Sistem Perakaunan Berkomputer Standard Untuk Kerajaan Negeri (Speks) Information Security Policies
Sistem Perakaunan Berkomputer Standard Untuk Kerajaan Negeri (Speks) Information Security Policies
Version 1.0
March 2006
Introduction.................................................................................... 1
II.
III.
IV.
V.
1.0
2.0
3.0
4.0
5.0
6.0
7.0
8.0
9.0
10.0
1.1
1.2
Policy Statement..................................................................... 10
2.2
Policy Statement..................................................................... 11
3.2
Policy Statement..................................................................... 12
4.2
Policy Statement..................................................................... 13
5.2
Policy Statement..................................................................... 14
6.2
Policy Statement..................................................................... 15
7.2
Policy Statement..................................................................... 16
8.2
Policy Statement..................................................................... 17
9.2
Policy Statement..................................................................... 18
(i)
10.2
11.0
12.0
13.0
14.0
Policy Statement..................................................................... 19
11.2
Policy Statement..................................................................... 20
12.2
Policy Statement..................................................................... 21
13.2
Policy Statement..................................................................... 22
Compliance .................................................................................... 23
14.1
14.2
Policy Statement..................................................................... 23
DEFINITIONS ...........................................................................................24
(ii)
DOCUMENT IDENTIFICATION
DOCUMENT NAME:
Sistem
Perakaunan
Berkomputer
Standard Untuk Kerajaan Negeri
(SPEKS) Information Security Policies
REFERENCE NO:
SPEKS-POL-01
VERSION NO:
1.0
DATE CREATED:
March 2006
(iii)
Date
Section Affected
Description of Change
(iv)
I.
Introduction
This document, the Sistem Perakaunan Berkomputer Standard Untuk Kerajaan
Negeri (SPEKS) Information Security Policies, provides the policies that should be
followed by the Management and Staff associated with the use, support and
management of SPEKS in the Bendahari Negeri (BN) and Pusat Tanggungjawab (PTJ).
II.
information
cannot
be
disclosed
without
SPEKS
Information
Security
Policy
should
then
minimise
the
4. Separation of duties
The duties of record creation and corrections must be segregated from the
duty of approval of such records. Separation of duties also means the act of
separating the operations and network teams;
5. Auditing
The purpose of this activity is to identify security incidents or situations that
threaten security. Therefore, ICT assets such as computers, servers, routers,
firewalls and networks must implement audit trail;
6. Recovery and Continuity
Process must be in place to prevent significant or prolonged system
disruption. In the event when such disruptions do occur, there must be plans
for recovery and continuity of SPEKS related operations within an acceptable
timeframe; and
7. Compliance
SPEKS Security Policy must be read, understood and complied with to
prevent any breach against it which could threaten SPEKS security.
SPEKS Security Policy Scope
Compliance to the SPEKS Information Security Policies will be compulsory to the
extent that the management and handling of information and the ICT facilities as
well as peripheral equipment, forms and materials in the complete information life
cycle activity related to SPEKS are within the control of the management of State
Office. In this context the complete information life cycle covers the PTJs and the
BN Offices.
The policies are a high level collection of directives that govern how information
assets, are managed, protected and distributed within State Office and the PTJs.
The implementation of these policies is mandatory and State Offices must have a
action plan in place to ensure full compliance.
In general where there are existing Government policies, instructions, guidelines and
procedures, these will take precedence over the respective elements mentioned in
Ref No.: SPEKS-POL-01
Version: 1.0
Date : March 2006
this SPEKS Information Security Policy document. The exception is in areas where
specific higher security measures are enforced in the SPEKS Information Security
Policy in areas where the classification of the assets or the operating area are of the
level that specifically require higher security measures than that specified in the
Government policies, instructions, guidelines and procedures.
