Free Essay

Tft2

In:

Submitted By aronnin
Words 2279
Pages 10
Page 1
June 4, 2014
ABC Company
Proposed revision of Information Security Policy
Anthony Ronning: Information Security Manager

OBJECTIVE:
Due to the recent breach of our electronic health record (EHR) systems, it is necessary that policies pertaining to access and control mechanisms of health records be reviewed and/or modified to mitigate future incidents

SPECIFIC GOALS: 1.) Implement a standard based on Attribute Based Access Control (ABAC) to ensure that electronic health records (EHR) are protected from unauthorized entities 2.) Implement a standard for the use of remote access methods to information systems 3.) Implement a standard that ensures that access to electronic health records (EHR) is audited and backed up without changes or over writing
INFORMATION SECURITY POLICY GOALS: * Confidentiality = data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity plan of protecting the organization from exposure to internal and external threats
ADHERANCE TO SECURITY POLICY GOALS: * Information Security Training = new users will be required to complete information security training modules as a requirement for employment * Receipt of Information Security Policy = new users will be supplied with, and must sign for, a copy of the organizations information security policy

Page 2

* Management approval = Information Security Policy has been reviewed and approved by all upper management and security personnel * Suspected security breaches = any person who suspects a security breach is responsible for reporting that breach to the Information Security Manager * Preventive and Contingency Plan = end point security, virus protection, access control and backup and storage plans are in place *
PROPOSED REVISIONS/ADDITIONS
Attribute Based Access Control (ABAC) Standard
Change justification: The audit revealed that undocumented standard user accounts had been set up and then escalated to full access. This may or may not have been an inside operation and for the point of this proposal it is immaterial if these new standards are adopted. It is obvious that the escalated privileges obtained were a result of poor practices. A stronger, more granular method of access control must be adopted. Attribute Based Access Control (ABAC) is a logical access control method that controls access to objects; in this specific case, health records, by evaluating rules against attributes. Attributes are characteristics of the requestor (subject) such as name, date of birth, home address, training, and job function. Objects (resources) also have attributes such as specific kinds of health records and not necessarily all health records (NIST Publication 800-162). The advantage of using attribute based access control is the ability to be more granular and limit only specific subject’s access to specific objects. A subject is assigned a set of subject attributes, and those attributes are matched to a set of object attributes, such as a folder containing specific health records. The administrator is the owner of the object and creates the access control rules based upon the attributes of the subject and the object.
Developmental Steps: (NIST 800-162 section 3.1.3) * Identify objects (specific records) that will be shared and protected by ABAC * Define the rules or policies that will govern their protection * Identify and define the subject and object attributes, along with their associated authorities, in coordination of access control rule developers (administrator/owners) * Develop processes regarding how the access control policies are written, validated and managed * Determine how the Access Control Mechanism (ACM) will be segmented or distributed throughout the organization and how attribute, policy, and decision requests and responses will be rendered.
Notes of interest: Attribute based access control can be more costly to develop depending on how complex the implementation. The advantage is that it can implement an existing role based method and migrate into a more granular policy based upon the characteristics (attributes) of the individual requestor. The extra costs associated with implementation can be insignificant when Page 3

weighed against the damage of liabilities associated with compromised health data and personal information. In addition, the adoption of ABAC will limit the amount of records that are accessed in a given time period, because the administrator can include attribute rules pertaining to the number of times an object can be accessed and rules as to how many objects a subject can access at a time and in a given time period.
Remote Access Standard
Change Justification: The audit revealed that the unauthorized accounts that were created happened to be remote access accounts. If these accounts were indeed created by remote access there is a dangerous weakness in the organization’s information systems. There is an immediate need for the implementation of a strict standard for remote users. Sensitive information that is sent to or from external network devices needs to be protected so that malicious parties can neither alter nor access that information. An unauthorized release of sensitive information could damage the public’s trust in the organization (NIST Publication 800-114).
Securing a teleworkers PC: (NIST Publication 800-114)

