[1] Digi-CAST™ [2] is the system used to implement all Certificate Authority systems. Digi-CAST3™ is the methodology used to implement the compliance strategy for ISO 27001 [3].
[4] This ISMS is specific only to the three Certificate Authority [CA] rooms in Isa Town, the five Registration Authority Control Centre operator desks located on the ground floor of the National ID card issuing centre in Isa Town and the two Public Servers located in Juffair, in the Kingdom of Bahrain. The ISMS does not extend beyond these two geographicaal locations and the personnel that make up the operational and management team for these areas. It should also be noted that the Key Ceremony(s) that occurs is outside the physical environment and is not included in the ISMS, however, detailed scripts, explanations and security documentation from each Key Ceremony will be introduced into the ISMS as required.
The Information Security Management System covers all activities within the PKI [5] infrastructure in Juffair and ISA Town including related infrastructure key components such as Digi-CA and associated HSM. It relates to all assets, software and infrastructure used for storing, handling, processing and distributing digital certificates to Bahrain citizens.
Where terms which are used in ISO27001:2005 are used here, the definitions provided in clause 3 of that standard are applied. Where terms are defined in ISO17799:2005 but not in ISO27001:2005, the ISO17799:2005 definitions are applied here.
In particular, the ISMS is defined as the part (which includes organisational structure, policies, planning activities, plans, responsibilities, working practices, procedures, processes and resources) of the Organisation’s overall management system which, based on a business risk approach, enables management to establish, implement, operate, monitor, review, maintain and improve information security within the Organisation.
A current version of this document is available to PKI staff members of staff and is available on request from the Information Security Manager.
This procedure was approved by the Director General of IT and the Information Security Manager on 08 November, 2007 and is issued on a version controlled basis under his/her signature
Adlin Hisyamuddin Shaikh Salman Mohammed Al-Khalifa
Information Security Manager Director General of IT
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Change history
Issue 1 7 November, 2007 Initial issue
[4] The Organisation’s ISMS documentation consists of:
a) The individual has the necessary skill, competence and resources to carry out the processes or task(s) and
b) The Owner retains accountability for ensuring that the process or task is carried out correctly.
Adlin Hisyamuddin Shaikh Salman Mohammed Al-Khalifa
Information Security Manager Director General of IT
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Change history
Issue 1 08 November, 2007 Initial issue
[4]
3.3 The ACT Phase – Maintain & Improve the ISMS
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
[4] The Organisation’s approach to risk, which has been specifically approved and authorised by management, is contained in the risk management framework, which it applies to its overall strategic planning process. The risk management framework is designed to identify and assess risks (including information security risk) in the business plan, to identify and evaluate options for the treatment of those risks, and to select control objectives and controls that will reduce those risks to acceptable levels within the context of the business plan, operational requirements, constraints and objectives and national and international legislation and regulation. [ISO17799 4.1 and 4.2]
CIO has decided not to use an automated tool to perform risk assessments. Instead it has sought advice from external security consultants VigiTrust to set out the initial to procedures and documentation and in conjunction and co-operation with the Digi-CAST3™ Team, has been trained on the use of this manual and the implementation of the procedures necessary to produce a number of methodologies to perform risk assessment on a regular basis
Risk assessments projects need to be carried out regularly and need to help CIO identify the threat landscape, vulnerabilities and threat levels associated to each vulnerability against each of its tangible and intangible assets.
CIO opted to work with Digi-Sign because of its knowledge of Certificate Authority [CA [9]] and Public Key Infrastructures [PKI [5]] and with VigiTrust because of their in the filed of risk assessment for particularly sensitive information and projects related to the security of sensitive assets.
CIO considered tools such as RA2 or equivalent on the market. However these tools require a deep understanding of the current security threat landscape and are only extremely effective for security professionals.
It was therefore decided to work with security consultants who had their own methodologies backed by a proven track record of helping blue chip organizations to meet security best practice guidelines.
Some initial research was conducted by CIO as to whether an automated tool would be appropriate to perform the risk assessment tasks related to this project. It was very quickly identified that consultants would be required in order to engage with CIO and conduct risks assessments. After a full tendering process in accordance with the laws of the Kingdom of Bahrain and a lengthy and careful consideration process, Batelco and Digi-Sign were selected to provide this service to the CIO in co-operation with Digi-Sign’s ISO consultancy partner VigiTrust.
The chosen methodology is based on benchmarking vulnerabilities and threats to each assets against a risk matrix. The matrix consists in evaluation of the asset in terms of importance to CIO, assigning a probability of likelihood for each threat and determining an absolute impact for the threat. The risk is calculated as follows:
Risk (aka “Absolute risk”) = Probability of Threat * Absolute Impact of Threat
The information below details all of the elements of this risk calculation model:
Evaluation of Assets
The operation owner defines the value of each asset detected depending on his perception of impact on operations) or on users in general in case of loss, theft, inaccessibility, deterioration / corruption or any other security violations. Perceived value is ranked as follows:
Unimportant (0) Damage on the asset never affects the data system
Not very important (1) Damage on the asset has very little impact on the data system. The data system keeps operating. Damage on it does not tarnish the company name.
Medium (2) Damage on the asset affects the data system. The data system keeps operating but the asset in question must be replaced. Damage thereon can affect the company name negatively to a somewhat noticeable extent.
Important (3) Damage on the asset has major impact on the data system. The data system is only half operational in that it may not be fully accessible or its integrity might have been somewhat compromised. The asset in question must be replaced. Damage thereon affects the company name adversely.
Very important (4) The asset plays a major part for the operation of the data system. Damage on the asset has a huge impact on the operability of the data system. Only parts of the data system remain useable. Damage thereon has substantial adverse impact on the company name.
Extremely important (5) The asset is essential for the operation of the data system. Damage on the asset directly influences the data system. The data system is out of operation. Damage thereof has very adverse impact on the company name.
At this stage Potential vulnerabilities are listed for each asset. Vulnerabilities are the weaknesses identified for assets. Potential threats are listed for each asset. Threats are potential tools by which vulnerabilities can be misused or exploited.
Important Note: The value as determined by the above procedure is entered in the “Critical” column Risk Treatment Plan file that accompanies this document and is referenced “Digi-CAST Asset List & Risk Treatment Issue 001-071107.xls”.
Threat Probability Values
Negligible (0) Not likely to happen.
Very low (1) Twice or three times in a period of 5 years.
Low (2) May happen once a year or a shorter period of time.
Medium (3) May happen every six months or within a period of time between one to 6 months.
High (4) May happen once a month or within a period of time between 2 days to one month.
Very high (5) May happen once a day.
Extremely High (6) May happen multiple times a day.
Threat Impact Values
Unimportant (0) The threat has no impact on the asset.
Small (1) The threat has little impact on the asset. There is no need to repair or re-configure the asset.
Important (2) Although the impact by the threat is minor and is only reported by a few persons or organizations, the threat can still have concrete damage. Corrective action involving time, effort and financial input may have to be implemented to make up for the damage and eradicate the issues.
Detrimental (3) The Threat can damage the reputation of asset and system operators. Significant spending may be necessary to repair the damage and eradicate the issues.
Serious (4) The Threat inflicts substantial damage on the asset and/or many staff members and the organization itself may be significantly impacted by the damage. Large scale restructuring may be necessary in the damaged system. Corrective action needs to be taken to eradicate the issues.
Very serious (5) Threats causes the asset to be out of operation indefinitely. It requires the system to be re-designed and re-structured totally. Corrective action needs to be taken to eradicate the issues.
The information pertaining to absolute risks requires the use of the values detailed above according to the formula, Absolute Risk = Threat Probability Value * Threat Impact Value.
So by determining the “Threat Probability Value” (i.e. 1 – 6) using the horizontal part of the following Risk Calculation Table and then searching down the vertical column for the “Threat Impact Value”, the “Absolute Risk Value” can be calculated.
Important Note: All three values are entered in the Risk Treatment Plan file that accompanies this document and is referenced “Digi-CAST Asset List & Risk Treatment Issue 001-071107.xls”.
Every time an asset is added or removed from the Trust Centre, this Digi-CAST™ [2] Manual and the “Digi-CAST Asset List & Risk Treatment” must be updated and must be signed by the Information Security Manual.
In addition, the new Issue must be circulated to all members of the Trust Centre Team and Trust Centre Management. And this is the responsibility of the Information Security Manager.
Risk Calculation Table
Probability of the Threat to Happen |
Unimportant (0) |
Minor (1) | Important (2) | Detrimental (3) | Serious (4) | Very serious (5) |
Negligible (0) | None (0) | None (0) | None (0) | None (0) | None (0) | None (0) |
Very low (1) | None (0) | Low (1) | Low (2) | Low (3) | Medium (4) | Medium (5) |
Low (2) | None (0) | Low (2) | Medium (4) | Medium (6) | High (8) | High (10) |
Medium (3) | None (0) | Low (3) | Medium (6) | High (9) | High (9) | Critical (15) |
High (4) | None (0) | Medium (4) | High (8) | High (12) | Critical (16) | Very High (20) |
Very High (5) | None (0) | Medium (5) | High (10) | Critical (15) | Very High (20) | Very High (25) |
Extremely High (6) | None (0) | Medium (6) | High (12) | Critical (18) | Very High (24) | Very High (30) |
Absolute Risk Table
Absolute Risk |
Risk Score |
Multiplication Values
|
None | 0 | 0 |
Low | 1 | 1,2,3 |
Medium | 2 | 4,5,6 |
High | 3 | 8,9,10,12 |
Critical | 4 | 15,16,18 |
Very high | 5 | 20,24,25,30 |
Actual Risk Value is calculated by using the following final formula:
1. Absolute Risk = Probability of the Threat * Absolute Impact of the Threat
2. Absolute Risk Score Simplified Absolute Risk Score (Table 4)
3. Actual Risk Value = New Absolute Risk Score * Asset Value Identification of Targets, Controls and Counter Measures and Management of Risks
3–Step Absolute Risk Calculation
Step 1
Take into consideration the impact an event using the “Threat Impact Values” scale above (0 - 5).
Step 2
Then consider the likelihood it could happen using the “Threat Possibility Values” scale above (0 - 6).
Step 3
Then use the table, which gives you the risk for the RTP (it is a basic multiplier). The value you get will appear on the “Absolute Risk Table” and this enables you to label the Risk appropriately.
Example
Rack server:
The Rack could be physically damaged or it could collapse resulting in machines having to be powered off before being moved - results in disruption to services.
Probability of that happening is low (2) however impact of the issue, if it did happen, is high (4) as it would seriously disrupt services. Therefore the Absolute Risk Value is 4 x 2 = 8. The Absolute Risk (8) is then entered in the Absolute Risk column of the Digi-CAST Asset List & Risk Treatment.
In Summary
Low Absolute Risk Value is typically low to high impact with little probability of occurrence (or vice versa).
High Absolute Risk Value is typically high impact and high probability (unusual and rare, but may occur).
Medium Absolute Risk Value is more complicated and requires careful attention as it suggests that the impact would be medium to high and so is the probability. This is where indicating actual controls in place will ensure that a proper risk assessment has been conducted.
Consider the asset and carefully consider the likelihood of the potential threat happening. Should it happen, what impact would have it have on the CIO Trust Centre if it did happen and then using the above system assign figures and calculate the Absolute Risk Value.
The CIO Trust Centre staff must understand the scoring mechanism and regular training should be provided by the Information Security Manager to all the members of the Trust Centre Team. In addition ongoing security awareness through training, reference manual, demonstration and incident reporting, resolution and documentation is provided in order for Trust Centre Team to keep abreast of the latest threats in order to be able to continually assess risks and take pre-emptive action.
The Organisation’s method for risk assessment is to use risk assessment tool in this Digi-CAST™ [2] Manual and uses the procedure as set out below. This tool and methodology is suitable for the scope of the Organisation’s ISMS (Section 1), the business objectives (3.1b1 above), the security, contractual, legal and regulatory requirements (3.1b2) above and risk management framework that were identified earlier. The selection criteria are set out in DOC 4.2. [ISO27001 4.2.1c] and the risk assessment procedure itself is carried out as described in DOC 4.4.
This method of risk assessment is applied throughout the Organization in respect of information risks.
The Information Security Manager is responsible for carrying out risk assessments wherever they are required by the ISMS.
Procedure
Controls are implemented according to relevant associated processes and OWIs pertaining to each threat.
The Information Security Manager is the owner of this document and is responsible for ensuring that this procedure is reviewed in line with the review requirements of the ISMS.
A current version of this document is available to the Trust Centre team members on request.
This procedure was approved by the Director General of IT and the President of the CIO on 08 November 2007 and is issued on a version-controlled basis under their signatures.
The Organisation has a documented approach (framework in DOC 4.3, tool in DOC 4.2 and procedure/methodology in DOC 4.4) to risk assessment.
Shaikh Salman Mohammed Al-Khalifa Mohammed Al-Amer
Director General of IT President of CIO
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
[4] Information Security Policy
Control objective: The organization provides management direction and support for information security in accordance with business requirements and relevant laws and regulations of the Kingdom of Bahrain.
The management team and the board of directors have approved and authorized an information security policy for the Organisation. This policy is set out below and is authorized for separate distribution under the President of CIO’s signature, with the reference DOC 5.1. A current version of this document is available to all staff and contractors, and to external parties [when signing supply contracts]. The development of the information security policy is carried out under the PDCA process described in Section 3 of the Information Security Manual.
INFORMATION SECURITY POLICY
The Board and management of The Central Informatics Organization [CIO], located at National Smart Card Centre [NSCC], Building 1088, Road 4025, Block 842, Isa Town and Government Data Network Centre, 1091, Road 4225, Juffair 342, and both locations are in the Kingdom of Bahrain and provide for the operation of the National ID card, identity verification and validation of the citizens and residents of the Kingdom of Bahrain is in the business of providing Digital Certificates [8] and related Public Key Infrastructure [PKI [5]] services, are committed to preserving the confidentiality, integrity and availability of all the physical and electronic information assets throughout the CIO CA [9] and RA areas in order to preserve the integrity, reputation and security of the citizens, residents and Government Departments and Agents it serves. Information and information security requirements will continue to be aligned with the CIO goals and the ISMS is intended to be an enabling mechanism for information sharing, for electronic operations and for reducing information-related risks to acceptable levels.