Related Documents for Reference
The following are the related documents that have already been in place and should
be referred to as preceding documents:
1. MyMIS Garis Panduan Pengurusan Keselamatan ICT Sektor Awam Malaysia;
2. Akta Keselamatan;
3. Akta Rahsia Rasmi 1972;
4. Akta Acara Kewangan 1957;
5. Akta Kawasan Larangan dan Tempat Larangan 1959;
6. Pekeliling Am Bil 3 Tahun 2000 Rangka Dasar Keselamatan Teknologi
Maklumat dan Komunikasi Kerajaan;
7. Pekeliling Am Bil 1 2001 Mekanisme Pelaporan Insiden Keselamatan
Teknologi Maklumat dan Komunikasi (ICT);
8. Akta Jenayah Komputer 1997;
9. Akta Tandatangan Digital 1997;
10. Pekeliling Kemajuan Pentadbiran Awam Bil.1 Tahun 2003 Garis Panduan
Mengenai Tatacara Penggunaan Internet dan Mel Elektronik di Agensiagensi Kerajaan; and
11. Arahan Perbendaharaan.
III.
Documentation Hierarchy
This document, the SPEKS Information Security Policy, is derived from the SPEKS
Information Security Policy and Standards document that governs the information
security management, operation and use of SPEKS. This is created for easy reference
on the governing policies.
The SPEKS Common Information Security Procedures contains the common
procedures for implementation based on the SPEKS Information Security Policies and
Standards.
Senior Management will find the SPEKS Information Security Policies document
sufficient for an understanding of overall governing policy while the management
and officers involved in the daily information security management, operation and
use of SPEKS will need to refer to all these documents for guidance.
The above document relationships are depicted in the following chart:
SPEKS Information
Security Policies and
Standards
SPEKS Information
Security Policies
(Policies extracted out from the
Primary Document for easy
reference)
(Primary Document)
SPEKS Common
Information Security
Procedures
(Procedures Document)
IV.
Consequently this SPEKS Security Policy document will be the guiding document for
adherence and enforcement in order to ensure the proper and secure use of the
system. Senior Management in State Governments must ensure that the SPEKS
Security Policies are enforced and necessary corrective or disciplinary actions should
be taken in the event of severe non adherence or non compliance.
Responsibilities
It is the duty of all employees of the State Office and third parties providing services
to, or acting as agents of the State Office to:
1. Take all necessary precautionary measures to safeguard the information
that they create, receive or control, as well as the facilities that they use;
2. Comply with the SPEKS Information Security Policies;
3. Promptly report all security incidents to the management to ensure that
appropriate actions are taken; and
4. Diligently use the SPEKS information assets and supporting ICT facilities for
its intended and authorised purpose and nothing more; as use of such assets
and facilities for other than the intended and authorised purpose will
constitute a violation to policy that may result in appropriate disciplinary
action.
Implementation of the SPEKS Information Security Policies is the responsibility of line
Management and shall be monitored by State SPEKS Implementation Committee
(Jawatankuasa Pelaksanaan SPEKS Negeri), State Internal Audit and Jabatan Audit
Negara as External Auditor.
The responsibility for implementing the SPEKS Common Information Security
Procedures lies with the Pegawai Pengawal/ Ketua Jabatan.
Key Support Relationships
SPEKS application support and maintenance continue to be provided by JANM. JANM
will manage the application bug fixing and patch release and any enhancements
request from the States. The State Offices are the users of the SPEKS application and
each State Office will have their own complete SPEKS application and hardware
installed and will provide first level support to the State Offices.
Ref No.: SPEKS-POL-01
Version: 1.0
Date : March 2006
All State Offices are expected to have one common version of SPEKS with the
appropriate patch releases implemented so that JANM will be able to render the
appropriate support to the State Offices.
Issues of common interest e.g. training and refresher training for State users,
Frequently Asked Questions and Help Documentation will be centrally coordinated
through JANM.
State Offices may have specific requirements from time to time that are unique to
the particular State. JANM is expected to moderate and control the development of
such requirements so that a common version usable across all States is always
achieved to enable the application to be effectively supported.
Unless qualified otherwise, the term SPEKS system referred in this document covers
the SPEKS application hardware and software as well as all peripheral equipment and
activities that handle a part of the information life cycle related to SPEKS. This
includes the payment vouchers and invoices and the people operating SPEKS.
Updates and Maintenance of Documents
The SPEKS Information Security Policies and Standards (and this derived document,
SPEKS Information Security Policies), and the SPEKS Common Information Security
Procedures documents are subject to document control.
