored, processed, or transmitted by the organization's technology systems,

Page 11: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

11

The processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy and integrity of sensitive information.

including those located on-site or at a remote service provider.

Data Protect

13.2 Remove sensitive data or systems not regularly accessed by the organization from the network. These systems shall only be used as stand-alone systems (disconnected from the network) by the business unit needing to occasionally use the system or completely virtualized and powered off until needed.

Data Detect

13.3 Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.

Data Protect

13.4 Only allow access to authorized cloud storage or email providers.

Data Detect

13.5 Monitor all traffic leaving the organization and detect any unauthorized use of encryption.

Data Protect

13.6 Utilize approved cryptographic mechanisms to protect enterprise data stored on all mobile devices.

Data Protect

13.7 If USB storage devices are required, enterprise software should be used that can configure systems to allow the use of specific devices. An inventory of such devices should be maintained.

Data Protect

13.8 Configure systems not to write data to external removable media, if there is no business need for supporting such devices.

Data Protect

13.9 If USB storage devices are required, all data stored on such devices must be encrypted while at rest.

CIS 14

Controlled Access Based on the Need to Know: The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical assets based on an approved classification.

Network Protect

14.1 Segment the network based on the label or classification level of the information stored on the servers, locate all sensitive information on separated Virtual Local Area Networks (VLANs).

Network Protect

14.2 Enable firewall filtering between VLANs to ensure that only authorized systems are able to communicate with other systems necessary to fulfill their specific responsibilities.

Network Protect

14.3 Disable all workstation-to-workstation communication to limit an attacker's ability to move laterally and compromise neighboring systems, through technologies such as Private VLANs or micro segmentation.

Data Protect 14.4 Encrypt all sensitive information in transit.

Data Detect

14.5 Utilize an active discovery tool to identify all sensitive information stored, processed, or transmitted by the organization's technology systems, including those located on-site or at a remote service provider, and update the organization's sensitive information inventory.

Page 12: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

12

Data Protect

14.6 Protect all information stored on systems with file system, network share, claims, application, or database specific access control lists. These controls will enforce the principle that only authorized individuals should have access to the information based on their need to access the information as a part of their responsibilities.

Data Protect

14.7 Use an automated tool, such as host-based Data Loss Prevention, to enforce access controls to data even when data is copied off a system.

Data Protect

14.8 Encrypt all sensitive information at rest using a tool that requires a secondary authentication mechanism not integrated into the operating system, in order to access the information.

Data Detect

14.9 Enforce detailed audit logging for access to sensitive data or changes to sensitive data (utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring).

CIS 15

Wireless Access Control: The processes and tools used to track/control/prevent/correct the security use of wireless local area networks (WLANs), access points, and wireless client systems.

Network Identify

15.1 Maintain an inventory of authorized wireless access points connected to the wired network.

Network Detect

15.2 Configure network vulnerability scanning tools to detect and alert on unauthorized wireless access points connected to the wired network.

Network Detect

15.3 Use a wireless intrusion detection system (WIDS) to detect and alert on unauthorized wireless access points connected to the network.

Devices Protect

15.4 Disable wireless access on devices that do not have a business purpose for wireless access.

Devices Protect

15.5 Configure wireless access on client machines that do have an essential wireless business purpose, to allow access only to authorized wireless networks and to restrict access to other wireless networks.

Devices Protect

15.6 Disable peer-to-peer (ad hoc) wireless network capabilities on wireless clients.

Network Protect

15.7 Leverage the Advanced Encryption Standard (AES) to encrypt wireless data in transit.

Network Protect

15.8 Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), which requires mutual, multi-factor authentication.

Devices Protect

15.9 Disable wireless peripheral access of devices [such as Bluetooth and Near Field Communication (NFC)], unless such access is required for a business purpose.

Network Protect

15.10 Create a separate wireless network for personal or untrusted devices. Enterprise

Page 13: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

13

access from this network should be treated as untrusted and filtered and audited accordingly.

CIS 16

Account Monitoring and Control: Actively manage the life cycle of system and application accounts - their creation, use, dormancy, deletion - in order to minimize opportunities for attackers to leverage them.

Users Identify

16.1 Maintain an inventory of each of the organization's authentication systems, including those located on-site or at a remote service provider.

Users Protect

16.2 Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems.