The CIO’s current strategic business plan and risk management framework provide the context for identifying, assessing, evaluating and controlling information-related risks through the establishment and maintenance of an ISMS. The risk assessment, Statement of Applicability and risk treatment plan identify how information-related risks are controlled. The Information Security Manager is responsible for the management and maintenance of the risk treatment plan. Additional risk assessments may, where necessary, be carried out to determine appropriate controls for specific risks.
In particular, business continuity and contingency plans, data back up procedures, avoidance of viruses and hackers, access control to systems and information security incident reporting are fundamental to this policy. Control objectives for each of these areas are contained in the Manual and are supported by specific, documented policies and procedures.
All employees of the CIO [and certain external parties identified in the ISMS] are expected to comply with this policy and with the ISMS that implements this policy. All staff, and certain external parties, will receive appropriate training, initially by the Digi-CAST3™ Team and ultimately by the Information Security Manager.
The CIO has established Trust Centre top-level management steering committee chaired by the Director General of IT and including the President of the CIO and the Chief Security Officer to support the ISMS framework and to periodically review the security policy.
The CIO is committed to achieving certification [10] of its ISMS to ISO27001:2005
This policy will be reviewed to respond to any changes in the risk assessment or risk treatment plan and at least annually.
In this policy, “information security” is defined as:
preserving
This means that management, all full time or part time staff, sub contractors, project consultants and any external parties have, and will be made aware of, their responsibilities (which are defined in their job descriptions or contracts) to preserve information security, to report security breaches (in line with the policy and procedures identified in Section 13 of the Manual) and to act in accordance with the requirements of the ISMS. The consequences of security policy violations are described in the [organization’s] disciplinary policy. All staff will receive information security awareness training and more specialized staff will receive appropriately specialized information security training
the availability.
This means that information and associated assets should be accessible to authorized users when required and therefore physically secure. The computer network identified as part of the scoping work for Section 1 of the Manual is resilient and the organization is able to detect and respond rapidly to incidents (such as viruses and other malware) that threaten the continued availability of assets, systems and information. There are appropriate business continuity plans to meet the requirements of the CIO Trust Centre as approved by the Director General of IT.
Confidentiality
This involves ensuring that information is only accessible to those authorized to access it and therefore to preventing both deliberate and accidental unauthorized access to the CIO Trust Centre’s information and proprietary knowledge and its systems including its network(s), website(s), extranet(s), and e-commerce systems.
And integrity
This involves safeguarding the accuracy and completeness of information and processing methods and therefore requires preventing deliberate or accidental, partial or complete, destruction, or unauthorized modification, of either physical assets or electronic data. There must be appropriate contingency [including for network(s), e-commerce system(s), web site(s), extranet(s)] and data back-up plans, and security incident reporting. The CIO Trust Centre will comply with all relevant data-related legislation in the Kingdom of Bahrain within which it operates.
Of the physical (assets)
The physical assets of the CIO Trust Centre including but not limited to computer hardware, data cabling, telephone systems, filing systems and physical data files and information assets
The information assets include information printed or written on paper, transmitted by post or shown in films, or spoken in conversation, as well as information stored electronically on servers, web site(s), extranet(s), intranet(s), PCs, laptops, mobile phones and PDAs as well as on CD ROMs, floppy disks, USB sticks, back up tapes and any other digital or magnetic media, and information transmitted electronically by any means. In this context “data” also includes the sets of instructions that tell the system(s) how to manipulate information (i.e. the software: operating systems, applications, utilities, etc)
of the CIO.
The CIO Trust Centre and such partners that are part of our integrated network and have signed up to our security policy and have accepted our ISMS.
The ISMS is the Information Security Management System, of which this policy, the information security manual (“the Manual”) and other supporting and related documentation is a part, and which has been designed in accordance with the [specification contained in ISO27001:2005]
A SECURITY BREACH
A SECURITY BREACH is any incident or activity that causes or may cause a break down in the availability, confidentiality or integrity of the physical or electronic information assets of the Organization.
The Information Security Manager is the Owner of this document and is responsible for ensuring that this policy document is reviewed in line with the requirements in clause 5.1.2 in the Manual.
A current version of this document is available to all members of staff on the on request and as it does not contain confidential information, it can be released to relevant external parties.
This information security policy was approved by the Trust Centre Committee and the Directors of the CIO on 08 November, 2007 and is issued on a version-controlled basis under the signature of the Information Security Manager.
Shaikh Salman Mohammed Al-Khalifa Mohammed Al-Amer
Director General of IT President of CIO
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
The Organisation’s information security policy is reviewed at planned intervals, or when and if significant changes occur, to ensure its continuing suitability, adequacy, and effectiveness.
Note: The Information Security Manager accepts his role as owner of this document and intends to conduct several internal audits before 30 November, 2007 to ensure all aspects of the ISMS are correct, accurate and that this ISMS accurately reflects the total CIO Trust Centre environment.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
[4] Control objective: management of information security within the Organisation and establishment of a management framework for the initiation, implementation and control of the ISMS.
The Organisation’s management actively supports information security within the Organisation through clear direction, demonstrated commitment, explicit assignment and acknowledgement of its – and everyone else’s - information security responsibilities.
Due to the small size of the organisation, it co-ordinates its information security activities through a the Trust Centre Managers consisting of Director General of IT and the Information Security Manager from different parts of the organisation who have relevant roles and job functions
The Organisation has clearly defined all information security responsibilities.
The Organisation has clearly defined all information security responsibilities
The Organisation has defined and implemented a management authorisation process (see DOC 6.4) for new information processing facilities.
A confidentiality and non-disclosure agreement (DOC 6.5) reflecting the Organisation’s requirements for the handling of information is in place (also see 8.1.3 [7]) and is reviewed regularly
The Organisation maintains appropriate contacts with relevant authorities
The organisation maintains appropriate contact with special interest groups and other specialist security forums and professional associations
The Organisation’s approach to managing information security and its implementation (i.e. control objectives, controls, policies, rules, processes and procedures for information security) is independently reviewed at planned intervals, and when significant changes to the security implementation occur.
Control objective: to maintain the security of organisational information processing facilities and information assets that are accessed, processed, communicated to or managed by external parties
The Organisation’s procedures for identifying risks to its information assets and information processing facilities from business processes involving external parties, and for implementing appropriate controls before granting access, are identified in DOC 6.8.
All identified security requirements are addressed, in line with the procedure in DOC 6.8 and the Organisation does not apply this control because none of its customers access any of its information assets.
Agreements with third parties involving accessing, processing, communicating or managing organisational information assets or information processing facilities, or adding products or services to information processing facilities, contain or refer to all identified security requirements, as required in DOC 6.8, and third parties are not allowed to access the Organisation’s information assets until such an agreement has been signed.
“Facility” is defined as “any system(s) or device(s) that will be used to process or store organizational information or that will connect to an organizational network or other information processing facility.” It includes hardware, software and services.
a) Approved (as to adequacy for the business purpose) and authorized by the line manager who/whose team will use them (business approval);
b) Approved and authorized by the local Site Managers (see 6.1.3.8) as to meeting all relevant security policies and requirements are met (site approval);
c) Approved and authorized by the IT Manager as to compatibility with current (and planned future) system components (technical approval);
d) Approved and authorized by the Information Security Manager as to meeting information security requirements (e.g. information classification, anti-malware, etc) (security approval).
e) Signatures and dates must be on the procurement documentation before the procurement can proceed.
User-level information processing devices (notebooks, PDAs, mobile phones, etc) are all considered as “facilities” in terms of this procedure and the Organization requires each individual deployment of any such device to be approved and authorized in line with this procedure. Where relevant, a risk assessment will be carried out in line with DOC 4.4 [7]
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to achieve and maintain appropriate protection of organizational assets.
[4]
All information assets are clearly identified, and an inventory of all important assets has been drawn up and is maintained in line with the requirements of DOC 7.1
All assets associated with the information systems or services are ‘owned’ by a designated individual or part of the Organisation, and details of the Owner are identified on the asset inventory in line with DOC 7.1.
Rules for the acceptable use of information and assets associated with information processing facilities have been identified, documented and implemented.
Control objective: to ensure that information receives an appropriate level of protection
Information has been classified in terms of value, legal requirements, sensitivity and criticality to the Organisation
An appropriate set of procedures for information labelling and handling has been developed in accordance with the classification scheme adopted by the Organisation and this is set out in DOC 7.6
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to ensure that all employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities.
[4]
Security roles and responsibilities of employees, contractors and third party users have been defined and documented as required by the Organisation’s information security policy.
Background verification checks on all candidates for employment, contractors and third party users are carried out in line with DOC 8.1 and in accordance with the laws, regulations and ethics of the Kingdom of Bahrain, and proportional to the Organization business requirements, the classification of the information to be accessed, and the perceived risks
Employees, contractors and third party users must agree and sign the terms and conditions of their employment contract, which state their and the Organization responsibility for information security
Control objective: to ensure that all employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error.
All employees of the Organization and, where relevant, contractors and third party users receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job function.
The Organisation has a formal disciplinary process for employees who have committed a security breach
Control objective: to ensure that employees, contractors and third party users exit an organisation or change employment in an orderly manner
All employees, contractors and third party users are required to return all Organisational assets in their possession upon termination of their employment, contract or agreement.
The access rights of all employees, contractors and third party users to information and information processing facilities are removed upon termination of their employment, contract or agreement, or adjusted upon change
Shaikh Salman Mohammed Al-Khalifa Mohammed Al-Amer
Director General of IT President of CIO
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Control objective: to prevent unauthorized physical access, damage and interference to the organization premises and information.
[4]
The Organization uses security perimeters to protect areas that contain information and information processing facilities.
Secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
The Organization has designed and applied physical security for offices, rooms and facilities.
The Organization has designed and applied physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster
The Organization has designed and applied physical protection and guidelines for working in secure areas and these are contained in DOC 9.8.
Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises are controlled and isolated from information processing facilities to avoid unauthorized access.
Control objective: to prevent loss, damage, theft or compromise of assets and interruption to the organization activities
Equipment is sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized access
Equipment is protected from power failures and other disruptions caused by failures in supporting utilities.
Power and telecommunications cabling carrying data or supporting information services is protected from interception or damage
Equipment is correctly maintained to ensure its continued availability and integrity
Security is applied to off-site equipment taking into account the different risks of working outside the Organization premises
All items of equipment containing storage media are checked to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal
Equipment, information or software may not be taken off-site without prior authorization as required by DOC 9.12
PREMISES INSPECTION
Site Address:
Date and time of Inspection:
Inspector:
a) Completeness of perimeter:
b) External walls of solid construction:
c) Access possible over walls/through roof?
d) Access possible under walls?
e) External doors solid?
1. With required locks/breach alarms?
2. With automatic closing mechanisms?
3. Remote access doors protected by cameras?
f) External windows locked/barred?
g) Fire doors alarmed and monitored in accordance with Work Instruction DOC 9.2
h) Fire alarms installed and working (DOC 9.2)
i) Fire suppression equipment installed and working (DOC 9.4)
j) Burglar/intruder alarms installed and working (DOC 9.3)
1. All [accessible] external windows covered?
2. All external doors covered?
3. Unoccupied areas alarmed at all times?
4. Reception area controlled (DOC 9.6)
k) Air conditioning installed and working (DOC 9.5)
l) Health and safety regulations [insert details of relevant code] applied?
m) (If it houses systems processing confidential information) how easy is it for the public to access the facility?
n) (If it houses systems processing confidential information) how unobtrusive is this to the public? Are there any obvious signs of information processing activities?
o) Are internal directories appropriately classified to restrict access to details of confidential sites?
p) Are hazardous, combustible materials safely stored (at a safe distance from a secure area)?
q) Are bulk supplies of non-confidential items stored outside secure areas?
r) Are necessary fire extinguishers available [insert details of requirements] and tested [insert details of testing regime]?
Distribution: copies of this report are held by the Premises Security Manager and the Information Security Manager.
The Site Security Managers at the CIO are the owners of this document and is responsible for ensuring that this procedure is reviewed in line with the review requirements of the ISMS.
All designated secure areas (see DOC 9.7 and DOC 9.10) on any of the Organization’s premises are subject to controlled access and usage.
All information processing equipment owned or used by the Organization is subject to secure site location and protection requirements.
The requirements are:
a) That equipment is sited so as to minimize [public/unnecessary] access to work areas;
b) Information processing and storage equipment (including faxes, photocopiers and telephone equipment used for confidential information) is sited in secure areas [server/communications rooms/secured offices] so that it is not possible for confidential information to be seen by unauthorized people;
c) Secure areas are subject to the same level of physical perimeter protection as secure sites;
d) Equipment that requires special protection is isolated in the CA [9] Inner Core Room;
e) Controls are implemented to deal with theft (see sub section 9.1 of the Manual), natural or man-made disaster (see sub section 9.1.4 of the Manual).
f) The Organization does not allow smoking inside any of its sites, nor does it allow eating or drinking inside secure areas;
g) Secure areas are monitored for temperature increases above X degrees Celsius and an acceptable limit has been set at X degrees Celsius and the Information Security Manager receives an immediate alert as set out in the OWI for the fire detection system once they are breached.
b) The Site Managers are responsible for ensuring that Heating and Ventilation engineers provide a formal report on the heating, cooling/air conditioning and ventilation requirements of each secure area and each site that contains information processing equipment and for reporting on the adequacy or otherwise of current installations. Shortfalls in requirements are to be treated by escalating their concerns to the Information Security Manager for Risk Assessment, treatment and the creation of an Operation Work Instruction [OWI] as necessary.
c) The Site Managers are responsible for ensuring that all supporting utilities and equipment is inspected (also see DOC 9.7 and DOC 9.8) on a frequency determined by manufacturer’s recommendations [and previous inspections] and that inspection certificates are retained in line with sub section 15.1.3 of the Manual.
a) Electromagnetic shielding for cables;
e) Technical sweeps and physical inspections that are carried out by the Information Security Manager and/or the Security Administrator to ensure that no unauthorized devices are attached to cables.
