Subsection 1 - General Administrative Rule
Purpose
The purpose of the Bureau of Technology Services (BTS) Information Security Administrative Rule is to ensure the security and availability of City Technology Resources, including systems, assets, networks and information. The BTS Information Security Administrative Rule also helps ensure confidentiality, integrity and availability of electronic information captured, maintained and used by the City of Portland. This policy shall be used as a foundation for all Citywide policies, standards, procedures, and guidelines that are developed and implemented by the City, related to information security and compliance. As of 2023 the BTS-2.xx Information Security Administrative Rules have been consolidated into this one policy.
The Information Security Administrative Rule is a "living" document that will be altered as required to address changes in technology, applications, procedures, legal and social imperatives and potential cyber threats. Please reach out to the Information Security team with any needs, questions, or concerns: BTS - Information Security btsinfosec@portlandoregon.gov
The BTS Information Security Administrative Rule is technical in nature, combining technologies, resources, processes, applications, and workforce compliance to policy expectations as well as legal requirements.
The following Information Security reference documents will aid in applying the BTS Information Security Administration Rule into practice, as securing City information is an integral responsibility for all Authorized Users.
- City of Portland Security Standards 4.0
- BTS Technology Standards Directory
- List of Sensitive Information Fields
- HRAR 4.08 Information Technologies
- HRAR 1.03 Public Records Information, Access and Retention
- HRAR 11.04 Protection of Restricted and Confidential Information
- Glossary | CSRC (nist.gov) - Technology and Information Security terms and definitions
Authorized Users (employees, contractors, vendors, volunteers, and other authorized parties) are responsible for complying with this policy. Unauthorized access to, use, or abuse of City Technology Resources, information and data, including legally privileged information is expressly prohibited. City Confidential, Restricted and Unrestricted (Public) Information classifications are detailed in Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING.
Authority and Compliance
The Chief Technology Officer (CTO) shall establish and provide authority and governance for information security policies, standards, and best practices for Citywide technology to secure all City Technology Resources, information and data and promote the most efficient use of City Technology Resources.
The Senior Information Security Officer (SISO) is responsible for developing and enforcing policies and standards for the implementation and use of information technology security standards and compliance on a Citywide basis.
The City of Portland is a public entity. The City has custodial responsibilities for a significant and diverse amount of sensitive and confidential information, as referenced above. The City holds business contracts with a broad range of public and private organizations. The City is the recipient of federal and private grants. The City owns, maintains and operates significant critical infrastructures and services including those of public health and safety. These and related responsibilities place significant obligation on the City regarding the management and use of its extensive Technology Resources. Not least among these obligations are compliance requirements with many State and Federal laws, regulations, and promulgated rules. Pursuant to Federal and State regulations, management control of access to law enforcement data, specifically Criminal Justice Information Services (CJIS), National Crime Information Center (NCIC 2000) and Law Enforcement Data Systems (LEDS), are under the authority of the Chief of Police of the Portland Police Bureau. The Bureau of Emergency Communications (BOEC) maintains a separate CJIS role and parallel responsibilities.
Beyond strict compliance requirements, the City must also understand and consider several additional government and industry standards and best practices that contribute to the objective of "due care".
In addition to the City's information security governance and compliance requirements, this policy also reflects the City's strong commitment to its own institutional ethics and values.
Successful compliance and protection of City Technology Resources, assets, information and data require all Business System Owners, System Operators, Data Custodians and Authorized Users of City-owned technologies, to learn, understand, and support the City's information security policies and associated standards, best practices and guidelines.
Administrative Rule
The Information Security Administrative Rule includes subsections for policies covering the following areas:
Subsection 1: GENERAL ADMINISTRATIVE RULE
Subsection 2: ROLES AND RESPONSIBILITIES
Subsection 3: NETWORK ACCESS AND ACCOUNTS
Subsection 4: REMOTE NETWORK ACCESS
Subsection 5: IDENTITY AND ACCESS MANAGEMENT
Subsection 6: DATABASE PASSWORDS
Subsection 7: PATCHING, MALWARE PREVENTION AND RECOVERY
Subsection 8: INCIDENT REPORTING AND RESPONSE
Subsection 9: MOBILE DEVICES AND REMOVABLE MEDIA
Subsection 10: WIRELESS NETWORKS
Subsection 11: ANALOG MODEMS
Subsection 12: PHYSICAL SECURITY AND ASSETS
Subsection 13: INTRUSION PREVENTION AND DETECTION
Subsection 14: SECURITY ASSESSMENTS, AUDITS, AND PENETRATION TESTS
Subsection 15: ENCRYPTION
Subsection 16: FIREWALL AND SECURITY SYSTEMS
Subsection 17: PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS
Subsection 18: INFORMATION CLASSIFICATION, PROTECTION AND SHARING
Subsection 19: CLOUD SERVICES
Subsection 20: SOFTWARE, SYSTEM AND SECURITY DEVELOPMENT LIFECYCLE
Subsection 21: CONTAINER SECURITY
Subsection 22: TECHNOLOGY TRAVEL
In addition to the above policies, the following general information security policies apply to all Authorized Users of the City's technology resources and information:
- Altering Authorized Access: Authorized Users are prohibited from changing access controls to allow themselves or others to perform actions outside their authorized privileges and assigned responsibilities.
- Applicability: This BTS Information Security Administrative Rule is applicable to all Business System Owners, System Operators, Data Custodians, and Authorized Users of City Technology Resources, associated information or any other electronic processing or communications related Technology Resources or services-including removable media, internet-based and mobile devices.
- Authorized User Accountability: Authorized Users are accountable for their actions in use of City Technology Resources and information and may be held liable to administrative or criminal sanctions for any unauthorized actions found to be intentional, malicious or negligent.
- Background Checks: Background checks may be a requirement for any Authorized User who will be working with or around City Confidential or restricted technology equipment or information. Such determination will be at the discretion of the CTO, SISO, and Business System Owner unless it is mandated by law or State/Federal requirement.
- Denial of Service Actions: Authorized Users are not allowed to prevent Authorized Users or other systems and technology services from performing authorized functions by actions that deny access or the ability to communicate. These include actions that deliberately suppress communications or generate frivolous or unauthorized network activity or service interference.
- Electronic Data and Records Management: The City generates, processes and stores many forms of information. Records Retention and disposition requirements are maintained by and can be found at the City of Portland Auditor's Office.
- All City Business System Owners, Data Custodians, and Authorized Users are obligated to understand the nature of the information and data they generate, use, transmit or store-regardless of location or storage medium--and ensure that they are managing that information and data in full compliance with City records management and information security policies.
- Exceptions: Exceptions to this policy must be approved by the CTO or the SISO. In each case, the bureau must request the exception waiver, in writing, and include such items as the need for the exception, the scope and extent of the exception, the safeguards to be implemented to mitigate risks, specific timeframe for the exception, organization requesting the exception, and the approval from the bureau director requesting the exception.
- Information Protection: Authorized Users are required to protect the confidentiality, integrity and availability of City Confidential or Restricted Information they use, transmit and store. Examples of confidential or sensitive information include but are not limited to; criminal justice data, pending litigation records, employee personnel records, health benefits information and medical files, payment card numbers, in-process procurement evaluation and contract negotiation materials, driver license numbers, social security numbers, dates of birth, intellectual property and all other information expressly exempt from Oregon public records laws.
- A List of Sensitive Information Fields is available for guidance in determining confidential data fields and types.
- Malicious Software (Malware): Authorized Users must not willingly or through an act of negligence, introduce or use malware such as computer viruses, Trojan horses, worms or spyware.
- Monitoring of User Accounts, Files and Access: Related Administrative Rules governing Authorized User use of City technology resources and expectation of privacy, monitoring of use, site blocking, prohibited use, email (including all-employee broadcast email, Union use of email, Netiquette, and email records retention), and malware protection are included in the Bureau of Human Resources Administrative Rules. (In particular: HRAR 4.08 Information Technologies)
- Reconstruction of Information or Software: Authorized Users are not allowed to reconstruct or duplicate information or software for which they are not authorized.
- Software Licenses: All software used on City devices, or hosted by an internet-based service provider, must be appropriately and legally acquired and used according to a City procurement approved licensing agreement. Possession or use of illegal copies of software or data is expressly prohibited.
- Tampering with Information Security Software and Settings: Authorized Users must not tamper with or disable information security software or settings, including but not limited to network password mechanisms, system logs, virus protection software, security auditing and asset management tools, system clocks and software distributions tools.
- Unauthorized Access: Any attempted or unauthorized access, use, or modification of City Technology Resources is prohibited. Unauthorized users may face criminal or civil penalties. Access to or use of City technology resources by any person whether authorized or unauthorized, constitutes consent to City of Portland Administrative Rules.
- Authorized Users and unauthorized users are not to access or attempt to access systems, networks or information for which they are not authorized, nor provide access to unauthorized users. Authorized Users are not to attempt to receive non-City business information or access information by unauthorized means, such as impersonating another system, user or person, misuse of Authorized User credentials (user I.D.s, passwords, etc.) or by causing any technology component to function incorrectly. Authorized Users and unauthorized users are not to possess, intercept or transfer information or communications for which they are not authorized.
- Least Permissions, Least Privilege and Least Function: Systems, accounts and assets must be configured to provide the least permission, privilege, and function required to complete a task. Unnecessary permissions, privileges, or function must not be assigned to any assets.
- Unauthorized Data Alteration: Entering information into a computer or database that is known to be false and/or unauthorized, or altering a database, document, or computer disk with false and/or unauthorized information is prohibited.
Subsection 2 - Roles and Responsibilities
Purpose
Responsibility for protecting City Technology Resources, including systems, assets, and information, is shared by many entities and individuals throughout the City including the Senior Information Security Officer, Authorized Users, Business System Owners, Data Custodians, and System Operators.
The purpose of this policy is to describe the specific roles and responsibilities of each of these groups and individuals regarding Information Security.
Role and Responsibilities
Senior Information Security Officer (SISO) and Information Security
The Senior Information Security Officer provides a key role of centralized oversight and enforcement for technology systems' security-related services for the City. These responsibilities include, but are not limited to the following key areas:
- Security policy development, implementation, and enforcement; including granting exceptions to any BTS Security Administrative Rule.
- Strategic security planning and plan implementation.
- Security awareness and education programs.
- Maintain relationships with external entities for threat intelligence and information gathering.
- Risk Management Strategy, including risk outcomes that identify options to accept, mitigate, deny, and transfer identified risks.
- Disaster Recovery, Continuity of Operations and Contingency planning.
- Address Supply Chain and Procurement risks.
- Risk assessments and incident prevention.
- Security audits, and penetration tests.
- Contract review of technology acquisitions.
- Incident Response services, ensuring the Incident Response Plan is followed and incidents are coordinated with other agencies and entities.
- Vulnerability management program. An automated and adaptive vulnerability capability for scanning City networks and assets to detect vulnerable and exploitable systems and to identify gaps in patching and security. See Subsection 7 - PATCHING, MALWARE PREVENTION AND RECOVERY.
- Security consulting services as needed.
- Development and implementation of all appropriate security standards and guidelines as necessary for the City.
- Consider impacts to Privacy for each technology under the SISO's purview.
Account Managers
- Must create, enable, modify, disable, and remove information system accounts in accordance with the concepts of Least Privilege and Least Permissions.
- Must require a valid access authorization based on CTO or SISO-approved business justification and a request must be made to create the account.
- Ensure inactive accounts are automatically disabled after 90 days.
- Must disable accounts after six months of inactivity. If data needs to be retained or used by other Authorized Users, it must be exported and stored separately from the account.
- Delegate limited account management ability to create accounts to business system owners where necessary and only when approved by the CTO or SISO.
- Must review accounts and access activities annually.
- Must report anomalous account activities and policy violations to Information Security.
- Must create each account or group according to the permissions required, never copying or duplicating other accounts. Access must be defined according to Role-Based Access (RBAC) and permissions must be based on the required job role.
Authorized Users
All Authorized Users have a critical role in the effort to protect and maintain City technology systems and data. Authorized Users, including users who are contractors or 3rd party service providers, of City Technology Resources and data have the following responsibilities:
- Support compliance with all federal and state statutes and regulations.
- Comply with all City and Bureau Administrative Rules, policies and guidelines.
- Protect all City technology assets and information and never share access, accounts, privileges and associated passwords.
- Always maintain the confidentiality of sensitive information for all uses.
- See: List of Sensitive Information Fields for guidance in determining confidential information.
- Accept accountability for all activities associated with the use of their Authorized User accounts and related access privileges.
