Home
        Contents
         Contents
1.                                                 64  21                    IRC LEPOMOE S uu uuu u mires a FOR                       UBI VEU NUBE GL RUN URN           asss Nancie t 64  4 2                              64   5  Information Security Organtzation                                                                                  64  5 1  Information Security Organization Definition                                                          64  5 2  UO INU OC                            65  5 3  Communication Route at Emergency                                                 65   6 Rule and                                        65  6 1  Information                                                       65    6 2   People Security  Io be defined imn    f  t  re     5  u      u de Dess aede ia EA 66                        Sec UEIEy aoi cet endete a                                 66   o oL Omice Buil and          u uuu  uuu nuy aqu etae dob reser eco    66  0 25 2    C abinet and  DESK    uy k kuyaaman oc be                   UY 66  0 25 35         Machine                  uu                                         unas 66   6 4  Physical Information                                 67  Ou                                                      rater 67  6 4 2  Digital Archives  DVD CD FD Tape                                                              67   6 5  Cent PG SEOUEIDY uu aun umu puma naa Et End du otto Po Se ote Rodas 67  RM EE DIT arojedu Gr 67  63 2  3Laptop  Mobi
2.                                          33  4 5 2  Document Revision  Distribution  Access and Keeping                                  34        FCC OPAC OMG OM                         35   5   Manacement  Respomsibilily uuu u  ullu ls                             EVE SO UTI                     35  241 ManasementCOnimniiWentf                                                                           35  5 2  Government Information Security Organtzation                                                      23  5 3  Capacity Development   L u I LUTTE 36  5 4  Management RevIew                                                                                                36       Contoland Trealme RETE 36  Gas      Or              AL arcana      E m aaa           36  6 2  Control and Treatment by Information Asset                                                           37  Appendix   Risk Check Instruction                                                                                      38  SECTION 4  Government Information Security Management System Risk Check           39  SECTION 5  Government Information Security Rule                                                        62                     MR                                                     63  2  Three Basic Rules to Secure Information                                                                       63  ooo                  a              n 63  4  Normative References  Terms and Deflinition                 
3.      l  gl  m     n      2        I      F          ri   gt                   il                             anti virus protection          and action  221  irformatica gathering    BEEN Patch applibation    WPS                                     UPS for al servers        ra         2                 S                           a             a                           43    Risk Check       Ee Asset Evaluation Check item                      Vu                                    a                               hk                     u  pner ea                il                   backup   Beck cat park       EE NT CRED                 data access                 2411 77    Archie protaction 7                              j             ex             Id   f  en             8        182         Lus                                    185          pese HPE for      sen              iii               uspandar until PAIS integrating GATS                            44       Risk Chack    Check item                      ee                          amp  High _  5          Mi  189            L j               Define those who can enter the facili                    SS  gt             M     Separate un office  gt  space And tha other                 common space   Li       titers Gt outsiders with an insider attendant  Lies      Record an entry and exit           Gheck rez ull   Comments on Gheeh Results                             MO    l o Y                 Entry    axit record      
4.     Security techniques     Information  security management systems     Requirements    28    3 2 Terms and Definition  The followings are the terms and their definitions specifically used in GISMS     Government Information Security Management System  GISMS    It is ISMS for Royal Government of Cambodia in this manual  ISMS is referred to  ISO ISE 27001     Government Information Security Office  GIS Office     It is set up as a secretary at GCIO Committee and NiDA takes the role of GIS Office  as part of its responsibility  It is responsible for setting up the policy  standards and  guidelines of GISMS and is also responsible for all ISMS related topics in Royal  Government of Cambodia  This definition is a draft  GCIO patronage will be settled  in GCIO development project     Chief Information Security Officer  CISO    It is assigned to one official by ministry  Responsibilities are explicitly defined in  GISMS Manual and Information Security Rule Book     Information Security Manager  IS Manager    It is assigned by ministry  Responsibilities are explicitly defined in GISMS Manual  and Information Security Rule Book     Risk Check Book   It is a check book which identifies information assets  evaluates information assets   checks potential risks  identifies risks and evaluates risks     Government Information Security Rule Book  GIS Rule Book     It defines rule and procedures which secures each information asset  It 15 defined by  ministry whereas its sample is develope
5.    eneryptan  Mi   5            55 ing mails                              f          on         m cn                             5    Download a web m executable only which has an electronic signature        41    Risk heck             Chack item          Asset Evaluation       Check izem             amp   8            em      3  3      Fr            E   c2                        F                                                                                Fae machines and printers  i   er ox  Dispose printed matanals fazed materials with  Cte Faring record          racord of faxing  sending receiving    muaj     sd                                                                                                                                                                    115       Us    incu         all laptop   mobile PCs p   1171 slow          tial          Arti wrus protection  Scan storage devces with anti virus software periedisathr      9    Hc ptem Execute a physical formatting of a storage  or scrap rt physically     120   Persona  ass Pt  Personally owned PG  strage devices and degital arch  7 Internal  2 Midde  l tow  1 tow 1                            esas      1 Gat a permission from TS manager to Lake ino    persona asset ta from an office   1  Low T  Lowe             software explicitly allowed by 1S ma ager                                              Apply  patches according to 15 managers                 Encrypt la send      e  mail   Report and take 
6.   6  Control and Treatment  6 1  Types of Control  There are four types  mitigating risks  transferring risks  avoiding risks and   knowingly and objectively  accepting risks     Mitigating risks is the major control to take against the revealed risks  A PC is  vulnerable against a virus intrusion  for instance  Anti virus software installation and  activation is a control to be taken    Transferring risks is the administratively possible way of control  Assume a PC  contains valuable information and it is vulnerable against a fire disaster  Then  the  data back up in a remote place is a control of mitigating risks  on the other hand   enrolling a fire insurance and insuring the damage of lost data is a control of  transferring risks     36    6 2     Avoiding risks is      alternative to vanish      source of risks  The previous research  collected lots of privacy information which is irrelevant to the main business and it  is vulnerable to information leakage  then  disposing the information safely is a  control of avoiding risks     Knowingly and objectively  accepting risks is the last option  For example  it is  widely applied to protect a LAN by setting up a firewall whereas a web server for  external users is set up out of a firewall  It is accepted the web server might be  attacked from outside although it needs some recovery efforts once an attack  happens  Accepting risks has to be very carefully managed and the top management  review and authorization is always req
7.   and or transmitting of portions or all of this publication may not be allowed without  permission of NiDA        SECTION 1  Government Information Security  Management System      Drafted by Yusuke Tanaka  JICA Expert    Edited by ICT Security Management Technical Team  iSMTT      4                            Government  Information Security Management System       The Project of    Capacity Development on ICT Management at           H E  CHEA MANIT  Deputy Secretary General  Mr  TANAKA YUSUKE  JICA Expert  November  2008       Government  Information Security Management System   GISMS   Development Project    Introduction    GISMS       Government Information Security Management System  GISMS  is for Royal  Government of Cambodia to secure information used in its business operations  to  ensure the administration continuity in Royal Government of Cambodia and to  minimize the risk of damage by preventing security incidents and reducing their  potential impact  GISMS has the following characteristics       Based on the best practices of global standard ISO IEC27001      Accumulation of good practices and knowledge of information security        Ease of adoption of ISO IEC27001 to any organization because of its  applicability of tasks stipulated        Continuous revision       Process based PLAN      Applicable regardless of organization   s structure  f      Applicable regardless of organization s size and or nature  e PDCA approach      Plan Do Check Action      Step by 