Scope
The Organization requires, under sub section 9.2.6 of the Manual, that all removable storage media are clean (which means: it is not possible to read or re-constitute the information that was stored on the device or document) prior to disposal.
Responsibilities
The Information Security Manager is responsible for managing the secure disposal of all storage media in line with this procedure when they are no longer required, and is the Owner of the relationship with Al Falwa Cleaning WLL who is the approved contractor for removing shredded documents.
All Owners (see sub section 7.1.2 [7] of the Manual) of removable storage media are responsible for ensuring that these media are disposed of in line with this procedure.
Procedure [ISO 17799 clause 9.2.6]
Hard disks must be cleared of all software and all Organizational confidential and restricted information prior to disposal or re-use, as set out in clause 5 below.
The Information Security Manager is responsible for the secure disposal of storage media and the disposal of all information processing equipment is routed through his/her office. A log (REC 9.1) is retained showing what media was destroyed, disposed of, and when. The asset inventory is adjusted once the asset has been disposed of.
Hard disks are cleaned by the Security Administrator prior to destruction.
Devices containing confidential information are broken and then burnt prior to disposal and are never re-used.
Devices containing confidential information that are damaged are subject to a risk assessment prior to sending for repair, to establish whether they should be repaired or replaced in which case they are destroyed according to this procedure.
Documents containing confidential and restricted information which are to be destroyed are shredded by their owners, using a shredder with an appropriate security classification. These shredders are located in the ISA Town National Smart Card Centre outside the Trust Centre. The waste is removed by the approved contractor.
The Information Security Manager is the owner of this document and is responsible for ensuring that this procedure is reviewed in line with the review requirements of the ISMS.
Yousif Mohammed Ali Muthanna Yousif Mohammed Abdulla
Site Security Manager Site Security Manager
____________________________ ____________________________
On: On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Changes to information processing facilities and systems are controlled
Duties and areas of responsibility are segregated to reduce opportunities for unauthorized or unintentional modification or misuse of organisational assets
1. Risk Assessment Adlin Hisyamuddin - Information Security Manager, Head PKI [5]
2. Authorisation of Controls Mubarak Abdulla Alhiddi - CSO/CIO
3. Change Initiation Ahmed Essa Abualfath - Computer Security Administrator
4. Change Management Shaikh Salman Mohammed Al-Khalifa – Director General of IT
5. Network Management Khalid Al Othman – Chief, Network
6. Network Administration Khalid Ali Al Jalahma – Network Administrator
7. IT Operations Mohammed Al-Yassi – Director IT Operations
8. Software Development Sameh Abo-El-Ela
9. System Testing Osama Khalid Rafai - Computer Security Administrator
10. Employee Administration Hesham Al-Ghatam - Chief, Personnel & Admin’ Development
11. Asset Purchase Khulood Al-Jassim - Supervisor Administration Service
12. Site/Secure Area Security Adel Khalifa Bu-Alai - Chief of Police in Juffair
13. Site/Secure Area Security Mohammed Hamdan Mohammed - Chief of Police in Isa Town
14. Security Audit Osama Khalid Rafai - Computer Security Administrator
15. PKI Manager Adlin Hisyamuddin - Information Security Manager, Head PKI
16. Physical Site Security Yousif Mohammed Ali Muthanna – Site Security Manager
17. Physical Site Security Yousif Mohammed Abdulla – Site Security Manager
Development, test and operational facilities are separated to reduce the risks of unauthorized access or changes to the operational system
Control objective: to implement and maintain the appropriate level of information security and service delivery in line with third party service delivery agreements
The Organization ensures that the security controls, service definitions and delivery levels included in the third party service delivery agreement are implemented, operated and maintained by the third party
The Organisation regularly monitors and reviews the services, reports and records provided by third parties and carries out regular audits
The Organisation manages changes to the provision of services, including maintaining and improving existing information security policies, procedures and controls, taking account of the criticality of business systems and processes involved and re-assessment of risks, and the procedures for doing this are contained in DOC 6.8. [7]
Control objective: to minimize the risks of systems failures
Acceptance criteria for new information systems, upgrades and new versions have been established and suitable tests of the system(s) are carried out during development and prior to acceptance, all as specified in DOC 10.10. rotection
Control objective: to protect the integrity of software and information
Detection, prevention and recovery controls to protect against malicious code and appropriate user awareness procedures have been implemented
The execution of mobile code is prohibited in the Trust Centre
Control objective: to maintain the integrity and availability of information and information processing facilities
Back-up copies of information and software are taken and tested regularly in accordance with the agreed back-up policy below
Control objective: to ensure the safeguarding of information in networks and the protection of the supporting infrastructure
Networks are managed and controlled as set out in DOC 10.14, in order to be protected from threats, and to maintain security for the systems and applications using the network, including information in transit
Security features, service levels and management requirements of all network services have been identified and included in the network service level agreement and are managed in line with DOC 10.14.
Control objective: to prevent the unauthorized disclosure, modification, removal or destruction of assets and interruption to business activities
Media are disposed of securely and safely when no longer required, in line with DOC 9.11. [7]
Procedures for the handling and storage of information are set out in DOC 7.6 [7] and DOC 10.15 to protect this information from unauthorized disclosure or misuse
System documentation is protected against unauthorized access, as set out in DOC 10.15.
Control objective: to maintain the security of information exchanged within an organization and with any external entity
Formal exchange policies, procedures and controls are in place to protect the exchange of information through the use of all types of communication facilities
Agreements are established in line with DOC 6.8 [7] for the exchange of information and software between the Organization and external parties
DOC 9.12 [7] sets out how the Organization ensures that media are protected against unauthorized access, misuse or corruption during transportation beyond the Organization physical boundaries
Messaging is outbound only and no inbound email system exists within the CIO Trust Centre
A policy and procedures have been developed and implemented to protect information associated with the interconnection of business information systems.
Control objective: to ensure the security of electronic commerce services, and their secure use
Electronic commerce information passing over public networks is protected from fraudulent activity, contract dispute, and unauthorized disclosure and modification as set out in DOC 10.17.
Information involved in on-line transactions is protected in line with DOC 10.17 to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized message duplication or replay
The integrity of information being made available on a publicly available system is protected in DOC 10.17 to prevent unauthorized modification
Control objective: to detect unauthorized information processing activities
Audit logs recording user activities, exceptions and information security events are produced and kept, in line with DOC 10.18, for a period specified in DOC 15.2 [7] to assist in future investigations and access control monitoring
Procedures for monitoring use of information processing facilities have been established in DOC 10.18 and the results of the monitoring activities are reviewed [regularly]
Logging facilities and log information are protected against tampering and unauthorized access, as required by DOC 10.18
System administrator and system operator activities are logged as required by DOC 10.18
Faults are logged, analysed and appropriate action taken, all in line with DOC 10.18
The clocks of all relevant information processing systems within the organisation are synchronized with an agreed accurate time source as specified in DOC 10.18.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to control access to information
[4]
An access control policy has been established, documented in DOC 11.1, and is reviewed when required in the light of business and security needs. In addition, as the Trust Centre protects National Assets, the following are the physical procedures that must be followed every time the Trust Centre in the National Smart Card Centre in Isa Town is accessed.
Administration Area
When access is required to the Administration Area of the Trust Centre, any two of following five members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Administration Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Administration Area unaccompanied by one of the following personnel:
If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.
Outer Core
When access is required to the Outer Core Area of the Trust Centre, all three of following members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Outer Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Outer Core Area unaccompanied by all of the following personnel:
If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.
Inner Core
When access is required to the Inner Core Area of the Trust Centre, all three of following members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Outer Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Inner Core Area unaccompanied by all of the following personnel:
If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.
Setting Access Control on the Idendix System
Access to all areas of the Trust Centre is controlled by the Identix biometric locking system on all of the doors. The system is configured according to the policy set out in sub section 11.1 above. Only two people have the username and password to access this system:
The Identix control system is located in the Administration Area of the Trust Centre and as no one can access this area alone, both people will be monitored by one of the other personnel with access rights to the Administration Area. A change log must be signed by the Director General of IT or the President of the CIO to change the access configuration for any of the doors in the Trust Centre.
No changes to this system are permitted without this change control document signed by the Director General of IT or the President of the CIO.
In addition, as part of the monthly controls checking procedure, the Information Security Manager will check the los on the Identix system, print out these logs and sign them to demonstrate that no unauthorised changes have occurred without authorisation.
Control objective: to ensure authorized users’ access and to prevent unauthorised access to information systems
The allocation and use of privileges is restricted and controlled in DOC 11.3
The allocation of passwords is controlled through a formal management process as set out in DOC 11.3
Management reviews users’ access rights at regular intervals using the formal process as set out in DOC 11.3
Control objective: to prevent unauthorized user access, and compromise or theft of information and information processing facilities
Users are required (in their User Agreements DOC 11.4) to follow good security practices in the selection and use of passwords
Users are required (in their User Agreements DOC 11.4) to ensure that unattended equipment has appropriate protection
The Organisation has adopted a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities and the requirement for compliance [12] with this policy is set out in DOC 11.4.
Control objective: to prevent unauthorized access to networked services
DOC 11.8 sets out the authentication methods that are used to control access by remote users.
Automatic equipment identification is used as set out in DOC 11.8 as a means to authenticate connections from specific locations and equipment
Physical and logical access to diagnostic and configuration ports is controlled as required by DOC 11.8.
Groups of information services, users and information systems are segregated in the network(s) in line with the requirements of DOC 11.7 and 11.8
The Organization has a single shared network which extends across the organizational boundaries; the Organization restricts the capability of users to connect to the network, in line with the access control policy (DOC 11.1) and requirements of the business applications and as set out in DOC 11.8.
Routing controls have been implemented in line with DOC 11.8 for the Organization networks to ensure that computer connections and information flows do not breach the Organization access control policy as applied to the business applications
Control objective: to prevent unauthorized access to operating systems
Access to information systems is controlled by the secure log-on procedure set out in DOC 11.9
All users have a unique identifier (user ID) for their personal and sole use, issued in line with the requirements of DOC 11.3, and [a suitable authentication technique] has been chosen to substantiate the claimed identity of a user
The password management system set out in DOC 11.3 ensures quality passwords
The use of utility programs that might be capable of overriding system and application controls is restricted and controlled as specified in DOC 11.10.
Inactive sessions are shut down in accordance with DOC 11.9 after a defined period of inactivity
Restrictions on connection times are used to provide additional security for high-risk applications, as specified in DOC 11.8.
Control objective: to prevent unauthorized access to information held in application systems
Access to information and application system functions by users and support personnel is restricted in DOC 11.2 in accordance with the access control policy in DOC 11.1
Sensitive systems have a dedicated (isolated) computing environment as provided in DOC 11.9
Control objective: to ensure information security when using mobile computing and teleworking facilities
A formal policy is in place and appropriate security measures have been adopted to protect against the risks of using mobile computing and communication facilities
Is not permitted in the Trust Centre.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Information Systems Acquisition, Development & Maintenance
Control objective: to ensure that security is an integral party of information systems
[4]
Control objective: to prevent errors, loss, unauthorized modification or misuse of information in applications
Data input to applications is provided from an external source and the responsibility of its accuracy is outside this ISMS.
Validation checks are incorporated into applications to detect any corruption of information through processing errors or deliberate acts.
Requirements for ensuring authenticity and protecting message integrity in applications have been identified, and appropriate controls identified and implemented
Data output from an application is validated to ensure that the processing of stored information is correct and appropriate to the circumstances
Control objective: to protect the confidentiality, authenticity or integrity of information by cryptographic means
The Organisation has a policy on its use of cryptographic controls for protection of its information, as set out below
Key management, as documented in DOC 12.2, supports the Organization use of cryptographic techniques
Control objective: to ensure the security of system files
The installation of software on operational systems is controlled by DOC 12.3
Test data is selected, protected and controlled in line with DOC 10.10 [7].
Access to program source code is restricted in line with DOC 10.15 [7]
Control objective: to maintain the security of application system software and information
The implementation of changes is controlled by the use of the formal change control procedures set out in DOC 10.7.
When operating systems are changed, business critical applications are reviewed and tested in line with DOC 10.10 [7] to ensure there is no adverse impact on organisational operations or security.
The Organisation does not seek bespoke modifications to commercial software packages.
Controls are applied to limit the opportunities for information leakage
The Organization does not outsource software development
Control objective: to prevent the damage resulting from exploitation of published technical vulnerabilities
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action to be taken.
[4]
Information security events must be reported to the Information Security Manager as quickly as possible, as set out in DOC 13.1
All employees, contractors and third party users of information systems and services are required by DOC 13.1 to note and report to the Information Security Manager any actual or suspected weaknesses in Organizational systems or services
Control objective: to ensure a consistent and effective approach is applied to the management of information security incidents
Management responsibilities and procedures have been established in DOC 13.2 to ensure a quick, effective and orderly response to information security incidents that ensures appropriate corrective or preventative actions, restores normal operations as quickly as possible, and ensures that improvement opportunities are identified and acted upon.
DOC 13.2 requires the Information Security Manager to quantify and monitor the types, volumes and costs of information security incidents.