Users Protect

16.3 Require multi-factor authentication for all user accounts, on all systems, whether managed on-site or by a third-party provider.

Users Protect

16.4 Encrypt or hash with a salt all authentication credentials when stored.

Users Protect

16.5 Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels.

Users Identify

16.6 Maintain an inventory of all accounts organized by authentication system.

Users Protect

16.7 Establish and follow an automated process for revoking system access by disabling accounts immediately upon termination or change of responsibilities of an employee or contractor. Disabling these accounts, instead of deleting accounts, allows preservation of audit trails.

Users Respond

16.8 Disable any account that cannot be associated with a business process or business owner.

Users Respond

16.9 Automatically disable dormant accounts after a set period of inactivity.

Users Protect

16.10 Ensure that all accounts have an expiration date that is monitored and enforced.

Users Protect

16.11 Automatically lock workstation sessions after a standard period of inactivity.

Users Detect

16.12 Monitor attempts to access deactivated accounts through audit logging.

Users Detect

16.13 Alert when users deviate from normal login behavior, such as time-of-day, workstation location, and duration.

CIS 17

Implement a Security Awareness and Training Program: For all functional roles in the organization (prioritizing those mission-critical to the business and its security), identify the specific knowledge, skills, and abilities needed to support defense of the enterprise; develop and

N/A

17.1 Perform a skills gap analysis to understand the skills and behaviors workforce members are not adhering to, using this information to build a baseline education roadmap.

N/A 17.2 Deliver training to address the skills gap

identified to positively impact workforce members' security behavior.

N/A

17.3 Create a security awareness program for all workforce members to complete on a regular basis to ensure they understand and exhibit the necessary behaviors and skills to help ensure the security of the organization. The organization's security awareness

Page 14: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

14

execute an integrated plan to assess, identify gaps, and remediate through policy, organizational planning, training, and awareness programs.

program should be communicated in a continuous and engaging manner.

N/A

17.4 Ensure that the organization's security awareness program is updated frequently (at least annually) to address new technologies, threats, standards, and business requirements.

N/A 17.5 Train workforce members on the importance

of enabling and utilizing secure authentication.

N/A

17.6 Train the workforce on how to identify different forms of social engineering attacks, such as phishing, phone scams, and impersonation calls.

N/A 17.7 Train workforce members on how to identify

and properly store, transfer, archive, and destroy sensitive information.

N/A

17.8 Train workforce members to be aware of causes for unintentional data exposures, such as losing their mobile devices or emailing the wrong person due to autocomplete in email.

N/A

17.9 Train workforce members to be able to identify the most common indicators of an incident and be able to report such an incident.

CIS 18

Application Software Security: Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect, and correct security weaknesses.

N/A 18.1 Establish secure coding practices

appropriate to the programming language and development environment being used.

N/A

18.2 For in-house developed software, ensure that explicit error checking is performed and documented for all input, including for size, data type, and acceptable ranges or formats.

N/A

18.3 Verify that the version of all software acquired from outside your organization is still supported by the developer or appropriately hardened based on developer security recommendations.

N/A 18.4 Only use up-to-date and trusted third-party

components for the software developed by the organization.

N/A 18.5 Use only standardized, currently accepted,

and extensively reviewed encryption algorithms.

N/A

18.6 Ensure that all software development personnel receive training in writing secure code for their specific development environment and responsibilities.

N/A

18.7 Apply static and dynamic analysis tools to verify that secure coding practices are being adhered to for internally developed software.

N/A 18.8 Establish a process to accept and address reports of software vulnerabilities, including

Page 15: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

15

providing a means for external entities to contact your security group.

N/A

18.9 Maintain separate environments for production and non-production systems. Developers should not have unmonitored access to production environments.

N/A

18.10 Protect web applications by deploying web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks. For applications that are not web-based, specific application firewalls should be deployed if such tools are available for the given application type. If the traffic is encrypted, the device should either sit behind the encryption or be capable of decrypting the traffic prior to analysis. If neither option is appropriate, a host-based web application firewall should be deployed.

N/A

18.11 For applications that rely on a database, use standard hardening configuration templates. All systems that are part of critical business processes should also be tested.

CIS 19

Incident Response and Management: Protect the organization's information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker's presence, and restoring the integrity of the network and systems.

