Web-based Application Security
|
|
Objective
In accordance with the Information Security and Acceptable Use Policy, all web-based
applications developed, licensed, and/or operated by OCC must be adequately protected
to ensure confidentiality, integrity, availability, and accountability of such systems.
Physical Location
All production web-based applications should be operated on servers in rooms that
meet the applicable minimum standards defined in the procedure for Server Rooms.
Support Requirements
All web-based applications must have a valid support contract or, in the case of open-source
software, be commercially or community supported. Costs to maintain appropriate information
security must be included in the project’s budget.
Patching
Security patches must be installed within 30 days, in a timely manner, depending on
the likelihood and impact of vulnerability exploitation. Commercial applications must
be a supported version and no more than N-1.
Directory Name Service (DNS) Naming
When warranted to promote application migration to alternate hardware, applications
should be accessed via a DNS alias, rather than the name of the server that hosts
the application.
Authentication and Access Control
Applications that host Confidential or Controlled Data must adequately limit access
to view or change that data to individuals requiring such access. All applications,
including those that host Public Data, must adequately limit access to change that
data to individuals requiring such access. When feasible, Active Directory (AD) or
Active Directory Federated Services (ADFS) should be used as the authentication mechanism.
Encryption
Exchange of Confidential Data, including authentication credentials, must be performed
via an encrypted channel using trusted certificates. Use of self-signed certificates
in production environments is not recommended. Confidential Data in transit must be
encrypted using a minimum of 256-bit encryption.
System Logon Banner
Internet-facing applications that require authentication must be configured to present
users with the College logon banner, as follows:
Use of OCC Information Systems is subject to the OCC Information Security and Acceptable Use Policy. Pursuant to Michigan and Federal law: (1) Unauthorized use is prohibited; (2) Usage may be subject to security testing and monitoring; (3) Misuse is subject to criminal prosecution; and (4) Users have no expectation of privacy except as otherwise provided by applicable privacy laws. |
Automatic Log-off
Applications that require authentication must be configured to automatically end a
user’s session/lock interface after a time consistent with the business purpose of
the application. IT recommends 15 minutes of inactivity for applications serving Confidential
Data.
Logging
Application activity must be logged and retained for a minimum of 90 days to facilitate
troubleshooting and investigations. The following types of activities must be logged:
Application logs should also be sent to a centralized logging server to reduce storage requirements on local systems and reduce feasibility of log tampering.
Vulnerability Assessment
All applications are subject to periodic application vulnerability scans conducted
or sponsored by IT. For applications that are Internet-accessible or host Confidential
or Controlled Data, these scans must be conducted at least annually. All other applications
must be scanned for application vulnerabilities every two years. System owners are
responsible for timely remediation of identified vulnerabilities.
Configuration and Access Control
Applications must be developed and maintained with appropriate security controls.
Controls must also be documented. Some examples include:
Authentication Session Management
Authentication session management protocols will be used in web applications for testing,
development, and production environments. Such access controls include, but are not
limited to:
Data Validation
All input of data, including usernames and passwords, must be verified on the server
side of the application.
Client-side validation is encouraged but should not be relied upon for validation.
Database Interfaces
When present, database interfaces should be configured to provide adequate security
controls. Examples include:
Incident Management
Application owners are required to report any suspicious activity to IT for investigation.
Backups
Unless backup functions are configured at the server level, application data must
be backed up in an automated fashion consistent with the business requirements for
recovery time objective (length of time the system can be offline) and recovery point
objective (amount of data at risk since the most recent backup, replication, or other
data protection event). Stored backups must also meet security protections comparable
to the source server.
Business Continuity Planning / Disaster Recovery
All mission-critical systems must be covered by an applicable Business Continuity
Plan (BCP) and Disaster Recovery (DR) plan.
Exemptions
In the event that compliance with this web-based application standard cannot be met,
please contact itsecurity@oaklandcc.edu to submit an exemption request which will
be approved or denied by IT. Denied exemption requests may be appealed to the CIO
for final decision.
Change Log