The responsibility for updates and corrections to these documents lies with Jabatan
Akauntan Negara Malaysia (JANM) upon instruction or endorsement by the SPEKS
Steering Committee.
State Offices are not expected to modify these documents. Any request and
suggestions for modification or changes must be directed to JANM as follows:
Name
Address
Telephone No. :
03-8882 1183
Facsimile No.
03-8882 1043
Terminology
Unless specific reference is made to Jabatan Akauntan Negara Malaysia (JANM) or
the Bendahari Negeri (BN) or the Pusat Tanggungjawab (PTJ), the term State Office
or State Offices used in this document refers to the BNs and PTJs and other related
organisations that are managing or using SPEKS in the States in Malaysia.
The PKN/BN also has the Unit Teknologi Maklumat (UTM) to provide the necessary
ICT support to the SPEKS application. The WAN network infrastructure in most States
is managed by the Pusat Komputer /Bahagian Teknologi Maklumat/Unit Teknologi
Maklumat of the Pejabat Setiausaha Kerajaan Negeri (SUK) with few exceptions.
V.
1.0
Security Management
1.1
1.2
Policy Statement
All employees using, administering or managing SPEKS will be given
designated responsibilities in the management and use of SPEKS as defined
in the SPEKS Security Management Standards. Employees must adhere to
their scope of responsibilities defined and must report to the Jawatankuasa
Pelaksanaan SPEKS Negeri through their respective Ketua Jabatan/ Pegawai
Pengawal, any exceptions or shortcomings or areas that may not have an
identified process owner.
10
2.0
2.2
Policy Statement
All employees of State Offices should be briefed of their responsibilities
towards the proper use of ICT facilities and enforcement of ICT Security. All
employees must familiarise themselves with the ICT Security Policies and to
comply with the relevant procedures that relate to their work and
obligations and also to practice and promote safe computing practices.
Employees must familiarise with the standard operating procedures in the
use of SPEKS and must provide feedback on any discrepancies found in the
operation of SPEKS, or in the potential anomalies or misuse of privileges in
using SPEKS by other employees.
11
3.0
3.2
Policy Statement
Access to SPEKS and related facilities should be controlled, taking into
account State Office policies for information dissemination and entitlement
(such as the "need to know" and "least rights" principle), and any contractual
or legal requirements to protect access to data or services.
Staff assigned specific privileges and accesses to SPEKS facilities must ensure
that they work within their authorised privileges and responsibility and to
report to their Ketua Jabatan/Pegawai Pengawal when their job function
(and hence their access privileges) changes.
12
4.0
4.2
Policy Statement
Information processing facilities should be physically protected from security
threats and environmental hazards.
13
5.0
Installation Management
5.1
5.2
Policy Statement
System software and hardware should be managed in a controlled and
consistent manner for the application systems to operate in a controlled
manner. All new hardware and software installations and upgrades are to be
planned formally and notified to all interested parties ahead of the proposed
installation date. Information Security requirements for new installations are
to be circulated for comment to all interested parties, well in advance of
installation.
14
6.0
Computer Operations
6.1
6.2
Policy Statement
Data Owner must ensure the proper management and operation of all SPEKS
information processing facilities and to minimise system disruptions. The
Computer Operations practices should ensure that the objectives of
confidentiality, integrity and availability are being met. This includes
segregation of incompatible duties, logging and review of key activities and
backup and recovery procedures are in place in the event of an emergency.
15
7.0
7.2
Policy Statement
Changes to systems including patches should be applied in a controlled
manner so that the proper functioning, stability and security of systems are
not compromised. In addition, this Policy also ensures that changes to
systems are only implemented on the basis of formal requests and plans
authorised by management and that continued compatibility of all
components is maintained.
16
8.0
Problem Management
8.1
8.2
Policy Statement
The Data Owner must ensure that all system and operational problems are
logged and resolved in a controlled and proper manner. All logged problems
should be reviewed by management on a periodic basis and all outstanding
problems should be followed up and resolved in a timely manner.
Every employee must adopt proper usage and safe computing practices as
advised by the State Office from time to time and to report problems and
unusual incidents including virus or worm attacks, system performance
degradation or any security compromises that affect or potentially affect
confidentiality, integrity and availability.
