1911 Security Assessment and Authorization Policy
Department of Human Services |
Index: |
POL1911 |
|
Revised: |
03/20/2024 |
||
Next Review: |
03/20/2026 |
Subject: DHS Information Security Policies
Policy
This policy establishes the Enterprise Security Assessment and Authorization Policy, for managing risks from inadequate security assessment, authorization, and continuous monitoring of company information assets through the establishment of an effective security planning program. The security planning program helps DHS implement security best practices with regards to enterprise security assessment, authorization, and continuous monitoring.
Authority
-
United States Department of Commerce National Institute for Standards and Technology (NIST)
-
Centers for Medicare & Medicaid Services
-
United States Internal Revenue Service
-
United States Department of Health & Human Services
-
Georgia Technology Authority
-
Social Security Administration
References
-
Georgia Technology Authority Enterprise Information Security Policy
-
Centers for Medicare & Medicaid Services, Volume II: Minimum Acceptable Risk Standards for Exchanges
-
Social Security Administration (“SSA”) Electronic Information Exchange Security Requirements and Procedures for State and Local Agencies Exchanging Electronic Information with the Social Security Administration (“TSSR”)
Applicability
The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information, not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including e-mail, messages and files) is the property of DHS. All users (DHS employees, contractors, vendors or others) of IT resources are responsible for adhering to this policy
Definitions
- Plan of Action and Milestones (POA&M)
-
A remedial action plan (the process of accepting or resolving a risk) which helps the agency to identify and assess information system security and privacy weaknesses, set priorities, and monitor progress toward mitigating the weaknesses.
Responsibilities
DHS shall adopt the Security Assessment and Authorization principles established in NIST SP 800-53 “Security Assessment and Authorization,” Control Family guidelines, as the official policy for this domain. The following subsections outline the Security Assessment and Authorization standards that constitute this policy. Each DHS Business System is then bound to this policy and shall develop or adhere to a program plan which demonstrates compliance with the policy related to the standards documented.
CA-1 Security Assessment and Authorization Procedures
-
Senior management, management, and all organization entities are required to coordinate and implement necessary controls for providing security assessment and authorization controls governing agency IT resources and information systems on the basis of business and security requirements.
-
Periodic reviews of this policy shall be performed and documented at least within every three years, or when there is a significant change.
-
Periodic review of security assessment and authorization procedures shall be performed at least annually.
CA-2 Security Assessments
-
DHS assesses security controls throughout the system development life cycle process, and at a minimum annually.
-
The agency has developed and executes a security assessment plan which addresses:
-
The scope of the assessment,
-
Assessment procedure to be used to determine security control effectiveness,
-
Assessment environment, assessment team, and assessment roles and responsibilities.
-
-
Ongoing security control assessments in accordance with the organizational continuous monitoring strategy are performed at least annually in order to monitor and maintain minimum acceptable control implementation, intended operational status, and production of desired outcomes.
-
The agency’s security state of organization information systems is reported to appropriate organizational officials on an annual basis (i.e. senior management, Chief Information Security Officer, etc.).
-
A security assessment report is produced that documents the results of the assessment and the results of the security control assessment are provided to appropriate agency officials (i.e. senior management, Chief Information Security Officer, etc.).
CA-3 Systems Interconnections
-
DHS explicitly authorizes connections from the information to other information systems through use of the agency’s approved and executed Interconnection Security Agreements.
-
Annual review and update to the agency’s Interconnection Security Agreements is performed to ensure security requirements are adequately addressed within the agreement.
-
A deny-all and allow-by-exception policy is employed for allowing systems that receive, process, store, or transmit sensitive data to include, but is not limited to, Federal Tax Information (FTI), Social Security Administration data, Centers for Medicare and Medicaid Services (CMS) data, etc.
CA-5 Plan of Action and Milestones
-
DHS maintains and updates an internal Plan of Action and Milestones (POA&M) in order to document the agency’s planned remedial actions for correcting weaknesses or deficiencies identified during the agency security controls assessments.
-
POA&M review is performed, at a minimum, on a quarterly basis.
CA-6 Security Authorization
-
An Authorizing Official, to include agency senior-level executive or manager, is assigned as the authorizing official for the agency’s information system.
-
The Authorizing Official is responsible for authorizing the information system for processing before commencing operations and before an authority to connect is granted.
-
Authority to connect shall be granted only upon successful completion of the DHS Certification and Accreditation Process.
-
-
Security authorizations are reviewed and updated, as necessary, every three years or when there is a significant change in data sensitivity, federal or legislation requirements, security violations, and prior to the previous security authorization.
CA-7 Continuous Monitoring
-
DHS employs a service provider managed configuration management process for agency information system and components. Review of agency-defined metrics regarding the configuration management process and continuous monitoring program is performed on an annual basis.
-
Continuous security control assessments are performed, and a report of the agency’s security state is provided to the agency’s Authorizing Official on, at least, an annual basis.
-
Ongoing security monitoring of agency-defined metrics in accordance with the agency’s continuous monitoring strategy is performed continuously to ensure agency strategy is effective, maintained, and adhered to.
Evaluation
The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:
-
Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.
-
Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.