8.  6  Execute an emergent anti virus protection ISO n a  procedure if necessary   b2 7  Record an analysis and an action ina report   ISO  Updated  Information  Security Event Report    b2 8  File a report and keep for the defined period   IS In charge  n a 20    Records   Information Security Event Report       All information security events should be reported and handled appropriately by the in   charge personnel   Information Security Event Report    Name    Reported Record Number   Department    Name       Contact  Cell E mail      Department           Event Type  Virus detection     Reported Time     Inappropriate settings installatia  Undesirable unsavory e mail de Action   Others O    Event Time     Situation     Lessons Learned    Name       Department     Recorded Time       Lessons Learned        15       Three Basic Rule to Secure Information     Rule 1  Always consider whether you acquire  process or  save confidential information  Do NOT expose  information against any risks of leakage  falsification and  inaccessibility      Rule 2  Lock up an office entrance  a cabinet and a desk  drawer before walking away for any moment      Rule 3  Activate an auto detection function of anti virus  software  Update a virus definition file at least weekly   scan a storage device of your PC weekly and any  external storage devices  e g  FD  Memory Card Stick    and HDD  when to connect to your PC  T    Information Security Management Example     Disciplinary Action    Details o
9.  D Password Stolen    lo UPS       GISMS Document Architecture       Top two documents will be proposed as the common documents among all government  organizations in Cambodia  The preliminary ones are drafted at this project and  extended in the future     As of 19 NOV    Unified  Policy  and  Manual    Assessed  by  Organization    Defined  by  Organization   Sample  Delivered        8    GISMS Policy        Objective       The objective of information security is to ensure the administration continuity in the government of Kingdom of Cambodia and to  minimize the risk of damage by preventing security incidents and reducing their potential impact     Policy       The goal of ISMS Policy is to protect the information assets in the government of Cambodia against all internal  external deliberate or  accidental treats        The security policy ensures that      Information will be protected against any unauthorized access     Confidentiality of information will be assured       Integrity of information will be maintained       Availability of information for administration processes will be maintained       Legislative and regulatory requirements will met       Information security training will be available  for all government officials       All actual or suspected information security breaches  will be reported to the Information Security Manager  and will be thoroughly investigated     Procedures exist and support the policy   including virus control treatments and passwo
10.  Goode shipping record  Keep records of cauriar service     5              High     s High   3 High                      in Gere    Cabinet lock up                          198                      EIE A M      e                2  Internal    n High     sHgh   Mide    od       Fax machinas and printers                 D  Yes                                 Yes                 D  Yes           Yes               hysical in tration                                          E                      Client PG  hardware and software           Desktop PC                                                   e    Gonnect UPS for      desktop PGs              Lucr i us    ie ET  oles                       LO  TT Security wire Wire all    aptop  mobila PCs physically to desks or store         locked                       Pa                       gt    PT   Pd  ma Ir                            mos   i  Er      gt                                                                  45      241  Extended   242     Network and Server          Risk Ghack                              Wile              tremtmant                                    Pt bs dehed and implemented in the future        Po ces contd                   _   _ E          46       Risk Ghack                                                        2TH     279 Physical irformation    EIME  282     983     zad       285       286                      mol      Paper 2                       Outsiders  Get outsiders wrth ar insider attendan
11.  Risks  Assess Risks procedure consists of five steps  Identify Information Assets   Evaluate Information Assets  Check Potential Risks  Identify Risks and  Evaluate risks  The detailed procedure is defined in Risk Check Book  Please  refer to an instruction in Risk Check Book   See Appendix 1 Risk Check  Instruction     Step 1 Identify Assets  Identify assets  Risk Check Book has 6 default assets  4 assets out of 6     such as Facility  Paper  Client PC  and Network  amp  server assets are  supposed to be defined by department for each to check by itself     Step 2 Evaluate Assets  Next step is to evaluate assets  There are 3 elements of evaluation     Confidentiality  Integrity and Availability  Select one class of each  according to the criteria shown below              Confidentiality evaluation  lass valuation    General     Internal     Confidential    Description   Open information assets which go to public   nformation used only in a government business operation  Confidential among limited authorized people    Co hN5         C1    2  Integrity evaluation           Class   lt     Description   No impact on business continuity by falsification  Operational cost impact by falsification   Political impact by falsification          4                  Middle    High    3  Availability evaluation             7                           jDescripton        o      1  t Low     ji        Out of service allowed over twenty four hours          2  3 Midde      3    Out of service 
12.  desks or store at a locked facility       65 Anti virus protection Scan storage devices with anti virus software periodically     66 Disposal Execute a physical formatting of a storage  or scrap it physically     68 Permission Get a permission from IS manager to take in out a personal asset to from an office  M  No      12    Risk Check Book   Step4  Evaluate Risks       Evaluate Threat and Vulnerability to apply the criteria  Total Risk is automatically displayed   8  Risk evaluation   Points     Asset   Threat     Vulnerability                     Evaluation  Points _  Description    Allowed Risk  Non allowed risk which needs controlled    Vulnarability    Total Risk    I    Middle    Unauthorized access  falsification  malfunction      3  Middle 2  H    Middle     Unauthorized access  falsification  malfunction      3  Middle     Middle      Unauthorized access  falsification  malfunction      3  Middle           Middle          ee    H  I  I  I  I             automatic    Middle Unauthorized access  falsification  malfunction 3  Middle      Middle Unauthorized access  falsification  malfunction 3  Middle H     Middle    Middle    Middle  H         6  Threat evaluation                  Evaluation                       Description  Low probability of the threat  Middle probability of the threat    High probability of the threat          16    Risk Check Book   Step 5  Decide Controls       All check items evaluated as    High    risks are requested to control them  There a
13.  drafted  documents are authorized with the same procedures defined in 4 5 1 Document  Structure and Authorization     All other GISMS documents revision is defined by ministry in accordance  with PDCA cycle defined in 4 3 Check and 4 4 Action     GISMS Manual  Risk Check Book and GIS Rule Book must have a revision  history to assure which revision readers are referring     Distribution  Access and Keeping  The confidentiality of GISMS documents varies by document  which 15    defined as follows   1  GISMS Policy and GISMS Manual are classified as    general     which    34    means they can be got published and all Cambodian people can access and  read them    2  Non assessed Risk Check Book contains no identified risks in a  ministry and it is classified as    general     On the other hand  After assessed  Risk Check Book contains identified risks  threats and vulnerability    therefore  it is classified as  internal   which requires the careful  distribution  access and keeping only in a government business operation   3  GIS Rule Book contains the internal business rule and procedure and it  is classified as  internal      Copies of all revisions of after assessed Risk Check Book  GIS Rule Book and  defined records blank forms must be submitted to GIS Office and it keeps for  five years     All other GISMS documents distribution  access and keeping are defined by  ministry  However  it is requested to take carefully deal with handling  documents which contain confidential
14.  information  e g  server IP address   personal privacy information      4 6  Record Control  Records need to be managed for implementing rule and procedures  Control of  authorization  revision  distribution  access and keeping of records blank form can  be defined in GIS Rule Book     Generally  records are submitted by the designated officials and filed and reserved  by Information Security Office  Keep numbering those records uniquely identified   The period of keeping of all records is defined as one year  otherwise it is  specifically defined     Records often contain confidential information  e g  server IP address  personal  privacy information   and it is requested to take carefully deal with handling     5  Management Responsibility  5 1   Management Commitment  The top management of Royal Government of Cambodia is responsible for  establishing  implementing  monitoring and maintaining ISMS to ensure the  administration continuity of Royal Government of Cambodia and to minimize the  risk of damage by preventing security incidents and reducing their potential impact  under the declaration of GISMS Policy     Management people are directly responsible for implementing ISMS and especially  for ensuring staff compliance in their respective departments     5 2  Government Information Security Organization  The Ministers of Royal Government of Cambodia shall assign Government Chief    Information Officer  GCIO  for each ministry  The top of Royal Government of  Cambodia s
