Information and Cyber Security Policy For Organizations 21 10 2021
Information and Cyber Security Policy For Organizations 21 10 2021
Versions
Version Prepared by Reviewed by Authorized by Issue Date Description
1 Research, Policy Review Board of Version 1
Policy and Committee, Directors of Sri
Projects Team Senior Lanka CERT
of Sri Lanka Management Date:
CERT of Sri Lanka
CERT
Date: 25th Date: 08th
August 2021 October 2021
Attribution
Published by
Research, Policy and Projects Division
Sri Lanka CERT|CC
Room 4-112, BMICH, Colombo 7
Sri Lanka
Telephone: +94 11 269 1692, Fax: +94 11 269 1064
Email: [email protected]
Websites: www.cert.gov.lk, www.onlinesafety.lk
Note
This publication will remain as a “Draft Version” until being approved by the relevant
Authority to adopt as a Policy.
Version 1 2
Table of Contents
Acronyms ……………………………………………………………….. 4
Introduction ……………………………………………………………. 6
Glossary ………………………………………………………………. 36
References ………………………………………………………… 39
Version 1 3
Acronyms
AMC Audit and Management Committee
CCTV Closed-circuit Television
CD Compact Disk
CERT Computer Emergency Readiness Team
CIA Chief Internal Auditor
CII Critical Information Infrastructure
CIO Chief Innovation Officer
DVD Digital Video Disc
HOO Head of Organization
HTTPs Hypertext Transfer Protocol Secure
ICTA Information and Communication Technology Agency
IPS/IDS Intrusion Prevention System/Intrusion Detection System
ISC Information Security Committee
ISO Information Security Officer
ISO 27002 International Organization for Standardization for Information Technology –
Security Techniques - Information Security Management Systems
IT Information Technology
LGC Lanka Government Cloud
LGN Lanka Government Network
MFA Multifactor Authentication
MISS Minimum Information Security Standards
NDA Non-Disclosure Agreement
NIST National Institutes of Standards and Technology
PIN Personal Identification Number
RMC Risk Management Committee
RPO Recovery Point Objective
RTO Recovery Time Objective
SFTP Secure File Transfer Protocol
SIEM Information and Event Management
SSD Solid-state Drive
SLA Service Level Agreement
SSL Secure Socket Layer
TLS Transport Layer Security
USB Universal Serial Bus
VPN Virtual Private Network
Version 1 4
Executive Summary
Many government organizations in Sri Lanka now depend on the reliable functioning of
digital systems and infrastructure. Malicious actors, however, can exploit these digital
systems to cause harms such as theft of sensitive information, disruption of day to day
operations, damage to the reputation of organizations which in turn can lead to the loss
of public trust and confidence in government systems, and place nation’s security,
economy, safety and wellbeing at a risk.
To effectively address these cyber security risks, the Sri Lanka Computer Emergency
Readiness Team (Sri Lanka CERT), the organization which has the mandate for
protecting the cyber space in Sri Lanka, has developed an Information and Cyber
Security Policy for use by government organizations in order to protect their digital
systems and resources from various cyber security threats. The policy provides a risk
based approach for implementing an information security program at organizational
level, and guides organizations in identifying digital assets that should be protected,
developing appropriate measures to protect assets, detecting information security
incidents and in responding to and recovering from cyber security attacks in an efficient
and effective manner.
The policy is developed based on the international best practices and standards such as
International Organization for Standardization (ISO) and National Institute of Standards
and Technology (NIST), and has been extensively reviewed by the information security
experts and senior government officers.
Approval from the Cabinet of Ministers will be obtained for the Policy for mandatory
use by all the government organizations, with the instructions that all the heads of
organizations are accountable for the implementation of the policy. Sri Lanka CERT shall
facilitate and provide recommendations to all government organizations in
implementing the policy, and shall evaluate the performance of organizations in
implementing the on an annual basis.
Version 1 5
1. Introduction
1.1. Government organizations in Sri Lanka have progressed rapidly over the past
decade in developing digital systems to carry out their daily administrative work and
to provide services to the general public, other government organizations as well
as to the private sector. As organizations become increasingly dependent on digital
systems, protecting information and digital infrastructure from unauthorized
access, disclosure and destruction, and from natural disasters such as floods and
fire have also become a high priority. Information and cyber security policies
therefore, should be implemented in organizations to protect digital systems and
reduce the risk of operational disruptions in order to provide services in a secure
and efficient manner.
1.2. This document presents the information and cyber security policy for government
organizations. It provides a set of policy statements that specifies the direction
upon which controls, standards and guidelines should be implemented by
government organizations in handling information security threats, protecting
hardware, software and data, mitigating vulnerabilities, and establishing an
information and cyber security governance structure. It further provides guidelines
to employees on their responsibilities in relation to information and cyber security.
1.3. All the government organizations that are defined as public authorities in the Right
to Information Act No 12 of 20161, are required to comply with the policy
statements outlined in this document. Heads of organizations are required to
understand the content of the policy, provide leadership to the implementation of
the policy, and assume ultimate accountability and responsibility for the
organization's information security activities and staff.
1.4. The policy statements shall be used to benchmark each organization’s status in
adopting information and cyber security measures on an annual basis. This will
enable organizations to identify the areas which need attention and where
improvements need to be carried out to secure the organization against various
cyber security threats.