- Ensure that use of City and personal technology devices, email, internet access, computer accounts, networks, and information stored or used on any of these systems is restricted to authorized purposes and defined acceptable use policies.
- Report all suspected security and/or policy violations to an appropriate authority, including your manager, the SISO and BTS Helpdesk.
- Follow all relevant policies, guidelines and procedures established by City bureaus and offices as well as agencies with which they are associated and that have provided them with access privileges.
- Comply with all software licensing terms, rules and restrictions.
- Accounts will be activated, terminated, suspended and managed according to all other relevant policies and procedures.
Business System Owners
Business System Owners play a critical role in the protection of City information systems and data. Business System Owners have responsibility for their managed systems and internet-based services and storage and must:
- Ensure compliance with all City and Bureau Administrative Rules, policies, standards and guidelines as well as all statutory and regulatory requirements.
- Segment and protect data into production, development, and test environments.
- Define the criticality of assets and the level of security required for protection. This is determined by performing a business impact analysis of the critical functions as determined within the asset criticality guidelines and aligned with Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING.
- Assign and provide necessary support and authority to appropriate Authorized Users to carry out the functions of Data Custodian(s)* for all managed technology systems and services. Work in cooperation with other Business System Owners for shared systems to ensure that Data Custodian responsibilities are properly fulfilled.
- Map data flows in a network diagram or network drawing
- Ensure the confidentiality of sensitive proprietary data especially personally identifiable information, protected criminal justice information, and sensitive information related to protection of critical infrastructure.
- See: List of Sensitive Information Fields for guidance in determining Confidential Information.
- Ensure that access granted to Authorized Users is based on the "Principle of Least Privilege" and "Principle of Separation of Duties" as appropriate and where required.
- Ensure that all incidents of security breaches are documented and reported to BTS HelpDesk and Information Security services personnel.
- Document and submit any desired exceptions to Citywide policy for review to the CTO.
- Use Change Control standards and procedures to document, schedule and coordinate maintenance and repair including outages and their resolution.
- Support all incident response activities that involve respective managed system(s) and services.
- Advocate for security resources as required in City budget processes and in grant proposals.
- Define the business parameters for disaster recovery plans, including both the required recovery time objectives and the required information recovery point.
- Ensure all new Authorized Users are provided with City policies, standards and guidelines.
- Provide timely notification to BTS, System Operators and Data Custodians in events where access to City technology systems and services is no longer required. Such events include employment termination or job duty change.
Data Custodians (Information Custodians)
The role of Data Custodians is to provide direct authority and control over the management and use of specific information or data. The Data Custodians may be a supervisor, manager, or designated professional staff, assigned the responsibility by the Business System Owners (Bureau Director). They may serve dual roles as a Business System Owners/Operators as well as a Data Custodians; however, this practice must be limited and consistent with the principle of separation of duties, such that they typically would not be the technicians (system administrators) that support the related technology systems, services or applications. Their responsibilities include but are not limited to:
- Ensure compliance with all Citywide and Bureau Administrative Rules, policies and all statutory and regulatory requirements.
- Provide System Operators and internet-based service providers the requirements for all access control measures related to the data they are charged with managing and protecting.
- Support access control to data by acting as a single control point for all access authorization. Maintain data access authorization audit logs and documentation. These audit logs and documents must be reviewed with the System Operators or internet-based service provider.
- Support regular review and control procedures to ensure that all Authorized Users and associated access privileges are current, accurate and appropriate.
- Ensure that access granted to Authorized Users is based on the "Principle of Least Privilege" and "Principle of Separation of Duties" as appropriate and where required.
- Ensure that data backup and retention requirements are aligned with business needs and public records Administrative Rules maintained by the City of Portland Auditor's Office.
- Notifies the appropriate System Operators or internet-based service provider when access granted to Authorized Users is no longer required.
- Data Custodians must work in conjunction with System Operators, or internet-based service provider, and Information Security personnel to ensure that "due care" is taken to properly protect City Confidential Information.
System Operators, System Administrators and 3rd party Service Providers
The role of System Operators and internet-based service providers is to provide day-to-day operation of a technology system or service. System operators and internet-based service providers, also referred to as system or service administrators, have the following responsibilities:
- Works with the bureau (Business System Owners and Data Custodians) to understand specific security requirements as they relate to business criticality, confidentiality and regulatory compliance.
- Works with bureau (Business System Owners and Data Custodians) to identify appropriate user access to the system and data.
- Maintains the confidentiality, integrity and availability of City Technology Resources with ongoing patching, monitoring, alerting and status reports.
- Works with Information Security personnel to effectively implement technologies and configurations which comply with information security policies, standards, guidelines and procedures.
- Establishes, prior to implementation, appropriate account access security, technical support access, as well as backup and emergency support.
- Ensures, as appropriate, that physical and logical access security is always controlled, and that robust backup and recovery mechanisms are employed.
- Regularly monitors for unauthorized access as well as maintains a history file for auditing purposes and reports any unauthorized or suspicious activity immediately to Information Security personnel.
- Works with the bureau (Business System Owners and Data Custodians) in preparing disaster recovery plans.
- Works with the Data Custodians to define proper data backups and with the City of Portland Auditor's Office retention schedules and ensures data and information is consistently maintained in accordance with such schedules.
- Removes access to City technology systems and Internet-based services immediately upon notification of authorized access change events such as employee termination or reassignment of job duties.
Subsection 3 - Network Access and Accounts
Purpose
Access to City Technology Resources on City networks and within authorized Internet-based Service Provider (hosted services) is essential for many City Authorized Users to do their jobs. At the same time, security considerations require that access is limited to only those persons whose responsibilities require access, and to only those resources required to fulfill their duties.
Remote Access to City Technology Resources requires enhanced Authorized User identification through Multi-Factor Authentication (MFA). See Bureau of Technology Services Subsection 4 - REMOTE NETWORK ACCESS and Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING for requirements.
The purpose of the Network Access policy is to establish rules for Authorized User access and remote use of the City's Technology Resources.
Administrative Rule
- Access to the City's Technology Resources will be made available to all Bureaus, offices and locations and follow a standard process to determine access requirements for Authorized Users:
- City personnel
- Volunteers
- Community members
- Business partners, and
- Contracted support personnel
- Authorized Users will be given access to only those specific resources required to accomplish their job as determined by Business System Owners and Data Custodians.
- Non-City Authorized Users will not be given access to the City's Technology Resources, except on a case-by-case basis at the discretion of the CTO or by Council action (e.g. Intergovernmental Agreements). Any non-City Authorized User receiving permission to access the City's Technology Resources must abide by all City and BTS technology Administrative Rules, standards and procedures.
- Security-warning banners must be displayed prior to allowing the logon process to be initiated by Authorized Users. This security banner must inform all Authorized Users that the City Technology Resources being accessed are proprietary, must only be accessed by Authorized Users, and that City Technology Resource usage is monitored for City policy enforcement purposes.
- Automated changes to access rights must be enabled wherever available.
Responsibilities
Bureau Responsibilities
- Business System Owners and Data Custodians must identify those Authorized Users who require access to City Technology Resources, including specific network resources and applications. These approved authorizations must be in writing and come from the bureau director or an authorized delegate and maintained by BTS.
- Business System Owners and Data Custodians must identify the minimum required account access required for an Authorized User to effectively fulfill their responsibilities.
- For non-City Authorized Users, the responsible Business System Owners or authorized bureau service delivery manager must identify City Technology Resources access requirements with proper written justification and receive prior approval from the CTO or the SISO. Requests for such access can be made by completing the appropriate request form: Account Management | The City of Portland, Oregon (portlandoregon.gov)
- Business System Owners and Data Custodians or a designated Bureau of Human Resources representative, are responsible for immediately notifying the BTS Helpdesk when access to City Technology Resources should be discontinued. An example includes termination of employment or assignment to responsibilities and duties for which access is no longer required.
- Data Custodians, or those who manage bureau specific data which can be accessed by multiple Authorized Users, are responsible to conduct bi-annual audits to ensure assigned Authorized Users continue to require access. Any required changes of access rights must be immediately reported to the Bureau of Technology Services' HelpDesk: BTS Technology Portal.
Bureau of Technology Services Responsibilities
- Create and delete Authorized User accounts, grant and revoke access to appropriate City Technology Resources as defined by the Business System Owners and Data Custodians following established policies and procedures.
- Enable and Disable MFA for each Authorized User account.
- Disable all Authorized User accounts found to be inactive for a period of 90 calendar days.
- Delete all Authorized User accounts that have been disabled for a period greater than 1 year.
- Respond to bureaus for specific help needed to audit City Technology Resource access.
Subsection 4 - Remote Network Access
Purpose
Remote network access is a generic term used to describe accessing the City's Technology Resources by Authorized Users who are not located within the City's facilities. Remote access may take the form of traveling Authorized Users, Authorized Users who regularly work from home, or Authorized Users who work both from the office and from home. In many cases, both the City and the Authorized User may benefit from the increased flexibility provided by remote access. As with any innovation, however, the benefits may be countered by risks if the purposes and methods of the remote access are not fully understood by all participants.
Internet-based, or "Cloud Services" Software as a Service (SaaS) services that contain City information are included within the scope of Bureau of Technology Services (BTS) Administrative Rules which apply to all City information repositories regardless of their storage locations or means of access. See Subsection 19 - CLOUD SERVICES.
The purpose of this policy is to define the approved methods for City Authorized Users to remotely connect to and access City Technology Resources and how these connections will be established, controlled and managed.
Administrative Rule
Remote access to City Technology Resources by Authorized Users is authorized when business activities require it, subject to approval by the Chief Technology Officer (CTO), the Senior Information Security Officer (SISO), or their delegate. The approved methods of remote access are through an authorized Virtual Private Network (VPN) connection from a City-managed device, or resource-limited access to the City's Microsoft Office 365 environment (Microsoft e-mail, Microsoft Teams, Microsoft OneDrive, or the Hitachi Anywhere portal.) with Multi-Factor Authentication (MFA).
The following additional policies apply to those Authorized Users approved for remote VPN access to City Technology Resources.
- Remote network access must only occur via a BTS maintained and authorized virtual private network (VPN) system. A VPN is not required for the use of the City portal applications with secure access support, such as the City's web and Microsoft Office 365 portal. Full VPN tunnel access is only available to BTS maintained devices.
- When actively connected to City Technology Resources, VPNs force all traffic to and from the remote device through the VPN tunnel. All other traffic is blocked unless City defined split-tunneling is established.
- All VPN Authorized Users assume responsibility to assure that unauthorized users do not access City Technology Resources through their devices, software or configurations. This includes Authorized User's family members, friends, and associates.
- Device security controls must be maintained to City standards in all unsecured remote locations.
- City-Managed Location: any City of Portland site with a City-managed network connection.
- Home Office: Teleworking from home, with VPN is allowed.
- Non-City Location: Not a City-Managed location or home office. Non-City locations are sites where BTS does not have administrative control over the network. VPN should always be active and more stringent security measures can be applied to devices connecting from these locations.
- Foreign countries: using City Technology assets in foreign countries is allowed by exception only. There are numerous security concerns to be aware of while traveling. Please submit a Helpdesk ticket with your itinerary for guidance prior to travel.
- Exceptions to the above require bureau director, CTO and SISO review and approval. Please work with your Business Relationship Manager to submit exceptions.
- VPN connections offer a private connection into the City's network from the internet, therefore additional security measures are required to prevent unauthorized access, including but not limited to MFA. Personal devices are subject to increased security controls.
- For non-City Authorized Users such as vendors and contractors, the responsible Business System Owners must identify remote technology resource access requirements with proper written justification of the business reasons for such access. Additionally, remote access for vendors or contractors must only be enabled during the time needed, disabled when not in use, and promptly deactivated after access is no longer necessary. The SISO holds the final approval authority for all remote access to the City's network.
The following additional policies apply to Authorized Users approved for remote Office 365 access to City Technology Resources.
7. Bureau and BTS authorization are required for remote access to Office 365. Certain Authorized Users may have additional limitations related to remote access. See HRAR-4.04 - Telework and HRAR-4.08 - Information Technologies.
8. Office 365 access requires MFA when accessing City resources from unmanaged devices.
9. Office 365 access does not grant access to City resources and information stored within the City's physical environment (local file shares, databases, endpoint device disk drives, or local applications.
10. City information must not be saved or stored on devices that are not City-owned, managed, or have not been approved and governed by City contract. See HRAR-1.03 - Public Records Information, Access and Retention, and HRAR-11.04 - Protection of Restricted and Confidential Information.
11. City information and records must be managed in accordance with State and City Rules Related to Public Recordkeeping Requirements.