N/A

19.1 Ensure that there are written incident response plans that define roles of personnel as well as phases of incident handling/management.

N/A

19.2 Assign job titles and duties for handling computer and network incidents to specific individuals and ensure tracking and documentation throughout the incident through resolution.

N/A

19.3 Designate management personnel, as well as backups, who will support the incident handling process by acting in key decision-making roles.

N/A

19.4 Devise organization-wide standards for the time required for system administrators and other workforce members to report anomalous events to the incident handling team, the mechanisms for such reporting, and the kind of information that should be included in the incident notification.

N/A

19.5 Assemble and maintain information on third-party contact information to be used to report a security incident, such as Law Enforcement, relevant government departments, vendors, and Information Sharing and Analysis Center (ISAC) partners.

N/A

19.6 Publish information for all workforce members, regarding reporting computer anomalies and incidents, to the incident handling team. Such information should be included in routine employee awareness activities.

N/A 19.7 Plan and conduct routine incident, response exercises and scenarios for the workforce

Page 16: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

16

involved in the incident response to maintain awareness and comfort in responding to real-world threats. Exercises should test communication channels, decision making, and incident responders technical capabilities using tools and data available to them.

N/A

19.8 Create incident scoring and prioritization schema based on known or potential impact to your organization. Utilize score to define frequency of status updates and escalation procedures.

CIS 20

Penetration Testing and Red Team Exercises: Test the overall strength of an organization's defense (the technology, the processes, and the people) by simulating the objectives and actions of an attacker.

N/A

20.1 Establish a program for penetration tests that includes a full scope of blended attacks, such as wireless, client-based, and web application attacks.

N/A

20.2 Conduct regular external and internal penetration tests to identify vulnerabilities and attack vectors that can be used to exploit enterprise systems successfully.

N/A

20.3 Perform periodic Red Team exercises to test organizational readiness to identify and stop attacks or to respond quickly and effectively.

N/A

20.4 Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, e-mails or documents containing passwords or other information critical to system operation.

N/A

20.5 Create a test bed that mimics a production environment for specific penetration tests and Red Team attacks against elements that are not typically tested in production, such as attacks against supervisory control and data acquisition and other control systems.

N/A

20.6 Use vulnerability scanning and penetration testing tools in concert. The results of vulnerability scanning assessments should be used as a starting point to guide and focus penetration testing efforts.

N/A

20.7 Wherever possible, ensure that Red Team results are documented using open, machine-readable standards (e.g., SCAP). Devise a scoring method for determining the results of Red Team exercises so that results can be compared over time.

N/A

20.8 Any user or system accounts used to perform penetration testing should be controlled and monitored to make sure they are only being used for legitimate purposes and are removed or restored to normal function after testing is over.

Page 17: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

17

V. SECURITY PROGRAM GOALS AND OBJECTIVES

1. Designated Responsibility for the Information Security Program The Assistant Vice Chancellor / Chief Information Security Officer (CISO), under the executive oversight of the Vice Chancellor / Chief Information Officer (CIO), is responsible for the development, implementation, and maintenance of a comprehensive standards and risk-based information security program. The WISP is updated as needed, at least annually, by the CISO.

2. Evaluation of current safeguards and security measures (CIS4, CIS6, CIS10, CIS20) The Information Security Office (ISO) and other responsible parties routinely review existing information protection safeguards. Security measures are reviewed, modified and/or added based on academic, research, business needs, regulation, and evaluation of the threat landscape conducted by the ISO and allied functions.

3. Administrative, Technical and Physical Controls to protect Personal Information (CIS1 – CIS20) The University maintains administrative, technical and physical controls to protect Personally Identifiable Information (PII):

a. Administrative controls include, but are not limited to university policies, such as, the Acceptable Use of Information Technology Resources Policy, Confidentiality of Institutional Information and Research Data policy, and Information Security Policy, security awareness training and communications, internal and external audit, and processes and procedures for granting and revoking access to physical and electronic forms of information.

b. Technical controls include but are not limited to firewalls, intrusion prevention systems, encryption, anti-malware, patch management, authentication and authorization systems, system logging, file backup, virtual private network, and network monitoring solutions.

c. Physical controls include but are not limited to electronic and physical card/key access control systems, locking mechanisms for areas and devices containing sensitive information and information-processing assets, creation of backup media, offsite storage of media, intrusion detection systems with central monitoring, closed circuit television monitoring and recording systems, Building Management Systems (BMS), fire detection, reporting and suppression systems, and water leak detection systems.