In all information security incidents, irrespective of whether or not a follow-up action against a person or organization involves legal action (either civil or criminal), evidence is collected, retained and presented as set out in DOC 13.5 to conform to the rules for evidence laid down in the laws of the Kingdom of Bahrain.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to counteract interruptions to business activities, to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption
Events that can cause interruptions to business processes are identified as set out in DOC 14.2, along with the probability and impact of such interruptions, and the risk assessment process (DOC 4.4 [7]) is extended to apply to business continuity risks. These risk assessments drive the business continuity planning framework (DOC 14.3)
The Organisation’s Business Continuity Plan is developed in line with DOC 14.1 and is set out in DOC 14.3. It enables the Organisation to maintain or restore operations and ensure availability of information at the required level and in the required time scales following interruption to, or failure of, critical business processes
A single framework (as described in DOC 14.1) of business continuity plans is maintained to ensure that the plan and all its sub-plans are consistent, to consistently address information security requirements, and to identify priorities for testing and maintenance
Business continuity plans are tested and updated regularly, in line with the requirements of DOC 14.4, to ensure that they are up to date and effective
Shaikh Salman Mohammed Al-Khalifa Mohammed Al-Amer
Director General of IT President of CIO
____________________________ _______________________________
On:
08 November, 2007
____________________________ _______________________________
Change history
Issue 1 08 November, 2007 Initial issue
Control objective: to avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security requirements
[4]
All relevant statutory, regulatory and contractual requirements and the Organization approach to meet these requirements have been explicitly defined, documented and are kept up to date for
each information system and the Organization
Appropriate procedures have been implemented to ensure compliance with legislative, regulatory and contractual requirements on the use of material in respect of which there may be intellectual property rights and on the use of proprietary software products.
The Organization procedure, set out in DOC 15.2 protects important records from loss, destruction and falsification, in accordance with statutory, regulatory, contractual and business requirements
Data protection and privacy are ensured as required and, where applicable, contractual clauses
Users are be deterred from using information processing facilities for unauthorized purposes.
Cryptographic controls are used in compliance with all relevant agreements, laws and regulations, as set out in DOC 12.2 [7].
Control objective: to ensure compliance of systems with organizational security policies and standards [10]
Managers ensure that all documented security procedures and work instructions within their area of responsibility are carried out correctly to achieve compliance with security policies and standards
Information systems are regularly checked for compliance with security implementation standards, and the Organization procedures for managing technical compliance checking are set out in DOC 15.4
Control objective: to maximize the effectiveness of and to minimize interference to/from the information systems audit process
Audit requirements and activities involving checks on operational systems are carefully planned as set out in DOC 15.5 and agreed with appropriate management to minimize the risk of disruptions to business processes.
Access to information systems audit tools are protected as required in DOC 15.5 to prevent any possible misuse or compromise
The Organization’s entire ISMS is within the scope of this procedure.
Responsibilities
All personnel connected with the Trust Centre are responsible for ensuring and checking for procedural compliance.
The Information Security Manager is responsible for planning and commissioning technical compliance checking.
Procedure
Management review [ISO 17799 clause 15.2.1]
Technical Compliance Checking [ISO 17799 clause 15.2.2]
ISO 27001 Auditor
The Organization’s information assets and whole ISMS are within the scope of this procedure.
Responsibilities
The Information Security Manager is responsible for planning systems audit activities. The Information Security Manager is responsible for authorizing audit activity to occur.
Procedure [ISO 17799 clause 15.3.1]
Audit controls
The audit regime and the specific audit requirements will be documented and identified as part of the initial internal audit and will be identified and documented here, once completed. You should refer to the guidance of ISO 17799 clause 15.3.1 in drafting your procedure for this activity.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
[4] The Information Security Manager is the Owner of this document and is responsible for ensuring that this policy document is reviewed in line with the review requirements stated above.
A current version of this document is available to all members of staff on request.
This manual was approved by the Board of the CIO Trust Centre on 08 November, 2007 and is issued on a version controlled basis under the signature of the Director General of IT.
Shaikh Salman Mohammed Al-Khalifa Mohammed Al-Amer
Director General of IT President of CIO
____________________________ _______________________________
On:
08 November, 2007 08 November, 2007
____________________________ _______________________________
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Issue 2 [issue date]
Issue 3 [issue date]
Issue 4 [issue date]
Adlin Hisyamuddin
Information Security Manager, Head PKI
+973 1 772-6732
+973 3 986-7661
adlinh@cio.gov.bh [13]
Mubarak Abdulla Alhiddi
CSO/CIO
Ahmed Essa Abualfath
Computer Security Administrator
+973 1 772-6731
+973 3 968-7334
aabualfath@cio.gov.bh [14]
Shaikh Salman Mohammed Al-Khalifa
+973 3 968-9898
smalkhalifa@cio.gov.bh [15]
Khalid Al Othman
Chief, Network
+973 1 772-6325
+973 3 609-9167
osamarf@cio.gov.bh [16]
Khalid Ali Al Jalahma
Network Administrator
+973 1 772-6729
kaljalahma@cio.gov.bh [17]
Mohammed Al-Yassi
Director IT Operations
Sameh Abo-El-Ela
Development Manager
cssoshg@cio.gov.bh [18]
Osama Khalid Rafai
Computer Security Administrator
+973 1 772-6325
+973 36099167
osamarf@cio.gov.bh [16]
Hesham Al-Ghatam
Chief, Personnel & Admin’ Development
+973 1 787-8177
alghatamhe@cio.gov.bh [19]
Asset Purchase
Khulood Al-Jassim
Supervisor Administration Service
+973 1 772-6760
aljassimk@cio.gov.bh [20]
Adel Khalifa Bu-Alai
Chief of Police in Juffair
+973 3 981-1055
Mohammed Hamdan Mohammed
Chief of Police in Isa Town
+973 3 980-8096
Operational Controlling Roles
Shaikh Salman Mohammed Al-Khalifa
+973 3 968-9898
smalkhalifa@cio.gov.bh [15]
Mohammed Al-Amer
President of CIO
+973 1 787-8101
+973 3 967-2222
malamer@cio.gov.bh [22]
Shaikh Salman Mohammed Al-Khalifa
+973 3 968-9898
smalkhalifa@cio.gov.bh [15]
Mubarak Abdulla Alhiddi
CSO/CIO
Khalid Al Othman
Chief, Network
+973 1 772-6767
alothmank@cio.gov.bh [23]
Khalid Ali Al Jalahma
Network Administrator
+973 1 772-6729
kaljalahma@cio.gov.bh [17]
Adlin Hisyamuddin
Information Security Manager
+973 1 772-6732
+973 3 986-7661
adlinh@cio.gov.bh [13]
Ahmed Essa Abualfath
Computer Security Administrator
+973 1 772-6731
+973 3 968-7334
aabualfath@cio.gov.bh [14]
Osama Khalid Rafai
Computer Security Administrator
+973 1 772-6325
+973 3 609-9167
osamarf@cio.gov.bh [16]
Khalid Ali Al Jalahma
Network Administrator
+973 1 772-6729
kaljalahma@cio.gov.bh [17]
Saud Abdulaziz Bahzad
Smart Card Support
+973 3 903-3319
soudbah@cio.gov.bh [24]
Sameh Abo-El-Ela
Smart Card Technical
+973 1 772-6704
+973 3 6439376
cssoshg@cio.gov.bh [18]
Isa Town Card Issuer No. 1 - to be selected by Adlin
Isa Town Card Issuer No. 2 - to be selected by Adlin
Key Ceremony Roles
Adlin Hisyamuddin
Information Security Manager, Head PKI
+973 1 772-6732
+973 3 986-7661
adlinh@cio.gov.bh [13]
Osama Khalid Rafai - Computer Security Administrator
+973 1 772-6325
+973 3 609-9167
osamarf@cio.gov.bh [16]
Elham Moh’d Saleh
Director Technical Resources
+973 17878017
elhama@cio.gov.bh [25]
Shaikh Salman Mohammed Al-Khalifa
+973 3 968-9898
smalkhalifa@cio.gov.bh [15]
Mubarak Abdulla Alhiddi
Senior Population Inspector – Supervisor
+973 39655366
monamj@cio.gov.bh [26]
Yousif Abdulla Ashoor
Senior Population Inspector – Clerk
+973 39457566
yashoor@cio.gov.bh [27]
Ahmed Abdulmonem Alshami
Smart Card Support
+973 39537089
alshamyah@cio.gov.bh [28]
Razan Abdulrahman Al Khalifa
Smart Card Support
+973 39456565
razanaak@cio.gov.bh [29]
Shaikh Salman Mohammed Al-Khalifa
+973 3 968-9898
smalkhalifa@cio.gov.bh [15]
Mubarak Abdulla Alhiddi
Ahmed Al Mahmood
Director of Population Registry
+973 39672677
aalmahmood@cio.gov.bh [30]
HSM Configuration Roles
Adlin Hisyamuddin
Information Security Manager, Head PKI
+973 1 772-6732
+973 3 986-7661
adlinh@cio.gov.bh [13]
Osama Khalid Rafai - Computer Security Administrator
+973 1 772-6325
+973 3 609-9167
osamarf@cio.gov.bh [16]
Elham Moh’d Saleh
Director Technical Resources
+973 17878017
elhama@cio.gov.bh [25]
Mubarak Abdulla Alhiddi
Ahmed Al Mahmood
Director of Population Registry
+973 39672677
aalmahmood@cio.gov.bh [30]
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
13/12/2006 |
|
Safe |
Chubb |
Europe |
SN |
PKI DC |
|
5000 |
|
OWI |
20/12/2006 |
|
HSM |
nCipher |
netHSM |
|
PKI DC |
|
11000 |
|
OWI |
30/9/2007 |
|
HSM |
nCipher |
netHSM |
|
PKI DC |
|
11000 |
|
OWI |
14/1/2007 |
|
Server |
UK |
APW |
|
PKI DC |
|
1238 |
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
|
Somke |
Fire |
NA |
PKI DC |
|
120 |
|
OWI due |
01/01/2005 |
|
Fire |
Fike |
FM 200 |
341861.2 |
PKI DC |
|
15000 |
|
OWI due |
01/01/2005 |
|
Air |
Clivet |
VR-DX |
|
PKI DC |
|
20000 |
|
OWI due |
01/12/2006 |
|
Backup |
YOKO |
|
HKA |
PKI DC |
|
300 |
|
OWI due |
01/01/2005 |
|
Light |
|
|
|
PKI DC |
|
|
|
OWI |
01/12/2006 |
|
Door |
Alpro |
NA |
NA |
PKI DC |
|
2000 |
|
OWI due |
13/12/2006 |
|
Door |
Trimec |
TS2001 |
NA |
PKI DC |
|
456 |
|
OWI due |
|
||||||||||
08/01/2007 |
|
Server |
Dell |
PE2950 |
CBXGK2J |
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
Dell |
PE2950 |
9WCHK2J |
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
HP |
|
|
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
HP |
|
|
PKI DC |
|
1814 |
|
OWI |
13/12/2006 |
|
Switch |
Cisco |
|
|
PKI DC |
|
817 |
|
OWI |
13/12/2006 |
|
|
|
X505 |
|
PKI DC |
|
13973 |
|
OWI |
|
|
KBM |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
|
|
KBM |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
Server |
UK |
APW |
47170 |
PKI DC |
|
1238 |
|
OWI |
13/12/2006 |
|
Server |
UK |
APW |
47166 |
PKI DC |
|
1238 |
|
OWI |
01/01/2005 |
|
Fire |
Fike |
FM 200 |
341861.2 |
PKI DC |
|
15000 |
|
|
01/01/2005 |
|
|
Somke |
Fire |
NA |
PKI DC |
|
15000 |
N/C |
N/C |
13/12/2006 |
|
Motion |
Texecom |
Mirage |
NA |
PKI DC |
|
33 |
|
|
01/01/2005 |
|
Light |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
Air |
Clivet |
VR-DX |
|
PKI DC |
|
20000 |
|
|
01/01/2005 |
|
Backup |
YOKO |
|
HKA |
PKI DC |
|
300 |
|
|
13/12/2006 |
|
CCTV |
|
|
63121040 |
PKI DC |
|
285 |
|
|
13/12/2006 |
|
Door |
Alpro |
NA |
NA |
PKI DC |
|
2000 |
|
|
13/12/2006 |
|
Door |
Trimec |
TS2001 |
0 |
PKI DC |
|
456 |
|
|
|
||||||||||
13/12/2006 |
|
Access |
Identix |
V20 UA |
390600348 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
30700024 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
500303254 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
DVR |
|
|
61210298 |
PKI DC |
|
477 |
|
|
01/12/2006 |
|
Remote |
|
|
|
PKI DC |
|
25 |
|
|
13/12/2006 |
|
Monitor |
|
|
6300145 |
PKI DC |
|
117 |
|
OWI |
01/12/2006 |
|
Coaxial |
|
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
PC |
Acer |
Veriton |
|
PKI DC |
|
405 |
|
OWI |
00/01/1900 |
|
|
Acer |
|
|
PKI DC |
|
35 |
|
OWI |
00/01/1900 |
|
Mouse |
Acer |
Mouse |
|
PKI DC |
|
10 |
|
OWI |
13/12/2006 |
|
Monitor |
Acer |
AC713B |
|
PKI DC |
|
125 |
|
OWI |
13/12/2006 |
|
Switch |
SMC |
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
Door |
Trimec |
TS2001 |
NA |
PKI DC |
|
456 |
|
|
13/12/2006 |
|
Exit |
ALPRO |
NA |
NA |
PKI DC |
|
88 |
|
|
13/12/2006 |
|
Power |
|
12V 5 |
NA |
PKI DC |
|
116 |
|
OWI |
13/12/2006 |
|
Alarm |
Veritas |
Excel |
NA |
PKI DC |
|
74 |
|
|
13/12/2006 |
|
LCD |
Texecom |
Premier |
NA |
PKI DC |
|
50 |
|
|
13/12/2006 |
|
Dialer |
Texecom |
Speech |
NA |
PKI DC |
|
63 |
|
|
13/12/2006 |
|
Siren |
Texecom |
Odyssey |
NA |
PKI DC |
|
18 |
|
|
13/12/2006 |
|
CCTV |
|
|
63121034 |
PKI DC |
|
285 |
|
|
14/12/2006 |
|
Fully |
|
|
|
PKI DC |
|
|
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
|
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
|
Khind |
EM2004G |
|
|
|
|
|
|
|
||||||||||
13/12/2006 |
|
Server |
UK |
APW |
0 |
Juffair |
|
1238 |
|
OWI |
08/01/2007 |
|
Server |
Dell |
PE2950 |
41WHK2J |
Juffair |
|
1814 |
|
OWI |
08/01/2007 |
||||||||||
13/12/2006 |
|
Switch |
Cisco |
|
|
Juffair |
|
817 |
|
OWI |
13/12/2006 |
|
|
|
X505 |
|
Juffair |
|
13973 |
|
OWI |
|
|
KBM |
|
|
|
Juffair |
|
|
|
OWI |
|
|
KBM |
|
|
|
Juffair |
|
|
|
OWI |
01/01/2005 |
|
Network |
|
|
|
Juffair |
|
|
|
OWI |
01/01/2005 |
|
Fire |
EMI |
AFA |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
|
EMI |
Fire |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
Light |
|
|
|
Juffair |
|
|
|
|
01/01/2005 |
|
Air |
Denco |
DM5 |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
Backup |
Pearl |
|
800390 |
Juffair |
|
|
|
|
The Information Security Manager is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the Information Security Manager on 08 November, 2007 and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
14/01/2007 |
|
OS |
Microsoft |
Windows Server 2003 |
1 |
PKI DC |
|
|
|
|
20/09/2007 |
|
OS |
RedHat |
Enterprise Linux 5 |
3 |
PKI DC |
|
|
|
|
07/10/2007 |
|
Digi-CA™ |
Digi-Sign |
Xp |
1 |
PKI DC |
|
97,000 |
|
|
|
||||||||||
14/01/2007 |
|
Access Control |
Identix |
4.6.1.0 |
1 |
PKI DC |
|
|
|
|
14/01/2007 |
|
CCTV control |
Infinova |
V.1.00.09 |
1 |
PKI DC |
|
|
|
|
14/01/2007 |
|
OS |
Microsoft |
XP Pro |
1 |
PKI DC |
|
|
|
|
15/01/2007 |
|
AntiVirus |
Trend Micro |
OfficeScan 8.0 |
1 |
PKI DC |
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
20/09/2007 |
|
OS |
RedHat |
Enterprise Linux 5 |
2 |
PKI DC |
|
|
|
|
|
|
SMTP |
Microsoft |
Exchange 2003 |
1 |
Juffair |
|
|
|
|
|
|
DNS (*.gov.bh) |
RedHat |
Enterprise Linux 4 |
1 |
Juffair |
|
|
|
|
|
|
DNS (*.gdn) |
Microsoft |
Windows Server 2003 |
1 |
Juffair |
|
|
|
|
The Information Security Manager is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The [Information Security Manager] is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Signature: Date:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The [Information Security Manager] is the owner of this document and is responsible for ensuring that it is maintained by the relationship Owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
External Parties: Information Security Procedure