Exceptions to this policy, or any sections thereof, may be granted on a case-by-case basis by the CTO and the SISO. If an exception is granted for VPN technology on non-City devices, Authorized Users acknowledge that their devices are a de facto extension of the City's networks and as such, are subject to all policies that apply to City Authorized Users and City-owned and managed assets, including, but not limited to acceptable minimal security standards of operating systems and software.
Responsibilities
BTS is responsible for setting up remote VPN access in a manner that is consistent with Information Security standards and policies. Such standards and policies include current malware and endpoint protection software, approved operating systems, operating systems patches, active firewalls, as well as other security and remote administration tools.
Subsection 5 - Identity and Access Management
Purpose
The purpose of this policy is to establish a best practices-aligned standard for Identity and Access Management (IAM), accounts, access, privileges, credentials, and passwords using the Zero Trust Architecture framework. For a summary of the model please see: Zero Trust Maturity Model - CISA.gov
Zero Trust Architecture Model
The guiding principle of Subsection 5, Identity and Access Management is Zero Trust Architecture (ZTA). ZTA's core concepts assume a breach has already occurred and each access or resource request made on the City's networks, assets, and technology service platforms is evaluated and authenticated using a central identity store. In other words, no user or asset is implicitly trusted.
"Identity" is one of the five ZTA pillars, or key concept areas: Identity, Devices, Networks, Applications, and Data. Identity is an attribute or set of attributes that uniquely describes a user or entity, including non-person entities. Within the City of Portland, Identity includes accounts, devices, and assets that require access to City Technology Resources. Identity also includes credentials and privileges, tokens, certificates, biometric data, and workload identity federation.
The scope of this policy includes all Authorized Users. Authorized Users include City employees, contractors, volunteers, any 3rd party partner and any resource accessing or using City of Portland Technology Resources.
Administrative Rule
Account Management
Governance of access to City technology resources and information is a service provided by an authorized distribution of delegated authority and rights to create, maintain, audit and terminate accounts, access rules, and services, commonly known as identity lifecycle management. Account management governance and delegation are granted under the authority of the Technology Services Chief Technology Officer (CTO) and Senior Information Security Officer (SISO). Account Manager roles and responsibilities are defined in BTS-2.01 - Information Security Administrative Rule | Portland.gov.
Identification and Authentication
- Authentication must occur using Multi-Factor Authentication (MFA).
- Tokens, such as certificates, may be used in place of passwords. Tokens can include any BTS approved non-password item that acts as or replaces a password.
- Authentication must rely on a single point of authentication: Single Sign On (SSO), managed by BTS.
- Automation must be used to orchestrate identity management and governance, such as Identity Governance and Administration (IGA).
- Authentication must be continuously monitored and evaluated using automation and regular log review by Information Security.
- Unsuccessful or suspicious login attempts will result in an account lockout.
- Inactivity or session timeout must be implemented on all systems.
- Authentication traffic must be encrypted.
- Authentication, Authorization and Auditing (AAA) requirements:
- Identification must be performed by the subject (user, device, entity, etc.) to start the process of authentication, authorization and accountability when accessing an object (file system, file, device, etc.) with the City of Portland. This involves providing the initial identity such as a username, proximity device, smartcard, token, or biometrics.
- Authentication requires the subject to provide an associated password or token to validate a claimed identity.
- Authorization ensures that once the subject's identity has been validated, they have the correct rights to the object being accessed.
- Auditing and Accountability ensures that the subject's actions are tracked and recorded appropriately for the purpose of holding the subject accountable for their actions while authenticated on a City of Portland system or service.
- Privileged Access Management (PAM) should be used for Administrator and other privileged access.
Account Types
Where an account matches one or more of the below definitions, the more restrictive permissions must be used.
- Individual (User) Accounts. An individual account is a unique account issued to a single Authorized User. The account enables the Authorized User to authenticate to systems and services with a unique digital identity. After an Authorized User is authenticated, they are either authorized or denied access to the system or service based on the permissions that are assigned directly or indirectly to an Authorized User.
- Every Authorized User working for the City of Portland must have an Individual Account.
- Administrator Accounts. Administrator accounts provide increased access and require additional authorization. Access will be restricted to only those programs, services or processes specifically needed to perform authorized business tasks and no more.
- Default Accounts are a special type of Administrator Account and must be disabled if not in use or renamed if possible.
- Must only be used for initial system installation or as an approved Service Account.
- The password for Default Accounts must be changed from the factory default upon first usage.
- Default Accounts are a special type of Administrator Account and must be disabled if not in use or renamed if possible.
- Service Accounts. A service account is not intended to be given to an Authorized User but is provided for a system or service process. Service Accounts must:
- Have an assigned owner responsible for documenting and managing the account.
- Be restricted to specific devices and hours when possible.
- Never be used interactively by an Authorized User for any purpose other than the initial system or service installation or if absolutely required for system troubleshooting or maintenance.
- Never be used for any purpose beyond their initial approved scope or function.
- Be internally identifiable as a service account within a standardized naming convention.
- Not allow its password to be reset according to any standardized and/or forced schedule. However, should an Authorized User with knowledge of a given service account password leave the City's employment or authorized role, that password must be changed immediately.
- Have the password known or accessible by at least two individuals within the City if the password is known by Authorized User. As such, restrictions for shared accounts, outlined below, must be followed.
- Shared Accounts. A shared account is any account where more than one Authorized User knows the password and/or uses the same authentication token. Use of shared accounts is only allowed when there is a system, service or business limitation preventing use of individual accounts. These cases must be documented by the information, system or service owner and reviewed by the Information Senior Information Security Officer (SISO) or designated security representative. Additional compensatory cybersecurity controls must be implemented to confirm accountability is maintained. Shared accounts must:
- Only be used after the BTS Information Security team has completed a risk assessment and approves the use case.
- Have the password (token) reset when any of its Authorized Users no longer need access.
- Be restricted to specific services, devices and hours when possible.
- Wherever technically feasible, have its Authorized Users authenticate to the system with their Individual Accounts and "switch user" or "run as" the shared account.
- Have strictly limited permissions and access only to the services or system(s) required.
- Comply with vendor and or contract licensing terms and conditions.
- Have a log maintained of users to whom the password is given.
- Guest Accounts. Guest accounts are for Authorized Users, typically from external organizations, who do not have Individual User Accounts. Guest accounts must:
- Be disabled until necessary and disabled immediately upon completion of approved use.
- Have limited rights and permissions.
- Have compensatory controls that include restricted network access.
- Be assigned a password the Authorized User cannot change but is changed monthly, at a minimum, by an account administrator.
- Not allow the account to be assigned for delegation by another account.
- Anonymous Accounts.
- Anonymous accounts are only allowed for limited use cases and after an Information Security team risk assessment.
- Emergency Accounts. Administrators may establish emergency accounts in response to crisis situations and with the need for rapid account activation. Emergency accounts must be accompanied by a business justification reviewed and approved by the CTO or SISO.
- Temporary Accounts: Temporary accounts must have strictly limited permissions and access only to the systems or services required. These accounts must be approved by the CTO or SISO.
- Temporary accounts may be any other type of account not defined in this policy or within City of Portland Security Standards 4.0.
- Must automatically be disabled after predefined term of 90 days.
- Test Accounts. Like Temporary Accounts, test accounts are temporary with the same additional controls.
- Test Accounts must have an expiration date defined at their creation after which the account is automatically disabled.
- External Accounts. Non-City access to City Technology Resources may be granted by Business System Owners.
- Access must be reviewed annually, and expiration dates defined.
- Have limited permissions and limited administrative access rights.
Passwords
The City of Portland has updated City Password standards to align with the National Institute of Standards and Technology NIST SP 800-63-3 - Digital Authentication Guidelines, or as revised.
- Each Authorized User is issued a single, unique City domain account and password.
- Sharing Authorized User accounts and passwords is prohibited. The Bureau of Technology Services (BTS) will work with bureaus who request an exception to this rule or to assist in implementing secure methods to address requirements met by Shared Accounts or for limited access use cases.
- Authorized Users are not permitted to reveal their passwords.
- If an account or password is suspected to have been compromised, an Authorized User must report the incident to the BTS Helpdesk and change the password immediately.
- Reuse of City credentials and passwords is prohibited. City domain passwords must not be used for non-City purposes.
- The use of a password manager is recommended for secure storage of all City Authorized User passwords and account credentials. See City of Portland Security Standards 4.0 for more information about password management.
- Do not write passwords down or store them anywhere in your workspace. Do not store passwords in a file on any storage device without BTS approved encryption technologies.
- Guidance list of "don'ts" for Password use and protection:
- Don't reveal a password over the phone to anyone. BTS personnel will never ask for your passwords. If someone does ask for your password, please report this to btsinfosec@portlandoregon.gov.
- Don't type and store passwords in clear text (e.g. notepad or MS OneNote).
- Don't reveal a password in an email or text message.
- Don't reveal a password to your supervisor.
- Don't talk about a password in front of others.
- Don't hint at the format of a password (e.g., "my family name").
- Don't reveal a password on questionnaires or forms.
- Don't forget to use caution when completing on-line forms that request current or new passwords. Submission forms may be intercepted.
- Don't share a password with family members or friends.
- Don't reveal a password to co-workers while out sick, traveling or on vacation.
- Don't use the "Remember Password" feature of technology applications and services (e.g., Microsoft Edge, etc.) as these leave your password vulnerable on the systems they are stored. This is a high-level security concern on shared systems such as kiosks or on an open wireless (Wi-Fi) network.
Password Discovery and Hardening
- Password cracking or guessing may be performed by the Information Security Office on a periodic or random basis. If a password is guessed or cracked during one of these scans the Authorized User will be required to change their password immediately.
Subsection 6 - Database Passwords
Purpose
This policy states the requirements for securely storing and retrieving database usernames and passwords (i.e., database credentials) for use by a software program or application that will access a database running on a City network or on City Technology Resources hosted outside of City networks.
Technology applications and services often require the use of database servers. To access these databases a software application or service must authenticate to the database by presenting authorized credentials. The database privileges that the credentials are meant to restrict can be compromised when the credentials are improperly stored.
This policy applies to all technology applications and services that access City Technology Resources production databases using stored credentials. An example of this scenario is a web server or batch processing system authenticating to a database server for the purpose of processing database queries on behalf of an Authorized User.
- Database Password strength is governed by Subsection 5 - IDENTITY AND ACCESS MANAGEMENT and City of Portland Security Standards 4.0, section 4.2 Password Requirements.
- BTS will work with bureaus who request an exception to this rule or to assist in implementing secure methods to address database password requirements.
Administrative Rule
General
- To maintain the security of the City's internal or hosted databases, access by technology software applications and services must be granted only after authentication with valid credentials. The credentials used for this authentication must not reside in the main, executing body of the software application or service's source code in clear text. Stored authentication credentials must remain encrypted.
Specific Requirements for Database Passwords
Storage of Database Usernames and Passwords
- Database usernames and passwords must be stored in a file separate from the executing body of the program's code. This file must not be world/everyone readable.
- Database credentials may reside on the database server. In this case, a hash number identifying the credentials may be stored in the executing body of the program's code.
- Database credentials may be stored as part of an authentication server (i.e., an entitlement directory), such as an LDAP (Lightweight Directory Access Protocol) server used for user authentication. Database authentication may occur on behalf of a program as part of the user authentication process at the authentication server. In this case, there is no need for programmatic use of database credentials.
- Database credentials must not be stored in a location that can be accessed externally through a web browser.
- Passwords or pass phrases used to access a database must adhere to Subsection 5 - IDENTITY AND ACCESS MANAGEMENT.
Retrieval of Database Usernames and Passwords
- If stored in a file that is not source code, then database usernames and passwords must be read from the file immediately prior to use. Immediately following database authentication, the memory containing the username and password must be released or cleared.
- The scope into which database credentials may be stored must be physically separated from the other areas of code, e.g., the credentials must be in a separate source file. The file that contains the credentials must contain no other code but the credentials (i.e., the username and password) and any functions, routines, or methods that will be used to access the credentials.
- For languages that execute from source code, the credentials' source file must not reside in the same browse-able or executable file directory tree in which the executing body of code resides.
Access to Database Usernames and Passwords
- Each technology application and service function accessing a City managed or hosted solution (SaaS) database must have unique database credentials. Sharing of credentials between programs is not allowed.
- Database passwords used by programs are system-level passwords as defined by Subsection 5 - IDENTITY AND ACCESS MANAGEMENT.
- Database usernames and passwords used by technology software applications, services or programs, such as a web server connecting to a database, must not also be used for interactive sessions by end users or system operators.