17
9.0
9.2
Policy Statement
Application developed and maintained for SPEKS must always follow a
formalised development process and must be maintained and supported with
the appropriate change control, configuration management and patch
release management program in place. Appropriate controls must be built
into the application to ensure that the integrity and confidentiality of
information entered, processed and stored are adequately protected.
18
Installation
and
maintenance
of
the
network
and
data
Policy Statement
Access to LAN and WAN for the SPEKS system should be controlled and
restricted to authorised users. The use, resilience and bandwidth of the
network should be based on the requirements of SPEKS. Data transmitted
should be protected against loss; corruption or repetition; and unauthorised
disclosure or modification.
Where the network is shared with other services and applications, the
Network Service Provider must ensure that performance and availability
targets for the running of SPEKS application are being met.
19
11.2
Policy Statement
Perimeter Logical Protection must be implemented to protect the internal or
closed network from the external public network. The design and
implementation and maintenance of the firewalls systems must be
implemented with appropriate screening and detection policies to ensure
protection from vulnerabilities that will be publicly available from time to
time.
20
12.2
Policy Statement
Virus and malware detection and prevention measures and appropriate user
awareness procedures must be formally implemented and enforced. Only
software with the appropriate software licenses can be used on State Office
SPEKS equipment and unauthorised or unlicensed software is strictly
prohibited. Files from outside of the office must be screened for viruses and
malware before copying onto State Office SPEKS PCs and Servers.
21
13.2
Policy Statement
A Business Continuity Plan must be developed and maintained to ensure
continuity of SPEKS related business processes which are supported by SPEKS
application,
SPEKS
related
hardware
and
network
and
operational
procedures. The plan must be tested to ensure that the procedures and the
recovery process are capable of providing the required level and timeliness
of support to the critical business processes surrounding SPEKS.
Employees computers should only be used for doing normal operation and
processes and should not store any critical data and files that are required
for recovery.
22
14.0 Compliance
14.1
This Policy and Standard establishes guidelines which apply to the SPEKS
information processing facilities, operational procedures and business
processes which are within the control of the State BN Office.
14.2
Policy Statement
The design, operation, use and management of information systems may be
subject to statutory, regulatory and contractual security requirements.
Advice on specific legal requirements should be sought from the
Governments legal advisers, or suitably qualified legal practitioners.
The security policies, standards and procedures governing the SPEKS
application and information handled by SPEKS should be regularly reviewed.
23
DEFINITIONS
1. Policies
Policies are high-level statements that must be communicated to people inside, and
in some cases outside, the organization. A policy is typically a document that
outlines specific requirements or rules that must be met. In the information/
network security realm, policies are usually point-specific, covering a single area.
Policies are higher-level requirement statements than standards, although both types
of management instructions require compliance.
2. Standards
Standards provide specific technical requirements. A standard is typically collections
of system-specific or procedural specific requirements that must be met by
everyone.
While policies are intended to last for up to five years or more, standards are only
intended to last a few years. Standards will need to be changed considerably more
often than policies because the manual procedures, organizational structures,
business processes, and information systems technologies mentioned in standards
change so rapidly.
3. Guidelines
A guideline is typically a collection of system specific or procedural specific
suggestions for best practice. They are not requirements to be met, but are
strongly recommended.
4. Procedures
Procedures are sometimes called operating procedures or department operating
procedures. Procedures are specific operational steps that are used to complete a
task or achieve a goal. Often this is specific to the application and its specific
infrastructural equipment and departmental workflow processes. However along side
with this policy and standards, only the common procedures will be produced as
others will fall under the SPEKS applications Standard Operating Procedures which
provides step by step information how the SPEKS application is to be used.
Ref No.: SPEKS-POL-01
Version: 1.0
Date : March 2006
24
The example that follows illustrates the difference between a policy, standard,
guideline and procedure:
A guideline would suggest the best way to manage the activity of logical
access control. (Note that depending on the area and requirements,
guidelines may or may not be produced); and
A procedure would describe how to manage the access control activity and
equally important is to maintain the appropriate records to ensure
compliance to the policy.
25