SAM – INFORMATION SECURITY
(Office of Information Security)
Note: Effective January 1, 2008, the Office of Information Security (Office) restructured and renumbered the content and moved it from SAM Sections SAM Sections 4840 – 4845 to SAM Sections 5300 – 5399. See also the Office's Government Online Responsible Information Management (GO RIM) Web site at for statewide authority, standards, guidance, forms, and tools for information security activities.
Page 5300 INDEX
INTRODUCTION 5300
STATUTORY PROVISIONS 5300.1
APPLICABILITY 5300.2
AGENCY RESPONSIBILITIES 5300.3
DEFINITIONS 5300.4
RISK MANAGEMENT 5305
RISK ANALYSIS 5305.1
AGENCY RISK MANAGEMENT PROGRAM 5305.2
POLICY, STANDARDS, AND PROCEDURE MANAGEMENT 5310
ORGANIZING INFORMATION SECURITY 5315
AGENCY MANAGEMENT RESPONSIBILITIES 5315.1
AGENCY DESIGNATIONS 5315.2
ASSET PROTECTION 5320
OWNERSHIP OF INFORMATION 5320.1
RESPONSIBILITY OF OWNERS OF INFORMATION 5320.2
RESPONSIBILITY OF CUSTODIANS OF INFORMATION 5320.3
RESPONSIBILITY OF USERS OF INFORMATION 5320.4
CLASSIFICATION OF INFORMATION 5320.5
HUMAN RESOURSES SECURITY 5325
PHYSICAL AND ENVIRONMENTAL SECURITY 5330
COMMUNICATIONS AND OPERATIONS MANAGEMENT 5335
INFORMATION INTEGRITY AND DATA SECURITY 5335.1
PERSONAL COMPUTER SECURITY 5335.2
ACCESS CONTROL 5340
INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND MAINTENANCE 5345
SOFTWARE LICENSING INTEGRITY PRACTICES 5345.1
CRYPTOGRAPHY 5345.2
INCIDENT MANAGEMENT 5350
INFORMATION SECURITY INCIDENT REPORTING REQUIREMENTS 5350.1
CRITERIA FOR REPORTING INCIDENTS 5350.2
INCIDENT FOLLOW-UP REPORT 5350.3
INCIDENTS INVOLVING PERSONAL INFORMATION 5350.4
DISASTER RECOVERY MANAGEMENT 5355
DISASTER RECOVERY PLANNING 5355.1
AGENCY DISASTER RECOVERY PLAN 5355.2
ADDITIONAL STATE DATA CENTER REQUIREMENTS 5355.3
COMPLIANCE 5360
COMPLIANCE SUMMARY 5360.1
INTRODUCTION 5300
(Revised 03/11)
Information security means the protection of information and information systems, equipment, and people from a wide spectrum of threats and risks. Implementing appropriate security measures and controls to provide for the confidentiality, integrity, and availability of information, regardless of its form (electronic, print, or other media) is critical to ensure business continuity and protection against unauthorized access, use, disclosure, disruption, modification, or destruction.
Government Code Section 11549 provides the Office of Information Security, within the California Technology Agency, with the responsibility and authority to create, issue, and maintain policies, standards, and procedures; direct state agencies to effectively manage security and risk; advise and consult with state agencies on security issues; and, ensure state agencies are in compliance with the requirements specified in the State Administrative Manual (SAM) Sections 5300 – 5399. These sections will continue to evolve as new policy is adopted.
STATUTORY PROVISIONS 5300.1
(Revised 03/11)
Pursuant to Government Code Section 11549.3, every state agency, department, and office shall comply with the information security and privacy policies, standards, procedures and filing requirements issued by the Office of Information Security. Additionally, the Office may conduct, or require to be conducted, independent security assessments or audits of any state agency, department, or office, the cost of which shall be funded by the state agency, department, or office being assessed or audited.
The primary provisions affecting the classification and dissemination of information under the control of California state agencies can be found in the State Constitution, in statute, and in administrative policy:
- Article 1, Section 1, of the Constitution of the State of California defines pursuing and obtaining privacy as an inalienable right.
