(1) This Procedure is governed by the Information Security Policy. (2) This Procedure is applicable to all members of the University community, staff, student, visitors, volunteers and contractors. (3) All users of the University's Information Environment must be authorised to access the appropriate systems and information resources. Access is managed and monitored in accordance with University policy. The elements involved in managing and monitoring access include identification, authorisation and authentication. (4) All members of the University community – staff, students and authorised visitors - are assigned a unique User Identifier (ID) to enable access to the ACU Information Environment and Resources. (5) User IDs must not be shared. If deemed necessary for business or operational reasons, approval must be obtained from the Chief Information and Digital Officer. Information Technology (IT) must maintain a documented record of shared user IDs. (6) Users are responsible for safeguarding their individual IDs and are accountable for all transactions recorded against their individual ID. (7) The Chief Information and Digital Officer or delegate, may approve the temporary creation and use of generic identifiers, in particular circumstances, such as testing and training. (8) Systems Owners are responsible for granting appropriate levels of access privileges, to enable members of the University community to undertake their respective duties. (9) Systems Owners are responsible for the recording and regular review – at least every six months - of Authorisation levels for all systems within the System Owner’s area of responsibility. Any irregularities should be addressed as a matter of priority. (10) Access to the University Information Environment and all University systems that require Authentication will only be granted through the use of a valid set of ACU assigned credentials. (11) Passwords are used for various purposes at ACU. Some of the more common uses include user (logon accounts, web application accounts, email accounts, screen saver protection, voicemail password, and to access other services). (12) For the purposes of this Procedure, Passwords and Passphrases are subject to the same standards set out below. The use of the term Password/s in this Procedure also includes Passphrase/s. (13) Passwords must be a minimum of eight alphanumeric characters in length. (14) Passwords must include at least (one) 1 upper and (one) 1 (lower case character (e.g., a-z, A-Z). (15) Consider the use of punctuation marks, numeric and special characters in a password where this functionality is available. e.g., (0-9, !@#$%^&*()_+|~-=\`{}[]:";'< />?,./) (16) Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. (17) Passwords must not contain: (18) Passwords: (19) Passwords believed to have been compromised, must be changed immediately and the matter referred to a supervisor and the IT Security Officer. (20) For some system and application administrative tasks system administrators and other authorised staff require deeper levels of access to systems and applications in order for them to undertake their duties. Privileged users may include systems, application and database administrators, and their supervisors. It should be noted that in some instances, privileged user access could potentially permit access to an entire system. (21) The following is subject to the provision of the Computer and Internet Acceptable Use Policy. This section sets out the protocol for using Digital Messaging in all its forms, including the security aspects of information transfer within the University and with any external entities. (22) The Procedure applies to all forms of information transfer, including emails and attachments, blog entries, wikis, voicemail, text messaging, social media and any other forms of digital communications. (23) The use of ACU messaging services must be related to the work of the University, including learning and teaching, research, community engagement, administration and / or other associated official activities of the University. Incidental and occasional personal use of messaging services are permissible provided that in each case the personal use is moderate in time and does not incur significant cost for the University. (24) The University's messaging services must not be used for: (25) The following sets out the operating procedures to ensure the protection of information and the secure operations of networks and supporting processing facilities. (26) Responsibilities and procedures for the management and operation of all information-processing facilities e.g. Data Centres must be established. This includes the development of appropriate operating Procedures. Operating Procedures must be documented, maintained, and made available on request. (27) Duties and areas of responsibility must be segregated to reduce opportunities for unauthorised or unintentional modification or misuse of University information assets. (28) Development, test, and production environments must be separated, to reduce the risks of unauthorised access or changes to the production system. (29) To protect the integrity of software and information assets, IT managed equipment must be maintained with the most recent anti-virus signature updates via a centrally managed console. The updates must be automatically distributed, with no manual intervention required by the end user or IT staff. (30) Detection, prevention, and recovery controls to protect against malicious code and appropriate user awareness procedures must be implemented. (31) To maintain the integrity and availability of information and information processing facilities, routine procedures must be established to implement back-up processes across all IT managed equipment: (32) Networks must be adequately managed and controlled, in order to be protected from threats, and to maintain security for the systems and applications using the network, including information in transit. (33) The Chief Information and Digital Officer is responsible for ensuring security features, service levels and management requirements of all network services are identified and included in any network services agreement, whether these services are provided in-house or outsourced. (34) Appropriate operating procedures must be established to protect documents, computer media, input / output data and system documentation from unauthorised disclosure, modification, removal, and destruction: (35) Procedures for monitoring use of information processing facilities must be established and the results of the monitoring activities reviewed regularly: (36) Logging facilities and log information must be protected against tampering and unauthorised access: (37) The clocks of all relevant information processing systems within the University must be synchronised with the au.pool.ntp.org time source. (38) ACU managed information processing