Version 1 6
2. Information Security Policy Framework
2.1. In line with the implementation of the Information and Cyber Security Strategy
(2019:2023)2, the Information Security Policy Framework is developed to assist
government organizations to implement Information and Cyber Security Policy.
The Policy Framework facilitates government organizations by providing other
necessary resources such as the Minimum Information Security Standards
(MISS)3, the Information Security Implementation Guide4, and the Technical
Guides that are necessary for organizations to protect information, systems and
digital assets from various information security events. Figure-1 presents an
overview of the Information Security Policy Framework.
Information and
Cyber Security Information and Cyber
Strategy (2019:2023) Security Policy
Minimum Information
Security
Standards
Information Security
Policy Framework
Information and Cyber
Security Implementation
Guide
Acts, Cabinet
Directives and
Circulars
Assessment Tool
Version 1 7
2.2. The information security policy framework includes the following:
2.2.1. Information Security Policy which is the main focus of this document, provides a
set of policy statements which organizations shall comply with. These policy
statements outline the essential controls and provides direction to government
organizations in protecting information, systems and infrastructure from
information security events.
2.2.2. Minimum Information Security Standards3 outline the minimum acceptable level
of information security controls that shall be adhered to by the respective
organizations. Two sets of minimum security standards are developed; one for
organizations maintaining critical national information infrastructure (CNII), and
the other for organizations which fall into the category of non CNIIs.
Organizations maintaining CNII are required to adhere to a higher level of
standards as disruption to such services would have a significant impact on the
country’s economy, national security and public health.
Version 1 8
3. Information and Cyber Security Policy
3.1. Introduction
3.1.1. The Information and Cyber Security Policy sets forth rules, guidelines and
processes for government organizations, creating a standard for the acceptable
use of organization’s information technology, including information, systems and
digital infrastructure to preserve confidentiality, integrity and availability of
information and systems used by organizations.
3.1.4. This Policy is applicable to any type of government organization that are defined
as public authorities in the Right to Information Act No 12 of 20161. The Policy
shall also be applicable to the relevant third party service providers who manage
IT services on behalf of the government organizations.
Version 1 9
3.1.5. This document will be updated periodically to provide technical and security
guidance for government organizations to support good information security
practices.
Version 1 10
organizations’ information security objectives, develop action plans, and secure
funding for information security activities.
3.2.1.2. Identify function: The identify function facilitates organizations to develop an
adequate understanding of how to effectively manage information and cyber
security risk to systems, assets, data, and functionalities (adopted from NIST10).
To comply with the identify function, organizations shall identify assets which
are in the forms of information, critical information infrastructure and IT
devices, and assess the risks associated with those assets to establish a formal
asset management system.
3.2.1.3. Protect function: The protect function outlines appropriate safeguards required
to ensure uninterrupted delivery of critical infrastructure services (adopted
from NIST10).
To comply with the ‘protect’ function, organizations shall implement
appropriate controls and safeguards to prevent, limit or contain the impact of
a potential information security event or incident. This includes but is not
limited to controlling user access to assets, installing firewalls, antimalware
software, conducting systems audits, data encryption, and establishing backup
strategy.
3.2.1.4. Detect function: The detect function defines the appropriate mechanisms
required to identify the occurrence of a cybersecurity event (adopted from
NIST10).
To comply with policy statements covered by the ‘detect’ function, the
organizations shall put in place mechanisms to detect information and cyber
security activities and events in a timely manner. Organizations shall analyze
logs and deploy automated tools to detect incidents in an efficient manner.
3.2.1.5. Respond function: The respond function defines the actions that should be
taken in response to a detected information and cybersecurity incident or an
event (adopted from NIST10).
To comply with this function, organizations shall develop and implement
incident response plan for responding to an information and cyber security
event in efficient and effective manner.
3.2.1.6. Recover function: The recover function identifies appropriate activities to
maintain plans for resilience and to restore any capabilities or services that
were impaired due to an information and cyber security incident (adopted from
NIST10).
To comply with ‘recover’ function, the organization shall develop disaster
recovery plan and activate disaster recovery plan to timely recover normal
operations to reduce the impact from an information and cyber security
incident.
Version 1 11
Table 1. Scope of Policy Coverage
Version 1 12
4. Policy Statements
the organization, and ensure resources
4.1. Information Security are available to support the information
Governance security activities and make it
successful.
The HOO shall also provide leadership
to create an information security
culture within the organization, where
users comply with information security
policies and guidelines, and work
proactively towards protection of
information and systems they use.
Compliance: Applicable to all
organizations
Version 1 15
4.1.4. Risk Management Misappropriation of such resources
Committee (RMC) would lead to disciplinary actions as
stipulated in the Establishment Code
and the legal actions under the
The organization shall establish a Risk Computer Crimes Act or any other
Management Committee. This applicable Acts of Law.
Committee shall be an independent
Compliance: Applicable to all
committee directly reporting to the
HOO, and holds the responsibility of organizations
overseeing the risk management of the
organization with respect to 4.1.6. Capacity Building
information and IT assets.
The RMC shall identify and evaluate The organization shall build the
risks in relation to assets, and shall information security capacity of the
propose appropriate controls to ISC to accountable individuals (ISO, CIO, CIA,
take necessary actions to mitigate the Assets Owners, etc.) and the end users
risks. The Committee shall include through conducting information
process owners (sectional heads), asset security awareness and training.
owners, and the ISO. The deputy Head
of the organization shall be the Information security awareness
chairperson of the Committee. activities shall be carried out to
promote security, and to inform the
Compliance: Applicable to CNII staff of security measures. Training
operators activities are essentials to build relevant
and needed security knowledge and
skills among the government staff.