- Developer groups must have a process in place to ensure that database passwords are controlled and changed in accordance with Subsection 5 - IDENTITY AND ACCESS MANAGEMENT. This process must include a method for restricting knowledge of database passwords to a need-to-know basis.
- Access to database usernames and passwords MUST be from a limited number of authorized administrative endpoints and use MFA unless by exception.
Subsection 7 - Patching, Malware Prevention and Recovery
Purpose
Malicious software (malware) can be transferred over the Internet, by Mobile Devices, Removable Media, local area networks, email, and other means. Malware can quickly spread to destroy or corrupt data and valuable City information. Essential services for internal and external customers of City Technology Resources can be drastically affected by malware infections. To maintain high availability of City Technology Resources continuous efforts must be made to prevent malware infections.
This policy applies to all devices connected to City networks and hosted (SaaS) City Technology Resources to ensure effective malware prevention, detection and eradication. Devices may be City-managed or personal, smartphones, computers, portable storage devices, and network devices.
Any device or network connection that does not meet City security standards will be disconnected and prevented from accessing City Technology Resources.
Administrative Rule
All systems, devices, City-owned or personal, or Hosted Technology Recourses connected to City-owned and managed networks must have Bureau of Technology Services (BTS) approved malware protection software, operating systems, operating system patches, firmware, applications, and application patches installed, operational and up to date.
Responsibilities
Bureau of Technology Services Responsibilities
- Maintain technology vulnerability and patch management program for continuous process improvement and to provide regular cybersecurity posture health and maturity status reports.
- Maintain and review logs of repair and patching with approved and controlled tools.
- Maintain the lifecycle of hardware, software, operating system, patches, firmware, and all technology equipment: procurement, installation, maintenance, patching, and monitoring of City assets.
- Maintain vulnerability management tools and capabilities and scan City assets frequently for vulnerabilities and indicators of compromise.
- Disclose detected Vulnerabilities to relevant parties and request patching in accordance with the severity of the vulnerability.
- Maintain malware and threat prevention software in accordance with City standards and to institute measures to ensure that malware prevention methods remain current.
- Patch management must be prioritized based on the severity of the vulnerability the patch addresses. Patching must meet applicable requirements within City of Portland Security Standards 4.0.
- If patching cannot be completed in the timeframe listed in the above linked standards documentation, compensating controls must be put in place up to and including removal of unpatched devices from the network.
- Maintain procedures for proactively preparing for and reactively responding to security incidents to minimize City impact and restore full operations as quickly and securely as possible.
- Isolate or quarantine systems and/or network segments and Internet-based services to prevent and/or contain malware outbreaks, minimize impact and to effectively restore services in a timely manner.
- Implement technologies and establish policies and procedures that limit the methods for connecting such devices and segmenting such devices (smartphones, computers, tablets, etc.) that do not meet City minimum security standards and specifications.
Bureau and Authorized User Responsibilities
- Comply fully with all malware security actions, warning and notices as issued by BTS.
- Work with BTS to patch vulnerabilities according to BTS Standards (insert link to standards doc), including scheduling downtime and coordinating outages with users and customers.
- Immediately report all suspected malware incidents or missing/malfunctioning malware protection software to the BTS Helpdesk.
- For Bureau-Supported hardware, software, or operating systems, patching must be completed on the same scheduled that applies to BTS according to the City of Portland Security Standards 4.0.
- Bureaus are responsible for funding the replacement of bureau-owned devices when they no longer support BTS policies or standards required to maintain security and patching on such equipment. BTS may take preventive action to protect the City network from devices which are bureau-supported and non-compliant. This may include firewalls, segmentation, and other security implementations.
- As noted in HRAR-4.08 - Information Technologies do not download and/or install any software (including free or trial software) on City devices without prior BTS approval.
- Do not connect any non-BTS supported device to the City network without prior BTS validation and authorization.
- Do not circumvent, disable, or remove any BTS malware protection software, systems or patches.
Use of personal and non-City devices to access City Technology Resources
- Personal devices may connect to cloud hosted City Technology Resources, such as Microsoft Office 365, when following all applicable City of Portland BTS, Bureau of Human Resources and City of Portland Auditor's Office Administrative Rules.
- Personal devices are not allowed to connect directly to the City network. Devices not secured and maintained by the City to BTS security standards present unpredictable risks.
- Remote users may use SSL VPN from personal devices that meet City security controls.
Supporting Practices
With assistance from the Bureau of Technology Services, bureau and office managers must ensure that Authorized Users are provided with information on safe practices for malware protection and that these safe practices are always observed.
As per HRAR-4.08 - Information Technologies, City Authorized Users are reminded of the expectation to observe safe practices regarding the use of devices to minimize malware risks.
Subsection 8 - Incident Reporting and Response
Purpose
Security compromises can potentially occur at every level of computing from an individual's desktop computer or mobile device to the largest and best-protected technology systems within the City. Incidents can be accidental incursions or deliberate attempts to compromise City Technology Resources and can be benign to malicious in purpose or consequence. Regardless, each incident requires careful response at a level commensurate with its potential impact on the security of individuals, business services, systems and the City as a whole.
For the purposes of this policy an "Information Security Incident" is any accidental or malicious act with the potential to a) result in misappropriation or misuse of Confidential or personal information (compliance information, such as PCI, CJIS, FTI; attorney client privileged information, social security numbers, health records, financial transactions, etc.) b) imperil accessibility to or the functionality of City Technology Resources, c) allow unauthorized access to City resources or information, or d) allow City Technology Resources to be used to launch attacks against the resources and information of other individuals or organizations.
In the case an Information Security Incident is determined to be of potentially serious consequence, the responsibility for acting to resolve the incident and to respond to any negative impact rests with the BTS Information Security Office in cooperation with the Chief Technology Officer (CTO) rather than other specific individuals, bureaus, departments, or groups. The City has established procedures and identified the Senior Information Security Officer (SISO) as its authority in developing response plans to serious Information Security Incidents. As described below, reports of Information Security Incidents will immediately be forwarded to the SISO. The SISO follows protocols in determining what actions must be taken and depending upon the nature of the security incident will determine whether incidents should be handled within the purview of the affected bureau, Bureau of Human Resources (BHR), or by additional security and operations specialists within BTS, the Information Security Office, or through partnership with external information security incident response resources. In certain cases, the SISO may escalate the incident to the City Attorney's Office, law enforcement, BHR, Risk Management or other City officers.
This policy outlines the procedures Authorized Users must follow to report potentially harmful Information Security Incidents. Authorized Users whose responsibilities include managing computing and communications systems have even greater responsibilities. This policy outlines their responsibilities in securing systems, monitoring and reporting Information Security Incidents, and assisting Authorized Users, Business System Owners, Data Custodians, System Operators and Administrators, and BTS staff to resolve security incidents.
Administrative Rule
All Authorized Users must take appropriate actions to immediately report and minimize the impact of Information Security Incidents.
Reporting unlawful or improper actions of Authorized Users is expected and covered in the following Bureau of Human Resources Administrative Rules:
HRAR-4.08 - Information Technologies
HRAR-11.01 - Statement of Ethical Conduct
HRAR-11.02 - Prohibited Conduct | Portland.gov
HRAR-11.03 - Duty to Report Unlawful or Improper Actions
Human Resources Administrative Rules
Responsibilities
Authorized Users
- Report Information Security Incidents immediately to the BTS Helpdesk by phone 503.823.5199. BTS support staff will help you assess the problem and determine how to proceed.
- Do not delete anything unless told to do so.
- Following the report, individuals must comply with directions provided by BTS support staff and/or the SISO to repair the system, restore service, and preserve evidence of the incident.
- Individuals must not take any retaliatory action against a system or person believed to have been involved in an Information Security Incident.
BTS Support Professionals
BTS Support Professionals have additional responsibilities for Information Security Incident handling and reporting for the systems and services they manage. In the case of an Information Security Incident, BTS support staff must:
- Respond quickly to reports from individuals.
- Take immediate action to stop or contain the incident from continuing or recurring.
- Following BTS Incident Response protocols and established procedures determine whether the incident should be handled locally or reported to the SISO.
- Analyze impact of incidents according to the criticality (threshold) of the event by performing forensic analysis.
- Use all available logs, data and other tools to assess the criticality of the incident.
- Respond to incidents within the context of Continuity of Operations, Contingency, and Disaster Recovery Plans.
- Once the incident is understood, it will be mitigated, and response processes will be updated with lessons learned.
- If the incident involves the loss of City Confidential and Restricted Information, including personal information, critical data, or has potentially serious impacts for the City, the BTS Support Professional must:
- Contact the Information Security Office immediately. The SISO or a delegate will investigate the incident in consultation with the CTO and relevant technology support specialists and develop an Incident Response plan.
- File a report, using BTS' service ticketing system, including a description of the incident and documenting any actions taken. The Information Security Office may request BTS Support Professionals to complete an Information Security Incident report form.
- Do not discuss the incident with others until a response plan has been formulated. The SISO and the appropriate Principal Information Officer will determine information disclosures and notices.
- Follow the Incident Response plan to preserve evidence of the incident, repair the system(s) and restore services.
- Manage public relations and ensure reputation is repaired after an incident.
Subsection 9 - Mobile Devices and Removable Media
Purpose
The purpose of the City's Mobile Devices and Removable Media security Administrative Rule is to establish rules for the use of Mobile Devices and Removable Media and their connection to the City's networks and authorized Internet-based Service Provider hosted services. These rules are necessary to preserve the integrity, availability and confidentiality of City information and technology assets.
Administrative Rule
- Mobile devices are computing devices in a small form factor that have at least one network connection interface, non-removable and/or removable storage, and are portable (i.e., non-stationary). These devices come in various forms such as: smartphones, smart watches, tablets, laptops, and wearable devices.
- Mobile devices must follow all relevant City Administrative Rules and Information Security Administrative Rules.
- Only Bureau of Technology Services (BTS) approved Mobile devices and Removable Media may be used to access City information systems and resources. The BTS Infrastructure Board, administered by BTS' Enterprise Architecture, approves Technology Standards.
- Employees may not download City information onto personal devices. The download of City data to personal devices exposes employees to the possibility of subpoena or Records Requests.
- City Confidential Information stored on Mobile Devices or Removable Media must use BTS approved encryption techniques for temporary data storage. Please see Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING for more information on the definition of Confidential and Restricted information.
- City Confidential and Restricted Information must not be transmitted via wireless technology to/or from a Mobile Device unless BTS approved encrypted wireless transmission protocols are implemented. See also Subsection 10 - WIRELESS NETWORKS.
- Sharing devices will be evaluated by BTS, to ensure tracking of device ownership, licensing, and accountability, authorization, and authentication. Single-user devices (smartphones and similar devices incapable of authenticating multiple users) cannot be tied to multiple user accounts and identities.
- Mobile devices and Removable Media must have BTS approved storage encryption, anti-malware capability, and device firewall operational and always activated.
- Mobile devices that cannot support the requirements of Subsection 5 - IDENTITY AND ACCESS MANAGEMENT are required at a minimum to implement a six-digit PIN with a fifteen-minute inactivity lockout.
- Use of synchronization services, such as backups, for mobile devices (e.g., local device synchronization, remote synchronization services, and websites) must be controlled through a Mobile Device Management (MDM) or other centralized management solution.
- Mobile devices may not access City networks unless their integrity is verified (including whether the device has been rooted/jailbroken, software patches, OS patches, etc.).
- All remote and mobile device access to City networks and authorized Internet-based Service Provider hosted services must comply with the requirements of Subsection 4 - REMOTE NETWORK ACCESS.
- Non-City owned mobile devices and remote access services that require City network connectivity must conform to City information security policies and standards. Non-City owned or managed mobile devices may have limited access rights to City technology resources and information.
- All City Authorized Users must secure Mobile Devices and Removable Media in their care and possession and immediately report any loss or theft of such devices to their bureau management and BTS HelpDesk. Additionally, if such devices support connectivity to City networks, the BTS Helpdesk 503-823-5199 must be contacted to take immediate steps to protect against unauthorized access to the City's Technology Resources.
- Exceptions to this Administrative Rule must be approved in writing by the Chief Technology Officer (CTO) or the Senior Information Security Officer (SISO).
Subsection 10 - Wireless Networks
Purpose
This policy prohibits access to City Trusted Networks via unsecured wireless communication mechanisms. Only wireless systems that meet the criteria of this policy and City Information Security Standards and Administrative Rules or those Authorized Users which have been granted an exclusive waiver by the Chief Technology Officer (CTO) or the Senior Information Security Officer (SISO) are approved for connectivity to the City's Trusted Networks.
