United Arab Emirates Ministry of Interior: Application Development Security Standards
United Arab Emirates Ministry of Interior: Application Development Security Standards
Ministry of Interior
General Directorate of E-Services & Telecom
Version: 1.0
CLASSIFICATION: Restricted
Version1.0
ATTENTION: This documentClassification: Restricted
contains information related to ‘MoI’ that is confidential and privileged.
The information is intended for the private use of ‘MoI’ only. By accepting this document, you agree to
keep the contents in confidence and not copy, disclose, or distribute this without written request to and
written confirmation fromTel.
‘MOI’. If you are
02 – 4446688 not
– Fax 02 the intended
– 4443494 recipient,
– P.O.Box: 398 –delete the document
Abu Dhabi, U.A.E and be aware
that any disclosure, copying, or distribution of the contents
www.moi.gov.ae - E-mail:of this document is strictly prohibited.
[email protected]
Document Control
Item Description
Document Title: Application Development Security Standards
Reference ID: MOI\GDEST\ICT-IS-APP-DEV-SS-04
Version: Draft
Publish Date: 11/03/2020
Revision Date: -----
Revision Record
Versio
Reviewer Signature/Date Notes Review & Approve
n
1.0 ---------- ---------
This standard applies to the applications, web services or web applications and that have been
deemed 'critical'. Whether owned by the MOI, and 3rd party organization - that connect to the
MOI network either directly or indirectly.
2. Purpose
The purpose of these standards is to secure integrity of the web services, websites, and
applications which are developed, acquired, manipulated, maintained or transmitted by MOI.
This policy establishes security standards for all the application software developed, purchased
or currently in use by MOI.
Industry and vendor best practice guidelines are referenced in the build, deployment and
operation of Web Servers, Websites and Applications
3. Scope
This standard applies to all web servers, services and applications (MOI and Other 3rd
parties connecting to MOI) using web-oriented protocols.
The standard excludes embedded web/application servers that are not within the scope of
the server standard, e.g., printers, switches, appliances and other hardware devices.
All the websites, Services and Applications owned by MOI providing services and
accessible over Intranet or Internet are subject to this standard.
This standard applies to all Application, Services and Websites hosted in test,
development and production environment over MOI network.
All Internet-facing web servers owned by MOI and hosted by external providers are
subjected to this standard
Every Application MUST have a properly documented architecture diagram with a high-
level explanation of the security layers mentioned in this document.
The development team MUST make use of a secure software development lifecycle that
addresses security in all stages of development.
Developers MUST provide the documentation and justification of all the application's
trust boundaries, components, and significant data flows.
Developers MUST provide definition and security analysis of the application's high-level
architecture and all connected remote services
Developer MUST follow centralized, simple, vetted, secure, and reusable security
controls to avoid duplicate, missing, ineffective, or insecure controls.
Before an application is developed, acquired, or enhanced, security requirements must be
formally documented to address all relevant security rules as defined.
Secure coding checklist, security requirements, guideline, or policy MUST be available
to all developers and testers.
To empower Risk Analysis team to perform periodic information security risk assessments
(RAs) for the purpose of determining areas of vulnerability, and to initiate appropriate
remediation, risk assessments can be conducted on any Asset of MOI GDEST such as
applications, databases, servers, storages, backup, and networks, and any process or procedure by
which these systems are administered and/or maintained.
Identify threats and perform risk assessment on the systems identified in “Applicaiton
Asset Register”
A threat is defined as any event that may compromise the confidentiality, integrity,
and/or availability of information assets.
Threat is the combination of four elements, 1) The Administrators/users, 2) The system /
server assets that must be protected from threats, 3) The method of unauthorized access,
and 4) Result of unauthorized action.
Identifying the list of users having access to the system / servers grouped by privileges.
Defining the assets related to systems, such as network switches, SAN Switches related
file servers and storage.
All the System Administrators MUST read adhere to MOI’s “Physical and
environmental security policy”
The Physical location of all the Servers owned by MOI / Departments must be identified
and secured.
MOI “Access control Policy” must be followed for system/server user access
management.
All the Administrative privileges related to servers, business owner accounts and OS
accounts must be with Head of Information security.
All server user accounts MUST be provisioned in accordance with the principle of least
privilege. Administrators must be provided privileges based on MOI Access control
policy.
All server user accounts MUST enable individual users to be identified (e.g. unique
accounts per user, or logged access to shared accounts).
