ICT - Security - Information Security Policy
ICT - Security - Information Security Policy
1. The Information Security Policy sets out the basis for UNDP in protecting the confidentiality,
integrity, and availability of its data, for classifying and handling confidential information, and
for dealing with breaches of this Policy.
2. The Information Security Management System (ISMS) stipulated by ISO 27001 requires a
comprehensive Information Security Policy document covering all areas of Information Security
and, given the prevalence of automated information handling techniques, particularly in the
area of ICT security. This document satisfies that requirement.
3. The structure of this Information Security Policy follows that of ISO/IEC 27001 and 27002 to
provide for easy correlation between the standard’s requirements and associated UNDP policy
statements. The diagram below details the relationship between the Strategic Plan of UNDP,
the UNDP Information Management Strategy, the UNDP Information Security Policy and
subordinate standards which provide more detailed guidance on implementing the
requirements of the Information Security Policy.
Purpose
a) Confidentiality
b) Integrity
c) Availability
5. The direction contained in Regulation 1.2(i) of the UN Staff Regulations requires staff members
shall exercise the utmost discretion with regard to all matters of official business. They shall not
communicate to any Government, entity, person or any other source any information known to
them by reason of their official position that they know or ought to have known has not been
made public, except as appropriate in the normal course of their duties or by authorization of
the Secretary-General. That direction is supported and implemented by this Policy.
6. This Policy sets out the basis for the protection of information, facilitating security management
decisions, and directing those objectives which establish, promote, and ensure best
Information Security controls and management within the UNDP working environment.
Scope
7. This Policy states broad management principles guiding the Information Security programme in
place within UNDP. This Policy applies to all physical areas under the control of UNDP. Where
other specific functional policies set more stringent requirements, they take precedence in
8. Information security standards and information security related work instructions are
subordinate to this Policy and provide more specific detail on implementation of this
Information Security Policy.
Objectives
10. The Information Security Policy consists of a principal declaration, which sets out the position
on Information Security and defines three security principles upon which this Policy is formed,
followed by nine supporting Policy Statements that expand upon those principles.
Principles
11. The UNDP recognizes that data and information (whether its own, or that entrusted to its care)
are core to its ability to fulfill its mission.
12. The UNDP is fully committed to protecting information and the environments in which
information is processed, transmitted and stored, consistent with the following security
principles:
13. All UNDP staff and other authorized individuals or entities are responsible for maintaining
appropriate control over information in their care and for bringing any potential threats to the
confidentiality, integrity, or availability of that information to the attention of the appropriate
management. Appropriate training and awareness programmes will be available to support and
reinforce this responsibility.
14. The following Policy Statements, structured on the ISO/IEC 27002 standard, support the
Principal Declaration and define the compliance requirements of Information Security Policy
management. The Statements address the following areas:
a) Asset Management
b) Human Resources Security1*
1
Refers to the personnel actions taken during the employment lifetime of a staff member or contract holder which
affects the information security of the organization.
17. The OIMT/BMS will undertake periodic monitoring and the Office of Audits and Investigations
(OAI) will conduct periodic audits of UNDP units to confirm compliance with this Policy and
related standards.
Asset Management
18. To achieve and maintain appropriate protection and control of UNDP information assets and to
ensure that responsibility and accountability for this protection and control is properly vested
in designated information owners/custodians. To ensure appropriate handling procedures are
applied to important information assets.
19. All assets shall be clearly identified and an inventory of all important information-related assets
drawn up and maintained for information security purpose.
Such important information-related assets for protection may include, but are not limited to:
20. All information and assets associated with information systems shall be owned by a designated
unit of UNDP. The designated owner (individual or entity that has approved management
responsibility for controlling the custody, production, development, maintenance, use and
a) Ensure that information and assets associated with information systems under their
control are appropriately classified
b) Periodically review access restrictions and classifications, taking into account applicable
access policies
21. Rules and standards for the acceptable use of information and assets associated with
information systems shall be identified, documented and implemented. Please refer to the
Usage of UNDP ICT Resources (Bring Your Own Device) policy.
Information Classification
22. Information shall be classified or categorized in terms of its value, legal requirements,
sensitivity, and criticality to the UNDP.
23. Appropriate procedures for labeling and handling sensitive information shall be developed and
implemented. Such procedures may incorporate special handling qualifiers or other
dissemination caveats such as “in-confidence” and/or “internal use only.”
