(1) The purpose of this Procedure is to set rules for and explain: (2) This Procedure is closely aligned with the 2015 New South Wales Government Digital Information Security Policy Compliance with Minimum Controls Core Requirement as recommended for universities by the New South Wales Government ICT Strategy and draws from the following guidelines for the Information Security Industry standards: (3) This Procedure applies to: (4) Data that is personal to the User of a University IT Resource and is stored, processed, or transmitted on that IT Resource as a result of incidental personal use is not considered University data. However, University data stored on non-university IT facilities must be verifiably protected according to the minimum security standards outlined in the Information Security - Data Classification Procedure and Standards. (5) Refer to the Cyber Security Policy. (6) Objective: To control access to information. (7) Objective: To ensure authorised user access and to prevent unauthorised access to information systems. (8) There must be a formal user registration and de-registration procedure (user registration form) in place for granting and revoking access to all information systems and services. (9) The access control procedure for user registration and de-registration must include: (10) The allocation and use of privileges must be restricted and controlled. (11) The principle of least privilege must be applied. Approved access by the asset owner must only be granted if it is deemed necessary to support a legitimate operational requirement. (12) Privileges must be assigned to a different user ID from those used for normal operational activity. (13) The University will monitor IT Resources and: (14) Staff authorised to undertake routine monitoring of IT Resources and extraordinary monitoring can only do so in accordance with University policies. (15) To prevent unauthorised user access, and compromise or theft of information and information processing facilities. (16) Objective: To prevent unauthorised access to networked services. (17) Users will only be provided with access to the services that they have been specifically authorised to use. (18) Appropriate authentication methods are required to control access for remote users. (19) Automatic equipment identification must be considered as a means to authenticate connections from specific locations and equipment. (20) Physical and logical access to diagnostic and configuration ports must be controlled. (21) Groups of information services, users, and information systems must be segregated on networks. (22) For shared networks, especially those extending across the University’s boundaries, the capability of users to connect to the network must be restricted, in line with the access control policy and requirements of the business applications. (23) Objective: To ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken. (24) Any known or suspected information security event or weakness will be reported to the IT Service Desk immediately by calling +61--2 9850 HELP (4357), or by email to onehelp@mq.edu.au. (25) Significant incidents are incidents that have implications on personal security, Occupational Health and Safety, breaches of privacy or incidents that may involve the administrative or academic manager. (26) Significant incidents must be reported to the Chief Information Officer immediately. (27) Faculties or Offices that cannot positively determine that the reported security event or weakness was a false positive will report the suspected information security event or weakness to the Chief Information Officer or the Chief Information Security Officer immediately. (28) The ICT security team will evaluate the information and determine the appropriate course of action. Any investigation outside the approval of the ICT Security team will be managed by disciplinary processes as per the Acceptable Use of IT Resources Policy. (29) A process of continual improvement will be applied to the response to, monitoring, evaluating, and overall management of information security incidents. (30) Where evidence is required, it must be collected to ensure compliance with legal requirements. (31) In accordance with Australian Guidelines for the Management of IT Evidence, HB171-2003, only defined security investigators are to collect security incident evidence. The Information Security Manager will ensure proper chain-of-custody of evidence when it is suspected that the information security event may result in legal action. (32) CodeYellow is a procedure and mechanism to ensure the best signal-to-noise ratio available when information security action is needed. (33) CodeYellow is designed to enforce policy, create a viable audit trail, streamline approval and decrease the time taken to take action. It represents a concrete improvement on the current practice of unaccountable email trails, delays due to unavailability of decision makers. (34) CodeYellow is not an emergency hotline suitable for physical or personal danger or safety alarms. CodeYellow depends on an external software service (OneHelp) which does not have uptime, real-time alerting, emergency broadcast or security characteristics suitable for these kinds of situations. (35) CodeYellow works like this: (36) A OneHelp automated approval process is used as a prerequisite to actioning a CodeYellow. The key personnel involved are the current Chief Information Officer (CIO), Director, Human Resources (Dir, HR), General Counsel (GC) and Deputy Vice-Chancellor. Approval works like this (a composite view across policies): (37) A member of the Senior Leadership Team can act as a proxy for the CIO in the event of unreachability and are part of the IT management team that the ticket is routed to. (38) The Deputy Vice-Chancellor or Vice-Chancellor both have executive approval privilege should the situation warrant it or should one of the required approvers be unavailable - this is the only CodeYellow bypass mechanism. Invocation of this approval is also required to be noted on the ticket. (39) All designated people in the tech group receive CodeYellow notifications, regardless of the type of approval. (40) Each type of request strictly requires the approvers nominated unless policy changes. (41) OneHelp itself is not a security mechanism; it is a tasking mechanism that can be seen by technicians. The system is not designed to be the case management mechanism for the issue, just the approval and execution of IT tasks. (42) Although regular support centre processes are short-circuited by CodeYellow to limit the number of eyes on the incident and reduce the escalation time, a technician with the URL for a CodeYellow could access the incident. This is, of course, by design and necessary for efficient task flow. (43) The following controls must be