4.1.5. End User Responsibilities
Information security capacity building
shall be an ongoing activity of the
Information security is everyone’s organization and it shall be included in
responsibility. All end users are the annual training plan.
required to behave responsibly and
comply with the Policy regarding the Compliance: Applicable to all
protection of information and IT assets organizations
which they have access to.
End user responsibilities shall include 4.1.7. Personnel Security
but not be limited to appropriate use of
information, computing devices, emails,
internet, social media, telephones, and Any one appointed or transferred to a
faxes. All users shall understand and role or position that involves dealing
adhere to end user responsibilities with information classified as “Secret”
outlined in the Information and Cyber or “Confidential”, or accessing CNII
Security Implementation Guide4, and must go through a security clearance
applicable information security before they are appointed for or
practices required by this Policy. transferred to such position, and
Version 1 16
periodic security clearance checks objectives to overall organizational
during their tenure. activities.
Wherever necessary the organization Compliance: Applicable to all
shall review the background of organizations
designated officials before they are
appointed to positions related to
information security. 4.1.10. Policy Compliance
Compliance: Applicable to CNII
operators The organization shall comply with the
Information and Cyber Security Policy.
Sri Lanka CERT shall conduct annual
4.1.8. Action Plans information security readiness
assessments to determine the level of
compliance, and the organization shall
The organization shall develop and
facilitate Sri Lanka CERT to conduct
implement information security action
such assessments.
plans (long term, medium and short
term plans) which defines the way in Compliance: Applicable to all
which security is to be guaranteed in organizations
realizing the objectives of the
organization.
Based on the information security 4.2. Identify Assets,
priorities determined by a risk Owners, Users and Risks
assessment, the organization shall also
allocate a budget for information
security activities in the action plans.
Compliance: Applicable to all
organizations
Version 1 17
(assets) that are of value to the 4.2.2. Critical National Information
organization, owners of the assets Infrastructure (CNII)
their roles and responsibilities, and
current risks associated with assets.
Critical National Information
Infrastructure are the systems or
4.2.1. Information Assets and IT facilities, the failure or destruction of
Assets which would have a devastating impact
on national security, governance,
economy, health and social well-being
The organization shall identify it’s all of a nation.
important information assets. An Organizations which maintain CNII shall
information asset is any information take appropriate measures to protect
that is of value to the organization in such infrastructure as specified in this
performing its organizational functions. Policy. Identification of CNII shall be
Examples of information assets include carried out by Sri Lanka CERT.
trade secrets, tender documents, Organizations declared as CNIIs will be
budget sheets, and employees’ subject to a set of instructions which
personal records, data gathered by will be supported by the forthcoming
application software related to services Cyber Security Act for enforcement of
offered by the organization, etc. instructions.
Information assets may come in many
different forms such as a paper Compliance: Applicable to CNII
document, a digital document, a operators
database, a password or encryption key
or any other digital file.
4.2.3. Asset Owners and
The organization shall also identify IT Custodians
assets. An IT asset is a software (e.g.
operating system, payroll system, CNII)
or hardware (e.g. computers, hard The organization shall identify asset
disks, servers, routers, networks, owners and custodians. The asset
firewalls) within an information owner is a senior executive level officer
technology environment. or an entity who has the approved
The identification of assets (information management responsibility of
and IT assets) shall be performed with controlling the lifecycle of an asset. It is
the intention of protecting assets from necessary to formally assign ownership
unauthorized access, use, disclosure, of the asset when it is created, or when
disruption, modification, or destruction assets are transferred to the
in order to ensure integrity, organization or acquired by the
confidentiality, and availability of organization.
assets. The custodian of the information asset
Compliance: Applicable to all will be responsible for the protection of
organizations the asset and for implementing the
controls (as identified and approved by
Version 1 18
the owner of the information asset) location of the asset, operating system,
related to the protection of the asset. license details, users, risk, classification
level, estimated value and so forth. The
The asset owner and custodian are also
IT asset register shall be accurate, up to
responsible for developing an inventory
date, consistent and aligned with other
for assets, classifying assets and
inventories.
protecting assets, defining and
reviewing access restrictions to assets, Compliance: Applicable to all
ensuring appropriate handling when organizations
asset is deleted or destroyed (adopted
from ISO 270029).
Compliance: Applicable to all 4.2.5. Risk Assessments
organizations
Version 1 19
4.2.6. Classify Assets Upon identification of the assets, the
organization shall implement
appropriate controls to prevent,
The organization shall classify assets limit or contain the impact of a
and determine the sensitivity and potential information security event
criticality of assets. The objective of the or incident. Controls applied shall be
classification is to ensure that an asset based on the classification of each
receives an appropriate level of
asset.
protection in accordance with its
importance to the organization and its To comply, the organization shall
sensitivity. Asset classifications shall be control access to assets, enforce
performed based on guidelines given in processes in place to secure data,
the “National Data Sharing Policy”13. define security controls for data- in-
Classification levels provided in the transit and data-at-rest, use
Data Sharing Policy are, “Secret”,
licensed, authorized software, and
“Confidential”, “Limited Sharing” and
deploy protective technology to
“Public”.
ensure cyber resilience.
