30
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

Embed Size (px)

Citation preview

Page 1: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

1

COMPUTER GENERATED & STORED RECORDS CONTROLS

Presented by

COSCAP-SA

Page 2: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

BACKGROUND. The material in this presentation is intended

to provide guidance to Aviation Inspectors concerning controls for managing information systems that generate and store records used in the maintenance of aircraft and aircraft components .

Page 3: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

APPLICABLE RELATED REQUIREMENTS & INFORMATION.

Chapter 11 (Maintenance Records) of the Inspectors manual and ICAO Annex 6, 8.8

Page 4: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

DEFINITIONS. For the purpose of this Document , the

following definitions apply:a. Authorizations. Permission granted by management to individuals authorizing full or partial admission to restricted access information management systems.b.Data. A set of alphanumeric and/or graphic characters organized to represent facts or instructions suitable for communicating, interpreting, or processing by a computer.

Page 5: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

c. Field. An element of a computer file that may contain data and whose size is controlled by the program.d. Information Systems. A computer system which is designed to automate a specific function such as records management.e. Privacy Keys. A password or procedure that allows full or partial access to a restricted information management system.

Page 6: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

f. Privacy Locks. A procedure that restricts access to a portion of an information system.

g. Read Only Capability. The authority given to an individual which allows that person to access or read data in a field without being able to change or enter data.

Page 7: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

i. Record. A history of the maintenance of a particular aircraft, aircraft component or item. As used in this document, a record is not a group of associated data fields or files within an information management system.

j.Write Capability. The authority given to a user which allows that person to enter or change data in a field.

Page 8: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

DISCUSSION.Maintenance organizations are required

to maintain records. ICAO Annex 6 and various states

regulations contain requirements regarding the content of those records

Computer based systems have been acquired to generate and store maintenance records.

This document will not discuss what maintenance and quality records should contain, but rather control mechanisms that should be used.

Page 9: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

A record system will detect and deter unauthorized disclosure, modification, or use of records. Record systems require protection to ensure that an accurate history of the maintenance of an aircraft, aircraft component or item exists. An information management system should be protected from intruders.

Page 10: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

The system should also be protected from employees with authorized access privileges who attempt to perform unauthorized actions. Protection is achieved not only by technical, physical, and personnel safeguards, but also by clearly advising all employees of the organizational procedures regarding authorized system use.

Page 11: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

SECURITY PRINCIPLES

Security attributes should be present in all systems. System should include:(1) User Identification.

Each user should be uniquely identified by an identification code to identify who has logged onto the system and to verify access.

(2) Authentication of User.

There should be a means of verifying that the person entering the user identification code is the authorized individual- normally done by the use of a password.

Page 12: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

SECURITY PRINCIPLES

(3) Principle of Least Possible Privilege. Each person is limited to the information

and transaction authority that is required by their job responsibilities.

Based upon the design of the system, privacy locks and keys may control varying combinations of data elements.Levels of protection may include the following:

(i)Data items, (v)Files, or

(ii)Data aggregates, (vi)The complete system (iii)Sets,(iv)Fields,

Page 13: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

SECURITY PRINCIPLES

(4) Relation to Quality Data Responsibilities.

The system should ensure that authorization privileges coincide with the responsibilities outlined in the organization’s quality control program.*

The system should be capable of assigning each user the specific access authority needed.

Page 14: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

SECURITY PRINCIPLES

(Privileges continued)

These may include:

(i) Read Only Access.*

(ii) Insert or Write Access Authorizations.*

(iii) Change Access Authorizations.*.

(iv) Delete Access Authorizations.

(v) Security Access Authorizations..

Page 15: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS.

The system should include devices that detect security breaches.

Security breaches should alert the security manager

Security breach logs should be available only to select individuals.

Serious events, may generate alarms..

Page 16: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS

Protection Against Software and Hardware Destruction.

System records should be protected from computer viruses.

Systems should include virus detection programs

Page 17: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS

Protection Against Software and Hardware Destruction.

Inventories.

Inventories of all software and hardware configurations and locations should be

used to ensure unauthorized hardware/software does not enter the computer environment.

Page 18: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS

Protection Against Software and Hardware Destruction.

Portable Equipment.

Portable computer equipment

such as laptops represent special risks from virus contamination and thus there use in the system must be strictly controlled.

Page 19: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS

Protection Against Software and Hardware Destruction.

Network Security. Procedures should address additional protection necessary to control a network. The degree of protection should be based upon the complexity of the system. Additional protection may required

Page 20: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

AUDITING MECHANISMS

Protection Against Software and Hardware Destruction

System Backup.

Backup provisions should be developed for loss of data resulting from system failure.

Backup periods need to be established.

Page 21: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

MEDIA CONTROL.

‘Media’ is the material on which data is stored and must:

be carefully controlled and protected.

be stored in secure locations. come from authorized sources.

Page 22: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

MEDIA TYPES

FLOPPY DISKS AND HARD DRIVES

Not for long term storage. Data for long term storage

should be transferred to other media.

Data must be able to be retrieved.

Page 23: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

MEDIA TYPES

MAGNETIC TAPES should be tested within six months. Tapes should be stored in a cool dry

environment. Storage criteria:

(i) temperature 62 - 68 degrees F.(ii) Relative humidity 35%-45%.(iii) rewind under controlled tension every 3 ½ years.(iv) before 10 years data should be transferred to

new tapes.(v) Annual sample of tapes should be tested to

identify any loss of data.(vi) No Smoking, eating, or drinking.

Page 24: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

MEDIA TYPES

OPTICAL DISKS

Optical disks are not highly

sensitive to physical abuse, environmental conditions, or magnetic force fields. Optical disks need only be protected from loss.

Page 25: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

MEDIA TYPES METAL PARTICULE TAPES

Chromium dioxide tapes should be handled like magnetic tapes except for periodic rewinding and cleaning.

New types of metal particle tapes will become available but may be subject to oxidation.

Prior to use of any metal particle tapes for long term storage,it must be ensured that the tapes can maintain integrity of the data

Page 26: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

DOCUMENTATION

The information management system should be properly documented.(1) All software programs within the system, including program changes, should be fully documented.(2) Procedures should be developed that control all data entered into the system. The procedures should address all information management system/human interface activities. The procedures should be kept current.

Page 27: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

Availability.

The computer industry is extremely dynamic concerning the systems that are available for record keeping. If the organisation changes from one system to another, the records that were produced by the old system must remain accessible to the CAA in a usable format. The organization’s documented quality control system should indicate how this accessibility is accomplished.

Page 28: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

Information Management System Facility Management.

The main system facilities that house the equipment must be protected from physical threats and hazards. Areas to be considered include:

a.Physical Security. Survey for potential hazards such as fire and water to minimized damage possibilities.

b. Environmental Conditions. Consider the environmental conditions of the equipment and media storage areas.

c. Disaster Recovery.Provide a contingency plan to allow recovery of critical system information in case of a disaster.

Page 29: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

TRAINING. Organizations should train each

employee who is involved with any portion of the system. The subject matter varying with the employee’s level within the organization and job responsibilities.

Training should include security awareness, organizational policy, system operation and record storage requirements.

Training should be documented

Page 30: 1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA

COMPUTER GENERATED & STORED RECORDS CONTROLS

THE END