Campus-wide Information Security Activites
Download
Report
Transcript Campus-wide Information Security Activites
Campus-wide Information Security
Activities
Teresa Macklin
Information Security Officer
27 May, 2009
Red Flag Rules
What are the “Red Flag Rules”? (Identity theft
prevention program required by federal law)
What does it mean to us? (Applies to us where our
operations allow persons to use a credit or deposit account
where payments are made periodically.)
What is a “Red Flag”? (A red flag is a pattern or activity
that might indicate identity theft.)
CSU Response
CSU-wide program development guidelines ready to
go before Board of Trustees
Guidelines include sufficient information to develop a
qualified program
Campuses required to develop a program and
report on compliance
Campus Red Flag Program Goals
Identify Covered Accounts
Identify Relevant Red Flags
Review/develop mechanisms to Detect Red Flags
Review/develop mechanisms to Respond to Identity
Theft
Integrate Red Flags Rule into Current Compliance
Program Activities
Ensure Contract Compliance
Provide Employee Training
Provide Oversight and Review of the Program
PCI Compliance
Payment Card Industry Data Security Standard (PCI DSS)
imposed by industry on all organizations that accept
payment cards
PCI DSS is multi-faceted security standard that includes
requirements for
security management,
policies,
procedures,
network architecture,
software design and
other critical data protection measures.
CSU Response
Each campus must
complete a PCI DSS assessment
Implement or maintain a compliant security program
CSU PCI Compliance Guidelines:
Implement working committee
Determine merchant and assessment activities
Develop payment card authorization policy
Develop campus security program
Annual assessment activity
PCI Committee Objectives
The committee must
Obtain the support of senior management!
Include representation from Information Technology, Information
Security, Internal Audit, Business and Finance, and auxiliary
organizations.
Establish a comprehensive inventory of information related to its
use of payment cards.
Determine which of the standards apply (depends on volume of
payment card activity across campus)
Develop campus policy to review and approve new payment card
activities
Ensure that the campus information security policy and incident
response plan meets the PCS DSS standard
Conduct assessments and reviews and/or managed independent
third party verification activities
PCI DSS Standard Overview
Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect cardholder data
Protect Cardholder Data
Protect stored cardholder data
Encrypt transmission of cardholder data and sensitive information across open public
networks
Maintain a Vulnerability Management Program
Use and regularly update anti-virus software
Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Restrict access to data by business need-to-know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Track and monitor access to network resources and cardholder data
Regularly test security systems and processes
Maintain an Information Security Policy
Maintain a policy that addresses information security
Data Classification Activity
In order to comply with the CSU-wide Information
Security Policy and Standards, the campus is required
to maintain an inventory of information assets which
contain critical or protected data.
Contact each campus organization and gather
information about “protected” data and the methods
by which it is stored. Use responses to create an
inventory database.
Survey released this week.
Protected Level 1 – Confidential Data
Confidential Information is information maintained by the
University that is exempt from disclosure under the provisions
of the California Public Records Act or other applicable state or
federal laws.
Passwords or credentials that grant access to level 1 and level 2
data
PINs (Personal Identification Numbers)
Confidential information is information whose unauthorized
use, access, disclosure, acquisition, modification, loss, or
deletion could result is severe damage to the CSU, its students,
employees, or customers. Financial loss, damage to the CSU’s
reputation, and legal action could occur.
Birth date combined with last four digits of SSN and name
Credit card numbers with cardholder name
Tax ID with name
Driver’s license number, state identification card, and other
forms of national or international identification (such as
passports, visas, etc.) in combination with name
Social Security number and name
Health insurance information
Medical records related to an individual
Psychological Counseling records related to an individual
Bank account or debt card information in combination with
any required security code, access code, or password that
would permit access to an individual's financial account
Biometric information
Electronic or digitized signatures
Private key (digital certificate)
Attorney/client communications
Legal investigations conducted by the University
Third party proprietary information per contractual agreement
Sealed bids
Level 1 information is intended solely for use within the CSU
and limited to those with a “business need-to know.”
Statutes, regulations, other legal obligations or mandates
protect much of this information.
Disclosure of Level 1 information to persons outside of the
University is governed by specific standards and controls
designed to protect the information.
Protected Level 2 – Internal Use Data (Partial List)
Internal use information is information
which must be protected due to proprietary,
ethical, or privacy considerations.
Although not specifically protected by
statute, regulations, or other legal
obligations or mandates, unauthorized use,
access, disclosure, acquisition, modification,
loss, or deletion of information at this level
could cause financial loss, damage to the
CSU’s reputation, violate an individual’s
privacy rights, or make legal action
necessary
Non-directory educational information may
not be released except under certain
prescribed conditions.
Identity Validation Keys (name with)
Student Information-Educational Records
(Excludes directory information) including:
Grades
Courses taken
Schedule
…
Employee Information
Birth date (full: mm-dd-yy)
Birth date (partial: mm-dd only)
Employee net salary
Employment history
Home address
Personal telephone numbers
Personal email
…
Other
Library circulation information.
Trade secrets or intellectual property such
as research activities
…