IT assets shall be classified into three
levels namely, “Critical Systems”, To protect assets, the organization is
“Sensitive Systems”, and “Non-Sensitive required to define and implement
Systems”, or components of such policies such as Identity
systems. A description of the IT assets Management and Access Control
classification scheme is available in the Policy5, Password Policy, etc. (Refer
“Information and Cyber Security policy statement 4.3.4).
Implementation Guide4”.
In such instances, the organization
Compliance: Applicable to all shall ensure that all employees
organizations including third party contractors
adhere to the policies. Periodic
revisions shall also be made to these
4.3. Protect Assets policies to ensure that the policies
are adequate and up-to-date. Any
violations of these policies shall be
reported to the ISC for necessary
action.
Version 1 20
on a server, cloud, hard drive, laptop, 4.3.3. Physical Protection
flash drive, or archived/stored).
It is essential to encrypt any data
(information assets) which are classified The organization shall provide physical
as “Secret” or “Confidential” prior to protection to assets to prevent physical
storing. Other means of protecting data intrusion and unauthorized access.
at rest include, controlling user access Based on the protection requirements
through Identity Management and of assets, each organization shall define
Access Control Policy and providing secure areas to store or process assets
physical protection to assets. which are important to the
Compliance: Applicable to all organization. Information assets
organizations classified as “Secret” and “Confidential”
are to be stored and processed in the
stated secure areas.
4.3.2. Protect Data-in-Transit Secure areas shall be protected by
physical walls and lockable doors, and
multi-factor entry systems, and shall be
The organization shall protect data-in- monitored through CCTV continuously
transit. Data in transit is the data that is to prevent physical intrusions and
actively moving from one location to unauthorized access.
another such as across the Internet or
Secure areas shall be protected to
through a private network (e.g. data
prevent threats from fire, flood,
being transferred from site A to B
humidity, electromagnetic fields and
through an organization owned private
temperature. Access to the computers,
network, including Wi-Fi).
systems or any devices shall be
In order to protect data in transit, the controlled through implementing an
organization shall encrypt sensitive Identity Management and Access
information (information classified as Control Policy (refer policy statement
“Secret” or “Confidential”) prior to 4.3.4).
moving and use secure connections
Furthermore, the organization shall use
(HTTPS, TLS, SFTP, etc.) for data
various technologies to control user
transfer as prescribed in the latest
access to information and IT assets.
version of “Information and Cyber
Such technologies include but are not
Security Implementation Guide”4.
limited to user identity and passwords,
Further, the organization shall ensure
access cards, PINs and biometrics.
that security parameters on Wi-Fi
settings have been enabled. Compliance: Applicable for all
organizations
Compliance: Applicable to all
organizations
Version 1 21
4.3.4. Identity Management and organization shall implement a policy
Access Control for passwords and MFA.
A password policy shall be formulated
The organization shall control user and implemented by the organization,
access to both Information and IT taking the following measures:
assets. Identity management and o Passwords must be at least 8
access control is an approach to characters long and must consist of
managing access to information and IT both upper and lower case
assets to keep them secure. characters (e.g. a-Y), digits (1,9), and
Identity management and access special characters (!@$+/).
control is focused on verifying a user’s o All passwords must be changed
identity and their level of access before after predetermined intervals which
granting them the access to systems is 90 days for regular access.
and information. Users shall only be Privilege access should only be
granted access to the assets which they granted on a need basis.
need to perform their tasks (need-to-
know), and assets they need to use to Note: Guidelines for developing a
perform tasks (need-to-use). The users password policy are also presented in
shall always be given minimum access the Identity Management and Access
to systems and information necessary Control Policy6.
for their role only. The organization shall implement MFA
Note: Sri Lanka CERT has drafted an access for securing user accounts which
“Identity Management and Access have access to secret and confidential
Control Policy”6 for government information. In designing MFA,
organizations which can be customized organization shall take into account at
and adopted by the organization. least combination of user’s knowledge
(what you know, e.g. password),
Compliance: Applicable to all possession (what you have, e.g. token,
organizations access card), or inherence (what you
are, e.g. biometric-finger print).
Passwords and any other
4.3.5. Strong Authentication
authentication credentials provided to
an employee who is leaving the
In accordance with the Identity organization shall be withdrawn and
Management and Access Control Policy, removed from all assets to prevent
the organization shall use strong further access by the employee.
authentication for verifying the identity
Compliance: Applicable to all
of a user. Username and password
organizations
combination, and use of multifactor
authentication (MFA) are
recommended to authenticate user
identity. To ensure a strong
authentication process, the
Version 1 22
4.3.6. Cloud Computing and Data Cloud (LGC) for cloud service
Sovereignty requirements. LGC is a government
owned private cloud service operated
by the Information and Communication
Cloud computing generally refers to the Technology Agency (ICTA), which was
availability of ICT resources such as designed to fulfil the cloud service
storage, processing, application requirements of the government.
development platforms etc., available
for users on demand without direct Compliance: Applicable to all
management by the user. Many organizations
organizations nowadays are moving to
cloud services due to cost savings, 4.3.7. Licensed Software and Patch
scalability and increased performance.