15.  specific threats       Threat evaluation  Class                             12     2       22      3 Hgh 13       Class  Evaluation   Description 7    d  Low                            enough to secure against athreat_          2  Fair  2    Controlled but opportunities to improve             3 Midde     35    Controlled proportionally but needed to improve     IVA 4  High Non controlled against a threat m       The total risk evaluation is determined by the following calculation   8  Risk evaluation   Points     Asset   Threat      Vulnerability                  7   Evaluation Points  Description    1    RI           1  2to6 _ Allowed Risk  Non allowed risk which needs controlled       Step 5 Decide Controls  All check items evaluated as    High    risks are requested to control them     Generally  they need to implement rules and procedures to mitigate risks   Therefore  it leads to develop Government Information Security Rule  Book  After deciding controls and making treatments to risk items  e g   define rules and procedures in GIS Rule Book   evaluate risks again and  make sure all check items get evaluated as    Low        4 1 4  Develop a Government Information Security Rule Book  GIS Rule Book is defined by ministry  Based on the results of a risk    assessment  the major treatment is to define rule and procedures to mitigate  revealed risks  GIS Rule Book must contain the following five components   Scope defined at Scetion 4 1 2 Define the Scope of ISMS  Informatio
16.  you feel difficult to evaluate   Step 2 22  Risk Check sheet automatically display the total evaluation of an asset at column J     Review the result and check with the criteria listed in Evaluation Table sheet   Revise confidentiality  integrity and availability evaluation if you feel a total asset value is different from actual        gt  e       a ee ee wi  Read column L            and choose just yes      no at column      jo I                                                                You can select one from a pull down menu in each field at column                  Read the description of each threat at column Q for assistance to decide threat evaluation          Use a default value if you feel difficult to evaluate           Review the result and check with the criteria listed in Evaluation Table sheet    Revise threat and vulnerability evaluation if you feel a total risk value is different from actual    Go to Step 5 if the total risk is High    Consider the consistency of ISMS if the total risk is Low   and make an arrangement if any  e g  update the existing rulebook or update the control reference at column V      D                       U Us          Step 5 3  Decide the applicability of implementing the rule and procedures in the sample information security rulebook   Decide the alternatives if not applicable     and the rule and procedures which is applicable and can be implemented to the organization   __       You can select one from a pull down menu in ea
17. Classification     a  Hiring Resigning procedure 1  Information Security  Management System          Personal profiling related to information    Physical Inf i     Security i 9  Security Operation      i i  NA  General Administration related    I to information security    Key Success Factor          Newok        i           number is referred                  IS    CD enhancement         Process and Timeline    Project Organization    Lead     Timeline described on full time basis  XXX          XXX      Staff A       XXX       Staff B C    39    24    SECTION 2  Government Information Security  Management System Policy    Kingdom of Cambodia  Government Information Security Management System Policy     Objective     The objective of information security is to ensure the administration continuity in  the government of Kingdom of Cambodia and to minimize the risk of damage by    preventing security incidents and reducing their potential impact      Policy             goal of ISMS Policy is to protect the information assets in the government of  Cambodia against all internal  external deliberate or accidental treats             security policy ensures that     nformation will be protected against any unauthorized access     Confidentiality of information will be assured      ntegrity of information will be maintained     Availability of information for administration processes will be maintained     Legislative and regulatory requirements will met      nformation security trai
18. Contents    SECTION 1  Government Information Security Management System                                    SECTION 2  Government Information Security Management System Policy                    23  SECTION 3  Government Information Security Management System Manual                  27  Wy                    AA                      28       ren    28  3  Normative References  Terms and Definition                                                                 28  ou NOD             CCU aG                               28  2 2  Terms ANG  BIEN esences eiue neei AEEKO                            29   4  Government Information Security Management System  GISMS                                  20  NE Esc ERN Tm m 20  4 1 1  Walkthrough GISMS Policy and GISMS                   20  4 1 2   Define the Scope                              l        S Sea Sena px ob deae evo xs              20  4 1 3  Assess IRIS EEUU Um 30  4 1 4  Develop a Government Information Security Rule Book                                3l  4 1 5  Define the Scope of the ISMS in GIS Rule BooKk                                           32                      TT 32   4 2  Do  Implement and Operate                                                                                     32  4 3  Check  Monitor and                                 24  44440008088        32  4 4  Action  Maintain and                         33  452  Document Bore  PNE NOTAE 33  4 5 1  Document Structure and Authortlzation                  
19. Type Check         Gheck        Comments on Check Results                                                                                                                                                                                                                                                               Enterprise D j  dL j j         R a    C ee      2171       fie building                        aie      Dafina those who can enter the facility    room   a eg   218    Imolament an appropriate key system fer an entrance of the facility room  j            s                      sparate an office space and tha other accessibles common spas                      Lan      Get outsiders with an insider attendant      422                   a            a        Lm   ES  s   125            eee   325      ee    HC    H   E      328      Faung record  Kee  1  Wo  a              ree                EN  ES      SN               Yas        E      338                    Digtal Archers    DVDs GDs tDs Tapes                   eee  EE EN    y    339     Protection _____           1        peu                   _             a meda  Tape FO CD DVD  physically  1          3411    Ghent PG  hardware and softerare E    442     Desktop PE    n  2  nternat   5 High        343    re CENE          Assign one main user gt minimum ta all PCs  1          344    2 Im l User ID and password            robust password and change ong periodica ly      L345                   Prohibit share user  D and p
20. a sample rule book   Obtain approvals                   4 3  Check  Monitor and Review    4 4  Action  Maintain and Improve    4 5  Document Control   4 6  Record Control   5  Management Responsibility   6  Controls and Treatment 10  Risk Check Book       Risk Check Book is applied to all government ministries when to assess their ISMS  scope  It contains Assets evaluation  Risks evaluation and Controls                Identify    Start Risks         Assets Assets Risks Risks Control    Evaluation Evaluation Treatment     Risk Check Book Y    Measurement    IS Rule Book     Control and Treatment are also called Measure     11    10    Risk Check Book   Step1  Identify Assets    Risk Check Book is applied to all government ministries when to assess their in scope  information assets  First of all  Identify assets  Risk Check Book has 6 default assets  4  assets out of 6  Facility  Paper  Client PC  and Network  amp  server assets are supposed to be  defined by department for each to check by itself  Just copy and insert a group of rows  e g    50 68 is a group of rows for Client PC              out whose assets they are  lt is useful to  prepare an office map for the later assessment       Assets  ee           Evaluation                                      L1 L2 L3 Description  Attributes  Location  Manag charge    of Assets  Confidentiali Integrity Availability   Total           Check Lich gC                   BNiDA  CISO J np C j    2     50     Client PC  hardware and softw
21. allowed up to twenty four hours          5 High  5            service allowed up to four hours                The total evaluation of an asset determines the total points of 3 elements  Review and revise  confidentiality  integrity and availability evaluation if you feel a total asset value is different  from actual     4  Asset evaluation   Points   Confidentiality   Integrity   Availability                  Evaluation Points  Description         j  Assets to Impact moderately on an operation    2  Middle 710 12   Assets to impact enormously on an operation  13      15  Assets to impact enormously on an governing       Step 3 Check Assets  Check assets  Just select Yes or No for each check item     30     Sample check items of Desktop PC    Assign one main user at minimum to all PCs    Use a robust password and change one periodically    Prohibit share user ID and password with several people    Clear a display screen by setting screen saver function with password   Scan a local storage with anti virus software periodically    Use an automatic virus detection function usually    Update a virus definition file periodically    Keep records of scanning and updating virus definitions   Connect UPS for all desktop PCs    Execute a physical formatting of a storage  or scrap it physically     SA RN           AS UN    Step 4 Evaluate Risks  Evaluate Threat and Vulnerability to apply the criteria  Each check item    has an example of threat in a comment column to easily identify the 