24. UNDP ensures that staff and other authorized individuals or entities understand their
responsibilities and to reduce the risk of theft, fraud or misuse of facilities. (Please refer to
UNDP Legal Framework for Addressing Non-Compliance of UN Standard of Conduct, Human
Resources policies and procedures page, and Anti-Fraud Policy. Candidates for employment
and all other authorized individuals should be adequately screened and detailed reference
checks conducted, especially for sensitive jobs. Information security responsibilities should be
addressed prior to employment, in job descriptions and in the terms and conditions of
employment.
Prior to Employment
25. Security roles and responsibilities of all staff and other authorized individuals or entities of
UNDP information assets shall be defined and documented in appropriate terms and conditions
prior to employment or contract finalization, reflecting the requirements of this Policy.
27. As part of their contractual obligation, UN staff conform to Regulation 1.2. (i) of the UN Staff
Rules and Regulation.
During Employment
28. All staff and other authorized individuals or entities using UNDP information assets shall apply
security measures in accordance with all relevant UNDP regulations, rules, policies and
procedures. All HR data, files and records are deemed sensitive and confidential. UNDP shall
ensure that all staff and other authorized individuals or entities:
Are properly briefed on their Information Security roles and responsibilities prior to be granted
access to sensitive information or information systems.
Are provided with sufficient guidelines outlining the information security expectations for their
role within the UNDP.
29. All UNDP staff and, where relevant, other authorized individuals or entities, shall receive
appropriate training and regular updates on Information Security-related policies and
procedures as relevant to their function.
30. Any required disciplinary procedure resulting from a serious breach of Information Security
assets or protocols shall be conducted in accordance with the relevant provisions of the UNDP
Staff Regulations and Rules.
31. Responsibilities for performing employment separation, reassignment, and termination shall be
clearly defined and assigned. Please refer to Separation Policies at POPP.
32. Staff and other authorized individuals or entities shall return all UNDP assets in their possession
upon separation from employment, contract or agreement. The separation process shall
formalize the return of all previously issued information assets.
33. The access rights of all staff and other authorized individuals or entities to information and
information systems shall be removed or altered as appropriate upon separation or
termination of their employment, contract or agreement, or adjusted upon reassignment. Any
deviations from this requirement can occur only with the CIO’s consent
Information Assets
35. All staff and other authorized individuals or entities shall ensure that documents containing
sensitive information are secured when not in use.
36. Sensitive information assets shall not be removed from UNDP premises without proper
authorization.
Work Areas
37. Security perimeters (barriers such as walls, card-controlled entry gates and doors, and manned
reception desks) shall be used to protect areas that contain information and information
systems.
38. Security perimeters shall be clearly defined, and all security measures shall be implemented.
Equipment
39. Information systems shall be sited or protected to reduce the risks from environmental threats
and hazards, and opportunities for unauthorized access. Power and telecommunications
cabling carrying data or supporting information services shall be protected from interception or
damage.
40. Information systems shall be protected from power failures and other disruptions caused by
failures in supporting utilities. Such protection shall be integrated with business continuity
planning (BCP) and disaster recovery (DR).
41. Information systems shall be correctly maintained to ensure continued availability and integrity.
Only authorized maintenance staff or contractors shall perform maintenance, and adequate
records of all maintenance shall be kept. Where appropriate, information should be cleared
from storage equipment before maintenance is performed.
42. Security shall be applied to off-site information systems and equipment, taking into accounts
the different risks of working outside UNDP premises. Such security may include measures to
protect against casual theft when travelling, inappropriate use, or loss of confidentiality of
information assets.
43. Information systems and equipment containing storage media shall be checked to ensure any
sensitive data or licensed software has been removed or securely destroyed prior to disposal.
44. Information systems and equipment shall not be removed from UNDP premises without proper
authorization.
45. To ensure the correct and secure operation of information systems, that key business and
support processes incorporate effective Information Security controls, and that adequate
operating procedures exist for the management and operation of UNDP information systems.
46. Formal documented procedures shall be established, maintained, and made available for all
activities involving information processing and communication facilities.
47. Changes to information systems and applications shall be subject to change management
control. Change management procedures shall be developed with appropriate documentation
to demonstrate compliance.
48. Appropriate segregation of duties and responsibilities shall be implemented to the greatest
extent possible to reduce the possibility that any one individual can compromise an application,
a policy, a procedure or activity, or to perform unauthorized or unintentional modifications to,
or to misuse any information assets.
49. Development, test, and operational (production) facilities shall be separated to reduce the risks
of unauthorized access or changes to the operational system.
50. Service and delivery levels as well as security controls provided by third-party providers
involved in supporting UNDP information processing or telecommunication services shall be
monitored to ensure that services are implemented, operated, and maintained in accordance
with contractual obligations.