facilities must be physically separated from those managed by third parties. (39) Critical or sensitive information processing facilities must be housed in secure areas, protected by defined security perimeters, with appropriate security barriers and entry controls. They must be physically protected from unauthorised access, damage, and interference. (40) A staffed reception area or other means to control physical access to the site or building must be in place; access to sites and buildings must be restricted to authorised personnel. (41) Secure areas must be protected by appropriate entry controls to ensure that only authorised personnel are allowed access. (42) The date and time of entry and departure of visitors must be recorded, and all visitors must be supervised unless their access has been previously approved; they must only be granted access for specific, authorised purposes and must be issued with instructions on the security requirements of the area and on emergency procedures. (43) Access to areas where sensitive information is processed or stored must be controlled and restricted to authorised persons only; authentication controls, e.g. access control card plus PIN, must be used to authorise and validate all access; an audit trail of all access must be securely maintained. (44) All staff, contractors, third party users and visitors must be required to wear some form of visible identification and must immediately notify security personnel if they encounter unescorted visitors and anyone not wearing visible identification. (45) Third party support service personnel must be granted restricted access to secure areas or sensitive information processing facilities only when required; this access must be authorised and monitored. (46) Access rights to secure areas must be regularly reviewed and updated, and revoked when necessary. (47) Photographic, video, audio or other recording equipment, such as cameras in mobile devices, must not be allowed, unless authorised. (48) Equipment must be sited to minimise unnecessary access to work areas. (49) Items requiring special protection must be isolated to reduce the general level of protection required. (50) Controls must be adopted to minimise the risk of potential physical threats, e.g. theft, fire, explosives, smoke, water (or water supply failure), dust, vibration, chemical effects, electrical supply interference, communications interference, electromagnetic radiation and vandalism. (51) Guidelines for eating, drinking, and smoking in proximity to information processing facilities must be established. (52) Environmental conditions, such as temperature and humidity, must be monitored for conditions, which could adversely affect the operation of information processing facilities. (53) Lightning protection must be applied to all buildings and lightning protection filters must be fitted to all incoming power and communications lines. (54) Equipment must be protected from power failures and other disruptions caused by failures in supporting utilities. (55) All supporting utilities, such as electricity, water supply, sewage, heating / ventilation, and air conditioning must be adequate for the systems they are supporting. Support utilities must be regularly inspected and tested as appropriate to ensure their proper functioning and to reduce any risk from malfunction or failure. (56) A suitable electrical supply must be provided that conforms to the equipment manufacturer’s specifications. (57) Wherever possible, multiple feeds with diverse physical paths should be installed. (58) All items of equipment containing storage media should be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use. (59) Devices containing sensitive information must be physically destroyed or the information must be destroyed, deleted or overwritten using techniques to make the original information non-retrievable rather than using the standard delete or format function. (60) The requirements set out below are in place to ensure that information security forms an integral part of information systems across the entire lifecycle. These requirements apply to the acquisition of new information systems, as well as upgrades or enhancements to existing systems, including systems that provide services over public networks: (61) To mitigate the risks associated with access to ACU information resources by external service providers, security controls should address processes and procedures across all participating parties. The controls should: (62) Management responsibilities, plans and processes should be established to ensure a rapid, effective and orderly response to information security incidents. Established plans should be communicated widely within the University. Processes should include: (63) This section sets out the requirements for managing information security in adverse situations, e.g. a crisis or disaster: (64) All relevant legislative statutory, regulatory and contractual requirements for information systems, should be explicitly identified, documented and maintained. These should include: (65) As an extension of the Information Security Policy, this Procedure will be reviewed every three (3) years from the date of approval, or more frequently if appropriate. (66) Unless otherwise indicated, this Procedure will still apply beyond the review date.Information Security Procedure
Section 1 - Policy Statement
Section 2 - Scope
Section 3 - Access Control
Identification
Authorisation
Authentication
Password / Passphrase Standards
Passwords Composition Guidelines
NOTE: Please do not use any of these examples as passwords!
Password Management
Use and Control of Privileged User Access
Top of PageSection 4 - Digital Messaging
Permissible Use
Prohibited Use
Top of PageSection 5 - Operations Management
Operating Procedures
Documented Operating Procedures
Segregation of Duties
Separation of Operating Environments
Controls against Malicious Code (including viruses)
Backup and Restore
Network Security Management
Media Handling
Monitoring
Protection of Log Information
Clock Synchronisation
Section 6 - Physical and Environmental Security Data Centres
Physical Security Perimeter
Physical Entry Controls
Equipment Security
Supporting Utilities
Secure Disposal or Re-use of Equipment
Section 7 - System Acquisition, Development and Maintenance
Security Requirements of Information Systems
Top of PageSection 8 - Supplier Relationships
Access to Information Assets by External Service Providers
Top of PageSection 9 - Information Security Incident Management
Management of Information Security Incidents and Improvements
Top of PageSection 10 - Information Security Aspects of Business Continuity Management
Information Security Continuity
Top of PageSection 11 - Compliance
Compliance With Legal and Contractual Requirements
Top of PageSection 12 - Review of this Procedure
View Document
This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.