* Using a combination of security software, such as antivirus and antispyware software, personal firewalls, spam and Web content filtering, and popup blocking, to stop most attacks, particularly malware * Restricting who can use the PC by having a separate standard user account for each person, assigning a password to each user account, using the standard user accounts for daily use, and protecting user sessions from unauthorized physical access * Ensuring that updates are regularly applied to the operating system and primary applications, such as Web browsers, email clients, instant messaging clients, and security software * Disabling unneeded networking features on the PC and configuring wireless networking securely * Configuring primary applications to filter content and stop other activity that is likely to be malicious * Installing and using only known and trusted software * Configuring remote access software based on the organization’s requirements and recommendations * Maintaining the PC’s security on an ongoing basis, such as changing passwords regularly and checking the status of security software periodically.

Remote access method: The proposed remote access method is a Virtual Private Network (VPN) with IP Security (IPsec). A VPN is a secure tunnel that connects the teleworker with the
Page 4

organization’s resources. Using IPsec requires the IPsec client software to be installed and configured on the teleworker’s device. Some applications that the user needs to use such as office productivity software requires remote desktop software to also be installed. IPsec also adds the capability of encrypting the traffic between the teleworker and the organization’s resources (NIST Publication 800-114). Wired Home Networks Precautions: Teleworkers should secure their wired home networks to help protect their telework devices. If a teleworker device connects directly to the teleworker’s ISP, such as plugging the device directly into a cable modem, then the device becomes directly accessible from the Internet and is at very high risk of being attacked. To prevent this from occurring, the home network should have a security device between the ISP and the telework device. This is most commonly accomplished by using a broadband router (e.g., cable modem router, DSL router) or a firewall appliance (NIST Publication 800-114). The following steps should be taken when setting up the router:

* Changing default passwords on the device so that attackers cannot use them to gain access to the device * Configuring the device so that it cannot be administered from outside the home network, preventing external attackers from taking control of the device * Configuring the device to silently ignore unsolicited requests sent to it, which hides the device from malicious parties. * Checking for updates and applying them periodically, as explained in the manufacturer’s documentation—either automatically (typically daily or weekly) or manually (to be performed by the teleworker at least monthly) * For broadband routers, turning off or disabling built-in wireless access points (AP) that are not used.

Wireless Home Networks Precautions:

Wireless networking transfers information through the air between a telework device and a wireless AP. If improperly configured, a wireless home network will transmit sensitive information without adequate protection, exposing it to other wireless devices in close proximity. Teleworkers should secure their wireless home networks so that their remote access communications are protected. They should follow the security recommendations from the documentation for the home network’s wireless AP (NIST Publication 800-114).

* Use a WPA2, WPA, or WEP key. This key is a series of characters (either a password composed of letters, digits, and punctuation, or a hexadecimal number) that is used to
Page 5

limit access to a wireless network. A wireless AP can be configured to require each device to provide the same key as the one stored in the AP. Devices that do not know the key cannot use the wireless network. The key should be long and complex, making it difficult for others to guess. * Permit access for only particular wireless network cards. Some APs can be configured to allow only specific devices to use the wireless network. This is accomplished by identifying the media access control (MAC) address of each device’s wireless network card and entering theMAC address into a list on the AP * Change the default service set identifier (SSID). An SSID is a name assigned to a wireless AP. The SSID allows people and devices to distinguish one wireless network from another. Most APs have a default SSID—often the manufacturer or product’s name. If this default SSID is not changed, and another nearby wireless network has the same default SSID, then the teleworker’s device might accidentally attempt to join the wrong wireless network. * Disable SSID broadcasts from the wireless AP. Many wireless APs broadcast the SSID, which essentially advertises the existence of the AP to any computers in the vicinity.

Notes of interest: Adopting this remote access standard will mitigate the possibility of unauthorized users from entering the organization’s private network. A very important point is that users will be subject to the same ABAC rules when accessing network resources as they would if they were physically at the office. The added security features of the VPN tunnel and encrypting capabilities of IPsec along with the common sense precautions listed in the bullet points above will lessen the chance of a penetration by unauthorized entities.