Updates
The organization, however, must be
extremely cautious about the risk of
The organization shall use licensed
using cloud services, particularly, when
software with valid updates. This
using public clouds (public cloud is a
includes but is not limited to system
cloud service available to anyone who
software, utility programs, and
wants to purchase them). Limited
application software (e.g. word
control over the cloud as they are
processing packages, databases,
operated in different jurisdictions,
browsers, antimalware, etc.).
limited visibility of architectures and
limited transparency of operations, Organization shall update operating
possible significant mismatches in systems and other relevant software
service-level agreements (SLAs) are with vendor supplied latest patches and
common cloud risks. fixes. Organizations should enable
automatic updates.
The organization shall ensure data
sovereignty. Data sovereignty refers to Compliance: Applicable to all
that the data subject to the laws and organizations
governance structures within the
country where it is collected.
4.3.8. Antimalware
All activities of the organization in
relation to storing and processing data
or hosting software applications in The organization shall install
other jurisdictions shall be performed Antimalware software with a valid
in accordance with the forthcoming license. Antimalware tools shall remain
“Data Protection Act” of Sri Lanka. active at any potential entry point, and
malware signatures shall be up-to-date
Further, it is strictly recommended to and automatic updates shall be
the organizations to perform a proper enabled.
risk assessment prior to obtaining any
cloud service. Malware detection must be configured
for on-access scanning, including
Organizations are encouraged to obtain downloading or opening of files, folders
the services of Lanka Government
Version 1 23
on removable or remote storage, and 4.3.10. Security of Emails
web page scanning.
Users must be prohibited from The organization shall configure their
changing the configuration of, email accounts with all applicable
uninstalling, deactivating or otherwise security features. To ensure the
tampering with antimalware. security of information, the email
Compliance: Applicable to all server shall be hosted in line with the
organizations regulatory framework of the
forthcoming Data Protection Act.
The organization shall set up email
4.3.9. Official Emails filters to remove emails known to have
malware attached and prevent the
inbox from being cluttered by
The organization shall use official
unsolicited and undesired (i.e. “spam”)
emails for official communications. email. Moreover, when sending
Official emails are the email provided
confidential information via emails, it
by the government with the domain must be encrypted.
name of “gov.lk”. Official email
accounts are official assets and the In the case of email accounts provided
organization has the right to access the by the Lanka Government Network
account, read emails or delete the (LGN), ICTA is required to ensure that
account. the email service is securely configured,
and security audit reports shall be
The organization shall use emails with
obtained on a periodic basis for
“gov.lk” domain for official
supervisory or regulatory requirements.
communications, and each employee
shall use official email for official
Compliance: Applicable to all
communication only. Employees must organizations
not use official emails for personal
communication.
All email attachments, regardless of the 4.3.11. Digital Signatures
source or content, must be scanned for
viruses and other destructive programs Where appropriate, the organization
before being opened or stored on any shall implement digital signatures to
government organization’s computer ensure authenticity. Similarly, digital
system. signatures should be used for emails to
All employees must adhere to ensure authenticity, integrity and
guidelines given in the “Safe and nonrepudiation.
Appropriate Use of E-mail” section of
the “Information Security and Cyber Compliance: Applicable to CNII
Implementation Guide”4. operators
Version 1 24
4.3.12. Perimeter Security To mitigate the risk of remote access,
Controls the organization shall use secure Virtual
Private Networks (VPNs), allow only
authorized users to access systems
The organization shall install perimeter based on the identity management and
security controls such as Firewalls, access control policy of the
Intrusion Detection Systems, etc., to organization, implement multifactor
provide protection to assets authentication, secure remote access
(information, computers, networks and from client devices, and use trusted
systems assets) against cyberattacks networks.
and prevent malicious software from
accessing assets via the Internet. Compliance: Applicable to all
organizations
The organization shall regularly update
perimeter security threat database,
install antimalware with automatic 4.3.14. Backup Strategy
updates enabled, update default
settings with appropriate The organization shall have a strategy
configurations, and disable default to backup data, logs, systems, software,
vendor supplied user accounts for such configuration details and any other
devices and systems. Information and information that are necessary to
Cyber Security Implementation Guide restore to normal operations in an
presents an overview of configuration event of a disaster. This strategy shall
details. be aligned with the organization’s
Disaster Recovery Plan (refer section
Compliance: Applicable to all 4.6.1).
organizations
Data written onto backup media shall
be preserved as per the regulatory
4.3.13. Secure Remote Access requirements of the government.
The organization shall also define the
Recovery Time Objective (RTO) and
The organization shall secure remote
Recovery Point Objective (RPO) to
access to internal networks to prevent
determine the frequency of backups.
unauthorized access to assets through
geographically distant locations. It is recommended that there shall be
an air gap16 between the live data and
Remote access brings many
backup data for protecting live data
information security threats to the
from any malicious attacks including
organization. Risk of eavesdropping as
ransomware.
information travels over the public
internet, unauthorized access to It is further recommended that backups
systems or data, and monitoring and shall be stored at a fire proof, secure
manipulation of data are common location which is physically distant from
security risks associated with remote the data processing site. There should
access. also be a mechanism implemented to
Version 1 25
detect any changes made to the “Information and Cyber Security
backups. Implementation Guide”3 provides
details on the secure application
Backups containing information assets
development lifecycle.
labeled as “Secret” and “Confidential”
shall be stored as per the security In developing web applications, the
requirements specified in the Assets organization shall adhere to the
Register. “Technical Guidelines for Web
Application Security”5 provided by Sri
Compliance: Applicable to all Lanka CERT.
organizations
Compliance: Applicable to all
organizations
4.3.15. Security-by-Design
Version 1 26
If the assets in the storage media are Audits shall be performed by a party
classified as “Secret” or “Confidential” qualified to carry out such audits. If the
the safest method of disposal is audits are to be carried out by a third
physical destruction of the media, after party, it is essential that a Non-
obtaining proper approval for the Disclosure Agreement (NDA) is to be
disposal action from ISC. signed to ensure the confidentiality of
the organization’s assets.
