This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policies:security:develandmaint [2018/01/05 12:10] – external edit 127.0.0.1 | policies:security:develandmaint [2018/01/10 13:32] (current) – [39. Calamity procedures] deul | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ======Baseline | + | ======Security |
- | =====Development | + | =====Development |
====31. System ownership==== | ====31. System ownership==== | ||
+ | System ownership for scientific systems is driven by the funding mechanism. Many systems are acquired though NWO and EU funding. The PI of the project is by definition the owner of the system. Both functional and technical management are in the hands of the IT Department. | ||
+ | |||
+ | For Servers and Desktops the ownership/ | ||
+ | |||
+ | For non-scientific information systems, by definition the Scientific Director ([[policies: | ||
====32. New information systems procedure==== | ====32. New information systems procedure==== | ||
+ | New scientific informations systems will all fall in the 'basic risk' category. For information systems that store personel information extra security measures will be taken to adhere to the GDPR requirements. | ||
+ | ====33. Additional risk analysis==== | ||
+ | There are no scientific systems with elevated risks. So no additional risk analysis measures have to be taken. | ||
- | ====33. Additional risc analysis==== | + | For information systems storing personel information additional |
====34. Operational acceptance asset==== | ====34. Operational acceptance asset==== | ||
+ | Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems ' | ||
====35. Security update procedure==== | ====35. Security update procedure==== | ||
+ | For all systems, server, desktops, stoarge and other devices security updates are implemented as a continuous process. Every day the software repositories are automatically interrogated for new security updates, which are then applied immediately. | ||
====36. Logfiles==== | ====36. Logfiles==== | ||
+ | Log files are stored local to the system where they are created. However, each log is analysed automatically and in case of a non-regular situation system managers are emailed with an indication of the non-regular behaviour. Upon receipt of such an incident the log on the system in question will be analysed. In case of a true irregularity an incident is initiated. | ||
+ | |||
+ | All systems use one set of time servers inside the IT Department server hardware to synchronize all clocks on all devices. The IT Department time servers themselves use international time servers to keep their time synchronized to the ' | ||
====37. Security incidents recording==== | ====37. Security incidents recording==== | ||
+ | Security incidents are recorded in a mail folder of the IT Department Head. | ||
====38. Security incidents responsible==== | ====38. Security incidents responsible==== | ||
+ | The Security manager as defined by the [[policies: | ||
====39. Calamity procedures===== | ====39. Calamity procedures===== | ||
+ | There is no true calamity procedure, | ||
+ | * Minimize downtime of critical services | ||
+ | * Communicate the calamity to all users/ | ||
+ | * Maximize the collaborative effort within the IT Department team | ||
+ | * Strive to full resolution of the calamity |