Auditing Standard to comply with HIPAA

Change Justification: The audit revealed that the audit logs were overwritten. Whether this was the standard policy, an inside job, or the work of a smart attacker that was familiar with the rule of always covering your tracks, the logs should have been backed up; not overwritten or erased. Computer system logs have increased over the years because different systems within the whole network log different events. Many of these logs pertain to computer or network security. In this case, the logs were overwritten. This is a clear violation of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA includes standards for certain health information.
Section 4.1 of NIST Publication 800-66 relates to HIPAA-related log management describing the need to perform regular reviews of audit logs and access reports. Section 4.2 specifies that documentation of actions and activities need to be retained for at least six years (NIST Publication 800-66). Had the logs not been overwritten, the breach might have been discovered before any data was compromised. It is recommended that the following two storage features of NIST
Publication 800-92 be implemented along with the HIPAA requirements covered in NIST Publication 800-66 to mitigate any further compliance failures.

Page 6

Storage of logs:

Log rotation: Log rotation is closing a log file and opening a new log file when the first log file is considered to be complete. Rotation is usually performed according to a predetermined schedule (hourly, daily, weekly etc.), or when it reaches a certain size. During rotation, the log can be compressed to save space as well as scripts run to analyze the old log for malicious activity and filtering to preserve characteristics and transfer to storage (NIST Publication 800-92),

Log archival: Log archival is retaining logs for extended periods of time on removable media, servers, or stored on Storage Area Network (SAN). There are two types of log archival: Retention is archiving logs on a regular basis as part of a standard operational activity. Preservation is keeping logs that would normally be discarded because they contain records of activity of particular interest. Preservation is typically performed in support of incident handling and investigations (NIST Publication 800-92).

CONCLUSION

Had these three standards been in place before the incident, unauthorized people would not have been able to access the network using remote access nor would they have been able to bypass the Attribute Based Access Control rules. Also, the logs would have recorded their attempts to penetrate the network and would not have been overwritten. Their attempts to create unauthorized user accounts would have failed. I trust these recommendations will be given careful consideration and, if they are adopted, ABC Company will be compliant and secure from further incidents.

Page 7

References

National Institute of Standards and Technology. Guide to Attribute Based Access Control (ABAC). Definitions and Considerations. NIST Special Publication 800-162

National Institute of Standards and Technology. Users Guide to Securing External Devices for Telework and Remote Access. NIST Special Publication 800-114

National Institute of Standards and Technology. Guide to Security Log Management. NIST Special Publication 800-92 and 800-66

Similar Documents

Premium Essay

Tft2 - Cyberlaw

...TFT2 Cyberlaw, Regulations, and Compliance Overview Kristi Lockett, Course Mentor Kristi.lockett@wgu.edu https://kristilockett.youcanbook.me Performance Assessment • • • Seven (7) Weeks to complete COS Four (4) Tasks Refer to Rubric (in Taskstream) for task requirement details Tasks – submit via Taskstream 1. Task 1 – Policy Statements • For given scenario, develop/revise two policy statements (new users and password requirements). Justify policies based on current federal information security laws/ regulations (i.e., HIPAA) 2. Task 2 - Policy Statements • For given scenario, develop three policy statements that would have prevented a security breach. Justify policies based on national or international standards (i.e., NIST, ISO) 3. Task 3 – Service Level Agreement • • • For given scenario, recommend/justify changes to service level agreement. Address the protection of the parent company’s physical property rights, intellectual property rights and the non-exclusivity clause Use Microsoft Word tracking to track your additions, deletions, and modifications. Insert your justifications after each SLA section, or write an essay describing your changes and justifications 4. Task 4 – Cybercrime • For the given scenario, write an essay responding to the following question prompts (suggested length of 3–5 pages): • • • • • • • • Discuss how two laws or regulations apply to the case study. Discuss how VL Bank will work within the parameters of appropriate legal jurisdiction...

