Click here to load reader
View
10
Download
0
Embed Size (px)
State of Illinois Department of Innovation & Technology
Overarching Enterprise Information Security Policy
S t a t e o f I l l i n o i s D e p a r t m e n t o f I n n o v a t i o n & T e c h n o l o g y
O v e r a r c h i n g E n t e r p r i s e I n f o r m a t i o n S e c u r i t y P o l i c y P a g e 1
Table of Contents 1. OVERVIEW ............................................................................................................................................ 3
2. PURPOSE ............................................................................................................................................... 3
3. SCOPE .................................................................................................................................................... 4
4. FRAMEWORK ........................................................................................................................................ 4
5. APPLICABLE LAWS, RULES, AND REGULATIONS................................................................................. 4
6. POLICY COMPLIANCE ........................................................................................................................... 5
7. EXCEPTIONS TO POLICY ....................................................................................................................... 5
8. INFORMATION SECURITY CONTROLS ................................................................................................. 5
9. INFORMATION SECURITY POLICIES ..................................................................................................... 6 Acceptable Use .................................................................................................................................................................................. 6 Access Control ................................................................................................................................................................................... 6 Security Awareness and Training .................................................................................................................................................... 6 Audit and Accountability .................................................................................................................................................................. 7 Security Assessment and Authorization ......................................................................................................................................... 7 Configuration Management ............................................................................................................................................................ 7 Contingency Planning ....................................................................................................................................................................... 7 Identification and Authentication ................................................................................................................................................... 7 Incident Response ............................................................................................................................................................................ 8 Maintenance Policy .......................................................................................................................................................................... 8 Media Protection .............................................................................................................................................................................. 8 Physical and Environmental Protection .......................................................................................................................................... 8 Security Planning .............................................................................................................................................................................. 9 Personnel Security ............................................................................................................................................................................ 9 Risk Assessment ............................................................................................................................................................................... 9 System and Services Acquisition ..................................................................................................................................................... 9 System and Communications Protection ........................................................................................................................................ 9 System and Information Integrity ................................................................................................................................................. 10
10. SUPPLEMENTAL INFORMATION SECURITY POLICIES ...................................................................... 10 Criminal Justice Information System Security .............................................................................................................................. 10 Federal Tax Information Security .................................................................................................................................................. 11 Payment Card Data Protection ...................................................................................................................................................... 11 Protected Health Information Security ......................................................................................................................................... 11 Protection of Personally Identifiable Information ....................................................................................................................... 12
State of Illinois Department of Innovation & Technology
Overarching Enterprise Information Security Policy
S t a t e o f I l l i n o i s D e p a r t m e n t o f I n n o v a t i o n & T e c h n o l o g y
O v e r a r c h i n g E n t e r p r i s e I n f o r m a t i o n S e c u r i t y P o l i c y P a g e 2
11. KEY ROLES AND RESPONSIBILITIES.................................................................................................... 12 Authorizing Official (Agency Role) ................................................................................................................................................. 12 Business System Owner (Agency Role) ......................................................................................................................................... 12 Chief Executive Officer (Agency Role) ........................................................................................................................................... 13 Chief Information Officer (DoIT Role) ........................................................................................................................................... 13 Chief Information Security Officer (DoIT Role) ............................................................................................................................. 14 Chief Risk Officer (DoIT Role) ......................................................................................................................................................... 15 Information Security Architect (DoIT Role)................................................................................................................................... 15 Information Security Risk Assessor (DoIT Role) ............................................................................................................................ 15 Information System Security Controls Assessor (DoIT Role) ....................................................................................................... 15 Information System Security Engineer (DoIT Role) ...................................................................................................................... 16 Information System Security Officer (DoIT Role) ......................................................................................................................... 16 Resiliency Planner (DoIT Role) ....................................................................................................................................................... 16 Technical Business Owner (DoIT Role) .......................................................................................................................................... 16
12. REVISION HISTORY ............................................................................................................................... 17
13. APPROVALS AND MANAGEMENT COMMITMENT .............................................................................. 17
State of Illinois Department of Innovation & Technology
Overarching Enterprise Information Security Policy
S t a t e o f I l l i n o i s D e p a r t m e n t o f I n n o v a t i o n & T e c h n o l o g y
O v e r a r c h i n g E n t e r p r i s e I n f o r m a t i o n S e c u r i t y P o l i c y P a g e 3
1. OVERVIEW It is the policy of the State of Illinois Department of Innovation & Technology (DoIT) to (i) support the business missions, goals, and objectives of the Governor and Do