According to DOC 6.8 [7] / DOC 6.8 [7] of this Manual, the Organization maintains the security of its information processing facilities and information assets in relation to external parties. All external parties who need to access any Organizational information assets are subject to this procedure. The Organization has (or may have) external party agreements with the following categories of organizations, all of whom are covered by this procedure; risks may be assessed for external parties as individual organizations or as categories, depending on the level of risk involved:
a) Service providers
b) Managed security services
c) Customers
d) Outsourcing suppliers (facilities, operations, IT systems, data collection, call centres, others)
e) Consultants and auditors
f) Developers and suppliers of IT systems and services
g) Cleaning, catering and other outsourced support services
h) Temporary personnel, placement and other (casual) short-term appointments
a) The information processing facilities and information assets the external party will access;
b) The type of access the third party will have – physical access and/or logical access (identifying the assets that will be accessed), whether the access is taking place on-site or off-site and the exact location from which access will be made;
c) The value and classification (see sub section 7.2 [7] of the Manual) of the information that will be accessed;
d) The information assets that the external party are not intended to access and which may required additional controls to secure;
e) The external party’s personnel (see sub section 8.1 [7] of the Manual), including their contractors and partners, who will or might be involved;
f) How external party personnel are to be authenticated (see Section 11 [7] of the Manual);
g) How the external party will process, communicate and store information;
h) The impact to the external party of access not being available when required, or of inaccurate or misleading information being entered, received or shared;
i) How the Organization’s information security incident management procedure (see Section 13 [7] of the Manual) will be extended to incorporate information security incidents involving the external party;
j) Any legal, regulatory or other contractual issues that should be taken into account with respect to the external party;
k) How the interests of other stakeholders might be affected by any decisions.
a) The information security policy (sub section 5.1.1 of the Manual);
b) The controls identified as required through the risk assessment process (see 4 [7]), which may include procedures and technical controls;
c) A clear definition and/or description of the product or service to be provided, and a description of information (including its classification) to be made available;
d) Requirements for user and administrator education, training and awareness (see sub section 8.2.2 [7] of the Manual);
e) Provisions for personnel transfer;
f) Description of responsibilities regarding software and hardware installation, maintenance and de-commissioning;
g) Clearly defined reporting process, reporting structure, reporting formats, escalation procedures and the requirement for the external party to adequately resource the compliance [12], monitoring and reporting activities;
h) A specified change management process (see sub section 10.1.2 [7] in the Manual);
i) Physical controls, including secure perimeters (see Section 9 [7] of the Manual);
j) Controls against malware (see sub section 10.4 [7] of the Manual);
k) Access control policy (see Section 11 [7] of the Manual);
l) Information security incident management (see Section 13 [7] of the Manual) and agreement violation management procedures;
m) The target level for service and security, unacceptable service and security levels, definition of verifiable performance and security criteria, monitoring and reporting;
n) The right to monitor and audit performance (including of the third party’s processes for change management, vulnerability identification and information security incident management), to revoke activities, and to use external auditors;
o) Service continuity requirements;
p) Liabilities on both sides, legal responsibilities and how legal responsibilities (including data protection and privacy) are to be met;
q) The protection of IPR and copyright;
r) Controls over any allowed sub-contractors;
s) Conditions for termination/re-negotiation of agreements, including contingency plans.
The Information Security Manager is the owner of this document and is responsible for ensuring that this procedure is reviewed in line with the review requirements of the ISMS.
A current version of this document is available to PKI team members of staff on the corporate intranet.
This procedure was approved by the Information Security Manager on 08 November, 2007 and is issued on a version controlled basis under his signature
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
The purpose of this document is to provide full Operating Work Instructions for the use, maintenance and support of the HSM in place at CIO
Responsibility & Asset Ownership:
[Please Indicate – probably Information Security Manager] is responsible for ensuring that this OWI is fully implemented and regularly updated to reflect any changes in the environment at CIO. As per the asset list the {Indicate – probably Information Security Manager] is the owner of the assets covered in this OWI.
Details of the Operating Work Instruction:
The nCipher net HSM is a hardware platform for providing cryptographic services to enhance the security of a variety of applications - from PKI [5] and authentication systems to Web services and SSL protected communications. The net HSM acts as a network-attached resource for secure cryptographic processing, providing an alternative deployment scenario to the traditional approach of dedicated HSMs on individual servers. By allowing multiple servers to securely access a single HSM to perform cryptographic functions, overall equipment costs can be reduced and system management simplified. Whilst dedicated HSMs are appropriate for security applications and servers that demand guaranteed availability and/or processing power, many deployments encompass multiple servers, either in a single site or across a wide
geographic area, where a shareable, network connected HSM is a perfect solution.
The CIO uses the nCipher HSM device (herein referred to as “HSM”) to securely generate and store the private keys for the CAs it operates.
The HSM device has been designed to remove any daily administration responsibilities from the administering users. The daily administration duties of the HSM device are reduced to a minimum and are internally performed by a self automated system management control mechanisms, that reside inside the HSM device. On a scheduled basis, CIO users appointed as administrators of the HSM device, are required to inspect the HSM operations by checking the log report accessible on the front panel screen of the HSM device.
The daily operating duties of the HSM are limited to the cryptographic signing operations and on periodic basis, the HSM device may be used by the CIO to generate fresh cryptographic keys when a new CA [9] is created. In the event of a new CA creation, the generation of new private keys is performed in a secure environment, video recorded, documented, witnessed and notarized thus assuring, that highest security is in place.
The device has a text based interface provided through the flat screen residing on the front panel of the HSM device.
All features and functionalities provided by the HSM device are documented and described in the hardware installation, administration and operation manuals available to CIO personnel.
Since this is a hardware device, no maintenance is required to keep the device in an ongoing operational state. The supplied hardware documentation available to CIO personnel describes all features and functionalities provided by the HSM device, including installation guides, configuration instructions and error correction.
The HSM device is located in the CIO’s highly secured data centre: ISA Town, which has two independent power supply sources, one from an external power supplier and the second from the CIO’s internal power generator. The power provided to the HSM device is isolated from other power segments inside the data centre building, thus meeting the independency and failover requirements in the event of any power failure or circuit overload.
The HSM deployment architecture includes a multi two HSM devices configured for High Availability. This mechanism balances the usage of network and hardware resources between two HSM devices and thus provides greater system performance and fail over support. The diagram below illustrates the current CIO’s deployment architecture of the Digi-CA™ [21] PKI System, with which the two HSM devices have been configured for operation:
Both HSM devices are placed in a dedicated, CISCO firewall/switch protected network segment. The CA core network in ISA Town, to which the HSMs are connected, is isolated from other corporate networks inside CIO and physical access to the Inner and Outer Core rooms as presented on the above diagram, is strictly protected with biometric devices and video camera monitoring performed 24 hours per day throughout the entire year.
The HSM devices, which are located in the Inner Core room inside the ISA Town Data Centre building, are the central cryptographic operation processing units for the CA System deployed inside CIO. Each HSM is connected to a dedicated back-end server hosting the relevant CA System components and both of the back-end servers have been configured for High Availability and provide a failover mechanism to the operation of CA System. The HSM provides the following main functionalities:
Each of the above functionalities is documented in the hardware manual available to CIO administering and operating personnel.
The installation and configuration of the HSM devices inside the CIO has been completed with the accordance to the hardware installation manual available to the CIO personnel. The manual provides a step by step instruction set allowing the administering users to correctly install and configure an HSM device. Upon successful installation of each device, a manual device operation check was run by the administering user to ensure the device has been installed and configured correctly and is up and running. For this purpose, a HSM support toolkit provided by the device vendor was used. Before the system was switched into a production environment, a set of test private keys was generated to ensure the HSMs are operating correctly. After each test, the HSM log was inspected to verify whether each operation was accomplished correctly.
The set of testing operations for CA AMC included:
All operations have been performed with the accordance to the hardware administration and operation manual available to CIO personnel.
CIO expects Digi-CA™ HSM to store up to 100 private keys of either 1024 bits, 2048 bits or 4096 bits size and sign around 100 000 Digital Certificates [8] in total, provided the current deployment architecture and allocated hardware capacity for the CA System. The maximum number of digital certificates issued per day will not reach 10 000. The CA System deployment architecture is expected to support 24/7/365 availability and currently there is no requirement for CIO to have an online disaster recovery centre. In an event of an irrecoverable major system or hardware failure, all disaster recovery activities will be carried out manually by the CIO appointed administering personnel, by recreating the CA System environment or loading configuration to a HSM device from backup resources. The above performance requirements have been measured, confirmed and tested by the CA System software and HSM hardware vendors and they meet the CIO requirements stated above.
The HSM device provides extended system operation control mechanisms, that automatically raise an alert when a critical exception error is encountered during the operations of the device. The alert is immediately logged in the HSM log. The HSM log is accessible to CIO appointed administering users from the flat screen residing on the front panel of the device or from the operating system command prompt of the server connecting to the HSM device. All exception error log entries are reported by HSM device using a unique error number and associated descriptive text, that informs the inspecting user about the type of the error and why it was generated. This architecture provides CIO administering users with an easy mechanism for identifying the source for the error and allows immediate correction of the problem. For irrecoverable or unidentified errors, CIO administering users should contact the hardware vendor to obtain further assistance.
The HSM administering users should perform regular inspections of HSM log to verify the correctness of its operations.
To ensure, that HSM devices are not vulnerable to any attacks or exploits, CIO appointed administering personnel should perform a weekly CA System network scans searching for possible new vulnerabilities.
The CISO network devices used inside the CA System network, such as firewalls and switches are equipped with network Intrusion Detection Systems [IDS], which constantly monitor all network traffic within the CA System network and immediately alert all administering users in an event of an intrusion attempt. These devices are configured by default to automatically disable any connectivity for a potential attacker. Administering users should additionally analyze the IDS reports on a weekly basis to attempt to identify any suspicious communication directed to any of the CA System Services or HSM devices.
Physical access to the CA System core location, where HSM devices are placed, should be protected with biometrics and should be divided into multiple access points excluding the existence of a single access point. CIO has assigned its secure Data Centre in ISA Town to install both HSM devices. This location provide security guarding of the building entrance, camera monitoring of entire building, biometric access to Data Centre IT operations rooms and book logging for all entries and exists.
Network access to the CA System, where HSM devices reside, is divided into two general segments: public and private. While the public segment can be accessed by any one through Internet, private segment is strictly secured for internal communications only and disabled for external access. In the CIO deployment architecture of the CA System, public access is allowed only to the Services located in the Juffair Data Centre building and it includes RA Registration Service, Time-Stamping [31] Service and OCSP [32] Service. The HSM devices are accessible only to the CSP Service installed on two dedicated back-end servers residing in the Outer Core room inside the ISA Town Data Centre building. For authentication purposes, hardware cryptographic devices are installed on each of the back-end servers to ensure that no other server can connect to any of the HSM devices. All communication to the HSM devices is encrypted using strong cryptography standards and a cryptographic authentication mechanisms are in place to ensure that only authorized Services can access the HSM device resources.
