Server Application Security
|
|
Objective
In accordance with the Information Security and Acceptable Use Policy, all applications
developed, licensed, and/or operated by OCC must be adequately protected to ensure
confidentiality, integrity, availability, and accountability of such systems.
Physical Location
All production server-based applications should be operated on servers in rooms that
meet the
applicable minimum standards defined in the Procedure for Server Rooms.
Support Requirements
All server-based applications must have a valid support contract or, in the case of
open-source software, be commercially or community supported. Costs to maintain appropriate
information security must be included in the project’s budget.
Patching
All applications must be at least at version n-1. Security patches must be installed
in a timely manner, depending on the likelihood and impact of vulnerability exploitation,
at least within 30 days of release.
Directory Name Service (DNS) Naming
When warranted to promote application migration to alternate hardware, applications
should be accessed via a DNS alias, rather than the name of the server that hosts
the application.
Authentication and Access Control
Applications that host Confidential or Controlled Data must adequately limit access
to view or change that data to individuals requiring such access. All applications,
including those which host Public Data, must adequately limit access to change that
data to individuals requiring such access. When feasible, Active Directory (AD) should
be used as the authentication mechanism.
Encryption
Exchange of Confidential Data, including authentication credentials, must be performed
via an encrypted channel using trusted certificates such as those provided by the
IT. Use of self-signed certificates in production environments is not recommended.
Confidential Data in transit must be encrypted using a minimum of 256-bit encryption.
System Logon Banner
Internet-facing applications that require authentication must be configured to present
users with the College logon banner, as follows
Use of OCC Information Systems is subject to the OCC Information Security and Acceptable Use Policy. Pursuant to Michigan and Federal law: (1) Unauthorized use is prohibited; (2) Usage may be subject to security testing and monitoring; (3) Misuse is subject to criminal prosecution; and (4) Users have no expectation of privacy except as otherwise provided by applicable privacy laws. |
Automatic Log-off
Applications that require authentication must be configured to automatically end a
user’s session/lock screen after a time consistent with t e business purpose of the
application. IT recommends 15 minutes
of inactivity for applications serving Confidential Data.
Application activity with protected data must be logged and retained for a minimum of 90 days to facilitate troubleshooting and investigations. The following types of activities must be logged:
Vulnerability Assessment
All applications are subject to periodic application vulnerability scans conducted
or sponsored by IT. For applications that are Internet-accessible or host Confidential
or Controlled Data, these scans must be conducted at least annually. All other applications
must be scanned for application vulnerabilities every two years. System owners are
responsible for timely remediation of identified vulnerabilities.
Configuration and Access Control
Applications must be developed and maintained with appropriate security controls.
Controls must also be documented. Some examples include:
Authentication Session Management
Authentication session management protocols will be used in web applications for testing,
development, and production environments. Such access controls include, but are not
limited to:
Data Validation
All input of data, including usernames and passwords, must be verified on the server
side of the
application. Client-side validation is encouraged but should not be relied upon for
validation.
Database Interfaces
When present, database interfaces should be configured to provide adequate security
controls.
Examples include:
Incident Management
Application owners are required to report any suspicious activity to the IT for investigation.
Backups
Unless backup functions are configured at the server level, application data must
be backed up in an automated fashion consistent with the business requirements for
recovery time objective (length of time the system can be offline) and recovery point
objective (amount of data at risk since the most recent backup, replication, or other
data protection event). Stored backups must also meet security protections comparable
to the source server.
Business Continuity Planning / Disaster Recovery
All mission-critical systems must be covered by an applicable Business Continuity
Plan (BCP) and Disaster Recovery (DR) plan.
Exemptions
In the event that compliance with this Server-based application procedure cannot be
met, please contact itsecurity@oaklandcc.edu to submit an exemption request which
will be approved or denied by IT. Denied exemption requests may be appealed to the
CIO for final decision.
Change Log