<section title="5.5. Standard Operating Procedures"><subsection title="Objective"><paragraph
    title="5.5.1."


><![CDATA[<p>Standard Operating Procedures (SOPs) ensure security procedures are followed in an appropriate and repeatable manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.5.2."


><![CDATA[<p>This section relates to the development of security related SOPs. Information relating to other mandatory documentation can be found in <a title="Document Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Development of SOPs"><paragraph
    title="5.5.3.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>In order to ensure that personnel undertake their duties in an appropriate manner, with a minimum of confusion, it is important that the roles of ITSMs, system administrators and system users are covered by SOPs. Furthermore, taking steps to ensure that SOPs are consistent with SSPs will reduce the potential for confusion resulting from conflicts in policy and procedures.</p>]]></paragraph>
<paragraph
    title="5.5.3.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="844"
><![CDATA[<p>Agencies SHOULD develop SOPs for each of the following roles:</p><ul>
<li>ITSM;</li>
<li>system administrator; and</li>
<li>system user.</li>
</ul>]]></paragraph>
</block>
<block title="ITSM SOPs"><paragraph
    title="5.5.4.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>The ITSM SOPs are intended to cover the management and leadership of information security functions within the agency.</p>]]></paragraph>
<paragraph
    title="5.5.4.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="849"
><![CDATA[<p>The following procedures SHOULD be documented in the ITSMs SOPs.</p><table class="table-control">
<tbody>
<tr>
<td style="width: 20%;">Topic</td>
<td>Procedures to be included</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Access control</strong></td>
<td>Authorising access rights to applications and data.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Asset Musters</strong></td>
<td>Labelling, registering and mustering assets, including media.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Audit logs</strong></td>
<td>Reviewing system audit trails and manual logs, particularly for privileged users.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Configuration control</strong></td>
<td>Approving and releasing changes to the system software or configurations.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Information security incidents</strong></td>
<td>Detecting, reporting and managing potential information security incidents.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Establishing the cause of any information security incident, whether accidental or deliberate.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Actions to be taken to recover and minimise the exposure from an information security incident.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Additional actions to prevent reoccurrence.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Data transfers</strong></td>
<td>Managing the review of media containing classified information that is to be transferred off-site.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Managing the review of incoming media for malware or unapproved software.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>IT equipment</strong></td>
<td>Managing the disposal &amp; destruction of unserviceable IT equipment and media.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System Patching</strong></td>
<td>Advising and recommending system patches, updates and version changes based on security notices and related advisories.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System integrity audit</strong></td>
<td>Reviewing system user accounts, system parameters and access controls to ensure that the system is secure.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Checking the integrity of system software.</td>
</tr>
<tr>
<td style="width: 20%;"><strong> </strong></td>
<td>Testing access controls.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>System maintenance</strong></td>
<td>
<p>Managing the ongoing security and functionality of system software, including: maintaining awareness of current software vulnerabilities, testing and applying software patches/updates/signatures, and applying appropriate hardening techniques.</p>
</td>
</tr>
<tr>
<td style="width: 20%;"><strong>User account management</strong></td>
<td>Authorising new system users.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="System Administrator SOPs"><paragraph
    title="5.5.5.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>The system administrator SOPs focus on the administrative activities related to system operations.</p>]]></paragraph>
<paragraph
    title="5.5.5.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="865"
><![CDATA[<p>The following procedures SHOULD be documented in the system administrator’s SOPs.</p><p> </p><table class="table-control">
<tbody>
<tr>
<td><strong>Topic</strong></td>
<td><strong>Procedures to be included</strong></td>
</tr>
<tr>
<td><strong>Access control</strong></td>
<td>Implementing access rights to applications and data.</td>
</tr>
<tr>
<td><strong>Configuration control</strong></td>
<td>Implementing changes to the system software or configurations.</td>
</tr>
<tr>
<td><strong>System backup and recovery</strong></td>
<td>Backing up data, including audit logs.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Securing backup tapes.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Recovering from system failures.</td>
</tr>
<tr>
<td><strong>User account management</strong></td>
<td>Adding and removing system users.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Setting system user privileges.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Cleaning up directories and files when a system user departs or changes roles.</td>
</tr>
<tr>
<td><strong>Incident response</strong></td>
<td>Detecting, reporting and managing potential information security incidents.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Establishing the cause of any information security incident, whether accidental or deliberate.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Actions to be taken to recover and minimise the exposure from information security incident.</td>
</tr>
<tr>
<td class="table-control-cell-merge-up"> </td>
<td>Additional actions to prevent reoccurrence.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="System User SOPs"><paragraph
    title="5.5.6.R.01."

    tags="Governance,Information Security Documentation,Software Security"


><![CDATA[<p>The system user SOPs focus on day to day activities that system users need to be made aware of, and comply with, when using systems.</p>]]></paragraph>
<paragraph
    title="5.5.6.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="884"
><![CDATA[<p>The following procedures SHOULD be documented in the system user’s SOPs.</p><table class="table-control">
<tbody>
<tr>
<td><strong>Topic</strong></td>
<td>
<p><strong>Procedures to be included</strong></p>
</td>
</tr>
<tr>
<td><strong>Acceptable Use </strong></td>
<td>Acceptable uses of the system(s).</td>
</tr>
<tr>
<td><strong>End of day</strong></td>
<td>How to secure systems at the end of the day.</td>
</tr>
<tr>
<td>
<p><strong>Information security incidents</strong></p>
</td>
<td>What to do in the case of a suspected or actual information security incident.</td>
</tr>
<tr>
<td><strong>Media control</strong></td>
<td>Procedures for handling and using media.</td>
</tr>
<tr>
<td><strong>Passwords</strong></td>
<td>
<p>Choosing and protecting passwords.</p>
</td>
</tr>
<tr>
<td><strong>Temporary absence</strong></td>
<td>How to secure systems when temporarily absent.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Agreement to abide by SOPs"><paragraph
    title="5.5.7.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>When SOPs are produced the intended audience should be made aware of their existence and acknowledge that they have read, understood and agree to abide by their contents.</p>]]></paragraph>
<paragraph
    title="5.5.7.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Should"
    cid="889"
><![CDATA[<p>ITSMs, system administrators and system users SHOULD sign a statement that they have read and agree to abide by their respective SOPs.</p>]]></paragraph>
</block>
</subsection>
</section>