All the manufacturer and defaults account/passwords must be changed, disabled or
deleted. Guest accounts MUST be removed.
User accounts on servers MUST be removed when they are no longer required.
User accounts on servers MUST be reviewed at least every 6 months and be removed if
they are no longer required.
User accounts on servers MUST be evaluated at least every six months to ensure the
permissions assigned to them are still appropriate.
Passwords on all the physical or virtual servers must follow MOI “Password Policy”
which can be reviewed from e-club accessible to all employees.
All local accounts on UNIX machines and domain accounts in Windows environment
should have a minimum 12-character passphrase, 2 special character, 2 digits, mixed of
upper case and lower-case letters and must be changed every 60 days.
UNIX environment: block the system account (nobody), verify that there are no
accounts with empty password fields in /etc/shadow, verify that no UID 0 accounts other
than root exist, disable remote logins for root account.
Access to all the servers must be logged to obtain forensic evidence in the event of
unauthorized access, or to submit as evidence to relevant authorities.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must only be installed from a trusted source and MUST be
installed only by System Administrators.
Operating systems or applications that are no longer supported by the vendor or an open
source community have an exception request granted by the Head of Information
Security.
Server operating system installations MUST include all current approved service packs /
major releases for that operating system version.
Server operating system installations MUST apply all approved and verified updates and
patches not already included on installation media immediately subsequent to installation.
All server operating systems must be hardened using CIS benchmarking to meet MOI
security Policies.
VMware environment MUST be hardened following “VMware Security Hardening
Guides” (https://www.vmware.com/security/hardening-guides.html)
Server operating systems MUST be configured to receive accurate time from MOI
standard NTP Server, in compliance with Security policy.
Server operating systems MUST be configured so they do not auto-run inserted media.
Server operating systems MUST be patched in line with patching policy/procedure.
All unnecessary applications and features on servers MUST be disabled and removed
where possible.
New Server MUST be created following the “Server Creation Guidelines” and the Server
creation form must be filled.
All the Servers must have secured, hardened OS configurations as per operations
management policy.
Capacity management should be implemented; monitoring, tuning, and evaluating the use
of resources to project and respond to future capacity requirements and ensure required
performance levels.
System Administrators must use trend information from the capacity management
process to identify and remediate potential bottlenecks that present a threat to system
security or services. System Administrators MUST plan and budget for server capacity
management by.
Production, test, and development environments should be separated to reduce the risk of
unauthorized access or changes to the production environment.
Architecture diagrams MUST illustrate clear separation between development, test,
production environments and operational systems.
All Windows servers MUST have an anti-malware solution installed and operating, in
line with the Security Standard - Malware Protection.
McAfee on all the servers MUST be updated consistently for detecting and providing
protection from network and host-based threats
Pro-Active patch management. All the existing Servers must be upgraded/patched to the
latest version consistently as recommended by vendors to avoid vulnerabilities
All the security related Server patches must be deployed consistently as recommended by
vendors.
All logs produced on servers MUST be forwarded to the appropriate centralized log
collection point (Ex: SIEM), in compliance with the Security Standard
All attempts to change server configurations MUST be logged.
Any events which involve privilege escalation MUST be logged.
Actions that modify or create users or groups, or modify the privileges of users or groups
on servers, MUST be logged
Shutdown and system suspension events on servers MUST be logged
All the servers MUST be monitored centrally from Foglight Monitoring tool
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
Server operating systems must be of a version that is still under active vendor support.
This must include security patches for identified vulnerabilities with a CVE score of 7 or
greater.
Server operating systems must utilize a version that complies with MOI information
security policy.
The SA team and security team MUST adhere to “Third-party/Supplier security policy” to
facilitate the implementation of the associated controls.
The SA team and security team MUST monitor third-party Server/System Operations /
Maintenance.
SA team and Third-Party Service Providers MUST apply servers patches on a regular and
timely basis commensurate with the criticality of the Servers.
Third-Party responsible for periodic maintenance, MUST make sure that all the servers are
updated to the latest operating system, applied security related patches routinely, firmware
must be upgraded, SSH version on all the servers MUST be upgraded as recommended,
closing any security gap found by VA team.
The SA team MUST monitor and review the System activities, reports, and records
provided by the third party related to the maintenance services.
The SA team MUST manage changes to the provision of third-party server activities,
including maintaining and improving existing server security policies, procedures, and
controls.