The HSM devices use industry standard cryptography, encryption mechanisms and hardware cryptographic devices for secure communications, such as AES encryption and nCipher nToken PCI devices, therefore ensuring, that no man-in-the-middle attack can succeed and no unauthorized party can obtain sensitive data or spoof the identity of the accessing Service. The operating core of the CA System, where HSMs are located, is isolated from any external networks such as Extranets or Internet and access to HSM devices is only possible after successful authentication using strong cryptographic mechanisms. Leaving the devices with no write-access from Internet or any external networks, makes enough protected against unwanted application and computer viruses circling throughout the Internet. The physical and network isolation of the HSM devices along with strict network access control policies in place, significantly reduce the possibility of an injection of a computer virus or an application commonly referred to as a Trojan Horse. Given the architecture of the device, it is not possible to inject any third party application code without prior cryptographic authentication to the device.
The CIO currently does not require an online disaster recovery solution and relies on multi service High Availability configuration of the CA System and failover configuration of two HSM devices. In an event of a failure of one HSM device, a second device will be used instead.
In an event of irrecoverable failure, the HSM devices will either be re-initialized or replaced with new hardware and system environment will be rebuild from scratch and HSM configuration data will be restored from the most recent backup stored on a dedicated backup server. The HSM hardware manual documents the process of hardware installation and CIO administering personnel should refer to the manual for instructions related to hardware installation and recovery from a major HSM failure.
The reinstallation and recovery of the HSM device should take no more than 48 hours. During the outage period Digital Certificates issued by the CA System, which uses the HSM devices, will remain valid and therefore the event will not affect the business continuity of the CIO nor will it cause any damage to End Entities to whom certificates are issued.
The preliminary calculation of device capacity utilization of the was performed by the CIO during the project initialization phase and therefore a sufficient capacity and hardware resources were allocated to the CA System upon installation, allowing the HSM hardware to continue an uninterrupted operations utilizing the necessary capacity for around 100 private keys and signing around 100 000 digital certificates in total. During the maintenance period, CIO appointed administering users will inspect the hardware performance logs once per 6 months and produce a report based on which the CIO will decide whether an additional hardware resource allocation or hardware replacement is required.
The hardware, network and physical location resources dedicated for the CA System have been completely separated by the CIO from any of its other network and application layer segments. Both HSM devices, that the CA System is using, are solely dedicated to the operation of the CA infrastructure and therefore do not interact nor interfere with any other network and software solutions, applications and facilities deployed inside CIO. The operations of the HSM devices does not have any technical impact on any of the areas of the CIO’s daily operations.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Scope:
The purpose of this document is to provide full Operating Work Instructions for the use, maintenance and support of the Digi-Ca in place at CIO
Responsibility & Asset Ownership:
[Please Indicate – probably Information Security Manager] is responsible for ensuring that this OWI is fully implemented and regularly updated to reflect any changes in the environment at CIO. As per the asset list the {Indicate – probably Information Security Manager] is the owner of the assets covered in this OWI.
Details of the Operating Work Instruction:
Digi-CA™ PKI System (herein referred to as: “CA System”) is the complete Certificate Authority [CA] system deployed inside Central Informatics Organization [CIO], which required to have its own CA to provide enhanced communication security and identity assurance to its own organization and to Bahraini Citizens. The CA System issues the Digital Certificates, in conformance with RFC 3280 standard, that are used by the CIO personnel and Bahraini Citizens for two factor authentication, electronic signatures and email protection. The CA System also issues Digital Certificates, that are used by the CIO to introduce client-to-device and device-to-device authentication using public key cryptography.
The CIO uses CA System to create multiple instances of unique CAs in a single CA System installation. The Digi-CA™ model imposes delegation of trust downwards from Root CAs to their Subordinate Certification Authorities [Sub-CAs]. The same installation of Digi-CA™ also enables any of these CAs to be cross signed by an external third party CA and any number of CAs can have any number of cross signed Subordinate CAs. This CA model is a requirement for CIO, which intends to deliver unique CA services to various governmental departments inside the Kingdom of Bahrain and to the Bahraini Citizens.
The daily administration duties of the CA System are reduced to a minimum and are internally performed by a self automated system management control mechanisms, that reside inside the CA System. On a scheduled basis, CIO users appointed as administrators of the CA System, are required to inspect the CA System operations by checking the log report and the service status report, which are both accessed through a web based CA Administration Management Console [CA AMC] or alternatively can be viewed directly from the Operating System command prompt console.
The daily operating duties of the CA System are limited to the issuance, revocation or suspension of Digital Certificates to the requesting entities, Bahraini Citizens, government institutions or CIO personnel. CIO users appointed as Registration Authority [RA] Operators can issue, revoke, suspend and de-suspend digital certificates by accessing a web based RA Management Console [RA MC] GUI.
All features provided by GUI management interfaces of the CA system, such as CA AMC and RA MC consoles, are logically grouped and easy to access upon successful authentication through an intuitive graphical menu. The CIO users appointed as administrators and operators, can easily access relevant console features without having great prior knowledge of PKI technology or CA System architecture.
The software manual provided by the CA System software vendor delivers the necessary documentation needed to administer and operate the CA system. CIO users should refer to this manual to identify the meaning of all CA System and individual console functionalities, the scope of their administering and operating responsibilities as well as deployment and configuration guidelines.
The maintenance of the CA System has been made easy to perform by the software vendor to an extend where a non technical personnel, having basic understanding of the software manual, can perform the necessary activities to correctly maintain the system to allow its uninterrupted operations. Daily duties of CIO users appointed as system administrators have been reduced to weekly inspections of the correct system operations. The necessary administering activities can be performed on a weekly basis by an authenticated personnel only, using a web based CA AMC GUI, through which users can view status reports of various CA System services and inspect the CA System logs to verify the correctness of its operations. All reporting information produced by the CA System provides a unique identifying number for a reported event as well as its intuitive and easy to understand textual description. The log reporting feature introduces different type of log entries, therefore it is easy for the CIO personnel to distinguish log entries between informational messages, critical errors and warning alerts. This enables CIO personnel with the ability to correctly inspect the system operations and troubleshoot any errors encountered during the CA System operations.
The CA System clearly distinguishes the roles and responsibilities of individual users, therefore administering the system is explicitly separated from the operating activities, which do not require from the appointed CIO personnel any technical knowledge related to the CA System administration as well as any knowledge in cryptography or Public Key Infrastructure industry standards. By following processes driven by the CA System, operating users can easily issue, revoke, suspend and de-suspend digital certificates. All administering and operating procedures are clearly documented in the CA System manual provided by the software vendor.
The Digi-CA™ PKI System software suite is a multi application component based PKI system for managing cryptographic keys, Digital [X.509] Certificates and supplemental PKI related services. Each application component (herein referred to as “Service”) provides a series of defined functionalities to other PKI application components of the system, as well as to administering and operating parties, as well as to end entities, to whom certificates are issued. This CA System is built with the following modules:
a. CA Application Server [CA APS]
b. Cryptographic Service Provider [CSP]
c. Time-Stamp Gateway Server [TSA Gateway]
d. Online Certificate Status Protocol Gateway Server [OCSP Gateway]
e. CA Administration Management Console [CA AMC]
f. Registration Authority [RA] Management Console [RA MC]
g. Registration Authority [RA] Registration Service [RA RS]
e. CA Database Server [CA DB]
All of the CA System components are located in the CIO’s highly secured data centres: ISA Town and Juffair, which both have two independent power supply sources, one from an external power supplier and the second from the CIO’s internal power generator. The power provided to the CA System is isolated from other power segments inside the data centre buildings, thus meeting the independency and failover requirements in the event of any power failure or circuit overload.
The CA System deployment architecture includes a multi server Service distribution model for each PKI application component provided by the CA System. This mechanism balances the usage of network and hardware resources between several server devices and thus provides greater system performance and fail over support. The diagram below illustrates the current CIO’s deployment architecture of the Digi-CA™ PKI System:
Each Service of the CA System is placed in a dedicated, CISCO firewall/switch protected network segment. The CA core network in ISA Town is isolated from other corporate networks inside CIO and physical access to the Inner and Outer Core rooms as presented on the above diagram, is strictly protected with biometric devices and video camera monitoring performed 24 hours per day throughout the entire year.
The CA Administration Management Console [CA AMC], which is installed on two dedicated back-end servers located in the Outer Core room inside the ISA Town Data Centre building, is a central CA management panel GUI for CIO users appointed as CA Administrators and CA Operators. The two back-end server hosting the CA AMC has been configured for High Availability and provide a failover mechanism to the operation of CA AMC component. The console provides the following main functionalities:
Each of the above functionalities is documented in the CA System manual available to CIO administering and operating personnel.
The RA Management Console [RA MC], which is installed on a dedicated front-end server located in the Outer Core room inside the ISA Town Data Centre building, is a central RA management panel GUI for CIO users appointed as RA Administrators and RA Operators. The front-end server hosting the RA MC provides the first point of access for the RA Operations Centre, from where RA Administrators and RA Operators can access the console features. This Service has been also installed on two front-end servers, configured for High Availability, located inside the Juffair Data Centre building, to provide – if necessary - a failover support as a second access point for the RA Operations Centre, from where RA Administrators and RA Operators can access the console. The RA MC console provides the following main functionalities:
Each of the above functionalities is documented in the CA System manual available to CIO administering and operating personnel.
The RA Registration Service [RA RS], which is installed on a dedicated front-end server located in the Outer Core room inside the ISA Town Data Centre building, is a central panel GUI for certificate subscribers [End Entities], to whom digital certificates are issued. The front-end server hosting the RA RS provides the first point of access for the RA Operations Centre, from where End Entities can access the Service features. This Service has been also installed on two front-end servers, configured for High Availability, located inside the Juffair Data Centre building, to provide second access point for End Entities, who can access the Service through the Internet. The RA RS console provides the following main functionalities:
Each of the above functionalities is documented in the CA System manual available to CIO administering and operating personnel.
The CA Application Server, which is installed on two dedicated back-end servers located in the Outer Core room inside the ISA Town Data Centre building, is an internal module of the CA system and is self-operated, meaning it does not provide or require any user management or user access functionalities. Only a CIO appointed administering personnel acting as the operating system super user can stop or start this service. The Service is registered by the administering user through the CA AMC. This Service can be accessed only by another CA System Service, that was previously registered within the CA system.
Cryptographic Service Provider is an internal module of the CA system, which is installed on two dedicated back-end servers, configured for High Availability, located in the Outer Core room inside the ISA Town Data Centre building. This Service is self-operated and does not provide or require any user management or user access functionalities. Only a CIO appointed administering personnel acting as the operating system super user can stop or start this Service. The Service is registered with the CA System by administering user through the CA AMC. This Service is not accessible to any user or other Service of the CA System.
Time-Stamp Service Gateway Server is a user accessible Service of the CA System, which is installed on two dedicated front-end servers, configured for High Availability, located in the Juffair Data Centre building. This Service is self-operated and does not provide or require any user management functionalities. It however authenticates, using a username and password, all individual subscribed users being the Citizens of Bahrain or any other Time-Stamping Service subscribed users against the CA Database before access to the Service can be provided to the user. Only a CIO appointed administering user acting as the operating system super user can stop or start this Service. The Service is registered with the CA System by the administering user through the CA AMC. This Service has been designed to be accessed by public Internet community as well as by CIO personnel.
Online Certificate Status Protocol Gateway Server is a user accessible Service of the CA System, which is installed on two dedicated front-end servers, configured for High Availability, located in the Juffair Data Centre building. This Service is self-operated and does not provide or require any user management functionalities. It however provides an open access to end users requiring OCSP service, as defined in the RFC 2560 standard. This Service has been designed to be accessed by public Internet community as well as by CIO personnel.
The CA Database is a SQL based database server, which is installed on two dedicated back-end servers, configured for High Availability, located in the Outer Core room inside the ISA Town Data Centre building. This Service is self-operated and provides the central storage facility for CA System managed data. Access to the CA DB resources is possible only to authenticated Services of the CA System and to the CIO appointed personnel acting as the super user of the operating system, who can access database for low level operations from the operating system command prompt. Each Service or administering user accessing the database resources must pass two factor authentication [33]:
The CA DB does not store any security critical data such as CA or End Entity private cryptographic keys and therefore it is not considered as a critical security point in the overall architecture of the deployed CA System. The CA DB data is backed up regularly on a daily basis and the backup data is automatically stored on a dedicated backup server residing in the ISA Town Data Centre building.
The installation of the CA System inside the CIO has been completed with the accordance to the software installation manual available to the CIO personnel. The manual provides a step by step instruction set allowing the administering users to correctly install and configure each of the CA System Services. Upon successful installation of each Service, a manual Service operation check was run by the administering user to ensure the Service has been installed correctly and is up and running. For this purpose, the Service Status Reporting of the CA AMC was used. Before the system was switched into a production environment, a set of test activities were performed to ensure entire CA System is operating correctly. After each test, the CA System log was inspected to verify whether each operation was accomplished correctly.
The set of testing operations for CA AMC included:
The set of testing operations for RA MC included:
The set of testing operations for RA RS included:
Test set of testing operations for CA APS in combination with Time-Stamping Gateway included:
Test set of testing operations for CA APS in combination with OCSP Gateway included:
All operations have been performed with the accordance to the CA System manual available to CIO personnel.
CIO expects Digi-CA™ System to issue around 100 000 Digital Certificates in total, provided the current deployment architecture and allocated hardware capacity. The maximum number of digital certificates issued per day will not reach 10 000. The CA System deployment architecture is expected to support 24/7/365 availability and currently there is no requirement for CIO to have an online disaster recovery centre. In an event of an irrecoverable major system failure, all disaster recovery activities will be carried out manually by the CIO appointed administering personnel, by recreating the CA System environment from backup resources. The above performance requirements have been measured, confirmed and tested by the CA System software vendor and they meet the CIO requirements stated above.