- The Information Practices Act of 1977 (Civil Code Section 1798, et seq.) places specific requirements on state agencies in the collection, use, maintenance, and dissemination of information relating to individuals.
- The California Public Records Act (Government Code Sections 6250-6265) provides for the inspection of public records.
- The State Records Management Act (Government Code Sections 14740-14770) provides for the application of management methods to the creation, utilization, maintenance, retention, preservation, and disposal of state records, including determination of records essential to the continuation of state government in the event of a major disaster. (SAM Sections 1601 through 1699 contain administrative regulations in support of the Records Management Act.)
- The Comprehensive Computer Data Access and Fraud Act (Penal Code Section 502) affords protection to individuals, businesses, and governmental agencies from tampering, interference, damage, and unauthorized access to lawfully created computer data and computer systems. It allows for civil action against any person convicted of violating the criminal provisions for compensatory damages.
See SAM Sections 5300 through 5399 and the Office's Government Online Responsible Information Management (GO RIM) Web site at for statewide authority, standards, guidance, forms, and tools for information security activities.
APPLICABILITY 5300.2
(Revised 10/09)
The SAM Sections 5300 through 5399 shall apply to the following:
1.All state agencies, departments, offices, boards, commissions, institutions, and special organizational entities unless otherwise specifically exempted by law or state policy;
2.All categories of automated and paper information, including (but not limited to) records, files, and data bases; and,
3.Information technology facilities, software, and equipment (including personal computer systems) owned or leased by state agencies.
AGENCY RESPONSIBILITIES 5300.3
(Revised 10/09)
Each agency must provide for the proper use and protection of its information assets. Accordingly, each agency must perform the following:
- Assign management responsibilities for information technology risk management, including the appointment of an Information Security Officer. See SAM Section 5315.
- Provide for the integrity and security of automated and paper information, produced or used in the course of agency operations. See SAM Sections 5310 through 5350.
- Provide for the security of information technology facilities, software, and equipment utilized for automated information processing. See SAM Section 5330.
- Establish and maintain an information technology risk management program, including a risk analysis process. See SAM Section 5305.
- Prepare and maintain an agencyDisaster Recovery Plan. See SAM Section 5355.
- Maintain a security and ongoing privacy program including an annual training component for all employees and contractors. Refer to Government Code 11019.9 and Civil Code 1798 et seq.
- Comply with the state audit requirements relating to the integrity of information assets. See SAM Section 20000 et seq.
- Comply with state reporting requirements. See SAM Section 5360.
Each state data center must carry out these responsibilities for those automated files, databases, and computer systems for which it has ownership responsibility. See SAM Sections 5320 and 5355.3.
DEFINITIONS 5300.4
(Revised 10/09)
Every State agency, department, and office shall use the information security and privacy definitions issued by the Office of Information Security and Privacy Protection in implementing information security and privacy policy and in their day to day operations. For example, use these definitions when interpreting and/or implementing State policies, creating and/or modifying departmental policies, and identifying, responding to, and reporting incidents.
The definitions are located on the Government Online for Responsible Information Management (Go RIM) Web site at
RISK MANAGEMENT 5305
(Revised 10/09)
Risk management is the process of taking actions to avoid or reduce risk to acceptable levels. This process includes both the identification and assessment of risk through risk analysis (SAM Section 5305.1) and the initiation and monitoring of appropriate practices in response to that analysis through the agency's risk management program.
State agencies need to ensure the integrity of computerized information resources by protecting them from unauthorized access, modification, destruction, or disclosure and to ensure the physical security of these resources. Agencies shall also ensure that users, contractors, and third parties having access to state computerized information resources are informed of and abide by this policyand the agency security plan, and are informed of applicable state statutes related to computerized information resources.
Each agency that employs information technology must establish risk management and disaster recovery planning processes for identifying, assessing, and responding to the risks associated with its information assets. The state's information assets (its data processing capabilities, information technology infrastructure and data) are an essential public resource. For many agencies, program operations would effectively cease in the absence of key computer systems. In some cases, public health and safety would be immediately jeopardized by the failure or disruption of a system. The non-availability of state information system and resources can also have a detrimental impact on the state economy and the citizens who rely on state programs. Furthermore, the unauthorized modification, deletion, or disclosure of information included in agency files and data bases can compromise the integrity of state programs, violate individual right to privacy, and constitute a criminal act.
RISK ANALYSIS 5305.1
(Revised 10/09)
As an essential aspect of its information technology security and risk management program, each agency that employs information technology must establish a risk analysis process to identify and assess risks associated with its information assets and define a cost-effective approach to managing such risks. Specific risks that must be addressed include, but are not limited to, those associated with accidental and deliberate acts on the part ofagency employees and outsiders; fire, flooding, and electric disturbances; and, loss of data communications capabilities.
The agency risk analysis process must identify and prioritize critical applications of information technology. When establishing priorities, agencies should consider that applications may become more critical as the period of unavailability increases and that processing cycles (i.e. monthly, quarterly or yearly) may have an impact upon the prioritization of applications. Agency risk management practices and disaster recovery planning must give priority to the establishment of policies and procedures to ensure the continued operation of these applications. See SAM Sections 5310 and 5355.
The risk analysis process must be carried out with sufficient regularity to ensure that the agency's approach to risk management is a realistic response to the current risks associated with its information assets. In general, the risk analysis process should be a cyclical process for most agencies. Agencies should complete the comprehensive risk analysis cycle at least every two years and whenever there has been a significant change in their use of information technology. This cycle ends with the preparation of a report documenting the risk assessment.
The risk analysis process should include the following:
- Assignment of responsibilities for risk assessment, including appropriate participation of executive, technical, and program management.
(Continued)
(Continued)
RISK ANALYSIS5305.1 (Cont. 1)
(Revised 10/09)
- Identification of the agency information assets that are at risk, with particular emphasis on the applications of information technology that are critical to agency program operations. A critical application, from a statewide perspective, is an application that is so important to the state that the loss or unavailability of the application is unacceptable. With a critical application, even short-term unavailability of the information provided by the application would have a significant negative impact on the health and safety of the public or state workers; on the fiscal or legal integrity of state operations; or, on the continuation of essential agency programs.
- Identification of the threats to which the information assets could be exposed.
- Assessment of the vulnerabilities, i.e., the points where information assets lack sufficient protection from identified threats.
- Determination of the probable loss or consequences, based upon quantitative and qualitative evaluation, of a realized threat for each vulnerability and estimation of the likelihood of such occurrence.
- Identification and estimation of the cost of protective measures which would eliminate or reduce the vulnerabilities to an acceptable level.
- Selection of cost-effective security management measures to be implemented.
- Preparation of a report, to be submitted to the agency director and to be kept on file within the agency, documenting the risk assessment, the proposed security management measures, the resources necessary for security management, and the amount of remaining risk to be accepted by the agency.
AGENCY RISK MANAGEMENT PROGRAM 5305.2
(Revised 10/09)
The practice of information technology risk management within the agency must be based upon the results of the agency's risk analysis process. Obtaining resources for risk management is subject to the same technical, programmatic, and budgetary justification and review processes required for any information technology program. See SAM Section 4819.3.
The risk management practices implemented by the agency will vary depending upon the nature of the agency's information assets. Among the practices that must be included in each agency's risk management program are:
- Organizational and Management Practices, see SAM Section 5315.
- Personnel Practices, see SAM Section 5325.
- Physical Security Practices. , see SAM Section 5330.
- Information Integrity and Data Security Practices, see SAM Section 5335.
- Personal Computer Security Practices, see SAM Section 5335.
- Software Integrity Practices, see SAM Section 5345.
POLICY, STANDARDS, AND PROCEDURE MANAGEMENT 5310
(Revised 06/10)
The purpose of information security policy, standards, and procedures are to establish and maintain a standard of due care to prevent misuse or loss of state agency information assets. Policy provides management direction for information security to conform with business requirements, laws, and administrative policies. Standards are the specifications that contain measurable, mandatory rules to be applied to a process, technology, and/or action in support of a policy. And procedures are the specific series of actions that are taken in order to comply with policies and standards.