22. appropriate ackions          mias  addressing mails                    na min                 Download a web B browser executable only which has      electronig signature     42    Risk Check                  Asse Assat Evaluation Check item  LI Description                   Location  Manager in charge    of Assets  Total    rneck Tape     0 0   Check iter                                      e ML         141 umma LAH and           2  Intermal_1a  Made  1  1  Low  132    j     a                 Disconnect an intarnal network from an external network                                                                             133                   POT    Reo o Record a network access  Il Na O  124      ee                 Audit           detect Urade              UOTE I IN        1  12811                       5 Contant UPS for al  network devices      eee Ee eer a   e  137                   j            E   i        i       133                     5 sical protection      140 Hee      ser defintion   Oefnn thone who can onter the server room                   1  T er and password  Ose a robust password and change        periodically  bo       iz       ser    shang       IFrohibit share user ID and password with several people          val             _                    manus   Document an operation manual and Inssen human erro          waf                   aconse control  PH        146        PO Data back  nene ur      i            Data recovery  Recerd                  1  z 
23. are  _      j  j   me         Desktop PC 2  Internal_ 3  Middle  Network SG Office Appli Enterprise           25    2 2                                 Khrishna                        62       Laptop  mobile        All desktop PC check items must be applied        2  Internal  3  Middle   mg poppe ruso     64        Storage devices   Portable HDDs  Memory sticks  Memory cards   3  Middle       1        1          67       Personal asset  Personally owned PC  storage devices and digital archiV2  Internal  3  Middle                  j  ees l        12                Risk Check Book   Step2  Evaluate Assets       Next step is to evaluate assets  There are 3 elements of evaluation  Confidentiality  Integrity  and Availability  Select one class of each according to Just select one from the  pull down menu  Use a default value if you feel difficult to                                      RH        Te    11213                       Attributes  Location  Manager in charge    of AgSets         ConfidentiallIntegrity _ Availability      Basic Check List_               L JNIDA CISO jJ j  j jO                          upo Gardvare                     pesa ss a s A    52                           IT    pepe                        Ec       for jenes j C              information assets whch qe et                   1              86          2 internal  2   information used only ina government business operation             3     i  c3      Confidential 5        Confidential among limited au
24. assword with several people                  s   345                           screen by setting screen saver function with password ION  347    an n local storage with anti virus software periodically   348  l   Use am automatic virus detection function usually  1D  Yes                                     EA ree                                                                           Scan storage devices with ant wrus software penodically    Enecutea B physical formatting cf a storage  or scrap it physical 1         Get a permission fram 15 manager te take in out    personal assat to from an office  I                   oe NS M te            es       j   ERE See Install software septicitly allowed by 15 manager                   Software configuration  Configure software according to     managers    instruction  Dye  MA       Pateh application Apply patches accorcing to 15 managers request 1  No             encryption      Encrypt to send      e mail 1                   Miss addressmg malg               and take appropriate actions when mi i i           jen                 the integrity of    document and deliver one      PD         367 fes                   ee ecce aeu 4 Web downloading 2                     s web browser executable only which has      electronic mgnature                     48    Risk Check                                    an fire  ace and the other accessibla common space  _  Get gutziderz with an insider attendant                         D o     Fig re
25. be applied   _  2  Internal_ 3  Middle                       aaa    j  y    64       Storage devices   Portable HDDs  Memory sticks  Memory cards   3  Middle  11 1    111  ooo  oo  o po      67       Personal asset  Personally owned PC  storage devices and digital archi 2  Internal  3  Middle  6         j  l            Risk Check Book   Step3  Check Assets       Check assets  Justlselect Yes                each check item               5  Check results              Class  Evaluation   Description         20  0 Yes NA_ 0    Correct operation        G G             Risk implication           Check item          Check Type Check item Check results       52 Assignment Assign        main user at minimum to all PCs     53 User ID and password  Use a robust password and change one periodically     54 User ID sharing Prohibit share user ID and password with several people     55 Cleared screen Clear a display screen by setting screen saver function with password       b56 Anti virus protection Scan a local storage with anti virus software periodically     57 Anti virus protection Use an automatic virus detection function usually     58 Anti virus protection Update a virus definition file periodically     59 Anti virus protection Keep records of scanning and updating virus definitions     60JUPS Connect UPS for all desktop PCs  N           61 Disposal Execute a physical formatting of a storage  or scrap it physically  1  No    63 Security wire Wire all laptop  mobile PCs physically to
26. be followed later     We re Here     Deployment lp   Organization        GISMS 3 0 and more  Acryption           Application Software    Peo    Scope  Extension     Information  Assets        GISMS 1 0 Deployment       Succeeding the GISMS 1 0 implementation at         it is recommended to deploy the said  GISMS 1 0 to all other ministries as part of GCIO  Government Chief Information Officer     Activities         i Benefits   Deliverables   Enhanced IS Capacity    a  Raise     RGC officials awareness of IS  i 1   ISMS      b  Secured client PC   7  Virus    i 16  Legislation  Norm    Key Success Factor    The number is referred to             IS        Start GCIO committee officially and deploy i CD enhancement      i GISMS 1 0 with top down approach     b  Group ministries by three to distribute the deployment efforts  Deployment to ministries    Prioritized Grp  The 2nd Group  The 3rd Group with the same class of IT utilization               is the easiest  Non motivated ministries          Mid Class of     High Class of   Low Class of   should be involved after the success of other ministries  Application to High class  IT Utilization     IT Utilization     IT Utilization   0  ministries will need additional efforts to fit in the more complex assessment and                 0                                  dI DD DIN atl  Process and Timeline i Project Organization  GIS Office at least    with 3 managers and  staffs supports  Min  3 members GCIO for information      secu
27. ch field at column Wand Y  Cd         Use a default value if you do not change the controls and the rule and procedures      the sample IS handbook   Step 6 2  Risk Check sheet automatically display the total evaluation of a risk at column AA     Review the result and check with the criteria listed in Evaluation Table sheet    Revise threat and vulnerability valuation if you feel a total risk value is different from actual   Step 6 3  Make sure it is preferable to get each total risk classified as Low    Decide take additional actions to lessen risks  or describe a residual risk statement to accept        38    SECTION 4  Government Information Security  Management System Risk Check      Drafted by Yusuke Tanaka  JICA Expert    Edited by ICT Security Management Technical Team  iSMTT      39                      Risk Check             2                x   A     Ei                                                                                   ele      5  mim  ja                                                                                                                i  48                         40    Risk hack        Assets   Asset Evaluation       a      2 Lal Description Attributas               Manager in charge    of Agsets i Er IOheck       Uheek                               m      E   EI        El  n                   zr  Ira          n  m  m  td  Pi                     me E     a                                                                                   
28. cord                                     Protection  Disposal                                             Ens   s                                 main usar at minimum te all PGs                                        EN              Antrinis protection        UPS                                                                             Fatch         Mail                                                     49    29                            T   2            lateral hh            MS          o      Fei         j         mesma    I       5 0         Es    ien  LE _ ____ _________      T i gt              Sher PC           asd                                         50    