Words: 369 - Pages: 2

Premium Essay

Tft2 Task3

...TFT2 Task 2 Thomas Garner Student ID: 336227 Information Security Modification Recommendations Service Level Agreement Between Finman Account Management, LLC, Datanal Inc., and Minertek, Inc. After careful review of the current Service Level Agreement(SLA) “A Service Level Agreement for Provvision of Specified IT Services Between Finman Account Management, LLC, Datanal, Inc., and Minertek, Inc.” we have determined that standard Information Technology security measures have not been addressed fully. Following are the recommended changes highlighted in the specific sections that need to be addressed. These changes are being recommended to protect Finman’s data and intellectual property. Established standards such as Best Management Practices(BMP), International Organization of Standards(ISO) and the Information Technology Infrastructure Library(ITIL) for the proper handling, storage and protection of IT resources are used as guidelines for these recommendations. Recommended Changes to SLA: Section 3 Background and Rationale Modifications: Finman views this SLA as a groundbreaking venture to harness the diverse array of IT-borne customer demands and opportunities that cannot be met by adhering to traditional paradigms. Finman’s objectives in the SLA are to compete more effectively in a highly competitive industry by offering its customers a unified IT management plan across an entire organization or even, if the customer wishes, across separate departments...

Words: 1333 - Pages: 6

Premium Essay

Tft2 Task4

...TFT2 Task 4 As the chief information security officer for VL Bank, we were notified by several of our commercial customers of unauthorized wire transfers in an amount greater than $290,000. This is very concerning since we take pride in our information security. As soon as we were notified of the fraudulent transactions my security team, along with the network engineers, performed a thorough investigation of how such attack had occurred. Once we were able to view all logs and audit data it came to our attention that the data did not appear to be stolen from our network. All transactions performed were done so with the appropriate credentials. Once we determined that the data breach did not occur on our network we worked with the customers to check their personal computers. We discovered that all the information was gathered from the customers with a key-logging virus that collected the usernames, account numbers, passwords, personal identification numbers, URL addresses, and digital certificates used to access the VL Bank online banking site. Further investigation showed that there was not adequate virus protection on these PCs. The key-logging virus originated from a phishing email impersonating VL Bank and asking the customer to load the latest security software to protect from identity theft. The customers reported the fund transfer immediately (within 48 hours) and they are protected under the Electronic Fund Transfer Act (EFTA). This states that as long as the fraudulent...

Words: 328 - Pages: 2

Free Essay

Tft2 Task1

...Security Policy Cyberlaw, Regulations, and Compliance – TFT2 Task 1   Introduction: Heart-Healthy Insurance is currently evaluating their current security policy and have requested some changes to the policy concerning adding new users and the password requirements for the users. The end goal of the requested changes is to satisfy several compliance regulations that are required by law for their business. The regulations that need to be considered are: 1. PCI-DSS (Payment Card Industry Data Security Standard) 2. HIPAA (Health Insurance Privacy and Portability Act) 3. GLBA (Gramm-Leach-Bliley Act) 4. HITECH (Health Information Technology for Economic and Clinical Health Act) 5. HHS (US. Department of Health and Human Services) New Users: The current directive for new users from the standing security policy states: “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” In evaluating the current policy this standard creates a lot of overhead and administration works for the users and the admins. The new users who are not already familiar with the systems must provide a list of machines that they require access too. Being so new they may not know all of the systems they would need on a day to day basis. This also rolls over...

