System and Services Acquisition Policy
Purpose
To ensure that Information Technology (IT) resources and information systems are acquired with security requirements to meet the information systems mission and business objectives.
Reference:
National Institute of Standards and Technology (NIST) Special Publications (SP): NIST SP 800-53a
- System and Services Acquisition (SA), NIST SP 800-12, NIST SP 800-23, NIST SP 800-35, NIST SP 800-36, NIST SP 800-37, NIST SP 800-64, NIST SP 800-65, NIST SP 800-70, NIST SP 800-100, NIST SP 800-128, NIST SP 800-137;
Policy
This policy is applicable to all departments and users of IT resources and assets.
ALLOCATION OF RESOURCES
IT Department, in direct guidance and association with the information system owner shall:
- Determine information security requirements for the information system or information system service in mission/business process planning.
- Determine, document, and allocate the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- Establish a discrete line item for information security in organizational programming and budgeting documentation.
SYSTEM DEVELOPMENT LIFE CYCLE
IT Department, in direct guidance and association with the information system owner shall develop a contingency plan for the information system that:
- Manages the information system using the system development life cycle to ensure incorporation information security considerations.
- Defines and documents information security roles and responsibilities throughout the system development life cycle.
- Identifies individuals having information security roles and responsibilities.
- Integrates the information security risk management process into system development life cycle activities.
ACQUISITION PROCESS
IT shall ensure the acquisition process includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal, state, and local laws, Executive Orders, directives, policies, regulations, standards, guidelines, and mission and business needs:
- Security functional requirements.
- Security strength requirements.
- Security assurance requirements.
- Security-related documentation requirements.
- Requirements for protecting security-related documentation.
- Description of the information system development environment and environment in which the system is intended to operate.
- Acceptance criteria.
SECURITY CONTROLS
Information Technology (IT) shall require the information system, system component, or information system service:
- Describe the functional properties of the security controls to be employed; security-relevant external system interfaces; high-level design, low-level design, source code or hardware schematics that meet the business requirements.
- Identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
- Employ only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within information systems.
INFORMATION SYSTEM DOCUMENTATION
IT Department shall:
- Obtain administrator documentation for the information system, system
component, or information system service that describes:
- Secure configuration, installation, and operation of the system, component, or service.
- Effective use and maintenance of security functions/mechanisms.
- Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions.
- Obtain user documentation for the information system, system
component, or information system service that describes:
- User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms.
- Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner.
- User responsibilities in maintaining the security of the system, component, or service.
- Document attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and [entity defined actions] in response.
- Protect documentation as required, in accordance with the risk management strategy.
- Distribute documentation to only authorized persons or entities.
- Obtain administrator documentation for the information system, system
component, or information system service that describes:
SECURITY ENGINEERING PRINCIPLES
IT Department shall:
- Apply industry standard information system security engineering principles in the specification, design, development, implementation, and modification of the information system.
EXTERNAL INFORMATION SYSTEM SERVICES
IT Department shall:
- Require that providers of external information system services comply with organizational information security requirements and employ security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- Define and document government oversight and user roles and responsibilities with regard to external information system services.
- Employ processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis.
- Require providers of external information system services to identify the functions, ports, protocols, and other services required for the use of such services.
DEVELOPER CONFIGURATION MANAGEMENT
IT Department shall ensure developers of the information system, system component, or information system service:
- Perform configuration management during system, component, or service design; development, implementation, and/or operation.
- Document, manage, and control the integrity of changes to configuration items under configuration management.
- Implement only organization-approved changes to the system, component, or service.
- Document approved changes to the system, component, or service and the potential security impacts of such changes.
- Track security flaws and flaw resolution within the system, component, or service and report findings to authorized personnel and/or business units.
DEVELOPER CONFIGURATION MANAGEMENT
IT Department shall:
- Require the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.
- Provide an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
- Require the developer of the information system, system component, or information system service to enable integrity verification of hardware components.
- Require the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions and software/firmware source and object code with previous versions.
- Require the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.
- Require the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.
DEVELOPER SECURITY TESTING AND EVALUATION
IT Department shall require the developer of the information system, system component, or information system service to:
- Create and implement a security assessment plan.
- Perform unit; integration; system; regression testing/evaluation.
- Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation.
- Implement a verifiable flaw remediation process.
- Correct flaws identified during security testing/evaluation.
- Employ static code analysis tools to identify common flaws and document the results of the analysis.
- Perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.
INDEPENDENT VERIFICATION OF ASSESSMENT PLANS / EVIDENCE
IT Department shall:
- Require an independent agent satisfying to verify the correct implementation of the developer security assessment plan and the evidence produced during security testing/evaluation.
- Ensure that the independent agent either is provided with sufficient information to complete the verification process or has been granted the authority to obtain such information.
- Perform a manual code review of defined processes, procedures, and/or techniques.
- Perform penetration testing.
- Verify that the scope of security testing/evaluation provides complete coverage of required security controls.
- Employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
Compliance
Employees who violate this policy may be subject to appropriate disciplinary action up to and including discharge as well as both civil and criminal penalties. Non-employees, including, without limitation, contractors, may be subject to termination of contractual agreements, denial of access to IT resources, and other actions as well as both civil and criminal penalties.
POLICY EXCEPTIONS
Requests for exceptions to this policy shall be reviewed by the Chief Information Security Officer (CISO) and the Chief Information Officer (CIO). Departments requesting exceptions shall provide such requests to the CIO. The request should specifically state the scope of the exception along with justification for granting the exception, the potential impact or risk attendant upon granting the exception, risk mitigation measures to be undertaken by the IT Department, initiatives, actions and a time-frame for achieving the minimum compliance level with the policies set forth herein. The CIO shall review such requests; confer with the requesting department.