29. d by NiDA and the sample is highly  recommended to apply as the minimum level as required to secure information     4  Government Information Security Management System  GISMS   GISMS takes the plan  do  check and action  PDCA  cycle as ISO27001 defines   This chapter defines these processes of GISMS   It also defines document control and record control     4 1 Plan  Establish     Plan process consists of 5 sub processes  walkthrough policy and manual  define the  scope of GISMS  assessing risks  develop GIS manual and obtain approvals     4 1 1  Walkthrough GISMS Policy and GISMS Manual  First of all  read GISMS Policy  which declares the objective and policy of    Kingdom of Cambodia GISMS  Walkthrough GISMS Manual  this document    which is applied to all government organizations of Kingdom of Cambodia   and which defines the unified rules to mobilize GISMS     4 1 2  Define the Scope of the ISMS  When a ministry starts developing ISMS  it needs to define the scope for one    cycle of PDCA  It is generally applicable to define the scope by physical  facilities  such as a land boundary building  It is also possible to define the    20    scope by information system network to effectively decide controls and  treatments against threats  It needs careful to scope by organization chart   because it sometimes makes difficult to implement  The initial version of  GISMS focuses only on Client PC as the minimum subset of fully scoped  ISMS developed in the future     4 1 3  Assess
30. e two steps of approvals  one is approved by the top management of    ministry and the other is done by GIS office    Once all steps from section 4 1 1 to 4 1 4 are completed and the risk check  book and GIS rule book which includes CISO and IS manager assignment are  fully documented  those planning process and documents shall be reviewed  and approved by GIS Office first in order to assure the compliance with  GISMS    The very exceptional case allows accepting a risk as a residual risk although it  exceeds the accepted level in the automated risk evaluation in Risk Check  Book  It needs a well organized reasons and decision making to get an  approval of GIS Office    The approval of the top management of ministry is a MUST to implement  fully and effectively at the ministry     4 2  Do  Implement and Operate   The first thing to do when implementing ISMS at a ministry is to establish ISO     Then  CISO assigns some of ISO members to prepare for and conduct an  information security training  The ISMS is a    management    system  therefore  it is  recommended higher ranked people get training first  get familiar with ISMS and  lead their officials to implement ISMS     4 3  Check  Monitor and Review     It needs a long way to go that ISMS is rooted in an organization  Continuous efforts  and improvements are required   In order to grasp the objective status and to discuss any improvements  the    32    4 4     4 5     measurement must be installed which are defined in GIS R
31. experiences        Capacity category and level are defined in Information Security Skill Map Survey of IPA  Mar 2004  33    21    NiDA Information Security Capacity Category and Level                 Capacity category and level  are defined as below   There are 16 categories and 102 sub categories     12  PKI Public Key Infrastructure   Usage  Certificate and Authentication  Certificate Revocation   Trust Model  Contract Model  Key Description and Encoding   Norms  Certificate Repository  Certificate Authorities  Establishment and Operation  Legal Scheme  PKI Elemental  Technology  PKI Service    8  Secured Programming Techniques  Web Application  Database  Application Common   XML Extensible Markup Language      PHP HypertextPreprocessor   JAVA  Perl  VB ASP  C C     UNIX  Compiler VM Virtual Machine   Windows       9  Security Operation  Secured Operation at Normal Time  Abnormal Handling  13  Cryptography  Information Source for Operation Public Key Cryptography  Common Key Cryptography  Hashing    Algorithm  Cryptic Random Number  Key Management  Zero  10  Security Protocol    Knowledge Proof  Other Cryptosystem  Cipher Breaking  Application Layer  Transport Layer  Network Layer  Data Link  Strength Evaluation  Layer    14  Electronic Signature  11  Authentication Usage  Elemental Technology  Mechanism  Benefits    Password Authentication  Biometric Authentication        Authentication Device  Authentication Protocol  Web  Authentication  System Authentication  Single Sig
32. f Disciplinary Action taken in May 2007    TO  All XYZ Company People in Japan    Business ethics are critical for our company   s success because they build trust and transparency  Trust and  transparency  in turn  build the right i i our Suppliers  our stakeholders and  the communities in whic ughout the world   However unfortu ed here and there  within the co          Considering  insufficient working regulations  in Royal Government of Cambodia   GIS Rule Book at the first stage takes  no disciplinary actions                   Dismissal  on                grounds       Improper fraudulen  t claims related to  time report        16    Information Security Management Example   Software Installation Block    To All XYZ Company People in Japan    Microsoft is expect f its Internet Explorer                This control requires client   a technical implementation  and   GIS Rule Book at the first stage only  defines a recommended rule     to get an approval from IS Manager     will be distribu    October 25th        24    Information Security Management Example     USB Memory Usage Prohibition    To All XYZ Company People in Japan    Below are the list o  related glob  Commi        curity violations    and    This control requires  a technical implementation  and  GIS Rule Book at the first stage  defines a rule to put a strap  with a small external device             Business use of USE               rule  However  the  security administrator may permit such use as project pol
33. hall establish Government Chief Information Officer Committee  GCIO  Committee   Government Information Security Office  GIS Office  is set up as a  secretary at GCIO Committee and NiDA takes the role of GIS Office as part of its    35    responsibility  This clause is a draft  GCIO patronage will be settled in GCIO  development project     The top management of each government organization shall assign Chief  Information Security Officer  CISO  and he she establishes Information Security  Office  IS Office      5 3  Capacity Development  Information security capacities are defined as follows and they are enhanced by the  management of GIS Office as a center of excellence   Information Security Capacity Categories   1 Information Security Management System  2 Network Infrastructure Security  3 Application Security  4 05 Security  5 Firewall  6 Intrusion Detection  7 Virus  8 Secured Programming Techniques  9 Security Operation  10 Security Protocol  11 Authentication  12 PKI  Public Key Infrastructure   13 Encryption  14 Electronic Signature  15 Unauthorized Access  16 Legislation  Norms    5 4  Management Review  GCIO is required to review all processes of ISMS of all government organizations  and GIS Office is authorized to request all government organizations to report their  ISMS status     CISO and IS Office at each government organization is required to operate the  equivalent review which fulfills the requirements of GIS Office and of 4 3 Check   Monitor and Review    
34. icy if one of the  following conditions is met  1  If the USB memory has a password  protection 2  If the USB memory has a biometric authentication function   fingerprint authentication  etc   3  If files are always encrypted or  password protected when saved in USB memory     25    17    Information Security Management Example     Web Site Access Block       To All XYZ Company People in Japan    As of December 30  2007  access to specific non business websites from the office LAN was  blocked     IT department has b  investigate re            et access logs to       This control requires S dtes   a technical implementation  and  GIS Rule Book at the first stage only  defines a rule not to access web sites  with inappropriate materials     youtube ce    Company resources               access are for business  use  although limited personal use IS accepi co stiU IN Policy 57  Excessive personal use  is not allowed  Your good sense is expected for the appropriate use of the Company resources   Failure to comply with XYZ Company policies will be reported and disciplinary action may be  taken     26       Action Plan    2     18    Next Step    This project covers only Client PC at NiDA  Call this project as GISMS 1 0   Then  Deployment to other ministries is its repeating actions     Extend the coverage of information assets such as Server   Network  Encryption            Application Software Development and People Matters  Business Continuity Plan is another  set of actions to 
35. k items are drafted by GIS Office  reviewed and authorized by  GCIO Committee  tentative name until officially established   Risk Check  Book blank form contains the default risk evaluation values and controls to  be taken  They are assessed and updated by ministry  Put the name of  ministry on the document after assessed     33    4 5 2     GISMS Document Architecture    Top two documents will be proposed as the common documents among all government  organizations in Cambodia  The preliminary ones are drafted at this project and  extended in the future                As of 5 NOV  Unified    Policy  and  Manual  EUN  y    Organization      Defined  by  Organization   Sample  Delivered     11    4  GIS Rule Book  This is defined by ministry  A sample GIS Rule Book  which is defined  based on the default risk evaluation values of Risk Check Book blank form   is drafted by GIS Office  It has to be authorized by the top of ministry  Put  the name of ministry on the document     Other supplementary documents are defined and utilized by ministry     Document Revision  Distribution  Access and Keeping   Revision   GISMS Policy shall be declared by the top of Royal Government of Cambodia   Hence  its revision procedure is defined by the other rules specified in RGC    This needs to be specifically determined in a decree system in the future      GISMS Manual and Risk Check Book are revised yearly by GIS Office on the  basis of comments  requests from ministries implementing ISMS  The