This policy covers all wireless information communication devices, whether City managed or personally owned (e.g., computers, laptops, notebooks, smartphones, tablet computers, etc.) which connect to any of the City's networks, or authorized Internet-based Service Provider hosted services, technology resources, or City managed or connected systems.
Administrative Rule
- Wireless networks must follow all requirements of information security policies, standards, and City Administrative Rules including, but not limited to, a risk assessment prior to implementation.
- Register Network Infrastructure Wireless Devices: All network infrastructure wireless devices (Access Points, Base Stations and Network Interface Cards) connected to City networks must be approved, registered, installed and maintained by the Bureau of Technology Services (BTS).
- Encryption and Authentication: To connect to City networks, all networking devices with wireless capabilities must utilize a City approved configuration which prohibits all unauthenticated and unencrypted traffic.
- Wireless networks must use the strongest encryption available.
- All Wireless Network device implementations must support a hardware address (MAC address) or BTS approved unique device identifier (Certificate or other) that can be registered and tracked.
- All wireless implementations must support and employ strong user authentication which checks against BTS approved and managed Identity and Access Management stores using approved Authentication Protocols and procedures.
- Setting the Service Set Identifier (SSID): All wireless access points must have their SSID configured so that it does not contain the default authentication credentials supplied by the manufacturer or disclose the manufacturer or model information.
- Wireless security measures must be applied to all wireless networks, such as, but not limited to Intrusion Detection Systems (IDS).
- Public wireless networks must be, at a minimum, physically separated from the internal network or configured to tunnel to a secure endpoint outside the internal network. The design must be included in the documented security plan.
- The wireless network administration console must not be directly accessible from the wireless network.
- Penetration Tests and Audits: Wireless Access Points and Base Stations are subject to periodic penetration tests and audits. Unauthorized Wireless Access Points are subject to immediate network disconnection and equipment confiscation.
- Default wireless manufacturer or vendor settings must be changed, including but not limited to default wireless encryption keys, passwords and SNMP community strings.
Subsection 11 - Analog Modems
Purpose
This policy explains the City's analog modem acceptable use and approval rules and procedures. This policy covers the use of modems that are connected to City Trusted Networks and City Technology Resources.
This rule applies only those modems that are connected to a device or networks within City owned or occupied facilities.
There are two important scenarios that involve modem misuse which BTS attempts to guard against through this policy. The first is an outside attacker who calls a set of phone numbers in the hope of connecting to a device which has a modem attached to it. If the modem answers from inside City premises, there is the possibility of breaching the City's internal networks through that device. At the very least, information that is held on that device can be compromised. This potentially results in the loss of City Confidential and Restricted Information.
The second scenario is the threat of anyone with physical access to a City facility being able to use a modem equipped device. In this case, the intruder could connect to City Trusted Networks of the City through the device's Ethernet connection and call outbound to an unmonitored site using the modem, with the ability to exfiltrate City information to an unknown location. This could also potentially result in the substantial loss of Confidential and Restricted Information.
Administrative Rule
All requests for analog communication access - into or exiting from City Trusted Networks - require preapproval from the Chief Technology Officer (CTO) or Chief Information Security Officer (SISO).
Procedure
Requesting a Modem Connection
The requester must submit a service request to the BTS HelpDesk. Guidance and resources are available at BTS - Secure Virtual Private Network (VPN) Secure Remote Access.
The CTO or SISO will review and rule on all analog modem requests.
Once approved by a Bureau Director, the individual requesting a modem connection must provide the following information:
- A clearly detailed business case of why other secure connections available within the City cannot be used.
- The business purpose for which the modem is to be used.
- The software and hardware to be connected to the analog phone line and used across the line.
- To what external connections the requester is seeking access.
The business case must answer, at a minimum, the following questions:
- What business services will be conducted over the modem?
- Whether any City Confidential or Restricted Information is transmitted?
- Why a City equipped desktop computer with Internet access capability is unable to accomplish the same tasks as the proposed modem?
In addition, the requester must be prepared to answer the following supplemental questions related to the security profile of the request:
- Will the devices that are using the modem be physically disconnected or network segmented from City's internal network?
- How will the modem be secured? Where will the modem be placed? An office, cubicle, or lab?
- Is dial-in from outside of the City required? If so, what authentication controls or audit logs are in place to prevent unauthorized remote access?
- How many modems are being requested, and how many Authorized Users will use them?
- How often will the modem be used? Once a week, 2 hours per day, etc.?
- What is the earliest date the modem can be terminated from service as the modem must be removed as soon as it is no longer in use?
- What means will be used to secure the modem from unauthorized use?
- What types of protocols will be run over the modem and analog line?
Device Configuration Requirements:
1. BTS will install approved endpoint detection and response (EDR) software on the device(s) using the modem.
Subsection 12 - Physical Security and Assets
Purpose
This policy describes the methods and responsibilities for protecting Citywide physical computer, network, communications and City Technology Resources. The City requires that appropriate environmental controls, physical protection and access controls be in place to protect computing and information resources. Proper and adequate physical security and protection is the responsibility of all City Authorized Users.
Physical Security
Physical security measures are an important part of any effort to protect City Technology Resources and City technology services, which include hardware, software, physical storage media and printed materials, and access security controls. Physical security control measures will be applied in accordance with physical and environmental considerations, compliance regulations, information privacy and confidentiality, and service criticality.
Public Areas
- City of Portland physical locations where the public may enter without restriction.
- Areas with kiosk computers or bill pay stations.
- Customer service counters.
- Public meeting rooms.
- Any other location the public is welcome.
Restricted Areas
- Small sets of individual Bureau servers located in office and remote location environments.
- Computer labs which host computing and network equipment used for testing and development purposes.
- Telecommunications closets which contain network and communications equipment and wiring.
- Media storage areas and vaults which are used to store electronic media such as backup disk drives, surplus equipment, as well as classified and archival documents.
- Modest-sized server rooms which host a limited number of computing devices and networking equipment.
- Enterprise data center facilities that host a wide variety and large quantity of critical computing equipment such as technology appliances, servers, data libraries, information storage arrays and network equipment.
- Internet-based Service Provider services that provide software as a service (SaaS) and information technology services that extend the City's networking environment.
- Any area where Criminal Justice Information (CJI) is processed.
Regardless of the specific environment, the City requires physical security requirements to be supported by all Business System Owners, Data Custodians, System Operators, and Authorized Users.
Assets
- Physical technology assets include but are not limited to servers, routers, switches, load-balancers, firewalls, workstations, laptops, tablets, smart phones and any physical technology device that holds or transmits City data.
- Software, including all applications used on City systems, Software as a Service, Platform as a Service, Infrastructure as a Service, or other applications hosted in a 3rd party cloud.
- Cloud-based solutions hosted in City-managed or owned public clouds.
- Containerized Servers.
Supply Chain
- Supply Chain is how products or assets are acquired, including multiple tiers of procurement, ordering, contracting, logistics and manufacturing.
- The Supply Chain needs to be understood to accurately assess risks to it, and plan for impacting events.
Administrative Rule
At a minimum, the following physical security measures and objectives must be implemented where applicable to protect City Technology Resources, and City Confidential and Restricted Information:
- All technology assets, both physical and virtual (hardware, software, and any other construct that interacts with the City's network), must have an asset tag or a unique identifier which will be tracked in a centralized data repository.
- Access keys and key codes to restricted areas must be limited to only those individuals needing entry to fulfill their job responsibilities. Records of individuals' assigned access must be maintained. Access logs must be maintained for at least one year, at a minimum, or if applicable regulations require. Access approval shall be 'minimum necessary' and 'need to know' in keeping with regulatory and applicable City Administrative Rules.
- Technology appliances, servers, network equipment, computer media containing City Confidential and Restricted Information and other essential computer and network devices must be stored in a secure location, such as a locked room, that protects them from unauthorized physical access, use, misuse, destruction or theft.
- Smoke/fire alarm and suppression systems are required for all data centers, server rooms and telecommunication closets to mitigate personnel harm and/or damage to City Technology Resources in the event of a fire.
- Temperature and ventilation control measures are required for all data centers and server rooms to protect City Technology Resources from preventable service disruptions or physical harm from negative environmental conditions.
- All mission critical data centers must employ emergency power control systems (backup generators and uninterruptible power supplies) to avoid disruptions and/or equipment/data harm due to power related failures.
- Inventory control measures such as inventory reports, asset tags or other identification markings for tracking are required per City accounting policy.
- All access to restricted areas, such as data centers, server rooms, and telecommunications closets, by unauthorized individuals must always be conducted with an authorized City employee escort.
- All specific tools, systems, or procedures implemented to meet physical security requirements must be selected based on importance to safety, information and physical security and compliance with City Administrative Rules, policies and standards.
- Each technology purchase should have the Supply Chain identified and tracked. (Supply Chain - NIST.gov).
- Component authenticity should be verified.
- Purchasing technology from federally or locally prohibited sources is not permitted.
- Supply Chain for critical assets must be tracked, and a Supply Chain Risk Management Plan should be created to prepare for critical events.
- If an asset is lost or stolen, report the loss to BTS and file a police report if stolen.
- Data, as an asset, should be destroyed according to the level of classification assigned. See Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING
All Authorized Users must be responsible to secure City Technology Resources in their care and possession and immediately report any loss or theft of such assets to their management and the BTS HelpDesk. Additionally, all Authorized Users must be aware of Unauthorized Users (e.g. maintenance, public and others visiting, delivery personnel, vendors, etc.) and be prepared to challenge individuals entering data centers, computer rooms and other restricted areas. Attempts by Unauthorized Users to access City Technology Resources or facilities must be reported to the OMF Facilities Security office.
Subsection 13 - Intrusion Prevention and Detection
Purpose
Intrusion prevention and detection plays an important role in implementing and enforcing the City's Information Security policy. As information technology services and systems grow in complexity, effective security protection systems must mature. With the proliferation of cybersecurity vulnerabilities introduced by use of internetworking technologies a level of assurance is needed that City Technology Resources are secure. Intrusion prevention and detection systems provide an essential part of that assurance.
The City Intrusion Prevention and Detection policy applies to all Authorized Users and all access to City Technology Resources. Additional responsibilities are assigned to technology support and administrative roles that are responsible for the installation of new information technology systems and services, the operations of existing information technology systems and services, and Authorized Users charged with information security.
Administrative Rule
- Analyze threat alerts, threat detections and threat intelligence on a regular basis.
- Operating system, user accounting, and application software audit logging processes must be enabled on all endpoint (host), Internet-based Service Provider (cloud) and server systems.
- Active scanning, packet captures, and TLS inspection is used to investigate and proactively detect and stop malicious activity.
- Alarm and alert functions of all firewalls and other network access control systems must be enabled.
- Audit logging of all firewalls and other network access control systems must be enabled.
- Audit logs from the access control systems must be monitored and reviewed by the service or system operators.
- Service and system integrity checks of the firewalls and other network access control systems must be performed on a routine basis, as approved by the Information Security Office.
- File, file system, firmware and OS integrity must be monitored and verified.
- Software control. Create an allow or deny list of approved and prohibited software, scripts and code, including mobile device code and software.
- Audit logs for services, servers and hosts on the internal, protected, network must be reviewed by the responsible BTS Support Professionals, Business Systems Owners, or System Operators and System Administrators.
- Audit logs for Internet-based Services Provider services must be reviewed by accountable City Authorized Users as defined within the terms of the service contract, applicable regulations, City and BTS policies and Administrative Rules.
- System Operators and System Administrators will furnish audit logs to the Information Security Office upon request.
- Audit log review, in conjunction with event correlation software, may be delegated to authorized service and system technical custodians.
- Endpoint-based (host) threat detection and response (EDR) and network-based intrusion prevention and detection tools must be audited on a routine basis as required by applicable regulations, City and BTS policies and Administrative Rules.
- All critical and high threat alerts and reports of anomalous activity must be reported to and reviewed by BTS Support Professionals for symptoms that might indicate unauthorized access or cyber threat activity. The Information Security team will assess whether an Incident Response plan activation is warranted.
- All suspected or confirmed instances of unauthorized access, misuse or abuse of City Technology Resources must be immediately reported by Authorized Users and BTS staff according to Subsection 8 - INCIDENT REPORTING AND RESPONSE.
Subsection 14 - Security Assessments, Audits and Penetration Tests
Purpose
This policy outlines the authority for Authorized Users of the City's Information Security Office to conduct security audits, monitoring, and investigations of technology systems within and connected to City Trusted Networks. The Information Security Office is also authorized to request third party Service Providers provide annual third-party security audit reports and all findings for anomalous activities and suspected security compromises.
