Baseline Security Controls Policy
Baseline Security Controls Policy
2. Scope
2.1. This policy applies to all Company Information Technology systems and infrastructure.
3. References
3.1. None
4. Definitions
4.1. Audit Log – a chronological record of system activities, including records of system accesses
and operations performed during a defined period of time.
4.2. Audit Record – an individual entry in an audit log related to an audited event.
4.3. Cryptographic Mechanisms – a means to render data unintelligible except to intended recipients.
4.4. Default Credentials – the vender defined username and password for a given system.
4.5. Malicious code protection – a program specifically designed to detect many forms of malware
and prevent them from infecting computers, as well as cleaning computers that have already
been infected.
4.7. Sensitive Company Information – any company owned information that, if disclosed, could
impact legal or regulatory compliance; or data that is critical to the business operations.
5. Responsibilities
5.1. Chief Information & Digital Officer is responsible for owning and administering this policy and for
establishing and maintaining the Cybersecurity program.
5.2. Information Risk Committee is responsible for risk management and policy decisions and for
approving exceptions to this policy.
5.3. Business Insights & Technology Solutions (BI&TS) Leaders are responsible for implementing the
controls outlined in this policy.
6. Policy
6.1.1. Audit records should include the following information: user making the change, date and
time stamp, link to the records, original value, new value and, where possible, the reason
for the change.
6.1.2. Audit records should be retained in a secure location and protected for modification.
6.1.3. The system should provide a warning to assigned personnel when allocated audit record
storage volume exceeds a pre-defined maximum threshold.
Page 1 of 3
Published MasterControl documents frequently use JavaScript. If you are seeing this message, your viewer
either does not support JavaScript or it is disabled. If you are using Adobe Acrobat, please enable JavaScript.
If you are using another viewer, you will need to configure your browser to view PDF files externally in Adobe
Acrobat.
6.1.4. System clocks shall synchronize time against authoritative time servers.
6.1.5. Audit records shall be maintained for a minimum of ninety (90) days.
6.2.2. The baseline configuration documents shall be reviewed at least annually for accuracy
and to ensure the relevant and current security controls are included.
6.2.3. An assessment of the security impact of changes to the configuration shall be conducted
prior to the change being implemented.
6.2.4. Only essential capabilities may be included as part of the baseline configuration;
unnecessary ports, protocols, services, and software shall be removed or disabled.
6.2.5. Systems and infrastructure that cannot meet the baseline security control requirements
outlined in this policy shall not connect to the corporate network and must remain
standalone.
6.3.2. A standard process to document, rate, prioritize, track and mitigate vulnerabilities shall be
implemented.
6.4.2. Firewalls shall be implemented between public networks and internal systems to restrict
the flow of network traffic to only that which is required.
6.6.1. Specific authorization and approval shall be granted prior to using portable media devices.
6.6.3. Media devices shall be destroyed or sanitized using approved procedures once their use
is no longer required.
Page 2 of 3
Published MasterControl documents frequently use JavaScript. If you are seeing this message, your viewer
either does not support JavaScript or it is disabled. If you are using Adobe Acrobat, please enable JavaScript.
If you are using another viewer, you will need to configure your browser to view PDF files externally in Adobe
Acrobat.
6.6.4. Chain of custody shall be maintained whenever physically transporting unencrypted
media.
6.7.1. Manufacturing systems and infrastructure that do not meet the baseline security controls
required by this policy shall not connect to the network and must remain standalone.
6.7.2. Manufacturing systems and infrastructure that meet the baseline security controls outlined
in this policy shall connect to a separate network segment that is isolated from the
corporate network.
6.8.1. Annual assessments of baseline security controls shall be performed to identify risks and
issues.
6.8.2. Remediation plans shall be reviewed and monitored by the Information Risk Committee.
6.9.1. Exceptions to this policy require approval of the Chief Information & Digital Officer and the
Information Risk Committee.
7. Attachments
7.1. None
8. Revision History
Page 3 of 3
Signature Manifest
DCC Review
Create/Revise
Peer Collaboration
Author/Department Approval
Final QA Approval
Training
Training
Set Dates
Notification
Published MasterControl documents frequently use JavaScript. If you are seeing this message, your viewer
either does not support JavaScript or it is disabled. If you are using Adobe Acrobat, please enable JavaScript.
If you are using another viewer, you will need to configure your browser to view PDF files externally in Adobe
Acrobat.