36. le PC      p e ht f ettet feed 69  6 5 3  Storage Devices  Portable Hard Disk   Memory Stick                                    71     Memory            Floppy DISK                       ua      ia          71        Personal PRO                       ay una uu                                     71   652202 SOLOW ARS sia ba                          E            ua qa           71                     c               73  Bos WV COUT OW      D uyu punta             75   6 6  Network and Server Security  To be fully defined in a future                                  76  OOl         and                                                                               uyasapa qis 76  06 2  Server                                              M 76   6 7  Application Software Security       be defined in a              77   Je  Iintopmation Seouritysr             uyu uuu ukana paskana      77  7 1  Information Security Training Execution                                                                 77  7 25 Promissory Letter SUDIISSIOIa x  otro u u usa a aS 77   oe Measure                                               77  9  Breach  To be defined in a future                               ayauya wiku 78  10  Records    c 78  SECTION 6  The Statement of Promise For Government Information Security                60    Note        rights are reserved to National Information Communications Technology  Development Authority  NiDA   The material in this publication is copyrighted  Copying  
37. n  Security Organization  Rule and Procedures  Information Security Training   and Measurement for Check and Action  A sample GIS Rule Book for a    31    ministry is obliged to use  which is issued by GIS office whose role will be  described in Chapter 5 Management Responsibility  The following three steps  explain the tips to develop GIS Rule Book     4 1 5  Define the Scope of the ISMS in GIS Rule Book  The scope of ISMS defined at Section 4 1 2 is documented in GIS Rule Book    where it is recommended to clarify the information assets and their related  physical locations  organizations  officials as their example can be shown in a  sample rule book     4 1 5 1 Identify the non applicable rule  procedure in a sample rule book  The rules and procedures depend on the information assets and their    confidentiality in scope of each ministry  They do not need to be defined  unless the targeted information assets exist in the scope     4 1 5 2 Modify rules and procedures in a sample rule book   They need to define more secured if the information dealt in a ministry is    more confidential according to the results of a risk assessment  They need  to add to be defined if a sample rule book does not contain the in scoped  information assets  In the latter case  it 15 recommended to discuss with  GIS Office before starting to define rules and procedures  in order to  decide who defines the standard of newly in scoped information assets of  RGC     4 1 6  Obtain approvals  There ar
38. n on    15  Unauthorized Access  Remote Unauthorized Access  Denial of Service  Tapping   Surveiling  Information Collection  Classical Unauthorized Access    16  Legislation  Norms  Standard and Guideline  Law and Act  International Standard   International Guideline       Capacity category and level are defined in Information Security Skill Map Survey of IPA  Mar 2004  34          Key Take Away       Five points we should know in GISMS     1       documents include GISMS Policy  GISMS Manual  Risk Check Book  and GIS  Rule Book     a  GISMS Policy declares the top management commitment of implementing GISMS   b  GISMS Manual defines the unified approach of GISMS for all ministries concerned   c  Risk Check Book enables all ministries to assess their risks in the same criteria   d  GIS Rule Book implements GISMS at each ministry    2  Top management commitment  Top management commitment is indispensable to root ISMS in each ministry    3  All officials involvement  All officials are strongly expected to set their mindset to keep information security rules  and procedures  and do information security related work in their daily operation    4  Technology utilization  Technology optimizes the information security risk mitigation and partly lessens  officials hand work efforts  This will be challenged in the next cycle of ISMS    5  Continuous improvement    All managers and above are obliged to supervise the implementation of ISMS at their  department group completely with con
39. nagement System 5  Firewall  Management Techniques  Risk Analysis Techniques  Information Firewall Installation and Operation  NAT Network Address  Security Policy  Information Security Audit  Relevant Knowledge Translation   Network Access Control    2  Network Infrastructure Security 6  Intrusion Detection  Network Design Techniques  Network Access Protocol  Intrusion Detection System Installation and Operation  Intrusion  VPN Virtual Private Network   Wireless LAN Detection System Function  Detection Algorithm  Detection    Subject  Intrusion Detection System       3  Application Securit    Threats against Web Server  Security Measures of Web Server  7  Virus  Communication Route  Policy after Infection  Policy for  Prevention  Virus Attack  Detection and Cleansing  Infection     Virus Types    Operation of Web Server  Web Application Design  Web Browser  Security  Basic Knowledge of Web Related Protocol       4  OS Securit  Log Control  Patch Application Control  Service Control  File  System Control  Account Control    Level Description   Level 0  No knowledge  no experience    Level 1  Understanding a basic knowledge  being able to acquire detailed technical contents through experience   Level 2  Putting an acquired knowledge into practice under supervision  being able to explain a detailed technical    content referring to an experience             3  Putting knowledge into practice autonomously  being able to use and advise technical know hows referring    to various 
40. ndispensable and mandatory  business       PDCA  Plan Do Check Action  cycles can gradually enhance information security step by step       Government unified ISMS can keep the better level of information security  by researching private  and public sectors in Cambodia and by considering the global trends  with the minimum power        Royal Government of  Cambodia     Assuring confidentiality  Maintaining integrity               Risk Evidence    RGC is being increasingly exposed to the cyber attacks of outsiders as it utilizes IT and internet  more as identified the notably high ratio of virus infection reaching 35      6    Risks and Measures Example       There exist present and clear dangers of information security and it needs to react proactively     Measure Risk   lt 15 Three Elements    lt Protection gt    Vulnerability    Threats              Information Leakage  estroying Media isposing EE   Room Entry Exit Control Normal FD CDs Sigo ss E CIS    Confidentiality Software Patch File sharing Software Usage    Anti Virus Software Security Hole              Entry Simple Password Passaic Oe    Access Control  Access Logging  Integrity Encryption  Digital Signature  Fingerprint  Firewall DMZ            Hacking  of Server Unauthorized Acce  Plain Text   Communication           Information  Security       Sniffing       Service Disabled  Laptop PC   Left in a car Theft  Denial of    Wiring Laptop PC  Availability    5  ut o    Data Backup   amp  Recovery Procedure           
41. ning will be available for all government officials     All actual or suspected information security breaches will be reported to the  Information Security Manager and will be thoroughly investigated     Procedures exist and support the policy  including virus control treatments  and  passwords     Administrative requirements for availability of information and systems will be met     The Information Security Manager is responsible for maintaining the policy and  providing support and advice during its implementation          managers are directly responsible for implementing the policy and ensuring staff  compliance in their respective departments     Compliance with the Information Security Policy is mandatory          Title  Secretary General     Date Liter 20    08    26    SECTION 3  Government Information Security  Management System Manual      Drafted by Yusuke Tanaka  JICA Expert    Edited by ICT Security Management Technical Team  iSMTT      27    1  Introduction  The Government Information Security Management System Manual  GISMS Manual   is defined that Royal Government of Cambodia establishes  implements  checks and  takes actions as a body of Government Information Security Management System     under the Government Information Security Management System Policy  GISMS  Policy  declared by its Prime Minister  the chief of the government     2  Scope  GISMS Manual covers all thirty one government organizations stated as follows     The Office of the Council of Mini
42. r  maintaining the  current scope of  ISMS      One official is in  charge of virus  infection handling  and he she has to  develop the tech  skills     Survey Cambodian    It may apply any technical controls    Pan such as an automatic virus detection    file update from server thru network     x  have additional trainings   including emergency drills      Monitoring and     Auditing i   A Solve an illegal         software problem     GISMS 2 0 Extension             IS Office  Coordinator        by division group    IS Manager IS Manager       IS In charge IS In charge       30       The next PDCA cycle as GISMS 2 0 is recommended to target on Server and Network     Server and Network  i  Benefits   Deliverables      a  System administrater manual  i b  Secured Server        Technical controlls planned for secured server      Key Success Factor  i a  Successful PAIS go live is a pre requisite   b  Divide an operational control and a technical    Information  Classification  i  i 2   Network Infrastructure Security  3  Application Security  4  OS Security  5  Firewall  6  Intrusion Detection    9  Security Operation           ERE RITU  OS i     control in the early stage in planning  10  Security Protocol  i Implement the operational control to obtain    benefits quickly  i           number is referred to    NiDA IS  i c  Skillful resource allocation i CD enhancement     Process and Timeline     Two groups are in                                 maintaining server  and network