The SA team MUST control the installation of software on operational systems make sure
freeware, cracked and malicious software are not installed by third-party.
The SA team MUST read and adhere to MOI’s “Incident Management Policy”.
The SA team MUST response to all the incidents as per Incident Management Policy and
Procedure
An information security incident is defined as an attempted or successful unauthorized
access, use, disclosure, modification or destruction of information; interference with
information technology operation; or violation of acceptable use policies.
All the fields on Incident forms must be filled with appropriate information, the fields with
not applicable info must be filled as “Not Applicable (N/A)”
All the incidents related to server security / availability must be filled and reported to “Head
of Information Security”
Incident response and forensics should be in place to assess how, as who, what was stolen,
what was changed, the extent of access, what could they do with more skills?
The response should include the following:
a) Collecting evidence as soon as possible after the occurrence
b) Conducting information security forensics analysis, as required
c) Escalation, as required
d) Ensuring that all involved response activities are properly logged for later analysis
e) Communicating the existence of the information security incident or any relevant
details thereof to other internal and external people or organizations with a need-to-
know
f) Dealing with information security weaknesses found to cause or contribute to the
incident; and once the incident has been successfully dealt with, formally closing and
recording it.
Make sure all administrative user interfaces related to server administrations are configured
and accessible over secured protocols such as ssh, https etc.
Encrypt transmissions between servers and clients from eavesdropping using functions or
tools.
Use secured, updated tools to login servers such as latest SSH clients, etc.
Physical media “HDD / Flash DISK / USB Disk / Tapes” containing information / data must
be protected during transportation.
Business continuity and disaster recovery plans should contain processes and procedures to
ensure the continuity of information security. Recommendations include:
An asset register of all virtual assets MUST be maintained and updated as appropriate.
This includes recording:
1. VM creation
2. VM destruction
3. VM modification
Activities on Virtualization MUST be controlled to prevent unauthorized creation,
destruction, or copying of virtual machines
All the critical Virtual Machines MUST have disaster recovery and business continuity
plan
Virtual machines, and virtual machine images/template, including which are not currently
active, MUST be patched as per MOI patch management policy/procedure.
New virtual Servers MUST be created from pre-configured, system images/template
(VM Images), VM Images/template MUST be hardened in accordance with Server
Security Standard.
All the live VMs and images MUST be protected from:
1. Unauthorized access
2. Unauthorized modification
3. Unauthorized deletion
4. Unauthorized copying
VM images/templates MUST be patched or kept up to date same as live systems.
Access to DS/storage of Virtual Machine Images must be logged
Changes to virtual deployments MUST be logged and MUST generate alerts.
Creation, migration, suspension or deletion of Virtual Machines MUST be logged and
MUST generate an alert.
Audit Staff will verify compliance to this standard through various methods, including but not
limited to, periodic walk-thru, video monitoring, business tool reports, internal and external
audits, and feedback to the standard owner.
Periodically conduct a vulnerability scan, considering the latest threats as per “IS
Compliance Policy”
Selection of Web Applications for scanning, testing, and assessing should occur
according to the schedule
Before the production launch of a new High or Very High Criticality Web Application
Before a significant change to a High or Very High criticality production Web
Application.
If a Web Application is hosted by a third-party provider and/or not hosted on MOI’s
network, an automated or manual test should be performed.
As directed by an information security review or upon request from the Chief
Information Officer, Information Security Services, or developers of a Web Application
Logs of privileged account holder (system administrators and system operators) activity
should be securely maintained and appropriately reviewed
Periodic Checklist related to the System security standards must be filled by System
Administrators prepared by Audit/Compliance Team “System Security Checklist”
5.2 Exceptions
Any exception to the standard must be approved by Head of Information Security Section
in advance.
These standards are an absolute requirement. Failure to meet these requirements will
require a formal exemption as detailed below.
Any exceptions to the application of this standard or where controls cannot be adhered to
must be presented to an assigned Security Engineer and considered for submission to
Head of Information Security Section.
Such exception requests may invoke the Risk Management process in order to clarify the
potential impact of any deviation to the configuration detailed in this standard.
Exceptions to this standard MUST be maintained on a risk register for accountability,
traceability and security governance reporting to senior management.
5.3 Non-Compliance
7. Revision History
Initial Draft Information Assurance Committee Prepared by Audit and
26/02/2020 Approval DD/MM/YYYY Compliance team.