Compliance: Applicable to all
organizations Compliance: Applicable to CNII
operators
Version 1 27
Compliance: Applicable to all classified as “Secret” and “Confidential”
organizations under any circumstances.
When employees’ personal devices are
4.3.20. Work from Home used to perform official duties, the
organization shall ensure that user
accounts are set up to have limited
With the transition to working from privileges, accounts are protected with
home, there is an increase in strong passwords and multifactor
information security threats. Therefore, authentication, antimalware software is
employees shall adhere to “Information installed and automatic updates are
Security Guidelines for Working from enabled, operating systems, utility
Home”7 issued by Sri Lanka CERT which software and other application
outline a set of security best practices software that is used have valid licenses
when working remotely. IT with necessary patch updates.
Administrators shall adhere to the Security of the personal device shall be
“Minimum Guidelines for IT the responsibility of the owner of the
Administrators”8 issued by Sri Lanka device. The organization shall not be
CERT to ensure secure access to liable for any loss or damage to the
organization’s IT assets when working device including loss of personal data
remotely is permitted. due to the use of the device.
Version 1 29
Lanka CERT immediately for technical Compliance: Applicable to CNII
advice and handling. operators
Version 1 30
The disaster recovery plan shall be
4.6. Recover Normal tested and updated on a periodic basis.
Operations
Compliance: Applicable to all
organizations
The organization shall have a Disaster In the event of a major crisis (critical
Recovery Plan that will be activated in disaster, cyber security incident), the
an event of a disaster to facilitate organization shall communicate with
recovery from such disaster. internal and external parties such as
line ministries, victims, media, clients,
The disaster recovery plan shall contain
and law enforcement authorities
activities to be performed to recover
according to a plan. The organization
from a disaster, and roles and
shall appoint a senior responsible
responsibilities of each team member
officer as the Media Spokesman to
in the plan.
communicate the crisis to the relevant
Disaster recovery plan shall be designed stakeholders.
by conducting a risk assessment and a
business impact analysis of the
Compliance: Applicable to all
information and IT assets, and the
organizations
recovery activities shall be designed by
considering the earliest point in time at
which it is acceptable to recover the
data (recovery time objective), and the
earliest point in time at which the
organization’s operations and systems
must be resumed after a disaster
(recovery point objective).
Version 1 31
5. Assessment Framework
5.1. Prior to the implementation of the Information and Cyber Security Policy, it is
essential to identify the present status of government organizations in adopting
information security to protect government resources, and this assessment is
therefore, designed to capture the present status of the government
organization in implementing information security.
5.2. Findings of the assessment will be used by Sri Lanka CERT to establish a baseline
for the organizations in adopting information security, and provide
recommendations to government organizations in implementing the
Information and Cyber Security Policy at their organizations.
5.3. This assessment will be repeated annually, and each year Sri Lanka CERT shall
assess the level of adoption of the Information and Cyber Security Policy at the
relevant organization, and recommendations will be made to improve the overall
information and cyber security readiness of the organization.
5.4. Any organization desiring to assess their level of Information and Cyber Security
Policy adoption could use this assessment framework to evaluate their progress
at any given time.
5.5. Information Security Officer, Chief Innovation Officer, or the officer in charge of
the subject of IT, is required to fill this assessment, and forward to Sri Lanka CERT
with the signature of the Head of Organization on or before 30th October of each
year.
5.7. Should the respondent wish to provide a detailed response to each question, the
respondent can provide details in the remarks section at the end of the survey
questionnaire. Respondents can refer to the Glossary of Information and Cyber
Security Policy for detailed explanation of relevant terms.
5.8. Assessment
Yes No
Information Security Governance
Security 1. Has the organization appointed an ISO?
Organization 2. Has the organization assigned information
Structure security responsibilities to ISO?
3. If no ISO has been appointed, has the CIO or the
officer in charge of the subject of IT been
assigned information security responsibilities?
4. Does the organization have a committee to
make decisions on Information Security or IT?
5. Does the HOO proactively lead information
security initiatives?
6. Has the organization assigned information
security audit responsibilities to CIA?
Capacity 7. Has the organization taken any steps to develop
Building the information security capacity of
accountable individuals?
Strategic 8. In designing and implementing the
Alignment organization’s functions, policies, strategies or
projects, has your organization taken
information security into account?
Information 9. Does your organization has financial provisions
Security for information security activities?
Action Plan 10. Has your organization developed action plans to
achieve its information security objectives?
Identify Assets, Owners, Users and Risks
Assets 11. Has your organization identified information
assets that have a value to the organization?
12. Has your organization assessed the risk
associated with information assets?
13. Has your organization classified information
assets based on their sensitivity, criticality,
impact of sharing or other means?
14. Has your organization recorded information
assets in an information assets register?
15. Has your organization identified IT assets?
16. Has your organization recorded IT assets in an
IT assets register?
17. Has your organization classified IT assets based
on their criticality?