Audits may be conducted to:
- Ensure integrity, confidentiality and availability of information and City Technology Resources.
- Investigate possible Security Incidents and ensure compliance with mandatory regulations and City information security policies and Administrative Rules.
- Monitor user or system activity where appropriate, and to detect and prevent unauthorized access to City Technology Resources.
- Develop Risk Assessments related to compliance, including but not limited to Criminal Justice Information (CJI) or Federal Tax Information (FTI).
- Develop Disaster Recovery, Continuity of Operations and Contingency Plans.
- Conduct Supply Chain risk assessments.
This policy applies to all technology devices owned or operated by the City and any non-City owned, personal technology devices that are present on City owned premises or are connected to City Trusted Networks and may not be owned or operated by the City.
Administrative Rule
When City Information Security Office Authorized Users conduct information security audits, investigations, penetration tests and activate Incident Response plans, City personnel must, upon request, provide appropriate and timely information and access to applications, systems and facilities. This policy does not supersede the requirement that the City auditor or other appropriate Bureau Directors approve access to City Technology Resources, such as when restricted by law or State and Federal requirements.
Audit and investigation access by the Information Security Office may include:
- Authorized User level and/or system level access to any City or personal technology device accessing City Technology Resources.
- Access to information (electronic, hardcopy, etc.) that may be produced with, transmitted through or stored on City Technology Resources.
- Access to City owned and managed work areas (data centers, computer rooms, telephone closets, labs, offices, cubicles, storage areas, etc.).
- Access to interactively monitor and log traffic on City Trusted Networks.
- Access to information to inform Risk Assessments, Risk Management and Risk Tolerance.
The City is subject to several State and Federal cybersecurity compliance requirements that mandate routine audits by the City. The City's Information Security Office performs internal compliance audits and investigations in support of the City's regulatory compliance and Administrative Rules.
Certain Information Security threat identification capabilities, systems and services automatically perform security analyses that are designed to alert BTS and Authorized Users to Security Incidents, cybersecurity threats, technology system failures, and out-of-policy activities.
Subsection 15 - Encryption
Purpose
Encryption standards and technologies are used to prevent Unauthorized Users from accessing or altering Confidential or Restricted Information stored on City Trusted Networks and City Technology Resources, Hosted Technology Resources, or transmitted across City and public networks.
The purpose of this policy is to provide guidance for where encryption technologies must be implemented and limit the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively. Additionally, this policy provides direction to ensure that State and Federal regulations are observed, and legal authority is granted for the dissemination and use of encryption technologies outside of the United States.
Administrative Rule
Applicability
Approved encryption standards and techniques for the storage and transmission of City Confidential and Restricted Information must be implemented based on a) information classification, as defined in Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING and, b) information security risk management decisions established by the Chief Technology Officer (CTO), Senior Information Security Officer (SISO) and Business System Owner, unless expressly required and defined by regulation, statute or contractual obligation.
The following classifications of Confidential and Restricted Information are expressly subject to the City's Encryption policy:
- Criminal justice information (CJI) when transmitted across public networks or any private network that is shared with non-criminal justice Authorized Users.
- Authorized User or application-level credentials (account names and passwords).
- Payment Cardholder Data (PCI) including primary account number, cardholder name, expiration date, and service or security code or Personal Identification Number (PIN)
- Personally identifiable information (PII) as defined by the Oregon Consumer Information Protection Act.
- Electronic protected health information (PHI) such as health benefit information covered under HIPAA privacy regulations.
- Any 802.11 wireless or Remote Network Access communications when used to connect to the City's Trusted Networks or City Technology Resources.
- Confidential and Restricted Information stored on Mobile Devices, such as laptops, smartphones, and Removable Media, such as USB thumb drives.
Note: This is not a complete list and is provided to give general guidance for commonly used Confidential and Restricted Information which are subject to higher levels of information security protection. Please contact the BTS Information Security Office for appropriate classification of data and to help determine if encryption is required. See also Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING.
Additional Compliance Considerations
- Where networks and systems are under legal regulations such as Criminal Justice Information Systems (CJIS) standards, there may be additional encryption requirements above and beyond the City's encryption policy.
- Criminal Justice Information is restricted to authorized United States agency use within U.S. borders.
Subsection 16 - Firewall and Security Systems
Purpose
This policy describes the methods and responsibilities for securing City Trusted Networks, City Technology Resources, and City Confidential and Restricted Information. Specifically, this policy outlines the standards and authority for managing the City's Trusted Networks and cybersecurity threat detection, prevention, and defense systems.
Administrative Rule
Information Security is responsible for developing all policies, standards and configuration change controls for the implementation, and use of firewalls and security systems within the City. These policies and standards include but are not limited to:
- At minimum, a stateful packet inspection firewall is required at each Internet and external connection, and additional security features will be enabled as needed.
- Firewalls are required between security boundaries or Security Zones, including boundaries between the City and external entities, and between internal City systems with different security levels or purposes.
- Firewalls will be used to enforce security between subnets, and to enable network segmentation.
- Management, administrative, and other Confidential networks should be protected by firewalls.
- A stateful packet inspection firewall is required between any Demilitarized Zone (DMZ) and/or Security Zone and the City's Trusted Networks and City Technology Resources.
- A stateful packet inspection firewall is required on either side of resources shared between the City and external partners to form a DMZ between the two entities networks. These firewalls must be physically separate devices or clusters when protecting networks managed by two different groups, or creating DMZs for high security systems, including external networks, Industrial Control Systems, or other critical infrastructure.
- A stateful packet inspection firewall must reside between the Internet and any City system, resource or network-connected device. Inbound Internet traffic must be limited to DMZs that include security systems and capabilities which provide authorized publicly accessible services.
- Determination of Standard Changes and Risk Assessments for firewall rule additions, change, and exceptions.
- Additional Firewall Standards are defined within City of Portland Security Standards 4.0.
- Firewalls must be configured to specifically deny traffic that has not been approved and documented.
- Firewall rules must be reviewed by BTS firewall administrators at least once every six months to ensure the rules' accuracy and continued necessity.
Intrusion Detection and Prevention
Intrusion Detection and Prevention Systems (IPS/IDS) must be implemented at network perimeters and critical network access points, and where deemed necessary for compliance, and must alert appropriate BTS Support Professionals and BTS Support Staff to suspicious network activities, incidents or malicious behavior.
Firewall Rule Change and Exception Requests
Written justification is required to provide a connection through a firewall. Business Systems Owners must submit written documentation for all access changes required to conduct their business. Submitted documentation must include the business reasons for these changes and the end date for this business need.
- Information Security approves or denies all requests to modify the City's cybersecurity posture and for allowing additional protocols, services and access to City Technology Resources.
- BTS firewall administrators evaluate all requests for firewall rule changes and maintain all required documentation on the business need for the firewall rules.
- Requests for additional firewall rule and protocol changes from external and/or untrusted networks are not permitted without written justification from Business Systems Owners and approval from the Information Security Office.
Subsection 17 - Payment Card Industry Data Security Standards
Purpose
The City collects payments using payment cards (credit and debit cards) for a variety of purposes. The payment cardholder association (Visa, Mastercard, American Express) requires that the City abide by specific information security standards, known as Payment Card Industry Data Security Standards (PCI DSS) for permission to process electronic payments using various payment cards.
This administrative rule outlines specific PCI DSS requirements related to payment card process environments managed and secured by the City and Authorized Third-Party PCI Payment Processors City payment card environments include any City systems, networks, applications and services that transmit, store, or process City payment cardholder data.
Administrative Rule
- The City and its PCI Payment Processors must meet all applicable requirements of the current PCI DSS standard, as set forth by the PCI Security Standards Council (www.pcisecuritystandards.org). The 'in-scope' requirements are determined by one or more Self-Assessment Questionnaire (SAQ) types depending on the modes and means of services within each payment card environment. Understanding the SAQs for PCI DSS version 3
- Bureaus that use City-approved PCI Payment Processors for electronic payment processing services must use only services and software that are Payment Application Data Security Standard (PA DSS) compliant.
- PCI DSS includes a broad expanse of general and overarching information security standards, technology controls, and behavioral expectations that are addressed in other City Administrative Rules of Bureau of Human Resources, Office of Management and Finance, and additional Administrative Rules.
Citywide Technology Standards for PCI DSS Compliance
The following PCI DSS Citywide technology and process standards are required for the City to achieve and maintain compliance with PCI DSS. These standards include but are not limited to:
Payment Card Services Roles and Responsibilities
- The City is required by the PCI Council to contract with an external PCI-certified auditor to conduct annual risk and compliance assessments of the City's payment card environments.
- The City is also required to secure a contract for an annual independent PCI DSS compliance audit and quarterly network scans of all bureaus, technologies, and platforms that process electronic payments.
- The City is also required to annually confirm and collect Attestations of Compliance (AOCs) from all City Authorized Third-Party PCI Payment Processors.
- Active City participants in PCI risk assessments include each PCI service Business System-or service-Owner (Bureau or Office), Data Custodian (Merchant ID Manager (MID Manager), OMF Treasury Division, BTS Support Professionals - BTS Support Staff, and the Information Security Office.
- The City Treasury Division is the PCI program service owner, and the Information Security Office is the technical controls compliance process owner.
- Each bureau that provides payment card services or supports a payment card environment must develop and maintain service-specific policies, processes, procedures, training, and security controls to maintain PCI compliance for services within their scope of responsibilities.
- The Information Security Office must conduct an annual review of its security policy as it relates to City payment card environments and update the policy whenever changes in the cardholder environments or PCI rules necessitate a change.
Authorized Third-Party PCI Payment Processors
- Business Systems Owners and the OMF Treasury Division must maintain a current list of Authorized Third-Party PCI Payment Processors.
- Business Systems Owners and the OMF Treasury Division must maintain a written agreement that includes an acknowledgement that Authorized Third-Party PCI Payment Processors are responsible for the security of cardholder data they possess or otherwise store, process or transmit on behalf of the City.
- Business System Owners and the OMF Treasury Division must establish a program to annually confirm Authorized Third-Party PCI Payment Processors' PCI DSS compliance status.
- Business System Owners and the OMF Treasury Division must maintain information about which PCI DSS requirements are managed by each Authorized Third-Party PCI Payment Processors, and which are managed by the City of Portland.
Authentication
- Shared passwords are prohibited to access any payment card environment, system, application, service or Trusted Networks.
Activity and Log Monitoring and Incident Response
- All Authorized Users must report Information Security Incidents immediately to the BTS Helpdesk. BTS support staff will help you assess the problem and determine how to proceed. See: Subsection 8 - INCIDENT REPORTING AND RESPONSE for processes and procedures.
- Information Security personnel and BTS Support Professionals - BTS Support Staff provide 24 by 7 Incident Response and monitoring coverage for any evidence of unauthorized activity or Information Security Incidents. This monitoring coverage includes resilient communications tools, such as email or text alerts, that provide timely information on the status of secure transmission, storage, or processing of payment card data.
- All transaction and activity logs from relevant systems within the City payment card environments must be reviewed daily.
- Logs from payment card environments systems must be retained for one year from their creation date.
- Logs include, but are not limited to, user identification, type of event, date and time, access success or failure indication, origination of an event, identity or system component of affected data, or resources.
- Payment card environment systems or services that support event correlation must maintain audit trails to associate all access to system components or services with Authorized User accounts.
Physical Access
- Physical access to equipment processing cardholder data must be restricted. Access must be authorized and based on individual job function, and be revoked immediately upon termination, including but not limited to the recovery or disabling of all keys, access cards, etc.
- Storage of all payment card data in electronic systems or physical media will be kept only to complete the payment transaction and will not be stored longer than business needs require. At no time after card authorization, under any circumstance, will the City store any information from the card magnetic track, the Card Validation Value/ Card Validation Code CVV/CVC, CVV2/CVC2, or the Personal Identification Number (PIN) block data.
- Paper copies of payment cardholder data must be cross-cut, shredded, incinerated, or pulped once they are no longer needed.
- Physical storage of electronic and physical media containing payment cardholder data must be secured in locked containers within physically secured, non-public-access, workspaces.
- End-of-life electronic media used to store payment cardholder data must be purged, degaussed or destroyed so that cardholder data cannot be reconstructed.
- All electronic systems and physical media with cardholder data will be audited on a quarterly basis to ensure that stored classified data does not exceed business retention requirements and that the retention schedule is adhered to.
Payment Card Services Device Management
- Only devices authorized by the Information Security Office must connect to City managed payment card systems, applications, services or environments.
