Information Security Controls Standard

SS-17-001 Information Security Controls

Effective Date: 7/1/2017

Review Date: 12/1/2020

Purpose

In accordance with the Information Security Control Policy, each agency operating within a shared-service environment is responsible for ensuring that applicable NIST 800-53 (rev. 4) security controls are implemented and operated effectively. This standard establishes responsibilities for security controls per application and/or system operating within a shared-services environment.

Standard

Agencies, service providers and integrators will comply with all applicable security controls outlined within the standard in accordance with NIST 800-53. The applicable control families are listed below:

 Technical Controls

Operational Controls

Managerial Controls

AC-Access Control

AT- Awareness Training

CA- Security Assessment /Authorization

AU -Audit & Accountability

CM - Configuration Management

CP- Contingency Planning

ID - Identification * Authentication

IR - Incident Response

PL- Planning

SC - Sys & Communication Protection

MA - Maintenance

RA - Risk Assessment

 

MP- Media Protection

SA - System & Services Acquisition

 

PE- Physical & Environmental Protection

 
 

PS- Personnel Security

 
 

SY- System & Information Integrity

 

The Information Security Control Matrix (See Appendix A) provides a perspective of shared technical responsibilities for all agencies, service providers, and integrators across the State’s IT enterprise. These responsibilities are based on current NIST best practices and existing enterprise contracts with current service providers and integrators. Appendix A is a tool to demonstrate compliance among State agencies during any and all scheduled IT audits and assessments. If an agency believes that a control is not properly aligned with their operational model, the agency is required to submit a request for an exemption to GTA ([email protected]). Although the agency may not have technical responsibilities for certain NIST 800-53 controls, the agency assumes ultimate accountability for NIST 800-53 compliance requirements. Agencies, service providers and service integrators must comply with all applicable NIST security controls as listed in the matrix below.

Agencies whose IT solutions are hosted, managed and maintained within the NADC or by a 3rd party service provider are required to abide by this standard and the attached security control matrix. This standard does not apply for any systems and/or applications where security is provisioned, implemented and maintained solely by the agency’s staff. If the Information Security Control Standard does not apply, agencies are still required to comply with all other enterprise IT standards.

*Refer to the diagram below as an example

Information Security Control Matrix

*All other State enterprise IT standards do apply in all three scenarios above.

Definition

Accountable Party: Entity for whom final ownership will be directed for instances of security incidents, breaches or disruptions.

Multisourcing Service Integration (MSI): A company that is responsible for coordinating and overseeing the delivery of technology services to state agencies by multiple service providers.

NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations- Provides a catalog of security controls for all U.S. federal information systems except those related to national security.

Responsibility: A group or individual who completes the task.

Service Provider: Organization, business or individual which offers service(s) to others in exchange for payment.

Shared-service Environment: A dedicated unit (including people, processes and technologies) that is structured as a centralized point of service and is focused on defined business functions and providing services for multiple agencies

Appendix A (See Attached File)