51. Changes in the provision of third-party services shall be closely managed, taking into account
the criticality of the information systems and processes involved and the re-assessment of all
relevant risks.
52. Acceptance criteria for new or upgraded information systems shall be established, and suitable
tests of the system(s) carried out during development and prior to acceptance.
53. Existing information system resources shall be monitored and adjusted as necessary, and
projections made of future capacity requirements, to ensure continued performance at the
required levels.
55. Where the use of mobile code is authorized, the configuration should ensure that the
authorized mobile code operates according to a clearly defined security policy.
Backup
57. Computer and communication networks shall be adequately managed and controlled, in order
to be protected from threats, and to maintain security for systems and applications using the
network, including information in transit.
58. Security features, service levels, and management requirements of all network services, both
internal and outsourced, shall be identified and included in all network services agreements.
59. Procedures shall be established for the management of removable storage media, including
procedures for the safe and secure disposal of storage media when no longer required.
60. Procedures shall be established for the handling and storage of information to protect against
unauthorized disclosure or misuse.
Monitoring
61. Procedures for monitoring use of information systems shall be established and the results of
the monitoring activities reviewed regularly. Monitoring shall be used to determine that actual
usage complies with authorized usage.
62. Audit logs recording user activities, exceptions, and Information Security events shall be
produced and kept for an agreed period to assist in possible investigations and/or access
control monitoring. Logging facilities and log information shall be protected against tampering
and unauthorized access.
The system administrator and system operator activities should be logged. Faults should be
logged, analyzed and appropriate action taken.
63. The clocks of all relevant information processing systems within the UNDP shall be
synchronized with an agreed accurate time source.
64. External parties, in this policy, include partners such as other UN entities and contractors. To
maintain the security of the organization’s information and information processing facilities
that are accessed, processed, communicated to, or managed by external parties, such as other
UN entities and contractors, the following conditions apply:
a) The risks to the organization’s information and information processing facilities from
business processes involving external parties should be identified and appropriate
controls implemented before granting access or sharing information with such entities.
b) Agreements with third parties involving accessing, processing, communicating or
managing the organization’s information or information processing facilities, or adding
products or services to information processing facilities should cover all relevant
security requirements.
(For handling of broader external parties such as the media and general public, please refer to the
Information Disclosure Policy (Making Information Available to the Public) policy, which details the list
of content that is not made public)
65. There shall be no exchange of sensitive UNDP information with a third party without
authorization and appropriate controls in place to protect the information from unauthorized
disclosure. Agreements should be established for the exchange of information and software
between UNDP and external parties.
66. Information associated with the interconnection of business information systems shall be
protected to prevent misuse or corruption. Information involved in electronic commerce
passing over public networks should be protected from fraudulent activity, contract dispute,
and unauthorized disclosure and modification.
68. To ensure appropriate restrictions on access to information, adequate access control shall be
applied to the information assets to ensure access is available only to current members of staff
(or other authorized individuals or entities) who require it in the course of their official duties
and that the rights of user access take proper account of the type and level of sensitivity of the
information concerned
70. The use of utility programs that might be capable of overriding system or other access controls
shall be restricted and tightly controlled.
71. Interactive sessions shall shut down after a defined period of inactivity, and restrictions on
connection times shall be used to provide additional security for high-risk applications
72. Automatic equipment identification shall be used to authenticate connections from equipment
if it is important that the communications can only be initiated from a specific location or
equipment.
73. Physical and logical access to diagnostic and configuration ports shall be controlled.
74. Groups of information services, users and information systems should be segregated on
networks. For shared networks, especially those extending across UNDP’s boundaries, the
capability of users to connect to the network should be restricted to UNDP business purposes
on a need-to-know basis.
75. Routing controls should be implemented for networks to ensure that computer connections
and information flows do not breach the access control policy of the applications.
76. Access to operating systems should be controlled by a secure log-on procedure. All users
should have a unique user ID for their personal use only and a suitable authentication
technique used to authenticate users.
78. A formal policy, operational plans and procedures should be developed and implemented for
tele-working activities and appropriate security measures adopted to protect against the risks
of using mobile computing and communication facilities.
79. Objectives - To ensure information systems (e.g. applications, infrastructures, services, etc.) are
designed with security as an integral component and placed into production with all system-
specific security requirements fully understood and implemented.