4. Identification of paper, electronic and other records, computing systems, and storage media, including laptops and portable devices, that contain PII and the associated reasonably foreseeable risks (CIS5, CIS7, CIS13, CIS14, CIS16) The University treats all university systems as if they contain PII. Minimum baseline security controls are required for all university systems including, but not limited to,

Page 18: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

18

encryption of data at rest and in transit, and protection of such data against unauthorized access to or use of the information in a manner that jeopardizes the confidentiality, integrity, and availability of said data, creating a risk of identity theft or fraud against the University’s constituents.

The University continuously evaluates reasonably foreseeable internal risks to all forms of PII. These evaluations are performed in the normal course of business and in cooperation with business and academic units across the University. Recommendations arising from these efforts are submitted to the applicable unit for consideration and implementation.

5. Employee training (CIS17) The University offers on-line security awareness and training materials to all students, faculty, and staff, including the proper use of University provided system security software to help minimize risk and safeguard the University’s information. The University also sponsors annual public information security awareness events. Specially prepared cyber security awareness and compliance trainings are made available as needed and/or as required to meet the special needs of business, academic, research and student groups.

6. Procedures for monitoring Employee compliance with policy and procedure (CIS17) All individuals applying for electronic access to PII are responsible for familiarizing themselves with all University policies, which include handling and protection of sensitive information. Compliance with security procedures is monitored in the normal course of business by departmental officials, including the IT Information Security Office. Violations of policy will follow established disciplinary procedures.

7. Means for detecting and preventing security system failures (CIS1, CIS2, CIS3, CIS4, CIS6, CIS10, CIS11, CIS16, CIS19) Security systems are monitored continuously. Failures are reported to appropriate staff via event messages sent to multiple communication channels. Mitigation of system failures is accomplished by implementation of high-availability fail-over systems, maintaining all security systems with current operating system and application patches and fixes, and regular maintenance.

8. Blocking of physical and electronic access to records containing Personally Identifiable Information (CIS4, CIS13, CIS14, CIS16) Centrally issued computer accounts are deactivated by means of notification from Human Resources Management, the Office of the Registrar, special request through the IT Information Security Office, or account holder sponsors. Identities of terminated individuals are sent to Information Systems, where automated and manual processes terminate access.

In urgent situations where access must be immediately terminated, a supervisor or other University official may expedite the removal of access through the IT Information Security Office.

Page 19: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

19

Servers with records that contain University PII are encrypted in motion and at rest and kept in secure facilities.

9. Contracts with third party providers; Explicit requirement to maintain safeguards consistent with those in “Standards for the protection of personal information of residents of the Commonwealth” (201CMR 17.00) (CIS13) Third party service providers with whom the University may need to share PII must be evaluated to determine whether they maintain safeguards and practices that provide for protection of PII consistent with the Massachusetts data breach regulations. Any University contract with a third-party service provider should require that the service provider protect and maintain PII consistent with Massachusetts data security regulations.

Cloud and SaaS application and service providers as well as users of said application must complete the form titled “Information Security Risk Assessment Audit for SaaS Applications” before acquisition.

10. Procedure for documenting any actions taken in connection with any breach of security and post-incident review of events and actions taken to improve security (CIS19) The University maintains Information Security Incident Management procedures. As these procedures are executed, contributors document actions taken and post-incident review to improve security where technically, operationally, and financially feasible. It is the mission of the Incident Response Team (IRT) to provide for the coordination of the response and investigation of attacks on the University’s information assets and to provide guidance on detecting, containing, and recovering from computer security incidents.

11. Authentication and Authorization Protocols (CIS4, CIS11, CIS14, CIS15, CIS16) Authentication credentials are created only for individuals who have been identified through established processes as having a right to one or more University technology resources. These accounts are only provisioned for the technology resources to which they are entitled and for which appropriate review has been performed.

12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting passwords (CIS4, CIS5, CIS20) New account holders may either receive a temporary password via email to an account for which identity had previously been established, or in person by presenting a valid picture ID. Upon receipt of the temporary password, or establishment of identity, the account holder must choose a new password that is compliant with University password complexity standards.