Words: 1129 - Pages: 5

Premium Essay

Tft2 Task 4

...t2 Task 4 In: Computers and Technology Tft2 Task 4 TFT2 Task 4 As the chief information security officer for VL Bank, we were notified by several of our commercial customers of unauthorized wire transfers in an amount greater than $290,000. This is very concerning since we take pride in our information security. As soon as we were notified of the fraudulent transactions my security team, along with the network engineers, performed a thorough investigation of how such attack had occurred. Once we were able to view all logs and audit data it came to our attention that the data did not appear to be stolen from our network. All transactions performed were done so with the appropriate credentials. Once we determined that the data breach did not occur on our network we worked with the customers to check their personal computers. We discovered that all the information was gathered from the customers with a key-logging virus that collected the usernames, account numbers, passwords, personal identification numbers, URL addresses, and digital certificates used to access the VL Bank online banking site. Further investigation showed that there was not adequate virus protection on these PCs. The key-logging virus originated from a phishing email impersonating VL Bank and asking the customer to load the latest security software to protect from identity theft. The customers reported the fund transfer immediately (within 48 hours) and they are protected under the Electronic Fund...

Words: 1413 - Pages: 6

Premium Essay

Tft2 Task 4

...TFT2 Cyber Law Task 4 Jordan Dombrowski Western Governors University Situation Report It has come to my attention from the security analysts of VL Bank and victims that commercial customers of VL Bank have been involved in identity theft and fraud. Multiple user accounts were created without authorization claiming the identity of our customers. These fake accounts were used to make twenty-nine transfers of $10,000 each, equaling $290,000. The bank transfers were being sent to several U.S. bank accounts of unknown individuals. The U.S. banks involved in the transfers were Bank A in California, Bank B in New York, Bank C in Texas, and Bank D in Florida. After the funds were transferred to one of these banks, the funds were automatically transferred to several international bank accounts located in Romania, Thailand, Moldavia, and China. After further analysis we discovered that the banks affected customers all used computers infected with a keystroke logger virus that collected usernames, passwords, account numbers, personal identification numbers, URL addresses, and digital certificates. The computers infected did not have an anti-virus or security software of any type installed. Additionally, these customers have reported that they have been frequently experiencing spear phishing attacks, which is most likely the way that the keylogging virus software was installed. Finally we concluded that our banks systems have not been breached and no customer data has been...

Words: 3994 - Pages: 16

Premium Essay

Tft2 Task2

...Security Awareness Policy ​ (statement 1) The Information Security (IS) team is responsible for promoting on­going security awareness  to all information system users.  A Security Awareness program must exist to establish formal  methods by which secure practices are communicated throughout the corporation.      Security guidance must exist in the form of formal written policies and procedures that define  the principles of secure information system use and the responsibility of users to follow them.  Security awareness articles, posters, and bulletins should be periodically created and  distributed throughout the corporation to educate employees about new and existing threats  to security and how to cope with them.     All employees are responsible for promptly reporting to their management and Information  Systems (IS) management any suspected insecure conditions or security violations they  encounter.  All employees must be made aware of their security responsibilities on their first  day of employment as part of the new­hire orientation program.  All employees must comply  with IS security policies by signing a compliance agreement that is retained in their personnel  file.      IS Security policies and procedures must remain current and readily available (e.g., via the  intranet site) for Information System users to review and understand them.  Information  Systems (IS) management must ensure that the terms and conditions of authorized system  access are clearly communi...

Words: 1815 - Pages: 8

Premium Essay

Tft2 Task 4

...TFT2 Task 4 As the chief information security officer for VL Bank, we were notified by several of our commercial customers of unauthorized wire transfers in an amount greater than $290,000. This is very concerning since we take pride in our information security. As soon as we were notified of the fraudulent transactions my security team, along with the network engineers, performed a thorough investigation of how such attack had occurred. Once we were able to view all logs and audit data it came to our attention that the data did not appear to be stolen from our network. All transactions performed were done so with the appropriate credentials. Once we determined that the data breach did not occur on our network we worked with the customers to check their personal computers. We discovered that all the information was gathered from the customers with a key-logging virus that collected the usernames, account numbers, passwords, personal identification numbers, URL addresses, and digital certificates used to access the VL Bank online banking site. Further investigation showed that there was not adequate virus protection on these PCs. The key-logging virus originated from a phishing email impersonating VL Bank and asking the customer to load the latest security software to protect from identity theft. The customers reported the fund transfer immediately (within 48 hours) and they are protected under the Electronic Fund Transfer Act (EFTA). This states that as long as the...

