This standard outlines the operational requirements necessary to maintain the security posture of infrastructure and associated applications deployed in production environments up to and including decommissioning and disposal.

Date of Effectiveness

To Be Determined

Standard Owner

Director, Information Security, Information Technology Services

Version

Version 0.5

Summary showing Section Headings

ID Section Headings Brief Description
OPS-GN General
OPS-SN Security Hardening
OPS-PM Vendor Security Patch Management
OPS-AV Antivirus Software
OPS-SM Security Monitoring and Intrusion Detection
OPS-VA Vulnerability Assessment
OPS-PT Penetration Testing
OPS-IM  Security Incident Management
OPS-NO Network Operations
OPS-FW Firewalls (OPS)
OPS-DR System Backups, Restorations, and Disaster Recovery
OPS-DD Decommissioning and Disposal of Hardware and Media

Operational Security Standard Controls

Control ID Control Existing Status Public Confidential Restricted Effort
OPS-GN General Existing Status Public Confidential Restricted Effort
OPS-GN-01 Operational activities, processes, and changes to infrastructure and applications must not circumvent or degrade any security controls implemented in accordance with published security hardening requirements. Temporary disablement of security controls necessary to facilitate a change must be identified and approved through the Enterprise Change Management process. TRUE Approved Recommended Required Required TBD
OPS-GN-02 Security based operational processes, security hardening requirements, and other documentation defined in this standard must be followed and must be reviewed annually or as identified by process owners. TRUE Approved Recommended Required Required TBD
OPS-GN-03 Following the implementation of any changes to the network infrastructure all related configuration copies and documentation (including processes and disaster recovery documents) must be updated and stored in more than one secure facility. TRUE Approved Recommended Required Required TBD
OPS-SH Security Hardening Existing Status Public Confidential Restricted Effort
OPS-SH-01 As part of an annual review, a formal process must be followed to ensure that risk associated with individual platforms is regularly assessed and any updates required to published security hardening requirements are identified and documented. FALSE Proposed Required Required Required TBD
OPS-SH-02 All security hardening requirements must be approved by ISEA. TRUE Approved Required Required Required TBD
OPS-PM Vendor Security Patch Management Existing Status Public Confidential Restricted Effort
OPS-PM-01 To ensure that systems are continuously hardened, a process must be developed, documented, and implemented for assessing and approving vendor security patches on designated network devices, hosts, platforms, and workstations. The process must identify:

  • Designated vendors and platforms.
  • Device types unable to receive vendor patches but requiring replacement of installed firmware to address security vulnerabilities.
  • Risk-based timelines for assessment and implementation of vendor security patches and firmware upgrades.
TRUE Approved Recommended Required Required TBD
OPS-PM-02 Once notification is received that a vendor will cease providing product security updates, patches or support, affected network devices, platforms, hosts, or workstations must be identified and risk-assessed. The risk assessment results must be documented and an action plan for decommissioning must be developed and approved TRUE Approved Recommended Required Required Medium
OPS-AV Antivirus Software Existing Status Public Confidential Restricted Effort
OPS-AV-01 Antivirus software must be centrally managed and monitored. FALSE Proposed Recommended Required Required TBD
OPS-AV-02 A privileged-class ID must be required to disable anti-virus software TRUE Approved Required Required Required TBD
OPS-AV-03 ISEA must approve the disabling of anti-virus software FALSE Proposed Required Required Required TBD
OPS-AV-04 Antivirus software must be kept up-to-date and actively running as designated by published security hardening requirements. These requirements must identify specific platforms on which anti virus products must be installed. If it is identified, it must be installed on all instances of that platform. TRUE In Progress Required Required Required TBD
OPS-SM Security Monitoring and Intrusion Detection Existing Status Public Confidential Restricted Effort
OPS-SM-01 Processes must be developed, documented, and implemented for monitoring, assessing, and escalating security events. The process must identify and define targets, methods, monitoring frequency, log review (as defined in the Infrastructure and Application Security standards) frequency, and escalation procedures. TRUE Approved Recommended Required Required TBD
OPS-SM-02 A process must be developed, documented, and implemented for monitoring, correlating, and assessing security events detected by network and host intrusion detection and prevention systems (NIDS, NIPS, HIDS, and HIPS). The process must determine and document the criteria used to select monitoring targets, methods and frequencies; the frequency of implementation of updates; and escalation procedures. TRUE Approved Required Required Required TBD
OPS-VA-01 Vulnerability Assessment Existing Status Public Confidential Restricted Effort
OPS-VA-01 A process must be developed, documented, and implemented for conducting vulnerability assessment (VA) scanning on production network segments. The process must identify:

  • The criteria for selecting scanning targets and frequency.
  • Identification of severity levels based on technology and criticality.
  • Vulnerability investigation and escalation procedures.
  • Requirement to document recommended remediation actions taken along with supporting rationale
TRUE Approved Required Required Required TBD
OPS-PT Penetration Testing Existing Status Public Confidential Restricted Effort
OPS-PT-01 Penetration testing must be conducted on infrastructure and applications according to the schedule and methodology detailed in the ISEA Penetration Testing Document. TRUE Approved Recommended Required Required TBD
OPS-PT-02 Departments, Division and Faculties must notify ISEA prior to implementing a new version or major release of an Internet-facing environment. The need to conduct or not conduct penetration testing based on the changes implemented must be determined and documented. FALSE Deferred Required Required Required TBD
OPS-PT-03 Penetration testing must be conducted by an approved independent internal unit or independent third party service provider. FALSE Proposed Required Required Required TBD
OPS-PT-04 Frequency and applicability of systems for penetration testing must be documented in the ISEA Penetration Testing Document TRUE Approved Recommended Required Required TBD
OPS-PT-05 The resource or application owner must ensure that the recommendations resulting from the penetration testing are implemented within the timeframes defined in the ISEA Penetration Testing Document TRUE Approved Recommended Required Required TBD
OPS-IM  Security Incident Management Existing Status Public Confidential Restricted Effort
OPS-IM-01 A process must be developed, documented, and implemented for monitoring, analyzing, escalating, and responding to identified information security incidents TRUE In Progress Required Required Required TBD
OPS-IM-02 All incidents determined to have security implications must be managed in accordance with the Coordinated Information Security Incident Response Process (CISIRP). TRUE In Progress Required Required Required TBD
OPS-IM-03 All information security incident management must be centrally coordinated and managed by ISEA. TRUE In Progress Required Required Required TBD
OPS-NO Network Operations Existing Status Public Confidential Restricted Effort
OPS-NO-01 Use of approved network packet capturing tools, diagnostic probes, or diagnostic modes on network devices must be restricted to approved personnel. Any data captured or created by approved network packet capturing tools, diagnostic probes, or diagnostic modes on network devices is considered Confidential TRUE In Progress Required Required Required TBD
OPS-NO-02 Third party network connections to the UofT network must be reviewed annually. TRUE In Progress Required Required Required TBD
OPS-FW Firewalls (OPS) Existing Status Public Confidential Restricted Effort
OPS-FW-01 Firewalls managed by UofT Technology or UofT’s designated agents must be centrally managed TRUE In Progress Required Required Required TBD
OPS-FW-02 Firewall configurations must be updated and maintained according to documented and approved published security hardening requirements TRUE In Progress Required Required Required TBD
OPS-FW-03 All firewall rules must be reviewed, at minimum, on an annual basis, and rules that are no longer required must be disabled TRUE In Progress Required Required Required TBD
OPS-DR System Backups, Restorations, and Disaster Recovery Existing Status Public Confidential Restricted Effort
OPS-DR-01 Information security controls in disaster recovery environments must provide a similar level of assurance as those implemented within UofT production environments TRUE In Progress Required Required Required TBD
OPS-DD Decommissioning and Disposal of Hardware and Media Existing Status Public Confidential Restricted Effort
OPS-DD-01 Decommissioning and disposal of all hardware and media must be performed in accordance with UofT approved processes TRUE In Progress Required Required Required TBD
OPS-DD-02 Removal and decommissioning of UofT hardware must be restricted to approved personnel TRUE In Progress Required Required Required TBD