- Bureaus that use payment card devices to process payment card transactions must use only devices that meet PCI PIN Transaction Security (PTS) validation and utilize point-to-point encryption technology.
- All payment card environment modems must automatically disconnect after 15 minutes of inactivity.
- All payment card systems, devices, applications or services that transmit, store, or process cardholder data must be properly inventoried, secured, and where appropriate, labeled.
- The OMF Treasury Division maintains the Citywide database of authorized payment card processing environments, devices, current Business System or Service Owner, MID Managers, Merchant IDs, and Authorized Third-Party PCI Payment Processors.
- MID Managers are responsible for providing the OMF Treasury Division with all payment card services information and all changes within their payment card environment, including, but not limited to: contact information, and purpose of the system or device.
- Payment cardholder data is prohibited from transmission via end-user messaging technologies including, but not limited to, email or text messaging.
- A current list of all systems or devices that transmit, store, or process cardholder data must be maintained by each Bureau, Office or MID Manager and the OMF Treasury Division.
- The physical locations for all payment card systems or devices must be reviewed at least annually and approved by the Information Security Office.
- Time synchronization technology must be used to maintain a correct and consistent time within critical systems. Changes to time configuration must be protected and initiate an alert.
- Vulnerability scanning will be conducted on a regular basis and after any significant change for PCI scope devices including but not limited to desktops, servers and network devices. Any PCI scope devices that are discovered to have vulnerabilities must be remediated according to the schedule enumerated in the BTS Patch Management Standards. See: City of Portland Information Security Standards
- Public-facing web applications must be assessed and protected against new threats through vulnerability security assessments at least annually, or an automated technical solution that detects and prevents web-based attacks.
Stored Cardholder Data
Retention or storage of authentication data after authorization--even if encrypted-is prohibited. When authentication data is received, render all data irretrievable upon completion of the authorization process.
Retention or storage of any cardholder data from a chip or magnetic track-- the magnetic stripe located on the back of a card-is prohibited.
Retention or storage of the personal identification number (PIN) or the encrypted PIN block is prohibited.
Retention of any permitted cardholder data must be securely stored by implementing data retention and disposal policies, procedures and processes that include at least the following:
- Limiting data storage content and retention time to that which is required for legal, regulatory, and business requirements,
- Establishing and maintaining processes for secure deletion of data when no longer needed,
- No permitted cardholder data may be stored or copied onto personal computers, or any other media not used as part of a centralized and BTS-approved backup data solution,
- Defining and auditing compliance with specific retention requirements for permitted storage of cardholder data,
- Quarterly automatic or manual processes for identifying and securely deleting stored cardholder data that exceed defined retention periods.
- Payment Account Numbers must be masked when displayed. At all times, the first six and last four digits must be the maximum number of digits displayed.
- Render Payment Account Numbers unreadable where stored (including on Removable Media, backup systems, and in logs) through one-way hashing, tokenization or encryption.
- If disk-level encryption is used, rather than file- or column-level database encryption, logical access must be managed separately and independently of native operating system authentication and access control mechanisms (for example, by not using Authorized User account databases or general network login credentials). Decryption keys must not be associated with user accounts.
Encryption of Data
- All City Merchant ID (MID) payment cardholder data must be encrypted when transmitted over a public network such as the Internet, and within the City's Trusted Networks. Cardholder data may also appear in the form of the sixteen-digit primary account number plus any of the following: cardholder name, expiration date, or service code.
- Only necessary data and secure protocols are permitted for City payment card transactions. All other traffic or protocols are explicitly denied in City payment card environments.
Encryption Key Management
- City Authorized Users are prohibited from knowing or having access to the encryption keys used by the City's PCI Payment Processors or the manufactures of point-of-sale payment devices.
- Only authorized encryption key custodians are authorized to create, distribute, or maintain City payment card environment encryption keys.
- All City managed encryption keys must only be created by authorized encryption key custodians using Administrative Accounts and the use of strong passwords in accordance with Subsection 5 - IDENTITY AND ACCESS MANAGEMENT.
- Knowledge of City managed encryption keys used in payment card environments must be restricted to the fewest number of custodians necessary and be based on business need.
- Cryptographic keys must be stored in the fewest possible locations.
- Encryption keys must not be stored or distributed in clear text.
- All encryption keys must be encrypted with a key-encryption key.
- Encryption keys must be maintained under a Split Knowledge and Dual Control Regime.
- City managed encryption keys must be changed at least annually. The keys may be changed more regularly as necessary or as recommended by the associated application or business use care.
- All compromised encryption keys must be replaced immediately.
- City managed encryption keys must use BTS and PCI DSS approved algorithms.
- Encryption key custodians must sign a key custodian form that acknowledges and accepts all encryption key management responsibilities as listed above.
System Development Life Cycle
Payment Card Services System, Application and Service Development
- Payment processing systems, services and application development must be developed securely in accordance with PCI DSS, based on industry standards and/or industry best security practices for secure coding, and incorporate information security throughout the software development life cycle.
- Software patches to payment card systems, services and applications must be properly tested before being deployed into a production environment.
- Test and development environments must be separate from the production environment, with access controls in place to enforce separation.
- Custom and default application accounts, usernames and passwords must be removed before a payment card system is placed into production.
- Test and development Authorized Users must employ separation of duties from production environment Authorized Users.
- Test cardholder data and accounts must be removed before a production system becomes active.
- Custom software code for payment card processing must be reviewed prior to release to production to identify any potential coding vulnerabilities.
- Custom software code reviews must be conducted by an individual other than the code author.
- Production data, such as active primary account numbers, must not to be used for testing and development. Production data must be sanitized before test or development use.
Several OMF Bureau of Revenue and Financial Services' Administrative Rules apply to PCI and payment card process environments:
- FIN-2.10 - Electronic Payment Processing Services
- FIN 2.10.01 Guidelines for Electronic Payment Processing Services | Comprehensive Financial Management Procedures
- FIN 2.10.01 Guidelines for Electronic Payment Processing Services | Comprehensive Financial Management Procedures
- FIN 2.10.03 Best practices for Processing Payment Card Transactions | Comprehensive Financial Management Procedures
- FIN 2.10.04 Security of Payment Device Hardware | Comprehensive Financial Management Procedures
Subsection 18 - Information Classification, Protection and Sharing
Purpose
Unauthorized access to City Confidential or Restricted information may introduce fraud, identity theft, or other risks to the City. Because the City's information is stored, processed and shared in both electronic and paper form, safeguards are required to address information classification and protection. The purpose of this policy is to minimize the risks associated with unauthorized access to, abuse, or misuse of City information and to minimize the costs of storing unneeded information.
Administrative Rule
Consistent with federal and state laws, such as the Oregon Revised Statutes relating to public records, the City will protect the information it holds in its custody based on the nature of the information and the risk of unauthorized or undesired access, disclosure, loss or destruction of such information. The degree of protection provided must correlate directly with the risk of exposure, regardless of information media type, storage location, or means of transport.
Information Classification Business System Owners are responsible for the classification of information into one of three categories. These categories allow Authorized Users, Business System Owners, Data Custodians and System Operators to understand the appropriate information handling requirements. Handling is defined to include capture, transmission, storage, retention, and disposal.
Unrestricted - (Public) Information approved for public access. This includes generally available public information, published reference documents (within copyright restrictions), open source material, City website information and press releases. Unrestricted information must still be protected against threats to the integrity of the information.
Restricted - Information which is intended strictly for use within the City. Although most of this information is subject to disclosure laws because of the City's status as a public entity, City information still requires careful management and protection to ensure the integrity and obligations of the City's business operations and compliance requirements. Restricted information includes information associated with internal email systems, City Authorized User account activity and certain personnel information.
Confidential - Information that is legally regulated, sensitive in nature, or requires significant controls and protection. Unauthorized disclosure of Confidential Information could have a serious adverse impact on the City or individuals and organizations who interact with the City. This information includes but is not limited to: 1) cardholder data subject to the Payment Card Industry- Data Security Standard (PCI DSS), 2) personally identifiable information (PII) as defined by the Oregon Consumer Information Protection Act (ORS 646A.600) or the Fair and Accurate Credit Transactions Act of 2003 (also known as the "Red Flag Rules"), 3) Protected Health Information (PHI) as defined by the Health Accountability and Portability Act (HIPAA) and the HI-TECH Act 4) copyrighted, City or third-party trade secrets and 5) attorney-client privileged information. Confidential Information may be subject to public disclosure laws.
Information Protection and Data Loss Prevention
- Information Classification - Information is afforded different protections based on its classification. The chart below summarizes these differences:
City of Portland Information Classification Measures of Protection
| Protection Measures | Unrestricted (Public) | Restricted | Confidential |
|---|---|---|---|
| Access Controls | Limited to System Administration | Mandatory | Mandatory |
| System Maintenance | Mandatory | Mandatory | Mandatory |
| Logging | Mandatory | Mandatory | Mandatory |
| Endpoint Detection and Response (EDR) / Anti-Virus-Anti-Malware | Mandatory | Mandatory | Mandatory |
| Firewalls | Mandatory | Mandatory | Mandatory |
| Encryption (during Transmission) | No | Recommended | Mandatory |
| Encryption (Storage) | No | Recommended | Mandatory |
| Authentication | Limited to System Administration | Mandatory | Mandatory (Strong authentication is required) |
| Physical Security | Recommended | Mandatory | Mandatory |
| Data labeling (automated) | Recommended | Mandatory | Mandatory |
- Data Labels - Data Custodians and employees processing City Restricted or Confidential Information and media must label information according to their information classification (Unrestricted/Restricted/Confidential).
- All electronic media and data must be labeled.
- Locations containing information of various levels of classification must be labeled as the most sensitive information contained within the location.
- Failure to label documents according to their data classification may result in these documents being treated as public documents and being handled accordingly.
- Default labels: If no metadata label is available, filenames can be used to classify data. Please see City of Portland Security Standards 4.0.
- Data Loss Prevention - Data and information storage locations will have limited or restricted access and the location of the data will be modified to reflect their classification level.
- Any attempts to share, disclose, copy or exfiltrate any Restricted or Confidential data will be logged, blocked, and reported. This will occur regardless of whether the appropriate data classification label has been applied.
- All unlabeled documents in Unrestricted locations will be treated as Unrestricted documents and will be handled accordingly. Unlabeled data in Restricted or Confidential locations will be automatically labeled.
- If data is discovered to be unlabeled or inappropriately labeled it will be relabeled.
- Business System Owners may prescribe additional measures not illustrated in this rule to classify and protect their information. This rule serves as a baseline classification and protection policy.
- Information Sharing - Information may be shared with external entities and individuals based upon the level of classification. Restricted and Confidential will not be shared without careful review and the authorization to disclose.
Subsection 19 - Cloud Services
Purpose
The information technology industry continues to shift service offerings from on-premises based systems to cloud-based services. The City of Portland is adopting cloud-based services in line with industry trends. Due care and due diligence of City information and Public Records requirements is a mandate of BTS to "ensure confidentiality, integrity and availability of electronic information..."
Administrative Rule
This policy outlines the requirements for Cloud Services use by the City of Portland and is Authorized by the BTS-2.01 - Information Security Administrative Rule. This policy applies to all City of Portland bureaus, divisions, entities and Authorized Users. Both internal City Cloud deployments (Private Cloud) and external partnerships (Public Cloud) must comply with this policy per City Code, Chapter 3.10 Office of City Attorney | Title 3 Administration 3.10.030(B).
Cloud, or 'hosted services' take many forms, including:
IaaS - Infrastructure as a Service - The Cloud Service Provider (CSP) provides the hardware in their data center. The Cloud Consumer manages the configuration and operation of operating systems (such as Windows), databases, storage, applications, security and application use.
PaaS - Platform as a Service - The CSP provides, configures and manages the hardware, operating systems, storage and database platforms. The Cloud Consumer configures and manages the use of the platforms, application's security and use.
SaaS - Software as a Service - The CSP provides, configures and manages the hardware, operating systems, databases, storage and applications. The Cloud Consumer manages the use of the application and may manage some aspect of application configuration and authorization of user access to the applications.
FaaS - Functions, or applications, as a Service, such as AWS (Amazon Web Services) Lambda, Kubernetes, Docker, etc.
Other - Any other cloud-based service, application, media, platform, or data repository.
Cloud Services
- Use of Cloud Services must follow all other applicable BTS Administration rules (Technology Services), City Procurement Rules (Chapter 5.33 Goods and Services) and any other applicable City of Portland rules.