43. rds      Administrative requirements for availability  of information and systems will be met      The Information Security Manager is responsible for maintaining      the policy and providing support and advice during its implementa Signature    Z    A All managers are directly responsible for implementing the policy          Secretary Geaeral   and ensuring staff compliance in their respective departments      Compliance with the Information Security Policy is mandatory       The Information Security Manager is responsible for maintaining the policy         providing support and advice during its implementation       All managers are directly responsible for implementing the policy and ensuring staff    compliance in their respective departments       Compliance with the Information Security Policy is mandatory         Date    Signature   Title  Secretary General     Date       GISMS Manual Contents       Government Information Security Management System  GISMS  Manual is defined  only one among all ministries of Royal Government of Cambodia  The initial version of  GISMS manual is focused on Plan  Establish  ISMS   pink shaded part     Introduction    N        Gover   Plan  Establish    Walkthrough ISMS Policy and ISMS Manual  Define the Scope and Boundaries of the ISMS    Assess Risks   Define an Information Security Rule Book   Define the Scope of the ISMS of IS Rule Book   Identify the non applicable rule  procedure in a sample rule book  Modify rules and procedures in 
44. re four  types  mitigating risks  transferring risks  avoiding risks and  Knowingly and objectively    accepting risks     Generally  they needs to implement rules and procedures to mitigate risks  Therefore  it  leads to develop Government Information Security Rule Book   See the next section      After deciding controls and making treatments to risk items  e g  define rules and  procedures in GIS Rule Book   evaluate risks again and make sure all check items get    evaluated as    Low     Risk Evaluation after Control  Control Contents References      Threat     Vulnarability  Total Risk              22 72 2222 2211  mplement Rule and Procedures    mplement Rule and Procedures    mplement Rule and Procedures      60J Implement Rules     61fImplement Rules      1 1 1   GISRuleBook                14          14 4      G66 Implement Rules               GIS Rule Book            17                               c  jN                                                oj    N      68Nmplement Rules        13    Government Information Security  GIS  Rule Book Contents       GIS Rule Book is defined by ministry  The following introduces NiDA GIS Rule Book  It is  the specific rule which needs to be done internally and it will be added in the future to get  more secured environment  It can be copied and modified for each ministry GIS Rule Book   The initial version of Information Security Rule Book is focused on client PC security   pink  shaded part        Introduction 9  Client PC Sec
45. rity matters   GIS Office       NiDA officials are    Secratory at mainly appointed to                   2           group of Committee        uc 0     Establish  GCIOs of minitsrieg         Committee i   lect the 15 depl                   x GCIO comitee GIS Office       GIS Office delivers   Implemenjiig i         consulting and audit  Monitoring and   Ministry A Ministry B services to ministries  Auditing   GCIO GCIO        Ministry                CISO                              JICA Expert Support     Plan  to develop ISMS     CISO       29    19    GISMS 1 0 Continuous Improvement       GISMS 1 0 at NiDA needs to be continuously improved as described formerly   Client PC    Information  Classification          Peope      jJ   na  Physical Information     J      a  Root GISMS 1 0 in           b  Let NiDA to be a front runner of ISMS in RGG    and lead ISMS deployment   i c  NiDA officials in charge of GIS Office can get  i more familiar with GISMS and more    comfortable to deploy to other ministries        Top management commitment  esp         solving an illegal software problem    b  An additional external party survey to optimize      Enhanced IS Capacity    1   Information Security  Management System  7  Virus  9  Security Operation              number is referred to           IS       aay       Network      7          thesecuritylevel      enhancement              Process and Timeline i Project Organization  Two IS Office  i Lead officials need to be    assigned fo
46. s at  NiDA and they are                                         Allocate budget and                        to tech control  a                  Eam mer ge ee      Implement URS  tech control  2    1                         JICA Expert Support   Not yet confirmed     20       IS Office  Coordinator    assigned to enhance  server and network  security             network  connected to PAIS  has the priority due  to its affects     31    NiDA Information Security Capacity Development Enhancement    NiDA is to enhance information security capacity according to the defined actions                                  4E  gr   S Develop  Develop    I   imtormation Securty Management System   Level   H               Application Securty   reao              Level   Level Levelt          ie                                        teen   Levelt           Level  s  inwsion Deteston       teri   teen   Levels                       tel             O         8  Secured Programming Tecniques       Levi   ever   Levero   Levelo   Levero                         ttt  tet  tot                    19                                 Leo   Level                ien eet  eet                      recu oe       sese en tna  teen sar te   ini        ene are defined in Information Security Skill Map Survey of IPA  Mar 2004     NiDA Information Security Capacity Category and Level    Capacity category and level    are defined as below   There are 16 categories and 102 sub categories       Information Security Ma
47. siest way of doing this is simply to log on to the LAN for the  automatic update process to run  If you cannot log on for some reason  contact  Information Security Office for advice on obtaining and installing anti virus updates      a6  Always virus scan any files downloaded to your computer from any source   FD CD DVD  USB hard disks and memory sticks  network files  e mail attachments or  files from the Internet   Virus scans must be set to happen automatically  It is also  required to initiate scheduled scans at least weekly      a7  Report any information security events  such as virus infections  promptly to Information  Security Office in order to minimize the damage      a8  Respond immediately to any virus warning message on your computer  or if you  suspect a virus  e g  by unusual file activity  by contacting Information Security Office   Do not forward any files or upload data onto the network if you suspect your PC might  be infected  19    14       Procedure       This page is cited from Government Information Security Rule Book     Virus Detection Handling    b2 1  Detect an information security event such as   Official n a  virus detection    2 2  Physically off line from a network Official n a  immediately     b2 3  Inform ISO immediately when the event Official Information Security Event  happens  Report  b2 4  Analyze the effects of an event and take an ISO n a  appropriate action  b2 5  Terminate any network application services if 150 n a  necessary   b2
48. step and spiral evolution       PDCA    Established    72                          ul    GISMS Development Scope    The scope is carefully focused to realize PDCA cycle under the severe time constraint   The Client PC is selected due to its vulnerability and the ability to raise all officials  awareness through practical activities    NiDA Client PC    exmation  Classification     Server        718     Development               L                          h  N dl    Organization Information Assets 1       GISMS Development Project Schedule    It is scheduled to quickly realize PDCA cycle of ISMS        is set up a workshop with other ministries to share the ISMS development experience  and  to raise the awareness necessity of ISMS     14Sep  21 T    7   wo  dud owe         1   58          Emm   Establish the ISM       Info Training    GISMS Development Do  at NiDA        ia TE    Te      Discussion to Apply   Request    to Other Ministries   Attendance  Cam    Draft Roadmap  ern Xd      Finalization CD Plan Finalize the pl       Government  Information Security Management System   GISMS     GISMS  Government Information Security Management System  in Brief       Objective Benefit    To continuously  secure information of    To help ensure  the governance continuity of Bisle of  Royal Government of Insufficient  Cambodia  IS Management    ee  Lea  Characteristic    e GISMS is based      15027001  the global standard       Top Down approach gets GISMS the most effective as the i
49. sters     Ministry of Agriculture Forestry and Fisheries     Ministry of Commerce     Ministry of Culture and Fine Arts     Ministry of Economy and Finance     Ministry of Education Youth and Sports     Ministry of Environment     Ministry of Foreign Affairs and International Cooperation     Ministry of Health   10 Ministry of Industry Mines and Energy     Il  Ministry of Information   12 Ministry of Interior   13 Ministry of Justice   14 Ministry of Labor and Vocational Training   15 Ministry of Land Management  Urban Planning  amp  Construction   16 Ministry of National Defense   1 7 Ministry of Parliamentary Affairs and Inspection   18 Ministry of Planning   19 Ministry of Post and Telecommunication   20 Ministry of Public Works and Transport   2  Ministry of Religions and Cults   22 Ministry of Rural Development   23 Ministry of Social Affairs Veteran and Youth Rehabilitation   24 Ministry of Tourism   25 Ministry of Water Resources and Meteorology   26 Ministry of Women Affairs   27 Municipality of Phnom Penh   28 Secretariat of Public Service   29 Secretariat of Civil Aviation   30 National Information Communications Technology Development Authority   NiDA  and  3  Permanent Mission of the Kingdom of Cambodia to the United Nations              1                   3  Normative References  Terms and Definition  3 1 Normative References    The following referred documents are indispensable for the application of this  document    ISO ISE 27001  2005 Information technology 