Words: 1403 - Pages: 6

Free Essay

Tft2 Task 1

...The current new user security policy for Heart-Healthy Insurance states the following: “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” The following changes are based upon the PCI-DSS Compliace: 1. Usage policies must be developed for critical technologies and defined for proper use of these technologies (PCI DSS 12.3). With this first policy an organization with prohibit or allow the usage of equipment and/or accounts depending on the individual’s permitted access. 2. Explicit approval by authorized parties (PCI DSS 12.3.1). This policy will grant specific approval by management to match the business needs. Proper approval to individual personnel will create a secured environment with critical systems. 3. Authentication for use of the technology (PCI DSS 12.3.2) Personnel will use passwords to authenticate the access they have to specific technology. This will hinder any individual who is trying to breach the environment and gain access to critical information. 4. Automatic disconnect of sessions after a specific period of inactivity (PCI-DSS 12.3.7) Users must log out if they plan to step away from their accounts and/or devices. Automatic log-off will stop any individual who is trying to gain access to the system without authorization...

Words: 627 - Pages: 3

Free Essay

Tft2 Task 4

...VL Bank Case Study You are the chief information security officer (CISO) for the VL Bank based in Atlanta, Georgia. Recently, a highly sophisticated and cleverly orchestrated crime was brought to your attention by the information security analysts in your department and by a growing number of business customers. Your company’s commercial customers utilize a digital certificate multifactor authentication process to access wire transfers, cash management, deposit operations, and account management applications common to all business customers. The problem is that several customers have reported that new user accounts have been set up under their names without their authorization and these accounts are initiating several fund transfers for $10,000. The wire transfers are being sent to various other bank accounts across the United States. As of today, the amount of fraudulent transfers has been over $290,000. The bank’s affected customers are calling to get answers and reclaim lost funds. Your supervisor is demanding answers from you as well. The bank’s general counsel is preparing for litigation threats from the affected customers. This could be a business nightmare, especially if you fail to resolve the situation quickly. After further analysis, you learn some additional information about the case: 1. The $10,000 individual transfers are going to several U.S. bank accounts of individuals before being automatically transferred to several international bank accounts located in Romania...

Words: 405 - Pages: 2

Premium Essay

Tft2 Task 4

...Recommendation for information security Modification The review of the Service Level Agreement in the network “shows that better measures for Information technology have not been addressed, rather some added recommendation have been listed which provide the better protection to Finn man data and intellectual property. Thus various mechanisms for protecting the data have been suggested lik ITIL, Best management practices A.. Recommended changes for protecting Fin man’s data and Intellectual property. According to Finman more demands and opportunities of the information technology customers can not avail because of the some old tradition of SLA in the modern age. So the entire organization can compete the highly competitive industry by using the more sophisticated unified IT management techniques when it offers to its potential customer the best protecting techniques. Minertek made the latest software and named it as Datanal which was based on data-mining that has assembled the various desperate operations and various other programs and procedures which were located on the separate location which help the customer to eliminate the duplication a d also to help them to achieve the better economies of scales and open the new businesses the various location. For consolidation of Datanal software, the organization will need them to establish the Access control list and crate the new user policies which will be providing the authorization to authenticate the network process...

