preview

Controls For Securing Removable / Portable Media

Better Essays

Contents
Communications and Operations Policy 2
Policy Statement 2
Controls for securing removable/portable media: 2
Data backup procedures: 4
Separation of Duties: 6
Data collection and secure disposal of data/media: 6
Monitoring system use: 7
Protection of log information, (administrator and operator logs): 8
Protection of system documentation: 8
Antivirus: 8
Network controls: 9
Network management controls and services: 10
Exchange of information: 11
Electronic Commerce: 12

Communications and Operations Policy
Policy Statement
Departments are required to develop and implement policies to secure the operations, availability, and maintenance of information technology resources including network infrastructure and communications from …show more content…

Implementation of required protective measures to safeguard the confidentiality and integrity of the data in the event of theft or loss of the portable device may include encryption or physical protection for access to the IT Resource.
Policy and procedure must be established for controlled management of removable media which includes at a minimum, the following controls:
• Implement logging and audit trails of media removal from or relocations within the organization 's premises and maintain as appropriate to the data classification level.
• Require prior management approval and authorization for storage of data as appropriate to the data classification level on removable media including removal or relocation of the media.
• Impose restrictions on the type(s) of media, and usages thereof, where necessary for adequate security.
• Restrict Department users from storing high sensitivity data including but not limited to personal information on removable media (i.e., USB thumb drives, flash drives, compact discs, tapes) unless specifically directed to do so as part of their job function and authorized by Department management.
• Encrypt all data on mobile and remote computers/devices (e.g. laptops and/or desktops) that are used from outside an Department location to access or store high sensitive data to support normal business operations.

Get Access