Technology Privacy and Security Self Assessment: Primer and Recommended Minimum Practice (RMP)



Technology Privacy and Security Self Assessment: Primer and Recommended Minimum Practice (RMP)

1. Does your company have a virus protection program and a firewall in place?
RMP: Implement virus controls and filtering on all systems. Minimum controls include:

2. Does your company check for security software updates in a timely manner?

RMP: Subscribe to vendor patch notification services for all software and systems utilized, review and evaluate at least weekly, preferably daily. Where possible, enable automatic update capabilities. Test and install critical security patches and upgrades within 24 hours of availability, and all other patches within 30 days.

3.  Does your company replace factory default settings to ensure that your information security systems are securely configured?

RMP: Implement policies regarding the configuration of all network security devices and systems.

4. Does your company control access to information that resides on company servers and computers?
RMP: In regard to confidential or sensitive information accessible within your company:

5. Does your company have a policy on the creation and use of passwords?

RMP: Maintain an easily understandable written policy on creating and using passwords, and update the policy yearly to reflect current guidance.

6. Does your company use authentication and encryption to protect remote access to your network? 
RMP: Authenticate and encrypt all remote access to your network, requiring user identification and strong passwords. While a Virtual Private Network (VPN) is the most common method to provide this protection, its use may not provide sufficient security when using offsite computers, networks or public Wi-Fi hotspots.
As part of your security policy, allow remote access only from other networks that meet your organization’s security requirements.

7.  Does your company monitor user accounts to identify and eliminate inactive accounts?
RMP: Maintain a written standard on required timeframes to eliminate inactive user accounts, and utilize software that automatically identifies and disables such accounts in accordance with the standard. 

8.  Does your company have the ability to monitor and control downloading of data to external storage devices such as flash drives, personal and tablet computers, and smart phones?   
RMP: Maintain a written policy regarding storage of company data on portable devices, and utilize technical methods to prevent data leakage such as disabling or monitoring usage of USB ports, content filtering, and use of network monitoring software. All downloadable data should be encrypted.   

Glossary

Antispyware Software
A program that specializes in detecting both malware and non-malware forms of spyware.

Antivirus Software
A program that monitors a computer or network to identify all major types of malware and prevent or contain malware incidents.

Authentication

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

Ciphertext

Data in its encrypted form.

Encryption

The process of changing plaintext into ciphertext for the purpose of security or privacy.

Firewall
A gateway that limits access between networks in accordance with local security policy.

Malware

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.

Packet

A short fixed-length section of data that is transmitted as a unit in an electronic communications network.

Patch

An update to an operating system, application, or other software issued specifically to correct particular problems with the software.

Plaintext

Unencrypted information.

Spyware

Software that is secretly or surreptitiously installed into an information system to gather information on individuals or organizations without their knowledge; a type of malicious code.

Virtual Private Network (VPN)

A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks.

Virus

A self-replicating program that runs and spreads by modifying other programs or files.

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

Glossary Sources
Glossary of Key Information Security Terms, National Institute of Standards and Technology, February 2011. Merriam-Webster Dictionary, April 2013

Resource List

AICPA PrivacyDataProtection web site http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURCES/PRIVACY/Pages/default.aspx
Alexa Huth, Michael Orlando and Linda Pesante, Password Security, Protection and Management, 2012,Department of Homeland Security United States Computer Emergency Readiness Team (US-CERT) http://www.us-cert.gov

General and updated information on information technology security is maintained by US-CERT at http://www.us-cert.gov

 The purpose of this article is to provide information, rather than advice or opinion. It is accurate to the best of the authors’ knowledge as of the date of the article. Accordingly, this article should not be viewed as a substitute for the guidance and recommendations of a retained professional. In addition, CNA does not endorse any coverages, systems, processes or protocols addressed herein unless they are produced or created by CNA.

Any references to non-CNA Web sites are provided solely for convenience, and CNA disclaims any responsibility with respect to such websites. To the extent this article contains any examples, please note that they are for illustrative purposes only and any similarity to actual individuals, entities, places or situations is unintentional and purely coincidental. In addition, any examples are not intended to establish any standards of care, to serve as legal advice appropriate for any particular factual situations, or to provide an acknowledgement that any given factual situation is covered under any CNA insurance policy. Please remember that only the relevant insurance policy can provide the actual terms, coverages, amounts, conditions and exclusions for an insured. All CNA products and services may not be available in all states and may be subject to change without notice.

CNA is a registered trademark of CNA Financial Corporation. Copyright © 2013 CNA. All rights reserved.

Aon Insurance Services is the brand name for the brokerage and program administration operations of Affinity Insurance Services, Inc.; (AR 244489); in CA & MN, AIS Affinity Insurance Agency, Inc. (CA 0795465); in OK AIS Affinity Insurance Services Inc.; in CA, Aon Affinity Insurance Services, Inc., (0G94493), Aon Direct Insurance Administrators and Berkely Insurance Agency and in NY AIS Affinity Insurance Agency.