18. Has your organization identified the owners of
the assets?
Protect Assets
Version 1 33
Encryption 19. Does your organization encrypt sensitive
information prior to storage?
20. Does your organization encrypt sensitive
information prior to moving through electronic
channels?
Physical 21. Does your organization process or store
Protection sensitive information in secure areas?
22. Has your organization taken appropriate
measures to protect secure areas from fire,
flood, humidity and temperature?
23. Does your organization prevent unauthorized
entry to secure areas?
Identity 24. Does your organization have an Identity
Management Management and Access Control Policy?
and Access 25. Does your organization use strong
Control authentication?
Data 26. Does your organization obtain the service of
Sovereignty clouds or other digital infrastructure which
operate from other jurisdictions?
27. Does your organization assess risk prior to
obtaining cloud service?
Licensed 28. Does the organization use operating systems
Software and (OSs) with valid License(s)?
Patch 29. Have the OSs (s) of the organization been
Updates updated with vendor supplied latest patches
and fixes?
30. Does your organization have a procedure in
place to ensure vendor supplied critical patches
are installed on time?
Antimalware 31. Has the organization installed Antimalware
software with a valid license in all machines?
Email 32. Do the employees of your organization use
personal emails for official communication even
if they have been given official emails by the
organization?
33. Does your organization restrict users using
personal emails for official communications?
Perimeter 34. Does your organization have a Firewall in your
Security computer network?
Devices
Secure 35. Does your organization use secure Virtual
Remote Private Networks (VPNs) for remote access?
Access 36. Do all the users connecting remotely use VPN?
Backup 37. Does your organization backup data?
Strategy
38. Are the backups stored at a fire proof, secure
location which is physically distant from the
data processing site?
Version 1 34
Secure 39. Does your organization follow any of the
Disposal of following to dispose electronic media that
Assets contain sensitive information? - Shredding,
punching, physically damaging, degaussing.
Internal 40. Does your organization have internal
Information information security audit program?
Security Audit 41. Does your organization perform VAPTs through
Program Sri Lanka CERT prior to any deployment of
software applications?
42. Have you performed VAPT for your computer
network?
43. Does your organization perform VAPTs for
software applications on a periodic basis?
Work from 44. Does your organization adhere to the work
Home from home guidelines issued by Sri Lanka CERT?
Version 1 35
Glossary
Air Gap “An air gap is a technical configuration of the backup environment
where backup data is stored offline and completely separate from the
production environment. Because the data is stored in this way, it's
much harder for malicious parties to access the data remotely and
sabotage or delete it”16
Antimalware Anti-malware is a software designed to identify malware in devices or
prevent malware from infecting computer systems or electronic
devices. Malware is any software intentionally designed to cause
damage to a computer, server, or computer network (e.g. viruses,
worms, ransomware).
Assets Classification is the process of categorizing information assets based
Classification on its level of sensitivity, criticality and the impact of the sharing of
that information. The primary objective is to ensure that information
receives an appropriate level of protection in accordance with its
importance to the organization.
Assets Custodian Person in the organization who has the responsibility to protect an
information asset throughout the lifecycle as it is stored, transported,
or processed in line with the requirements defined by the information
asset owner
Assets Owner An asset owner is the person responsible for the day-to-day
management of assets
Availability of Availability ensures timely and reliable access to and use of
Information information.
Confidentiality of Confidentiality refers to the assurance that information is not disclosed
Information to unauthorized people and organizations.
Criticality of A measure of the degree to which an organization depends on the
Information information or IT assets for the success of a mission or of an
organization function. Criticality is comprised of two components,
Integrity and Availability. Integrity Criticality is the degree to which the
value of the information is determined by its reliability. Availability
Criticality is the degree to which the value of the information is
determined by its accessibility when needed.
Critical National Critical information infrastructure are the systems or facilities, whose
Information incapacity or destruction would cause a debilitating impact on national
Infrastructure security, governance, economy, health and social well-being of a
(CNII) nation.
Cyber Security It is a subsect of information security, which refers to the protection of
information and IT assets from being compromised or attacked
through cyber means (with the use of Internet Technologies).
Digital Signature Digital Signatures are mathematical scheme for verifying the
authenticity of digital messages or documents. It provides sender
authenticity (identity of the users), message integrity (guarding against
improper modification or destruction) and nonrepudiation (the
claimed sender cannot later deny generating the document).
Version 1 36
Encryption Encryption is the process of converting a plaintext message into a
secure-coded form of text, which cannot be understood without
converting it back via decryption.
Government The government organizations are the public authorities defined in the
Organizations Right to Information Act No. 12 of 2016.
Information Security controls are safeguards or countermeasures to avoid, detect,
Security Controls counteract, or minimize security risks to information and IT assets.
Controls could be technologies, policies, procedures, or processors put
in place to protect information assets.
Information Information Security Officer is a senior-level executive responsible for
Security Officer establishing and maintaining the organizations objectives, strategy,
(ISO) and action plans to ensure information assets are adequately
protected.
Information Information Security Committee is responsible in leading and
Security managing all Information Security related activities within the
Committee (ISC) organization, including information security planning, funding,
implementation and monitoring the implementation of information
security measures.
Information and SIEM is a solution that combines the collection data from log files for
Event analysis and reports on security threats and events, and conduct real-
Management time system monitoring, notifies network admins about important
systems (SIEM) issues and establishes correlations between security events to provide
real-time analysis of security alerts generated by applications and
network hardware.
