Corporate Audit of Security
Final Summary Report
5.3 MANAGEMENT RESPONSE
AND ACTION PLAN (3 of 3)
| Recommendations | Response | Action Plan and Tasks | Responsibility | Target Dates |
|---|---|---|---|---|
| 3. Senior management should ensure that
security objectives and activities relating to information assets:
3.1 Improve employee awareness of security requirements for information handling; 3.2 Improve the threat/risk assessment process and ensure that regular SOS/TRAs are carried out, updated and reported; 3.3 Require that a corporate-level TRA is carried out to investigate and document departmental risks and concerns; 3.4 Ensure that current operating systems are reviewed for information storage protection requirements; 3.5 Improve control over the storage, use and reconciliation of controlled documents. |
Since the audit was conducted, the recommended departmental TRA was initiated and a national physical and information technology survey was completed. The Information Management and Technologies Branch security review completed in June 2002 addresses the identified issue regarding the appropriate design and use of IT systems for protected data. | 3.1 Improve employee awareness of security requirements
for information handling
a) Introduction of the Immigration and Refugee
Protection Act (IRPA). |
|
|
| 3.2 Improve the threat/risk assessment process and ensure that regular SOS/TRAs are carried out, updated and reported |
|
|
||
| a) Physical facility TRAs While physical facility TRA policies are clearly specified, there is inconsistent application across CIC. Some see the process as too complex and not specifically useful. Consequently, the majority of audited sites did not have a recent TRA. The TRA tools will be reviewed for effectiveness and staff will be trained in its use. |
|
|
||
| b) IT Security TRAs Only 30% of systems have been reviewed. A comprehensive IT TRA policy will be completed. c) Continuous risk management |
|
|
||
| 3.3 Require that a corporate-level TRA is carried
out to investigate and document departmental risks and concerns a) Departmental TRA CIC is conducting a corporate-level departmental TRA to investigate and document departmental risks and concerns. This is the basis from which low-level TRAs will flow. |
|
|
||
| 3.4 Ensure that current operating systems are reviewed
for information storage protection requirements a) Enhancement of perimeter security The Information Management and Technologies Branch is currently engaged in a coordinated effort between IT Security and the IMTB Operations Datacom Group to improve perimeter security around CIC’s computer systems environment |
|
|||
| b) Information storage protection requirements IMTB will address the need to ensure that production applications and operating systems meet the Communications Security Establishment guidelines. 3.5 Improve control over the storage, use and reconciliation
of controlled documents |
|
|
- Date Modified:
