Skip to Content

9-4 Information Technology Professionals Policy - Section X: Operations Management Policy

Information Systems Department

X. Operations Management Policy

This Policy establishes information security requirements for operations management.

  1. Operating Procedures
    1. All Local Information Service Providers must have documented operating procedures related to information security including but not limited to:
      1. Processing and handling information;
      2. Securely, handling and transporting storage media;
      3. Handling unexpected outages or technical difficulties; and
      4. Restart and recovery procedures.
    2. Procedures must be verified by the Local Information Service Provider’s Information Security Representative to ensure they implement the desired Policy or Standard.
    3. Procedures must be kept up to date by authorized staff and stored in a secure location.
  2. Separation of Duties
    1. To reduce the risk of accidental or deliberate system misuse, separation of duties must be implemented where practical.
    2. Whenever separation of duties cannot be implemented, other compensating controls such as monitoring of activities, audit trails and management supervision must be implemented. At a minimum, the audit of security must remain separate and independent from the security function (i.e., security administration and security audits must be performed by different persons).
  3. Protection from Malicious Code
    Software and associated controls must be implemented across Local Agency networks to prevent and detect the introduction of malicious code. The type of controls and frequency of updating signature files must be commensurate with the value and sensitivity of the information at risk.
  4. Back-Up, Storage, Restoration
    Local Information Service Providers must develop and maintain plans to meet the IT backup and recovery requirements of the Local Agency they support.

    Procedures and requirements of the plan include:
    1. Ensuring backups are protected from being destroyed or read by unauthorized personnel;
    2. Storing a full backup copy in an environmentally protected, access-controlled, off-site storage location;
    3. Ensuring backup procedures and implementing activities (recording, retaining, and purging) comply with the California Public Records Act and County/Local Agency retention schedules; and
    4. Performing and documenting regularly scheduled restoration tests to ensure backup data can be recovered.
  5. IT Resource Monitoring
    Administrative Policy 9-2: Information Technology Use and Security Policy manual Section IV.B. Use of Local Agency IT resources and Data establish the Local Information Service Provider’s right to monitor and log all activities on the IT resources they own, control or manage for security, network maintenance and/or policy compliance.
    1. Where technically feasible, audit logs recording policy exceptions and other security related events must be produced and kept to assist in future investigations and access control monitoring.
    2. All logged events must reflect accurate date and time stamps.
    3. All audit logs must be retained in accordance with Local Information Service Provider standards.
    4. All audit logs must be classified as restricted data and protected accordingly.
    5. Review of audit logs must be commensurate with the nature and degree of criticality of the Local Agency IT resources and data involved.
  6. Back to top