1910 Planning Policy
Department of Human Services |
Index: |
POL1910 |
|
Revised: |
06/02/2025 |
||
Next Review: |
06/02/2027 |
Subject: DHS Information Security Policies
Policy
To establish and implement policies and procedures to ensure proper planning controls to the information system and information technology resources and any associated applications covered by federal, state and all other applicable rules and regulations, including the requirements establishing, documenting, reviewing, modifying and terminating individuals’ right of access. Critical to achieving this objective is the implementation of controls that address each of the requirements stated in this policy.
Authority
-
United States Department of Commerce National Institute for Standards and Technology (NIST)
-
United States Internal Revenue Service
-
United States Department of Health & Human Services – Administration of Children and Families (ACF), Office of Child Support Services (OCSS)
-
United States Department of Health & Human Services - Centers for Medicare & Medicaid Services (CMS)
-
Georgia Technology Authority
-
Social Security Administration
-
Federal Bureau Investigation (Criminal Justice Information Services)
References
-
Georgia Technology Authority Enterprise Information Security Policy
-
Centers for Medicare & Medicaid Services, Volume II: Minimum Acceptable Risk Standards for Exchanges
-
Social Security Administration (“SSA”) Electronic Information Exchange Security Requirements and Procedures for State and Local Agencies Exchanging Electronic Information with the Social Security Administration (“TSSR”)
-
ACF/OCSS - Security Agreement
Applicability
The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information, not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including email, messages, and files) is the property of DHS. All users (DHS employees, contractors, vendors, or others) of IT resources are responsible for adhering to this policy.
Definitions
- Controlled Unclassified Information (CUI)
-
Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended.
Responsibilities
DHS shall adopt the planning principles established in NIST SP 800-53 “Planning,” Control Family guidelines, as the official policy for this domain. The following subsections outline the planning standards that constitute this policy. Each DHS Business System is bound to this policy, and shall develop or adhere to a program plan which demonstrates compliance with the policy related to the standards documented.
PL-1 Security Planning Policy and Procedures
-
Develop, document, and disseminate to designated agency personnel:
-
All organizational level security planning policy that:
-
Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
-
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and
-
-
Procedures to facilitate the implementation of the security planning policy and the associated controls.
-
-
Designate an agency official to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures; and
-
Review and update the current security planning control:
-
Policy every one (1) year (or if there is a significant change); and
-
Procedures every one (1) year, (or when there is a significant change).
-
PL-2 System Security Plan and Privacy Plans
-
The agency requires approved system security and privacy plans for all information systems that:
-
Are consistent with the organization’s enterprise architecture;
-
Explicitly define the constituent system components;
-
Describe the operational context of the system in terms of mission and business processes;
-
Identify the individuals that fulfill system roles and responsibilities;
-
Identify the information types processed, stored, and transmitted by the system;
-
Provide the security categorization of the system, including supporting rationale;
-
Describe any specific threats to the system that are of concern to the organization;
-
Provide the results of a privacy risk assessment for systems processing personally identifiable information;
-
Describe the operational environment for the system and any dependencies on or connections to other systems or system components;
-
Provide an overview of the security and privacy requirements for the system;
-
Identify any relevant control baselines or overlays, if applicable;
-
Describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions;
-
Include risk determinations for security and privacy architecture and design decisions;
-
Include security-and privacy-related activities affecting the system that require planning and coordination with authorized agency personnel; and
-
Are reviewed and approved by the authorizing official or designated representative prior to plan implementation. Distribute copies of the security and privacy plans and communicate subsequent changes to the plans to designated agency officials;
-
-
Distribute copies of the plans and communicate subsequent changes to the plans to authorized agency personnel;
-
Review the plans at a minimum annually (or as a result of a significant change);
-
Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments; and
-
Protect the plans from unauthorized disclosure and modification.
PL-4 Rules of Behavior
-
Establish and provide to individuals requiring access to the system, the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy;
-
Receive a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;
-
Review and update the rules of behavior at a minimum annually; and
-
Require individuals who have acknowledged a previous version of the rules of behavior to read d. and re-acknowledge when the rules are revised or updated.
PL-4 (1) Social Media and Networking Restrictions:
Include in the rules of behavior, restrictions on:
-
Use of social media, social networking sites, and external sites/applications;
-
Posting organizational information on public websites; and
-
Use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications.
IRS.1:
Unless superseded by centrally-issued cross-agency policy, establish usage restrictions and implementation guidance for using Internet-supported technologies (e.g. Instant messaging) based on the potential for these technologies to cause damage or disruption to the information system or the agency’s accomplishment of its mission. Document the use of Internet-supporting technologies.
PL-8: Security and Privacy Architectures
-
Develop security and privacy architectures for the system that:
-
Describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information;
-
Describe the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals;
-
Describe how the architectures are integrated into and support the enterprise architecture; and
-
Describe any assumptions about, and dependencies on, external systems and services;
-
-
Review and update the architectures at a minimum annually to reflect changes in the enterprise architecture; and
-
Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.
PL-8 (1) Defense-In-Depth:
Design the security and privacy architectures for the system using a defense-in-depth approach that:
-
Allocates system communication and other relevant controls to information systems processing, storing, and transmitting CUI; and
-
Ensures that the allocated controls operate in a coordinated and mutually reinforcing manner.
Evaluation
The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:
-
Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.
-
Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.