13. Control of data security passwords (CIS14) Passwords are kept in a location and/or format on appropriate technology systems that does not compromise the security of the data they protect. Passwords are generated and maintained on systems in secured areas.

Page 20: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

20

14. Restricting access to PII to active users and active user accounts (CIS13, CIS14) Access to PII is permitted on a need-to-know and scope-of-employment basis. The duration of time an account is active is limited to the duration of a person's role as reported by official University systems of record. Access is revoked as part of the process of termination of employment or engagement. Access can also be revoked on an emergency basis through the IT Information Security Office.

15. The University publishes and maintains a records retention and disposition schedule (CIS13) Management of the disposition of records is a component of each functional department as described in the University's Records Management Program (RMP). The purpose of the RMP is to establish, in the context of the records lifecycle, the University-wide principles and processes for records retention and disposition, and to outline the roles and responsibilities associated with the Program. At the core of the RMP is the concept that records pass through a lifecycle in three stages:

a. Creation (or receipt) b. Use c. Disposition

A graphical representation of the lifecycle is presented below:

Judgments about the eventual disposition of records are best made at the beginning of the lifecycle. Success of any disposition program depends on an early awareness of which records are to be managed, and the need to manage them through all three lifecycle stages.

16. Blocking access after multiple unsuccessful attempts to gain access (CIS6, CIS8, CIS14, CIS15, CIS16) Access to certain electronic resources is blocked after a history of unsuccessful attempts to gain access.

17. Unique identifications and passwords (CIS4, CIS5)

Create(or Receive)

• Classify: email, form, records, regulated, etc.• Decide and assign Lifecycle

Use

• Active Storage Area• Locked or encrypted

Dispose

• Destroy• Or Archive

Page 21: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

21

Unique user IDs and passwords are assigned to each account holder. Password construction rules are designed to allow account holders flexibility in creating a password while maintaining complexity.

18. Encryption of PII across public and wireless networks (CIS10, CIS13, CIS14, CIS15) University practice is that all PII sent across public and/or unencrypted networks be encrypted. PII should only be accessed via ISO-approved encrypted portable devices or media. Privately owned USB flash drives may not be used for PII.

19. Encryption of PII on portable/removable devices (CIS5, CIS13) University policy requires that all university-owned devices, and those containing PII be encrypted. No PII is to be stored on unencrypted portable/removable devices.

20. Monitoring to alert on occurrence of unauthorized access (CIS1, CIS2, CIS3, CIS6, CIS11, CIS12, CIS13, CIS16) Internal and external monitoring for the occurrence of unauthorized access is applied to systems where it is technically, operationally and financially feasible to do so. Monitoring objectives guide the granularity of each tool and technique used ((e.g., intrusion detection systems, intrusion prevention systems, scanning tools, audit record monitoring software, network monitoring software, etc.) as well as the capability of information systems to support such objectives.

21. Firewalls and operating system security patches (CIS4, CIS11) The University uses access control lists, firewalls, intrusion prevention, and other undisclosed tools at the network and system level. All University-owned and managed devices are "patched" either automatically, or, in cases where unmanaged application of a patch may disrupt operations, patches may be applied manually.

22. System security agent software (CIS2, CIS5, CIS7, CIS8) By default, all University managed computers are enrolled in automatic update services for antivirus/malware protection.

23. Manage the security life cycle of in-house developed and acquired software in order to prevent, detect, and correct security weaknesses. (CIS18) All University acquired application software are scanned to determine continual vendor support, updated to current versions, and relevant patches applied. Web applications are tested for vulnerabilities with web application scanners prior to deployment and databases are developed and maintained using standard hardening procedures.

Page 22: RITTEN NFORMATION SECURITY PROGRAM (WISP)...11. Authentication and Authorization Protocols 12. Methods of assigning/selecting passwords; Reasonably secure method of assigning/selecting

WISP August 31, 2019 Wil Khouri

22

Signature Page APPROVED BY: Ray Lefebvre December 5, 2019 Raymond Lefebvre Date Vice Chancellor and Chief Information Officer APPROVED BY:

Wil Khouri December 5, 2019 Wil Khouri Date Assistant Vice Chancellor and Chief Information Security Officer