Words: 758 - Pages: 4

Premium Essay

Tft2 Task 2

...Introduction The major healthcare provider in question has experienced a potential security breach within their records. They are now currently investigating how this happened and what information was access by the unauthorized individual. However, the company is now interested in established a baseline framework to avoid future information breaches from occurring. This document will outline three major IT frameworks and how each could have mitigated the recent information breach. ISO Policy The ISO 27001 recommendation is a high-level discussion. A precise policy was not located. The discussion did contain a preventive feature to denied access afterhours; however, how the afterhours check relates to a policy is not clear. The COBIT5 recommendation is a discussion and needs to develop a policy. The discussion includes auditing in general; however, details about the auditing need to be developed once a precise policy is developed. The NIST framework discussion includes review of log files. Details need to be developed about the review once a policy is developed. The three major security frameworks in the discussion are excellent overall recommendations. Precise policy statements that will prevent an identified security flaw in the scenario need to be developed. The first policy presented is ISO 27001 (International Standards Organization Security Standards). According to the ISO website, “The ISO 27000 family of standards helps organizations keep information assets secure. Using...

Words: 3049 - Pages: 13

Premium Essay

Tft2 Task 1

...Updated Heart Healthy Information Security Policy Due to personnel, policy and system changes, and audits, Heart Healthy has voluntarily updated their information security policy to be in-line with the current information security laws and regulations. Currently Heart-Healthy Insurance, a large insurance company, plans to review and provide recommendations for an updated information security policy in the area ‘s of: Current New Users Policy The current new user section of the policy states:  “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator access.”(Heart-Healthy Insurance Information Security Policy) Current Password Requirements The current password requirements section of the policy states: “Passwords must be at least eight characters long and contain a combination of upper- and lowercase letters. Shared passwords are not permitted on any system that contains patient information. When resetting a password, users cannot reuse any of the previous six passwords that were used. Users entering an incorrect password more than three times will be locked out for at least 15 minutes before the password can be reset.”(Heart-Healthy Insurance Information Security Policy) Heart Healthy Insurance Information Security Policy and Update  Proposed User Access...

Words: 1532 - Pages: 7

Premium Essay

Tft2 Task 1

...Heart-Healthy Insurance is in need of an improved new user and password policy in order to become HIPPA, GLBA, and PCI-DSS compliant. I propose the following changes to the current policies: New User Policy Each user of this system will be given a unique username so we are able to track their use of the system, including the logging of their activities with timestamps in order to trace any and all activity on our network. Also new users will be given access based on the rule of least privilege. This rule states the only rights a user will be granted are the rights and privileges they need to complete their individual work. All requests for the creation of new user accounts or to increase the level of access of an existing user must be submitted in writing by a member of the management team. This document must include which systems and levels of access the new user requires or the new level of access needed for the existing user account. If an upper level of access is requested management must include a brief statement as to why this user needs an elevated level of access. In addition to these changes if a users status changes, i.e. they are terminated or voluntarily leave the company, they will be immediately removed from the authorized users database. Password Policy The new policy that will be put in place for all passwords, including existing passwords, will be as follows: * Cannot contain username * Must contain 3 uppercase letters * Must contain 3 lowercase...

Words: 598 - Pages: 3

Premium Essay

Tft2 Task 1

...Heart-Healthy Insurance Information Security Policy 1.0 Overview HHI provides access to authorized individuals that are employed and have the appropriate training for PCI DSS standards. Access to network and any software, hardware, business related assets will be managed by roles and responsibly. HHI promotes training for policies and procedures to ensure the integrity of our customers. 2.0 Purpose The purpose of the Access Control Policy is to ensure that sensitive financial information is kept secure and available to those who have the authorizations to access information. 3.0 Scope The scope of this policy is for all employees to protect the integrity of access to accounts. 4.0 User Policy This policy displays user’s access on a need to know roles to provide integrity and confidentiality to customers and employees of HHI. They will also be given Unique ID’s to access the computer systems. This policy pertains to new and existing users. Dept. Mgr: will oversee all employees and ensure that candidates are properly trained. Customer Mgr: will oversee operations from costumer services and cashiers. Customer Service officer: will be in charge of cashiers and customer service. Cashiers/Agents: trained to handle PCI DSS and company policies. Marketing: with limited remote access to authorized information. | Network | Application | Remote | Financial | Dept. Mgr | * | * | | * | Customer Mgr | * | * | | * | ...

Words: 932 - Pages: 4