50. t     hack tam             ical  Check Type        Ham  Ohack reauits  Comments      Check Results  Ee      ee er          2            a EXT         User definition              those who        anter the                      QNes NA    0 0 0 0 0 0 0 yY     Key system                 appropriate key system for      entrance of the facility  roam                                                      Dispose pointed materigis fared materials with care     Keep record of faxing  sanding   racaning                                    information eathin each paper  document     Save confidential paper documents in safe against unauthodred                         Use    paper shredder whan disposing confide ntials                       285              PG  hardware and saftwara  28   280                                                                 protection             Anti virua protection                                             io                                          1 iad  ex  fer           a   Eu              Po                                       Install soflware raplicithy allowed by IS manager           Configure softwara according tp  5 managers instruction   Apply patches according to IS manages  reque                   LL                              47    Risk                                                   Evaluation Check item m  EE Description  Attributes  Location  Manager in charge     of Arteta  Ganfidentiallintagrty  Availability   Total            
51. thorized people mm      59            t CE eR                   6       ttow      T      impact on business continuity by falsification      62 2   3  Middle  3    Operational cost impact by falsification         631 Ifs          15           impact by falsification        lt  j PF         _ 65     ES     Class  Evalustien           S           Lew  tT Out of service allowed over twenty four hours JF             Midde              of service allowed up to twentyfourhous              5 Hish     J          of service allowed up tofourhours         11    Risk Check Book     Step2  Evaluate Assets       Then  the spreadsheet automatically display the total evaluation of an asset according to  the total points of 3 elements  Review and revise confidentiality  integrity and availability  evaluation if you feel a total asset value is different from actual        Assets                1 Asset Evaluation     M    8      L1 L2  L3 Description  Attributes  Location  Manager in charge    of Assets     ConfidentiallIntegrity                       Total        Basic Check Liste  L  2NIDA CISO           50    Client PC  hardware and software     51      52       53            s4  12  Class    Evaluation  Points  Description    55   Assets to impact moderately on an operation    56    Assets to impact enormously           operation    57   As3  3 High 3 13115  Assets to impact enormously      an governing 00     58      ee    ie    62       Laptop  mobile PC  All desktop PC check items must 
52. tinuous improvement   35    22    Appendix    36    Image of Vulnerable Servers Spreading Out Viruses    Assume vulnerable DNS server hacked by unauthorized users from internet     a    13  LAN user gets  financial damage                                                                                      12  They buy  goods paying by  fraud credit card  information       11  The  1  DNS Server E information is sold  has security        to other parties   holes   i                  10  Malware sends  2  DNS Server   the information to  hacked by            Site   3  DNS cache 9  Malware sends  table falsified     the information to  their sites   7  Malware   4  LAN user 5  DNS 6  Malicious successfully 8  Malware search  access to designates site sends hiding unless cookies with credit  Internet wrong IP malware in anti virus card id password    address HTML  software    DNS Spoofing  detects  Or    23    GISMS 3 0 Extension    XXX  PKI Features         Information  Classification   1  Information Security          XXX system            _      b User manual          i i 7  Virus       es security                   Key Success Factor    i    The number is referred to           IS  i CD enhancement         Process and Timeline  i Project Organization    Lead     Timeline described on full time basis  XXX             XXX    Staff A       Staff B C         XXX    38    GISMS X X Extension    XXX    People Matters  i Benefits   Deliverables i Enhanced IS Capacity    Information  
53. uired    Control and Treatment by Information Asset   Most of controls and treatments is a type of mitigating risks  Major controls and  treatments are seen in Risk Check Book and a sample GIS Rule Book  respectively   New controls and treatments are preferably in placement by ministry  and they must  be clearly reported at the time of GIS Office approval     37    Appendix 1 Risk Check Instruction  Risk Check Book Instruction    Risk Check Book is used in a plan phase of ISMS  Follow the instruction below step by step                         2 7 7 757      72 ee    Step 1 1  Walkthrough the assets listed at column C in Risk Check sheet  It defines six types of asset   Information  People  Facility  Paper  Client hardware and software  and Network and server        Information and People assets are supposed to be defined at ministry level in accordance with the usual governance     NR Facility  Paper  Client hardware and software  Network and server assets are supposed to be defined by department   for each to check by itself    You can copy  amp  paste an asset by row in order to check by department  However    an asset has multiple check items to identify risks  Be careful to copy a group of rows to include all items     Evaluate assets     Step 2 1  Evaluate confidentiality  integrity and availability to apply the criteria described in Evaluation Table sheet          You can select one from a pull down menu in each field at column        and I        Use a default value if
54. ule Book    An internal audit to survey on the effectiveness of implemented ISMS is also  requested to find issues to achieve the level of risks in the planning process and or to  review the accepted level of risks  The results of risk evaluation must be updated in  Risk Check Book   The frequency of Check and Action must be defined in GIS Rule Book  however  it    has to be at least once a year or more     Action  Maintain and Improve     The results of the measurement and the internal audit lead to decide actions to  improve the effectiveness of ISMS and optimize the accepted level of risks  Those  actions are not only enhancements of rule and procedure but also treatments to  install new software hardware to protect a network system  The actions may contain  to abolish some rule and procedure to match with the change of a ministry role and  business operation     Document Control  This section defines GISMS document structure  authorization  revision  distribution   access and keeping     4 5 1  Document Structure and Authorization   GISMS has four major documents    1  GISMS Policy   2  GISMS Manual  These are drafted by GIS Office  reviewed by GCIO Committee  tentative  name until officially established  and authorized by GCIO Chairman   tentative name until officially established   GISMS Policy shall be declared  by the top of Royal Government of Cambodia  The initial version 1 0 is  tentatively defined by NiDA with an assistance of JICA     3  Risk Check Book  The chec
55. urity  Three Basic Rules to Secure Information 5 1  Desktop PC  Scope 5 2  Laptop Mobile PC    Normative References  Terms and Definition 5 3  Storage Devices  Portable Hard Disk    4 1  Normative References Memory Stick   Memory Card    4 2  Terms and Definition Floppy Disk     Information Security Organization 5 4  Personal Properties  5 1  Information Security Organization Definition 9 9  Software  5 2  ISO Member List  5 6  E mail  5 3  Communication Route at Emergency 9 7  Web Browsing     Rule and Procedures         6 1  Information Classification  To be fully defined in a future   6 2  People Security  To be defined in a future  6 6 1  LAN and Internet  6 3  Facility Security 6 6 2  Server Common  6 3 1  Office Building and Room 6 7  Application Software Security  6 3 2  Cabinet and Desk  To be defined in a future   6 3 3  Fax Machine and Printer 7  Information Security Training  6 4  Physical Information Security 7 1  Information Security Training Execution  6 4 1  Paper 7 2  Promissory Letter Submission  6 4 2  Digital Archives  DVD CD FD Tape  8  Measurement  9  Breach  To be defined in a future   10  Records List 18    Client PC Security Rule     Desktop            This page is cited from Government Information Security Rule Book     Desktop PC  Virus Protection     a5  Viruses are a major threat to NiDA and client PCs are particularly vulnerable if their  anti virus software is not kept up to date  The virus definition file MUST be updated at  least weekly  The ea
    
Download Pdf Manuals
 
 
    
Related Search
 Contents  contentstrack  contentstack  contentsquare  contents track login  contents meaning  contents synonym  contents insurance  contents page  contents and devices  contents tracker  contents collaboration  contents insurance uk  contents of big beautiful bill  contents of a box labeled smtwtfs  contents insurance for shared renters  contents home insurance  content scale  contentsquare login  content ai  contentshake  contents cover  contents page powerpoint  contents page ideas  contents of a report 
    
Related Contents
Remeha Avanta Plus Gas 360 Technical Instruction  1 USER MANUAL S16 - Mobility Scooters Direct  descargar manual - Ricardo David Maquinarias  N° 322 - Paroisse de Quéven  Manual do: FinePex  Publicité Arts 2013  SP60 GNSS-Empfänger Benutzerhandbuch, rev  Bedienungsanleitung - CS  VAD 5310 and VAD 5350  istruzioni di montaggio / messa a punto    Copyright © All rights reserved. 
   Failed to retrieve file