applied: (44) All user-level and system-level strong passwords must conform to the following minimum of three (3) of the following criteria, where possible: (45) Objective: To prevent errors, loss, unauthorised modification or misuse of information in applications. (46) Objective: To protect the confidentiality, authenticity or integrity of information by cryptographic means. (47) Objective: To ensure the security of system files. (48) Objective: To maintain the security of application system software and information. (49) Objective: To reduce risks resulting from exploitation of published technical vulnerabilities. Technical vulnerability management must be implemented in an effective, systematic, and repeatable way with measurements taken to confirm its effectiveness. (50) Macquarie IT will monitor compliance with the Cyber Security Policy and related procedures. Users must promptly report breaches of the Cyber Security Policy and this Procedure and suspected information security weaknesses to the Chief Information Officer. (51) Any breach of the Cyber Security Policy and related procedures may infringe relevant legislation as listed at the outset of this Procedure and expose persons to liability under such legislation. (52) If any of the minimum standards contained within this document cannot be met on systems manipulating Confidential or Controlled data, an Exception Process must be initiated that includes reporting the non-compliance to the Chief Information Officer, along with a proposed risk assessment and management plan. Non-compliance with these standards may result in revocation of system or network access, notification of supervisors and reporting to the Office of Internal Audit. (53) Any breach of this Cyber Security Policy or related procedures may result in formal disciplinary action for students in accordance with the Student Code of Conduct. Formal disciplinary action for staff will occur in accordance with the Misconduct / Serious Misconduct clauses as outlined in the Staff Code of Conduct, the Macquarie University Academic Staff Enterprise Agreement 2018 and the Macquarie University Professional Staff Enterprise Agreement 2018. (54) Macquarie University may refer serious matters or repeated breaches to the Vice-President, People and Services, Director, Human Resources, the Head of the relevant Organisational Unit or to the appropriate external authorities which may result in civil or criminal proceedings. (55) External providers who breach the Cyber Security Policy or related procedures will be subject to suspension of access, termination of contract and / or further legal action. (56) Nil. (57) Commonly defined terms are located in the University Glossary. The following definitions apply for the purpose of this Procedure. In this Procedure, unless a contrary intention appears:Information Security Procedure
Section 1 - Purpose
Scope
Section 2 - Policy
Section 3 - Procedures
Part A - Access Control
Operational requirement for access control.
User Access Management
User registration
Privilege Management
User Responsibilities Objective
Network Access Control
Use of network services
User authentication for external connections
Equipment identification in networks
Remote diagnostic and configuration port protection
Segregation in networks
Network connection control
Part B - Information Security Incident Management
Reporting information security events and weaknesses
Reporting and management of information security events
Part C - Information Security Requests (‘Code Yellow’)
Approval Mechanism
Issue concerning
Staff
Students
Other Party
How many to approve
Associated Policy
Definition
Account access / lockout
CIO and Director, Human Resources
CIO and DVC
CIO and DVC
1
Acceptable Use of IT Resources Policy
1) Account Access: Person other than allocated owner needs access to email account after owner has left MQ.
Access is only given to the email archive (Postini) and never the account directly. This is to keep the identity of
account owner intact. System Administrator of Postini can grant access.
2) Lockout: MQ Employee is being locked out of their account for disciplinary reasons or has been dismissed etc. MAY
NEED TO ACT IMMEDIATELY. Sys Admin's need to lock / block OneID account access.
Account extension
CIO or Director, Human Resources
CIO or DVC
CIO or DVC
1
Acceptable Use of IT Resources Policy
Academic or professional staff member requests access to their email after they leave MQ (for more than what is
already allowed). The IT Service Desk can extend account after access is approved.
Digital surveillance
CIO and Director, Human Resources
CIO and DVC
CIO and GC
1
Acceptable Use of IT Resources Policy and Cyber Security Policy
SERIOUS and SENSITIVE. Governed by legislation. Approval will be given to conduct digital surveillance on email
or digital records, disk copy of computer etc. CIO will coordinate.
Privacy breach
GC and CIO
GC and CIO
GC and CIO
1
Cyber Security Policy
Means that an MQ system has been hacked or breached. Staff need to act extremely quickly to mitigate breach.
Coordination point may come from many places – IT Security to be made aware a.s.a.p.
Law enforcement /
regulatoryGC or CIO
GC or CIO
GC or CIO
1
Agreement with Legal Counsel
Subpoena related searches. Subpoena from state or Federal police will be received by Legal Counsel who may ask
that digital records be provided directly to them. NEVER DEAL WITH POLICE DIRECTLY, ALWAYS REFER THEM TO
MQ Security. Nominated people within the IT Service Desk can provide information after approval given.
Personal Information Access
GC or CIO
*Pre Approved for
Deidre Anderson
Darren Peters
Michael Carley
John DurbridgeGC or CIO
Pre approved for student information.
1 for staff information.Acceptable Use of IT Resources Policy and Privacy Policy
1) IT Service Desk can release student information to Deidre Anderson, Darren Peters, Michael Carley or John Durbridge
immediately if they ask for it - its pre approved.
2) Approval is needed to release staff information by General Counsel or CIO. Nominated people within
Macquarie IT / IT Service Desk can provide information after approval given.Limitations
Part D - Password Selection and Management
Part E - Information Systems Acquisition, Development And Maintenance
Correct processing in applications
Cryptographic controls
Key management
Security of system files
Security in development and support processes
Technical vulnerability management
Compliance
Top of PageSection 4 - Guidelines
Section 5 - Definitions
View Document
This is not a current document. To view the current version, click the link in the document's navigation bar.
A patch management process must be established, implemented and monitored for all systems, maintaining a minimum patch level of n-1. This process will be managed by the ICT change management policy.