Free Essay

Is4550 Policy Monitoring and Enforcement Strategy

In:

Submitted By poof09
Words 435
Pages 2
IS4550

Policy Monitoring and Enforcement Strategy

Policy monitoring procedures within the Department of Defense for the auditing, and monitoring of networks .This policy establishes minimum practices to ensure the Department of Defense systems and networks are audited to maintain awareness of the operating environment, to detect indications of security problems, and to ensure systems and networks are used for authorized purposes.
This policy is issued to ensure compliance with • The Federal Information Management Security Act (FISMA) • Department of Defense IT Security Policy Management Policy

This applies to all Department of Defense employees and contractor employees using or operating Department of Defense computer systems, as well as the systems and networks, and to contractor employees providing services to the Department of Defense networks.
It is Department of Defense policy that Monitoring shall be used for the following • Individual Accountability Monitoring, shall be used to support accountability by providing a trace of user actions. • Intrusion Detection Monitoring,shall be designed and implemented to record appropriate information to assist in intrusion detection.

All Department of Defense information technology systems shall be monitored, audited and normal logging processes within the scope of this policy. An audit trail will include information to establish what activity occurred and who or what caused them. The following represents the events that would provide an acceptable audit trail.

• User login – unsuccessful, successful if feasible • Service startup and shutdown -- unsuccessful and successful, if feasible • User account permission modifications -- unsuccessful and successful • User account additions and deletions -- unsuccessful and successful • IP address or hostname associated with a given event, if feasible

Monitoring of Department of Defense Network • Department of Defense networks will be monitored for unauthorized or improper use. • Unauthorized or improper use of the systems shall be investigated and, discipline actions shall be imposed according the Human Resource's. If criminal activity is discovered, system logs shall be provided to the appropriate law enforcement officials. • Department of Defense system may be accessible through legal discovery and the Freedom of Information Act (FOIA) and shall be maintained as records and protected as such.

Prohibited uses of Department of Defense resources can result in punishment in accordance with federal law and civilian employee regulations. • User Accounts will be randomly audited to ensure compliance with established security standards. All employee and contractor accounts will be audited upon termination. • Audit trail information is subject to the Freedom of Information Act (FOIA).

All Department of Defense employees and contractor employees shall be aware of and observe policies regarding network audit and monitoring. Information System Security Officers, and System Administrators shall implement practices of this policy systems applications they are responsible for

Similar Documents

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74