- Early engagement of BTS Information Security ensures Cloud Services align with applicable regulatory, City information security, privacy, data classification and governance requirements.
- IaaS and PaaS
- For IaaS and PaaS, Bureau of Technology Services (BTS) will manage Azure, Amazon Web Services (AWS) and any other cloud provider infrastructure, platform configuration and Authorized User account access.
- Billing for these and other IaaS and PaaS Cloud Services will be managed through BTS. Bureaus will be responsible for monitoring and managing use of metered Cloud Services and associated costs. Billing is the responsibility of the individuals appointed as accountable for each bureau, division, or entity to monitor their data use and billing.
- Adjustments to Cloud Service subscriptions will be made through BTS.
- SaaS and FaaS
- Use of and subscription to SaaS/FaaS must be auditable, discoverable, and capable of having information and cyber risk assessed.
- Cloud Services providers shall follow all applicable industry control best practices for all critical security updates and patches.
- SaaS/FaaS vendors must allow BTS to routinely audit their security posture or provide annual third-party auditor documentation of their security posture, which should be equivalent to a SOC 2 Type II security assessment.
- Cloud Services providers are expected to cooperate with City and Law Enforcement investigations of service and data availability, integrity and security, including suspected compromise or breach of data or services.
- Non-Standard SaaS or FaaS applications are subject to the BTS Exception Process.
- Internal and external Cloud Services must leverage the City's Single Sign On (SSO) and Identity and Access Management (IdAM) platforms.
- Multi-Factor Authentication must be enabled for access to Cloud Services.
- Exceptions will be evaluated during the contracting process.
Legal and Contracts
- The City's use of Cloud Services must comply with all applicable federal, state, and local laws and regulations.
- City Data must be always located within the United States, whether at rest, in transit, or otherwise, except as provided by BTS authorized exception.
- All contract awards for Cloud Services must comply with City procurement code Chapter 5.33 Goods and Services and Chapter 5.68 Professional, Technical and Expert Service Contracts, as applicable.
- All contracts for Cloud Services must be submitted to the City Attorney's Office for review and approval as to form, regardless of value as required by Chapter 3.10 Office of City Attorney | Title 3 Administration 3.10.030(B).
Data Governance, Privacy and Security
- Bureaus managing Cloud Services data repositories must align data governance, ownership, privacy and security with City standards and requirements. (See References)
- Bureaus must comply with City data retention policy and schedules as determined by the City of Portland Auditor's Office.
- BTS can assist in configuring compliant IaaS and PaaS services. Also see Exit Strategy below.
- Cloud Services containing sensitive data types are subject to additional compliance requirements, including but not limited to the following: Payment Card Industry data (PCI), Personally Identifiable Information (PII), Federal Tax Information (FTI), Criminal Justice Information Services data (CJIS), and Personal Health Information (PHI).
- City-specific data types (Public, Restricted and Confidential) must be stored, accessed and transmitted in accordance with applicable City data governance polices, and as defined in Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING.
Exit Strategy
- Cloud Services and contracts should be developed with an exit strategy for disengaging from the vendor. The City must determine how data can be recovered from the vendor and archived, if necessary, or deleted with confirmation by the vendor, at the time of contract termination or expiration.
Subsection 20 - Software, System and Security Development Lifecycle
Purpose
Information security is a requirement to be considered throughout the System Development Life Cycle (SDLC). This Secure System Development Life Cycle Administrative Rule defines security requirements that must be considered and addressed within every SDLC.
Computer systems and applications are created to address business needs. To do so effectively, system requirements must be identified early and addressed as part of the SDLC. Failure to identify a requirement until late in the process can have major repercussions to the success of a project and result in project delivery delays, deployment of an inadequate system, and even the abandonment of the project. Furthermore, for each phase through which a project passes without identifying and addressing a requirement, the more costly and time-consuming it is to fix problems that occur because of the omission.
Information security must be adequately considered and built into every phase of the SDLC. Failure to identify risks and implement proper controls can result in inadequate security, potentially putting the City at risk of data breaches, reputational exposure, loss of public trust, compromise to systems/networks, financial penalties and legal liability.
Administrative Rule
- Training. Security is everyone's responsibility and employees require continual training and improvement of skills and knowledge to perform their duties.
- Define Security Requirements. Information must be classified and protected based on its classification. Adequate security requirements must be defined to protect City Confidential Information and data. A risk assessment early in the system, application or service development process must be conducted to determine requirements. See Subsection 18 - INFORMATION CLASSIFICATION, PROTECTION AND SHARING.
- Design Review. The design must be reviewed iteratively to ensure it complies with City security policies and standards.
- Develop the Asset. Appropriate security controls must be implemented to mitigate risks that are not avoided, transferred or accepted. Security controls must be justified and documented.
- Document Baseline Configuration. A configuration baseline provides something to compare against and ensures all similar devices match the baseline.
- Create Test Data. A process for the development of significant test data must be created for all applications. A test process must be available for applications to perform security and regression testing.
- Confidential production data should not be used for testing purposes. If production data is used, entities must comply with all applicable federal, state and external policies and standards regarding the protection and disposal of production data.
- Test Security Controls. All controls are to be thoroughly tested in pre-production environments that are identical, in as much as feasibly possible, to the corresponding production environment. This includes the hardware, software, system configurations, controls and any other customizations.
- The testing process, including regression testing, must demonstrate that all security controls have been applied appropriately, implemented correctly and are functioning properly and are countering the threats and vulnerabilities for which they are intended. The testing process must also include vulnerability testing and demonstrate the remediation of critical vulnerabilities prior to placing the system into production.
- Appropriate separation of duties must be implemented and followed throughout the testing processes such as ensuring that different individuals are responsible for development, quality assurance and accreditation.
- Secure Code Review. Software code must be reviewed and assessed iteratively both dynamically and statically to ensure compliance with requirements.
- Deployment and Implementation. Once the software code is deployed it should be penetration tested annually.
Subsection 21 - Container Security
Purpose
This document outlines the security policy for containerized workloads deployed within City-managed environments, including those running on Kubernetes and Docker. The primary goal is to ensure the confidentiality, integrity, and availability of City data and systems while minimizing the risks associated with containerized applications.
This policy applies to all containerized workloads.
Administrative Rule
- Least privilege: Containers must have the minimum permissions and resources necessary to successfully meet their intended functions.
- Defense in depth: Implement multiple layers of security to protect against various threats.
- Continuous monitoring and logging: Monitor container activity and network traffic for anomalies and potential security threats and incidents.
- Automated remediation: Implement automated responses to identified security issues.
- Vulnerability management: Regularly scan container images and systems for vulnerabilities and patch them promptly.
- Supply chain security: Secure the container image build and deployment pipeline to prevent compromise.
Image Management
- Image registry security: Use a secure container image registry with access control and vulnerability scanning capabilities.
- Image signing and verification: Sign container images with a trusted key and verify signatures before deployment to production environment.
- Vulnerability scanning: Scan container images for vulnerabilities before deployment and periodically thereafter.
- Image caching: Minimize image caching to limit the propagation of vulnerabilities.
Runtime Security
- Network isolation: Implement network segmentation to restrict container network access to required resources.
- Resource restrictions: Limit resource allocation (CPU, memory, etc.) for containers to prevent resource exhaustion.
- Security context: Configure security contexts for containers to enforce security settings such as user IDs and capabilities.
- Secrets management: Use secure methods to store and manage container secrets (e.g., environment variables, configuration files).
Monitoring and Logging
- Monitor container activity and system metrics for anomalies and potential security incidents.
- Collect and analyze logs from containers, hosts, and network devices for forensic purposes.
- Implement alerting and notification mechanisms for identified security issues.
Incident Response
- Establish a clear incident response plan for container security incidents aligned with BTS Information Security's Incident Response Plan.
- Define roles and responsibilities for incident response.
- Implement procedures for investigation, containment, eradication, and recovery.
Training and Awareness
- Provide training for developers, operations staff, and security teams on container security best practices.
- Increase awareness of container security risks and promote a culture of security within the container service and application team.
Compliance
- Ensure container security practices comply with relevant regulations and industry standards, especially City records retention requirements.
- Conduct regular audits and assessments to identify and address any gaps in container security posture.
Continuous Improvement
- Continuously review and update this policy to reflect the latest container security threats and best practices.
- Share knowledge and best practices within the City of Portland to improve overall container security posture.
Subsection 22 - Technology Travel
Purpose
In order to safeguard community information and City managed technology resources this policy outlines guidelines and restrictions for the use of City-owned technology assets during international travel to ensure their security and appropriate use.
Scope
This policy applies to all Authorized Users (employees, contractors, and officials) of the City of Portland who are issued City-owned technology assets and may need to travel for official City business purposes or choose to travel for personal reasons.
Policy
- General City Technology Travel
- City-owned technology assets, including but not limited to laptops, tablets, smartphones, and other electronic devices, are provided to employees for official use only.
- Employees are expected to comply with all City policies and procedures regarding appropriate use, technology use and cybersecurity while traveling.
- Domestic Travel, within U.S. and U.S. Territories
- Use of City-owned technology assets within the United States and U.S. territories is authorized with the approval of appropriate Service Area leadership.
- International Travel - City Technology Devices
- City-owned and managed technology assets that have not been designated as "one-time-use" status are prohibited while travelling internationally. Laptops that have been issued as a primary, Authorized User's device and/or spare bureau devices are prohibited from use while travelling internationally.
- Under no circumstance will City-owned technology devices, including laptops, smartphones and digital tablets, be allowed to access City services or be used on the City's networks once international travel has concluded. All devices that travel internationally must be destroyed upon return, except for cell phones used in the following countries.
- The United Kingdom, Canada, Australia, and New Zealand.
- For official City business involving international travel, one-time-use limited access 'burner' device purchase options may be available from BTS and are available within the travel request process. Additional processes and resources are located on the travel information page.
- Appropriate use of City technology resources is detailed in HRAR-4.08 - Information Technologies.
- Permission to take City-owned single-use (burner) technology assets and/or access to City technology services must be approved by the Service Area Administrator or designee and Information Security before the travel occurs.
- City managed cell phones approved for international travel countries are required to be erased upon return.
- Burner phones will be subject to post-trip information and public records capture. This includes device use, pictures, chat, apps, and any other communications deemed necessary from inspection.
- International Travel - Access to City Information and Data Resources
- Access to City-managed technology services is restricted while travelling internationally.
- Access to the City's Microsoft 365 Web-based portal is currently allowed, but all 'sync' functions are disabled.
- Access to BTS ServiceNow Services Portal is permitted.
- All other connectivity to internal resources is prohibited, including:
- VPN - Virtual Private Network
- Web browser-based VPN connections to away.portlandoregon.gov or vpn.portlandoregon.gov
- VPN client connections to *.portlandoregon.gov
- On premises City (network) file shares
- SAP - Timesheets, CityLearner, and the SAP desktop client
- HCPAnywhere browser or client access
- All other City internal resources.
- Authorized Users must submit to BTS a request for international travel with City-owned "one-time-use" technology assets. The request should include:
- Service Area Administrator or designee approval for travel and/or procurement of burner device if needed
- Purpose of travel and justification for the need to use City-owned technology assets, City services, and/or systems access
- Duration of travel and countries to be visited (including countries that may be stopped in as part of a flight-plan/layover)
- BTS approved plan for safeguarding City-owned technology assets during travel.
- Approval for international travel with City-owned technology assets may be granted based on the necessity of using the devices for official City business and the security risks involved.
- Travel Security and Authorized User Responsibilities
- Authorized Users must follow U.S. State Dept. Travel Advisories.
- Certain destinations may be high-risk or prohibited.
- Employees are responsible for the security and proper use of City-owned technology assets during travel.
- City-owned technology assets must not be left unattended in public places and must be stored securely when not in use.
- Employees must immediately report any loss, theft, or damage to City-owned technology assets to their Service Area Administrator and the BTS Director.
- Employees must immediately report any detention or seizures of City technology devices to their Service Area Administrator and BTS Director.
- Malicious or suspected activity will be blocked proactively to protect City assets.
- Authorized Users must follow U.S. State Dept. Travel Advisories.
References
Please refer to the following BTS resources for term definitions, acronyms, and BTS standards used within BTS Administrative Rules:
BTS Technology Standards Directory
Glossary | CSRC (nist.gov) - Technology and Information Security terms and definitions
History
Adapted from BTS 2.01-2.19 on December 28, 2022 by Chief Technology Officer
Amended on December 27, 2023 by Chief Technology Officer.
Amended on November 15, 2024 by Chief Technology Officer.
Amended by Deputy City Administrator of City Operations, effective December 23, 2025.