Information Information security means protecting assets from unauthorized
Security access, use, disclosure, disruption, modification, or destruction in
order to ensure integrity, confidentiality, and availability.
Information Information asset is information or data that is of value to the
Assets organization. This includes the documents available in an electronic
format, database records as well as the documents available in paper
format. Examples for information assets: word file, images, employees
personal record in a database.
IT Assets IT asset is any IT equipment, information system, software, storage
media that is of value to the organization. Examples for IT assets are
computers, servers, routers, disks, networks, software, information
systems and its components.
IPS/IDS Intrusion Detection Systems are devices that analyze network traffic to
identify known cyberattacks. Intrusion Prevention Systems devices
analyzes network traffic to identify known cyberattacks, however, it
can stop attacks by preventing packet from being delivered based on
type of attacks it detects
Integrity of Integrity refers to guarding information against improper modification
Information or destruction. It ensures that information remains in its original form.
Official Email Official emails are the email accounts supplied by the government with
the domain name of “gov.lk
Private Cloud Services offered over the Internet or over a private internal network to
only select users. E.g. Lanka Government Cloud
Public Cloud Service available to anyone who wants to purchase them
Version 1 37
Sensitivity of The degree to which the value of the information is determined by its
Information secrecy.
Recovery Point RPO indicates the earliest point in time in which it is acceptable to
Objective (RPO) recover the data. For example, if a process can afford to lose data up
to hours before disaster, then the latest backup available shall be up to
4 hours before disaster. The transactions which occurred after RPO
period shall be entered after recovery.
Recovery Time RTO indicates the earliest point in time at which the organizations
Objective (RTO) operations and systems must be resumed after a disaster.
Systems System hardening is the process of securing a system through changing
Hardening the default configuration and settings to reduce IT vulnerability and
the possibility of being compromised. This can be done by reducing the
attack surface and attack vectors which attackers continuously try to
exploit for purpose of malicious activity.
Virtual Private Virtual Private Network, establishes a secure connection by utilizing an
Network(VPN) encrypted tunnel for data communication over the internet.
Version 1 38
References
1.
Right to Information Act No 12 of 2016. Document can be accessed through
https://www.rti.gov.lk/.
2.
Information and Cyber Security Strategy of Sri Lanka (2019:2023), Published by
Research and Policy Unit, Sri Lanka CERT, November 2019. Document can be
accessed through https://cert.gov.lk/documents/NCSStrategy.pdf
3.
Minimum Information Security Guidelines. Published by Research, Policy and
Project Division of Sri Lanka CERT. Document can be accessed through
https://www.onlinesafety.lk/wp-content/uploads/2021/07/Minimum
Information_Security_Standards_Version1_14-07-2021.pdf
4.
Information Security Implementation Guide. Published by Research, Policy and
Projects Division of Sri Lanka CERT, (forthcoming).
5.
Technical Guidelines for Web Application Security. Published by Research, Policy
and Projects Division of Sri Lanka CERT. Document can be accessed through
https://www.onlinesafety.lk/wp-content/uploads/2021/04/Technical-Guidelines-
for-Web-Application-Security.vf1-1.pdf
6.
Identity Management and Access Control Policy for Government. Published by
Research, Policy and Projects Division of Sri Lanka CERT. Document can be
accessed through https://www.onlinesafety.lk/wp-
content/uploads/2021/04/Attachment-03_Logical-Access-Control-Policy.pdf
7.
Information Security Guidelines for Working from Home. Published by Sri Lanka
CERT. Document can be access through https://www.onlinesafety.lk/wp-
content/uploads/2021/01/IS-Guidelines-for-Working-from-Home.pdf
8.
Minimal Guidelines for IT Administrators: Guidelines to Improve Cyber Security to
Enable Work from Home. Published by Sri Lanka CERT. Document can be accessed
through https://www.onlinesafety.lk/wp-content/uploads/2021/01/IS-Guidelines-
for-Working-from-Home.pdf
9.
ISO 27002 (2013): Information Technology – Security Techniques - Information
Security Management Systems – Requirements, International Standards
Organization, Published by International Standard Organization.
10.
NIST Cybersecurity Framework. Published by National Institute of Standards and
Technology, U.S Department of Commerce. Resources can be accessed through
https://www.nist.gov/cyberframework/online-learning/five-functions
11.
NIST (2006): Information Security Handbook: A Guide for Managers, Published by
National Institute of Standards and Technology, U.S Department of Commerce.
Resources can be accessed through
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf
Version 1 39
12.
e-Government Policy of Sri Lanka (2009). Published by Information and
Communication Technology Agency of Sri Lanka (ICTA).
13.
National Data Sharing Policy of Government, Published by Information and
Communication Technology Agency of Sri Lanka (ICTA). Document can be accessed
through http://www.data.gov.lk/download/file/fid/362
14.
Educause, Information Security Governance Information Security Governance.
Document can be accessed through https://www.educause.edu/focus-areas-and-
initiatives/policy-and-security/cybersecurity-program/resources/information-
security-guide/toolkits/information-security-governance
15.
ISO/IEC 38500:2015 Information technology — Governance of IT for the
organization.
16.
Carbonite (2021), Can Air-Gapped Backup Provide an Extra Measure of Security?
Document can be accessed through https://www.carbonite.com/.
Version 1 40