The CA System provides extended system operation control mechanisms, that automatically raise an alert when a critical exception error is encountered during the operations of any of the system Services. The alert is immediately logged in the CA System log and delivered through an SMTP messaging system to all registered administering users. The CA system log is accessible to CIO appointed administering users from a web based management console [CA AMC] or from the operating system command prompt. All exception error log entries are reported by CA System using a unique error number and associated descriptive text, that informs the inspecting user about the type of the error, the Service that generated it and the line of the application code, at which the error has occurred. This architecture provides CIO administering users with an easy mechanism for identifying the source for the error and allows immediate correction of the problem. For irrecoverable or unidentified errors, CIO administering users should contact the software vendor to obtain further assistance.
The CA System administering users should perform regular inspections of CA System log to verify the correctness of its operations.
To ensure, that CA System Services are not vulnerable to any attacks or exploits, CIO appointed administering personnel should perform a weekly CA System network scans searching for possible new vulnerabilities.
The CISO network devices such used inside the CA System network, such as firewalls and switches are equipped with network Intrusion Detection Systems [IDS], which constantly monitor all network traffic within the CA System network and immediately alert all administering users in an event of an intrusion attempt. These devices are configured by default to automatically disable any connectivity for a potential attacker. Administering users should additionally analyze the IDS reports on a weekly basis to attempt to identify any suspicious communication directed to any of the CA System Services.
Physical access to the CA System core location should be protected with biometrics and should be divided into multiple access points excluding the existence of a single access point. CIO has assigned its secure Data Centre in ISA Town and Juffair to host the CA System. Both locations provide security guarding of the building entrance, camera monitoring of entire building, biometric access to Data Centre IT operations rooms and book logging for all entries and exists.
Network access to the CA System is divided into two general segments: public and private. While the public segment can be accessed by any one through Internet, private segment is strictly secured for internal communications only and disabled for external access. In the CIO deployment architecture of the CA System, public access is allowed only to the Services located in the Juffair Data Centre building and it includes RA Registration Service, Time-Stamping Service and OCSP Service. The remaining Services of the CA System are using strong cryptography standards for encrypting the communication from User-to-Service as well as Service-to-Service and a cryptographic authentication mechanisms are in place to ensure that only authorized identities can access relevant system resources.
The CA System uses industry standard cryptography and encryption mechanisms for secure communications, such as Secure Socket Layer [34] and Transport Layer Security protocols between Service, therefore ensuring, that no man-in-the-middle attack can succeed and no unauthorized party can obtain sensitive data or spoof the identity of the accessing user or device. The operating core of the CA System is isolated from any external networks such as Extranets or Internet and access to individual CA System Services is only possible after successful authentication using strong cryptographic mechanisms, such as SSL Client Authentication. Leaving the system with no write-access to Internet or any external networks, makes enough protected against unwanted application and computer viruses circling throughout the Internet. The physical and network isolation of the CA System along with strict network access control policies in place, significantly reduce the possibility of an injection of a computer virus or an application commonly referred to as a Trojan Horse.
The CIO currently does not require an online disaster recovery solution and relies on multi service High Availability configuration of the CA System. Each of the CA System Services has been distributed to two dedicated servers configured for High Availability to enable support for failover in an event of a failure of one server.
In an event of irrecoverable failure, the CA System will be rebuild from scratch and configuration and database data will be restored from the most recent backup stored on a dedicated backup server. The CA System software manual documents the process of system installation and CIO administering personnel should refer to the manual for instructions related to system installation and recovery from a major system failure.
The reinstallation and recovery of the entire CA System should take no more than 48 hours. During the outage period Digital Certificates issued by the CA System will remain valid and therefore the event will not affect the business continuity of the CIO nor will it cause any damage to End Entities to whom certificates are issued.
The preliminary calculation of drive capacity utilization of the CA System was performed by the CIO during the project initialization phase and therefore a sufficient capacity and hardware resources were allocated to the CA System upon installation, allowing it to continue an uninterrupted operations utilizing the necessary capacity for around 100 000 digital certificates. During the maintenance period, CIO appointed administering users will inspect the utilization process of the drive capacity and hardware resources once per 6 months and produce a report based on which the CIO will decide whether an increase of the drive capacity or additional hardware resource allocation or hardware replacement is required.
The hardware, network and physical location resources dedicated for the CA System has been completely separated by the CIO from any of its other network and application layer segments. All hardware and software components, that the CA System is using, are solely dedicated to its operation and therefore do not interact nor interfere any other network and software solutions, applications and facilities inside CIO. The operations of the CA System does not have any technical impact on any of the areas of the CIO’s daily operations.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Scope:
The purpose of this document is to provide full Operating Work Instructions for the use, maintenance and support of the Monitors, Mice and Keyboards in use within the framework of the PKI CA.
Responsibility & Asset Ownership:
The Network Manager is responsible for ensuring that this OWI is fully implemented and regularly updated to reflect any changes in the environment at CIO. As per the asset list the Network Manager is the owner of the assets covered in this OWI.
Details of the Operating Work Instruction:
A. Monitors
Monitors are to be plugged into a PC or Server for which it has been allocated (cross referenced in the asset list). Monitors should be switched to power saving mode when not used.
Monitors are to be kept clean of dust and users may not leave drink or food beside monitors.
Monitors are not under warranty. No specific support contract is in place to replace monitors within agreed periods of time should the monitor become faulty. [SUPPLIER] can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network Manager whether it might be appropriate to unplug a monitor used in another machine (PC or Server) to plug it back into the machine whose assigned monitor is faulty. When replacement units are delivered and implemented, existing units should be returned to their original place. Any such decision and associated action must be documented and signed off by the Information Security Manager and the Network Manager.
Monitors may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
B. Mouse
CIO use a number of various models of “mouse”. Each mouse is to be plugged into a PC or Server for which it has been allocated (cross referenced in the asset list).
Each mouse is to be kept clean of dust and users may not leave drink or food beside mouse.
No mouse is under supplier warranty. No specific support contract is in place to replace mouse units within agreed periods of time should they become faulty. [SUPPLIER] can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network Manager whether it might be appropriate to unplug a mouse used in another machine (PC or Server) to plug it back into the machine whose assigned mouse is faulty. When replacement units are delivered and implemented, existing units should be returned to their original place. Any such decision and associated action must be documented and signed off by the Information Security Manager and the Network Manager.
Mouse units may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
C. Keyboard
CIO use a number of various models of keyboards. Each keyboard is to be plugged into a PC or Server for which it has been allocated (cross referenced in the asset list).
Each keyboard is to be kept clean of dust and users may not leave drink or food beside keyboards.
Keyboards are not under supplier warranty. No specific support contract is in place to replace keyboards within agreed periods of time should they become faulty. [SUPPLIER] can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network Manager whether it might be appropriate to unplug a keyboard used in another machine (PC or Server) to plug it back into the machine whose assigned keyboard is faulty. Once replacement units are delivered and implemented, existing units should be returned to their original place. Any such decision and associated action must be documented and signed off by the Information Security Manager and the Network Manager.
Keyboards may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
Please note that anti-spyware software approved by the Information Security Manager must be ran on the network at least [once a month] to ensure that no keyloggers are present on the network as this could compromise the overall security of the PKI infrastructure.
D. KBM
CIO use KBMs to allow one monitor to be used for a number of designated server(s) or PC(s). Each KBM is to be plugged into the PCs or Servers for which it has been allocated (cross referenced in the asset list).
Each KBM is to be kept clean of dust and users may not leave drink or food beside keyboards.
KBMs are not under supplier warranty. No specific support contract is in place to replace them within agreed periods of time should they become faulty. [SUPPLIER] can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network manager whether it might be appropriate to plug monitors directly into a PC or server. Once replacement units are delivered and implemented, existing units should be returned to their original place. Any such decision and associated action must be documented and signed off by the Information Security Manager and the Network Manager. When replacement units are delivered and implemented, existing units should be returned to their original place.
KBMs may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
E. Coaxial Cables & Network Points
CIO use coaxial cables and network points as referenced in the Asset List. These items are not under supplier warranty. No specific support contract is in place to replace them within agreed periods of time should they become faulty. [SUPPLIER] can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network manager whether it might be appropriate interchange Coaxial Cables or Network Points (where applicable). Once replacement units are delivered and implemented, existing units should be returned to their original place. Any such decision and associated action must be documented and signed off by the Information Security Manager and the Network Manager. When replacement units are delivered and implemented, existing units should be returned to their original place.
Cables and Network Points may not be taken out of the CA rooms without prior approval from the Information Security Manager under any circumstances whatsoever.
Additional Notes pertaining to the Operational Working Instructions:
Keyboards, Monitors and Mouse units are delivered by vendors with users manuals either with dedicated Sections related to each asset or with a full users manual allowing for customization of the configuration. Where applicable such manuals are available in the manuals folder.
Other than at the initial installation stage, no specific testing of the assets is required. Basic performance criteria consist in making sure that monitors, keyboards and mouse units function properly and allow interaction with the PC(s) or server(s) these assets are allocated to.
No specific training is provided to users in relation to the assets covered in this OWI as most users intuitively know how to use basic functionality.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Switch Catalyst 2960 OWI
Scope:
The purpose of this document is to provide full Operating Work Instructions for the use, maintenance and support of the Switch Catalyst 2960 in use within the framework of the PKI CA (namely for PKI DC and Juffair).
Responsibility & Asset Ownership:
The Network Manager is responsible for ensuring that this OWI is fully implemented and regularly updated to reflect any changes in the environment at CIO. As per the asset list the Network Manager is the owner of the assets covered in this OWI.
Details of the Operating Work Instruction:
A. Integration and Initial Set-up
The Cisco Switch Catalyst 2960 should be implemented using the guidelines of the software guidance guide produced by Cisco. The switch is configured using Cisco command line access.
Switches are line between machines and a network access point the unit needs to be powered up and is already working in transparent mode.
The unit can be configured either by using CLI (Command Line Interface). All of the following needs to be fully configured:
Initial Configuration and Settings
The switch is configured to 4 different subnets:
Subnet 1
10.10.19.0/26
10.10.19.1 – First IP
10.10.19.63 – Broadcast
Subnet 2
10.10.19.64/26
10.10.19.65 – First IP
10.10.19.127 – Broadcast
Subnet 3
10.10.19.128/26
10.10.19.129 – First IP
10.10.19.191 – Broadcast
Subnet 4
10.10.19.192/26
10.10.19.193 – First IP
10.10.19.255 - Broadcast
Performance Features
Policy and Configuration Instructions:
The Network Manager in co-operation with the Information Security Manager decides on the policy implemented on the Cisco Switch Catalyst appliances. The policy is then implemented and saved with a back-up of the latest policy to saved in CIO Juffair to allow for Disaster Recovery purposes.
Item Policy Rule Description Justification
1 Switch Authentication Rule User Authentication at Switch User Management to guarantee confidentiality
The policy which is implemented must be fully documented and updated on a regular basis within this document.
Alert Escalations and IOS Updates:
The Cisco Switch Catalyst 2960 allows the Network Administrator to create rules for alerts to be a configured to be sent to either the Network Manager and the Information Security Manager. CIO to include details of escalation rules here-switch is transparent, no logging, escalation rules.
Update of the Cisco IOS must be done regularly and performed by the Network Manager as and when the latest IOS for the switch is made available from Cisco; must be agreed with the Information Security Manager and IT Operations Manager.
CISCO IOS Software Release 12.2(25)SEB.
In terms of performance monitoring, the Cisco Switch 2960 should be ample for the requirements of CIO at present. However should service be degraded and performance be impacted CIO should review the logs of the Cisco Catalyst 2960 to check that the bandwidth and performance capabilities of the units are not maxed out. If so configuration might be changed or a requirement for a clustered Cisco Catalyst environment to improve performance should also be envisaged, to be decided by the Network Manager and Information Security Manager to be submitted for approval according to the rules of this ISMS.
B. Subscription and Advance Replacement Instructions:
Cisco Catalyst 2960 units are covered under subscription with Fakhro Electronics with 1 year warranty. This ensures that the IOS version is regularly available for updates. Fakhro Electronics can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network Manager whether it might be interchange Cisco 2960s or to use a third party Switch to continue operations instead of the original Cisco Catalyst 2960. When replacement units are delivered and implemented, the configuration of the original unit must be implemented and tested as per the initial implementation. All associated actions must be documented and signed off by the Information Security Manager and the Network Manager.
Additional Notes pertaining to the Operational Working Instructions:
The Cisco Catalyst 2960 units are to be kept clean of dust and users may not leave drink or food beside the appliances.
Cisco Catalyst 2960 units may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
Cisco Catalyst 2960 units are delivered by vendors with users manuals either with dedicated Sections related to each asset or with a full users manual allowing for customization of the configuration. The main reference guide for the Cisco 2960 is entitled Catalyst 2960 Switch
Software Configuration Guide. CIO uses all the best practice guidelines available for these units in the guide. The guide is included in the series of manuals which are available in the manuals folder.
No specific training is provided to users in relation to the assets covered in this OWI as most users intuitively know how to use basic functionality. However CIO have a number of Cisco trained professionals to CCNA levels which allows CIO to perform a number of administration duties with internal staff and without requiring external assistance.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Tipping Point X505 OWI
Scope:
The purpose of this document is to provide full Operating Work Instructions for the use, maintenance and support of the Tipping Point X505 in use within the framework of the PKI CA (namely for PKI DC and Juffair).
Responsibility & Asset Ownership:
The Network Manager is responsible for ensuring that this OWI is fully implemented and regularly updated to reflect any changes in the environment at CIO. As per the asset list the Network Manager is the owner of the assets covered in this OWI.
Details of the Operating Work Instruction:
F. Integration and Initial Set-up
The Tipping Point hardware firewall and IPS appliance(UTM) is easy to install and very intuitive to set-up. Once plugged in line between a switch and a network access the unit needs to be powered up and is already working in transparent mode.
The Tipping Point Unit can support mixed environments irrespective of topology or IP addressing scheme. We have implemented the following mode of the UTM:
- NAT (including Virtual Server and PAT)
The UTM is configured with the following:
Interface 1 – External (Connected to CIO Isa Town main core switch)
Interface 2 – Frontend (Connected to Switch Subnet 2)
Interface 3 – Backend (Connected to Switch Subnet 3)
Interface 4 – HSM (Connected to Switch Subnet 4)
Tipping Point testing is carried out initially to ensure that the solution works transparently and allows legitimate traffic through and does show in its logging interface the number of attacks being stopped or simply logged. Each type of attack will generate an alert which can be sent via multi channel such as SMS or e-mail to the Network Manager and/or Information Security Manager.