Each agency must provide for the integrity and security of its information assets by establishing appropriate internal policies, standards, and procedures for preserving the integrity and security of each automated, paper file, or data base including:
- Establishes and maintains management and staff accountability for protection of agency information assets.
- Ensure the use of social media technologies is in compliance with the Social Media Standard (SIMM 66B).
- Establishes and maintains processes for the analysis of risks associated with agency information assets.
- Establishes and maintains cost-effective risk management practices intended to preserve agency ability to meet state program objectives in the event of the unavailability, loss or misuse of information assets.
5.Agreements with state and non-state entities to cover, at a minimum, the following:
a. Appropriate levels of confidentiality for the data based on data classification (see SAM Section 5320.5).
b. Standards for transmission and storage of the data, if applicable.
c. Agreements to comply with all state policy and law regarding use of information resources and data.
d. Signed confidentiality statements.
e. Agreements to apply security patches and upgrades, and keep virus software up-to-date on all systems on which data may be used.
f. Agreements to notify the state data owners promptly if a security incident involving the data occurs.
6.Establishing appropriate departmental policies and procedures to protect and secure IT infrastructure, including:
a. Technology upgrade policy, which includes, but is not limited to operating system upgrades on servers, routers, and firewalls. The policy must address appropriate planning and testing of upgrades, in addition to departmental criteria for deciding which upgrades to apply.
b. Security patches and security upgrade policy, which includes, but is not limited to, servers, routers, desktop computers, mobile devices, and firewalls. The policy must address application and testing of the patches and/or security upgrades, in addition to departmental criteria for deciding which patches and security upgrades must be applied, and how quickly.
c. Firewall configuration policy, which must require creation and documentation of a baseline configuration for each firewall, updates of the documentation for all authorized changes, and periodic verification of the configuration to ensure that it has not changed during software modifications or rebooting of the equipment.
(Continued)
(Continued)
POLICY, STANDARDS, AND PROCEDURE MANAGEMENT 5310 (Cont. 1)
(Revised 06/10)
d. Server configuration policy, which must clearly address all servers that have any interaction with Internet, extranet, or intranet traffic. The policy must require creation and documentation of a baseline configuration for each server, updates of the documentation for all authorized changes, and periodic checking of the configuration to ensure that it has not changed during software modifications or rebooting of the equipment.
e. Server hardening policy, which must cover all servers throughout the department, not only those that fall within the jurisdiction of the department's IT area. The policy must include the process for making changes based on newly published vulnerability information as it becomes available. Further, the policy must address, and be consistent, with the department's policy for making security upgrades and security patches.
f. Software management and software licensing policy, which must address acquisition from reliable and safe sources, and must clearly state the department's policy about not using pirated or unlicensed software.
g. Ensure that the use of peer-to-peer technology for any non-business purpose is prohibited. This includes, but is not limited to, transfer of music, movies, software, and other intellectual property. Business use of peer-to-peer technologies must be approved by the CIO and ISO.
7.Requiring that if a data file is downloaded to a mobile device or desktop computer from another computer system, the specifications for information integrity and security which have been established for the original data file must be applied in the new environment.
8.Establishing policy requiring encryption, or equally effective measures, for all personal, sensitive, or confidential information that is stored on portable electronic storage media (including, but not limited to, CDs and thumb drives) and on portable computing devices (including, but not limited to, laptop and notebook computers). This policy does not apply to mainframe and server tapes. (See SAM Section 5345.2).
ORGANIZING INFORMATION SECURITY 5315
(Revised 10/09)
Agency executive management must be visibly committed to information security and the practice of risk management. Risk management must be based upon an appropriate division of responsibility among management, technical, and program staff, with written documentation of specific responsibilities. Agency security policies and procedures must be fully documented, and agency staff must be knowledgeable about those policies and procedures. This section identifies the framework management establishes for the implementation of information security. See SAM Section 5360 for Filing requirements.