8.2.1 Information transfer
policies and procedures
Formal transfer policies, procedures and controls should be in place to protect the transfer of information through the use of all types of communication facilities.
- Consider the following for the procedures and controls to be
followed when using communication facilities for information transfer:
a) procedures designed to protect
transferred information from interception, copying, modification, mis-routing
and destruction;
b) procedures for the detection
of and protection against malware that may be transmitted through the use of
electronic communications;
c) procedures for protecting
communicated sensitive electronic information that is in the form of an attachment;
d) policy or guidelines outlining
acceptable use of communication facilities;
e) personnel, external party and
any other user’s responsibilities not to compromise the organization, e.g.
through defamation, harassment, impersonation, forwarding of chain letters,
unauthorized purchasing, etc.;
f) use of cryptographic
techniques e.g. to protect the confidentiality, integrity and authenticity of
information;
g) retention and disposal
guidelines for all business correspondence, including messages, in accordance
with relevant national and local legislation and regulations;
h) controls and restrictions
associated with using communication facilities, e.g. automatic forwarding of
electronic mail to external mail addresses; advise the personnel in general
about the problems of “reply all” ot “forward” functionalities in communication
i) advising personnel to take
appropriate precautions not to reveal confidential information;
j) not leaving messages
containing confidential information on voicemail or video since these may be
replayed by unauthorized persons, stored on communal systems or stored
incorrectly as a result of misdialling;
- Remind the personnel
that not to have confidential conversations in public places or over insecure
communication channels, open offices and meeting places. Information transfer
services should comply with any relevant legal requirements.
Information transfer occurs through the use of a number of different types of communication facilities, including email, voice recordings/ voice mail, chat, and video/ video conference, as well as face-toface/ verbal.
Software transfer may occur through a number of different mediums, including downloading from the Internet and acquisition from vendors’ off-the-shelf products.
Consider the business, legal and security implications associated with the information transfr and electronic communications and the requirements for security controls.
See also CIS Control 9 Email and Web Browser Protection.
8.2.2 Agreements on information
transfer
Agreements should address the secure transfer of business information between the organization and external parties.
- Incorporate the following into the agreements on information
transfer:
a) management responsibilities
for controlling and notifying transmission, dispatch and receipt;
b) procedures to ensure
traceability and non-repudiation;
c) minimum technical standards
for packaging and transmission;
d) escrow agreements;
e) courier identification
standards;
f) responsibilities and
liabilities in the event of information security incidents, such as loss of
data;
g) use of an agreed labelling system for sensitive or critical
information, ensuring that the meaning of the labels is immediately understood
and that the information is appropriately protected;
h) technical standards for recording and reading information and
software;
i) any special controls that are required to protect sensitive items,
such as cryptography;
j) maintaining a chain of custody for information while in transit;
k) acceptable levels of access control.
- Establish and maintain policies, procedures and standards to protect
information and physical media in transit.
- Reflect the sensitivity of the business
information involved in the information security content of any agreement.
- For confidential information, esure
the consistency of the specific mechanisms used for the transfer for all
organizations and types of agreements.
8.2.3 Electronic messaging
Information involved in electronic messaging should be appropriately protected.
- Include the following into security considerations for
electronic messaging:
a) protecting messages from
unauthorized access, modification or denial of service commensurate with the
classification scheme adopted by the organization;
b) ensuring correct addressing
and transportation of the message;
c) reliability and availability
of the service;
d) legal considerations, for
example requirements for electronic signatures;
e) obtaining approval prior to
using external public services such as instant messaging, social networking or
file sharing;
f) stronger levels of authentication
controlling access from publicly accessible networks.
8.2.4 Confidentiality or
non-disclosure agreements
Requirements for confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information should be identified, regularly reviewed and documented.
- Address in the confidentiality or non-disclosure agreements the
requirement to protect confidential information using legally enforceable
terms. Confidentiality or non-disclosure agreements are applicable to external
parties or employees of the organization.
- Select or add elements in consideration of the type of the other party
and its permissible access or handling of confidential information. The following may help as a minimum to identify requirements for
confidentiality or non-disclosure agreements: a) a definition of the
information to be protected (e.g. confidential information);
b) expected duration of an
agreement, including cases where confidentiality might need to be maintained
indefinitely;
c) required actions when an
agreement is terminated;
d) responsibilities and actions
of signatories to avoid unauthorized information disclosure;
e) ownership of information,
trade secrets and intellectual property, and how this relates to the protection
of confidential information;
f) the permitted use of confidential
information and rights of the signatory to use information;
g) the right to audit and monitor
activities that involve confidential information;
h) process for notification and
reporting of unauthorized disclosure or confidential information leakage;
i) terms for information to be
returned or destroyed at agreement cessation;
j) expected actions to be taken
in case of a breach of the agreement.
- Periodically review the requirements
for confidentiality and non-disclosure agreements and when changes occur that
influence these requirements.
- There may be a need for an
organization to use different forms of confidentiality or non-disclosure
agreements in different circumstances.
Confidentiality and non-disclosure agreements protect organizational
information and inform signatories of their responsibility to protect, use and
disclose information in a responsible and authorized manner.