Manage Security Measures: Technology security should be managed such that security measures are in line with business requirements. This includes:
- translating risk assessment information to IT security plans,
- implementing and monitoring the IT security plan, and, updating it to reflect changes in the IT configuration,
- assessing the impact of change requests on IT security,
- aligning IT security procedures to other policies and procedures.
|
|
| Identifying and authenticating access : The logical access to, and use of the information services function’s computing resources.
|
|
| User Account Management: Ensure timely action relating to requesting, establishing, issuing, suspending and closing of user accounts.
|
|
| Data Classification: classify data in terms of sensitivity by a formal and explicit decision by the data owner according to the data classification scheme.
|
|
| Violation and Security Activity Reports: assure that violation and security activity is logged, reported, reviewed and appropriately escalated on a regular basis to identify and resolve incidents involving unauthorized activity.
|
|
| Incident Handling: Maintain a computer security incident handling capability to address security incidents
|
|
| Cryptographic Key Management: define and implement procedures and protocols to be used for generation, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and unauthorized disclosure.
|
|
| Malicious Software Prevention, Detection and Correction: Regarding malicious software, such as computer viruses or trojan horses, management should establish a framework of adequate preventative, detective and corrective control measures,
|
|
ebc Service Commitments
- the development and presentation of EBC security program per ministry, at ITMCs and potentially MMCs, including threat risk and vulnerability assessments, business continuity planning, information classification, disaster recovery planning and testing, security clearance implementation, inappropriate use, security training, etc, and implementation of approved ministry priorities,
- Review and recommendations, and if approved, implementation of a new firewall configuration for Thunder Bay operations, prior to new ViSION implementation,
|
|
ebc Service Commitments
Logon and Application ID and Password Issuance
- upon management approval and receipt of a Network Access Request Form (NARF), and after being acknowledged within 1 day, a logon or application ID and password will be issued within 5 business days, 95% of the time,
- Upon special request a premium level of service can be invoked where the 5 days are collapsed to 1 business day,
Upon receipt of a Service Request at the ebc Service Desk,
- a logon password will be acknowledged within 20 seconds and completed within 1 hours 95% of the time,
- an application password will be acknowledged within 20 seconds and completed within 2 hours 95% of the time,
- a PKI certificate will be acknowledged within 1 day and modified within 10 days, 95% of the time.
|