80. New information systems and major system enhancements shall be formally presented to and
approved by the ICT Board before being acquired or developed. New information systems and
system enhancements shall undertake formal testing in a controlled environment with user
acceptance testing (UAT) prior to their promotion to production status. Formal testing shall
81. The security requirements of a new information system or system enhancement shall be
identified and agreed upon prior to system development or procurement
82. Ownership responsibilities in respect to a new information system shall be agreed upon prior to
its implementation.
83. Data validation controls shall be incorporated during development and maintenance of
information systems to detect and prevent any corruption of information through input,
processing, or output errors. Requirements for ensuring authenticity and protecting message
integrity in applications shall be identified, and appropriate controls identified and
implemented.
Cryptographic Controls
86. All changes to production information systems (and their source code) shall be formally
authorized and controlled to prevent the potential compromise of business processing and
security arrangements. Adequate and documented testing of all changes shall be performed.
87. Before operating systems are changed, business critical applications shall be viewed and tested
to ensure there is no adverse impact on organizational operations or security.
88. Outsourced software development shall be supervised and monitored by the appropriate
UNDP unit(s).
89. Timely information about technical vulnerabilities of information systems being used shall be
obtained, exposure to such vulnerabilities evaluated, and appropriate measures taken to
address associated risks.
91. Objectives - To ensure incidents affecting Information Security within UNDP are reported and
responded to in a timely and effective manner to allow corrective action to be taken.
92. All staff members and other authorized individuals or entities are required to report suspected
information security weaknesses or incidents to the BoM/OIST ICT Security unit
([email protected]).
93. The Information Security Section/OIST/BoM shall develop and maintain Information Security
event reporting and escalation procedures to ensure that Information Security events and
weaknesses associated with information systems are communicated in a manner allowing
timely corrective action to be taken.
94. In cases where an Information Security incident may involve either legal action or an internal
investigation, the Director, OIMT will consult with the Legal Office (LO) and/or the Office of
Audit and Investigation (OAI), in order to authorize the collection and retention of related
evidence and its subsequent provision to the LO and/or the OAI.
95. Objective: To ensure that UNDP is equipped to react to disruptions of operations, and to
ensure the timely resumption of critical business processes, following disasters or major
failures of information systems.
96. To ensure business continuity, the ICT Disaster Recovery Standards policy is in place.
97. To ensure compliance with applicable legal, statutory, regulatory, and contractual
requirements, procedures shall be implemented to guide UNDP in terms of its obligations. Such
obligations may be derived from, but are not limited to:
98. UNDP managers shall ensure that all security procedures within their area of responsibility are
carried out correctly to achieve compliance with security policies and standards. Managers in
Regional Hubs and Country Offices shall make an annual self-attestation that they are in
compliance with this Information Security Policy and its related standards. The Director, OIMT
will make a similar statement on behalf of the UNDP Headquarters. Any non-compliance must
be documented along with the reasons for non-compliance
99. Audit requirements and activities involving checks on operational systems shall be carefully
planned and agreed to in advance, to minimize the risk of disruptions to business processes.
100. Access to information systems audit tools shall be protected to prevent any possible misuse or
compromise.
102. The Chief Information Security Officer (CISO), OIMT provides technical advisory support to the
Director of OIMT.
103. An Information Security programme exists within UNDP to ensure that there is clear
responsibility and accountability, both within and across organizational units, for the
management of Information Security. The Information Security programme consists of the
policies, standards, work instructions, organizational units and individuals with security
responsibilities and provides the structure as well as an effective mechanism for coordinating
and managing Information Security for the organization.
104. In support of the Information Security programme, the OIMT/BMS exercises its duties in the
following areas:
105. By providing consultancy and support, and by performing ongoing reviews, the OIMT/BMS will
assist individual organizational units to comply with policies in support of the Information
Security programme.
107. The Office of Audits and Investigations (OAI) shall provide the senior management of UNDP
with a periodic independent assessment of the operation and effectiveness of the Information
Security programme.
108. There will be regular Information Security Management Meetings consisting of staff members
and contractors in UNDP who are key to implementing the information security programme.
Compliance
109. Failure to comply with this Policy without obtaining a prior waiver shall be dealt with in
accordance with UNDP Staff Regulations and Rules, or as appropriate, the staff contractual
terms.
Exceptions
110. Where an organizational unit is unable to meet a policy statement contained in this document,
the Head of a unit shall obtain a waiver from the Director, OIMT/BMS.
111. All waiver requests shall be viewed as temporary and carry a specific expiration date. They are
subject to review by the Director, OIMT/BMS.
112. If a waiver is no longer required before the expiration date or annual review, the Head of the
unit shall inform or advise the Director, OIMT/BMS.