Iowa Department of Management

New location for website content

The OCIO website is migrating to https://dom.iowa.gov/state-government/information-technology. The only information which will remain at this location is the IT Standards documentation.

Home » Telework Security Standard

Telework Security Standard

December 14, 2011


Purpose
This standard establishes the minimum security requirements for teleworking by state employees, contractors, volunteers, and interns.

Overview
Many state agencies provide staff with the option to work from an alternate work site including their home. The security risk associated with unmanaged telework arrangements can be costly and impact the ability to deliver essential public services. Agencies must understand the risk associated with teleworking and implement measures to offset those risks.

Key to establishing a secure telework arrangement is addressing the security of information while:

  • At rest: Data stored on a telework device such as laptop, desktop or removable storage device.
  • In transit: Data traveling between the agency and the telework location;
  • and In use: Data being used by the telework employee.

Agency telework equipment and information must have the same, or greater, protections than those implemented at the agency’s main location.


Scope
This standard sets the minimum requirements for secure teleworking. This standard applies to all agencies as defined by Iowa Code Chapter 8A, Section 101. Non-participating agencies are encouraged to follow the guidelines in this and other enterprise level policies, standards, guidelines, processes and procedures.

Definitions

  • Cloud-Based Applications: Applications delivered via the Internet, such as Google Docs, rather than installed on the user’s computer.
  • Multi-homed connection: A computer connected to two or more networks or having two or more network addresses. For example, a computer may be connected to a serial line and a LAN or to multiple LANs.
  • Peer-to-Peer (P2P): Peer-to-peer (P2P) file-sharing (ex. BitTorrent) allows users to share files online through an informal network of computers running the same software. Improper configuration of file sharing may facilitate data leakage.
  • Remote Connection: The connection of an information asset at a non-agency location to an information asset on the agency’s network.
  • Split Tunneling: The process of allowing a remote VPN user to access a public network, most commonly the Internet, at the same time that the user is allowed to access resources on the VPN. A disadvantage of this method is that it renders the VPN vulnerable to attack as it is accessible through the public, non-secure network.
  • Telework: A management approved arrangement, covered by a telework agreement, in which a staff person regularly performs officially assigned duties at a non-agency work site including work from home.

Updates

This standard will be reviewed at least every two years and updated as needed.

Enterprise Telework Security Standard

The following elements apply to telework:

  1. Policy: Agencies shall develop a telework security policy and share it with staff.

  1. Remote Connections: The following apply to remote telework connections:

    1. Connections must be encrypted.

    2. Connections must use two factor authentication. Forms of two factor authentication include:

      1. User ID & Password + Certificate

      2. User ID & Password + Token Generator

      3. User ID & Password + Token Generator + Certificate

    3. The telework user shall not initiate two simultaneous connections to different networks (i.e., no split tunneling and no multi-homed connections).

  2. User Accounts:

  • Telework user accounts shall have limited privileges. Administrative privileges shall only be granted to staff with a business need for such access.
  • Passwords for telework accounts shall not be stored with the device/equipment.
  1. Firewall: A firewall shall be implemented at the telework location which provides inbound and outbound filtering.

  1. Document-sharing:

  • Use of cloud based applications must be approved by agency management.
  • Confidential state data shall be encrypted in transit and at rest when using cloud-based applications.
  • Peer to peer file sharing applications shall not be installed on agency computers.
  1. Personal Email Accounts: Confidential agency information shall not be transmitted using personal email accounts.
     

  2. Equipment:  The following apply to equipment used to telework:

    1. Personally owned computers, removable media and other devices shall not be used for telework

    2. Agency telework equipment shall not be used for personal activities.

    3. Electronic equipment containing confidential information shall be secured when not in use.

    4. Telework desktops storing confidential information shall be encrypted.

    5. Unused applications shall be uninstalled from telework devices.

    6. Non-functioning electronic equipment shall be returned to the agency for disposal.

    7. Telework equipment shall be audited quarterly to ensure that security settings have not been disabled/altered.

    8. An inactivity timeout of 15 minutes shall be implemented on all telework laptops & desktops.

    9. Only agency approved software may be installed on agency equipment.
       

  1. Backups: Electronic information used at a telework location shall be backed-up to the agency’s main network storage.
     

  2. Security Updates: Laptops, desktops and other mobile devices used for telework must have critical security updates for active exploits installed within 5 days of release.

  3. Hard Copy Information: 

  • Paper documents containing confidential agency information shall be secured when not in use (i.e. placed in a locked desk or cabinet).
  • Paper documents with confidential information shall be shredded using a micro-cut shredder if disposed of at the telework location.
  • Agencies shall track removal and return of confidential materials, such as personnel records, to telework locations.
  1. Training: Agency employees, contractors, interns and volunteers shall receive training on secure telework practices prior to beginning to telework.
     

  1. Monitoring: All telework remote access shall be logged and monitored. Log files shall capture sufficient detail to allow a virtual reconstruction of the network session.
     

  2. Reporting: Staff shall report any security incident involving the theft/loss of equipment or unauthorized disclosure of information to the employee’s supervisor within 24 hours.
     

  3. Wireless: Telework wireless devices shall be configured so that they do not automatically attempt to join wireless networks they detect.
     

Effective Date

This standard shall be effective December 14, 2011.


Enforcement
This standard shall be enforced pursuant to Iowa Administrative Code 11—25.11(8A).

Variance
Iowa Administrative Code 11 - 25.11(2) provides for variances from security standards. Requests for a variance from any of the requirements of this policy will be submitted in writing to the Chief Information Security Officer prior to implementation.

Printed from the website on October 15, 2024 at 10:44pm.