Policy and Configuration Instructions:
The Network Manager in co-operation with the Information Security Manager decides on the policy implemented on the Tipping Point appliances. The policy is then implemented and saved with a back-up of the latest policy to be saved in CIO Juffair to allow for Disaster Recovery purposes.
The units allow for the following features to be implemented.
User Set-up
The Network manager will set-up accounts for themselves and the Information Security Manager.
Client and Server Protection
Spyware and Peer-to-Peer Protection
Multiple Security Zones
Flexible Policy Engine
Unified control of multiple services:
Encryption and Authentication
On-box and external RADIUS database
URL Filtering
Web Content Filtering
Annual subscription includes:
TippingPoint Isa Town
Item Policy Rule Description Justification
from internal or third-party certificate
authorities Allows CIO to ensure that certificates created by Digi-CA are let through the Tipping Point Allows for secure communication of CA certs to relevant parties
TippingPoint Firewall Juffair
Item Policy Rule Description Justification
from internal or third-party certificate
authorities Allows CIO to ensure that certificates created by Digi-CA are let through the Tipping Point Allows for secure communication of CA certs to relevant parties
The policy which is implemented must be fully documented and updated on a regular basis within this document.
Secure Management and & Alert Escalations:
The TippingPoint X505 is supported by the TippingPoint Security Management System (SMS), an enterprise-class management platform, which provides intuitive management for multiple TippingPoint IPS or X505 devices. The TippingPoint SMS arrives with factory-installed software for simplistic installation. CIO use the standard web based configuration so that the Network manager can perform installation and maintenance routine tasks and to allow the Information Security Manager to access the logs and policy where applicable.
The SMS is to be used to create rules for alerts to be a configured to be sent to either the Network Manager [NM] and the Information Security Manager [ISM]. Currently the rules are not agreed and the NM & ISM have identified this as a risk that will be addressed, documented and provided in this Manual in time for the second update of the manual on 14 November, 2007
The X505 is configured to send email notification when a High Level alert is detected by it.
Red Hat Isa Town
Item Issue Escalation patch Action Item / Remediation
Red Hat Juffair
Item Issue Escalation patch Action Item / Remediation
CIO to complete tables for each implementation PKI DC and Juffair. Information included in the example shown is for guidance purposes only.
In terms of performance monitoring, the Tipping Point x505 should be ample for the requirements of CIO at present. However should service be degraded and performance be impacted CIO should review the logs of the Tipping Point to check that the bandwidth and performance capabilities of the units are not maxed out. If so configuration might be changed or a requirement for a clustered Tipping environment to improve performance should also be envisaged, to be decided by the Network Manager and Information Security Manager to be submitted for approval according to the rules of this ISMS.
Subscription and Advance Replacement Instructions:
Tipping Point is covered under subscription with Fakhro Electronics with 1 year subscription. This ensures that the database of attacks for which Tipping Point scans is fully up to date. Fakhro Electronics can be contacted as per the details on the suppliers register to organize replacement unit(s). In the meantime, users may decide in conjunction with the Information Security Manager and Network Manager whether it might be appropriate to continue operations without Tipping Point Protection. When replacement units are delivered and implemented, the configuration of the original unit must be implemented and tested as per the initial implementation. All associated actions must be documented and signed off by the Information Security Manager and the Network Manager.
Additional Notes pertaining to the Operational Working Instructions:
The Tipping Point units are to be kept clean of dust and users may not leave drink or food beside the appliances.
Tipping Points units may not be taken out of the CA rooms without prior approval from the information security manager under any circumstances whatsoever.
Tipping Point units are delivered by vendors with users manuals either with dedicated Sections related to each asset or with a full users manual allowing for customization of the configuration. Where applicable such manuals are available in the manuals folder.
Full activity and log reports are available out of the box for Tipping Point and should be produced on a monthly basis by the Network Manager and sent to the Information Security Manager for review. Should the Information Security Manager request changes to the policy this must be done in accordance to the change control procedure.
No specific training is provided to users in relation to the assets covered in this OWI as most users intuitively know how to use basic functionality.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Motion Detector, Alarm, Power Supply & Siren OWI
Operating Work Instructions – Alarm Control Panel, Speech Dialler, Siren, Power supply, LCD Keypad and Motion Sensors
Scope:
This document covers the Operating Work Instructions for the Alarm Control Panel, Dialer, Siren, Power supply and LCD Keypad located throughout the datacenter in Isa Town.
Responsibilities:
The safe is the responsibility of the Physical Security Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. 12 zones panel, 2 partitions, 32 user codes, 4 outputs relay modules, 8 programmable outputs with 12 V battery for backup
a. 32 character LCD display, 4 voice message(each up to 32 seconds), 8 voice message, 4 trigger input
a. Remote keypads with standard 32 character LCD display and a speaker driver unit for programmable volume control, surface mount
a. The access code for the alarm is held by Physical Security Section personnel only and is changed regularly.
b. The alarm has a 20 second window from alarm is armed OR when an intruder detected inside the Data centre.
c. If the access code is failed to be entered in 20 seconds, the siren on the outside of the building will sound and flash. The speech dialler will then call the numbers stored in memory in the following order:
i. Physical Security Personnel 1
ii. Physical Security Personnel 2
iii. Head of PKI
iv. CA Administrator
d. The dialler will keep on dialling the numbers above in order until it is answered.
a. In case of failure, contact Mantech 17730459.
.
Ownership:
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Backup Air Conditioning Unit OWI
Scope:
This document covers the Operating Work Instructions for the Backup Air Conditioning Unit located throughout the PKI Data centre in Isa Town.
Responsibilities:
The backup air conditioning unit is the responsibility of the PKI Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. In case of any malfunction of the air conditioning units, the Vendor shall be informed for any replacements (Ref: Doc 7.1B)
Ownership:
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Dust & Fire Protection OWI
Operating Work Instructions – Fire/Dust Detection & Fire Suppression System
Scope:
This document covers the Operating Work Instructions for the Fire/Dust Detection & Fire Suppression System located throughout the PKI Data centre in Isa Town.
Responsibilities:
The safe is the responsibility of CIO’s Administration Department.
Details of Operating Work Instructions:
a. Somke Fire/Dust Detectors (located on the ceiling void, roof and under the raised floorings)
b. Fike Corporation Single Hazard Panel(SHP) – Alarm/System Control Panel
c. FM 200 Gas tank and release nozzles
a. When a fire is detected, the alarm siren will immediately sound, after 90 seconds the FM 200 gas will be released.
b. The release of the gas can be delayed by 1 minute by pressing a button on the SHP panel.
c. The SHP has a battery backup, in case of power failure.
d. For support, contact Al Moayyed Trading and Contraction 17700777.
Ownership:
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Access Control System OWI
Scope:
This document covers the Operating Work Instructions for the Access Control in PKI Data centre in Isa Town.
Responsibilities:
The access control is the responsibility of the Physical Security Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. Identix Fingerscan V20 UA
b. Dimensions : Length: 6-1/2”, Width 6-3/4”
c. Enrollment time : <5 seconds
d. Verification time : <1 second
e. FAR/FRR: variable, configuration dependant
f. Template size: 512 bytes
g. Allowable Finger Rotation: =/1 18 degrees
h. Power: 12V DC, unregulated
i. Weight: 2lbs
j. Transaction Storage: 8000 (minimum buffering)
k. Communications: RS485, Wiegang, RS232;optional gateway-supported Ethernet or modem
l. Baud rate: 9600 to 57600 bps
m. Template storage: 512 or optional 5000 and 32000 template memory
n. Door controls: Lock output, tamper switch, 3 auxiliary outputs, 4 auxiliary inputs
o. Card reader input: Wiegand, proximity, magnetic stripe (serial), smartcard (serial), barcode(serial)
p. Card reader emulation output: Wiegand
q. Timezones: 30
r. Operating temperature: -10 to 50 degrees Celsius
s. Display: 2 line, 16 characters
t. Options: User memory expansions: 5000 and 32000 templates, LCD display, integrated proximity card reader, dial up modem, Ethernet communications (10BAST-t), and Fingerlan IV
a. Entry would require a Physical security personnel and another person ie. all rooms require dual access.
b. A Physical Security personnel MUST be present in all room which requires access.
c. A user can use either his/her access code or an access card with his/her fingerprint to access.
a. In case of power failure, access would not be available but the door lock will be powered.
b. In case of network failure between reader and Fingerlan pc, the reader would still be able to provide access with templates stored on the reader itself.
c. For support, contact Mantech 17730459.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Telephone OWI
Scope:
This document covers the Operating Work Instructions for the fully functional telephone located in the Outer Core room in PKI Data centre in Isa Town.
Responsibilities:
The fully functional telephone is the responsibility of the CIO’s Administration Department.
Details of Operating Work Instructions:
a. Should the telephone fails, the telephone line can be connected directly to the alarm.
b. If the telephone line is down, please contact Batelco on 17881111
c. If the telephone line is down due to error in wiring, contact Techoland on 17271714.
Ownership:
This document is owned by CIO’s Administration Department.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Safe OWI
Scope:
This document covers the Operating Work Instructions for the Safe located in the Safe room in PKI Data centre in Isa Town.
Responsibilities:
The safe is the responsibility of the PKI Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. The digital combination for the safe door and the safe door key will be held by different individuals. If needed, the combination lock can also be set to require 2 user inputs instead of it. Current setting is set to 1.
b. One personnel will hold the common key to all deposit boxes while and individual responsible for the safe deposit box will hold the individual key.
a. In case of fire, the safe is rated to withstand fires up to 2 hours
b. If the batteries to the combination lock have not been changed in time and the tension does not suffice to cancel the lock’s blocking feature, a new 9V ALKALINE battery can be pressed to the contacts on the entry pad.
c. The code the safe remains active even as the power supply fails.
d. For support, contact Mantech 17730459.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Door Exit Push Buttons & Door Latch OWI
Scope:
This document covers the Operating Work Instructions for the Door Exit Switches and Door Latches in the PKI Data centre
Responsibilities:
The items are the responsibility of the PKI Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. The door latch is held magnetically via power from the Data centre. In case of power failure, the battery in the Access control is to provide power to the latch until power supply is restored.
b. In case of any failures, contact Mantech 17730459.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
CCTV OWI
Scope:
This document covers the Operating Work Instructions for the CCTV Cameras, DVR Remote Control ,Monitor, Digital Video Recorder (DVR) and coaxial cables located in the Outer Core room in PKI Data centre in Isa Town.
Responsibilities:
The safe is the responsibility of the Physical Security Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. CCTC Camera – Infinova V1466F-3895A14 CCTV, Vandal resistant x 3
b. DVR - Infinova V3010/4L Digital Video Recorder,4 Channels 80 GB Hard disk
c. Monitor - Infinova V1322T/14 14” Digital Color Monitor 1 channel
d. Coaxial cables - LOT
a. Entrance to the Outer Core room
b. Entrance to the Inner Core room
c. Entrance to the Safe Room.
a. Access to the DVR is protected via a PIN code. PIN code can be entered using keypad on the DVR or via the remote.
b. The DVR is also accessible via Infinova’s Remote Monitoring Software.
c. Setup of the DVR can be done either via the DVR or by using the Remote Monitoring Software.
a. In case of lost feed from cameras, please contact Mantech 17730459 for support.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Light Fittings & Switches OWI
Scope:
This document covers the Operating Work Instructions for the Lights fitting and switches located throughout the PKI Data centre in Isa Town.
Responsibilities:
The lights fitting and switches is the responsibility of the PKI Section of CIO’s Information Security Section.
Details of Operating Work Instructions:
a. In case of any breakage/malfunction of the lights fittings and switches, the Vendor shall be informed for any replacements (Ref: Doc 7.1B)
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
Appendix IV – Place Organizational Chart here
Links:
[1] https://www.digi-sign.com/downloads/download.php?id=cio-digi-cast-pdf
[2] https://www.digi-sign.com/service/digi-cast
[3] https://www.digi-sign.com/compliance/iso/27001
[4] https://www.digi-sign.com/downloads/download.php?id=digi-cast-pdf
[5] https://www.digi-sign.com/public+key+infrastructure
[6] https://www.digi-sign.com/service/digi-cast/asset+management
[7] https://www.digi-sign.com/service
[8] https://www.digi-sign.com/digital+certificate
[9] https://www.digi-sign.com/certificate+authority
[10] https://www.digi-sign.com/compliance/introduction
[11] https://www.digi-sign.com/compliance
[12] https://www.digi-sign.com/compliance/list+standards
[13] mailto:adlinh@cio.gov.bh
[14] mailto:aabualfath@cio.gov.bh
[15] mailto:smalkhalifa@cio.gov.bh
[16] mailto:osamarf@cio.gov.bh
[17] mailto:kaljalahma@cio.gov.bh
[18] mailto:cssoshg@cio.gov.bh
[19] mailto:alghatamhe@cio.gov.bh
[20] mailto:aljassimk@cio.gov.bh
[21] https://www.digi-sign.com/digi-ca
[22] mailto:malamer@cio.gov.bh
[23] mailto:alothmank@cio.gov.bh
[24] mailto:soudbah@cio.gov.bh
[25] mailto:elhama@cio.gov.bh
[26] mailto:monamj@cio.gov.bh
[27] mailto:yashoor@cio.gov.bh
[28] mailto:alshamyah@cio.gov.bh
[29] mailto:razanaak@cio.gov.bh
[30] mailto:aalmahmood@cio.gov.bh
[31] https://www.digi-sign.com/digi-ca/administrator/time+stamp
[32] https://www.digi-sign.com/digi-ca/administrator/online+certificate+status+protocol
[33] https://www.digi-sign.com/two+factor+authentication
[34] https://www.digi-sign.com/ssl+certificate