Program Management Policy
Program Management Policy
Page 1 of 19
Program Management Policy and Procedures (PM-1)
Table of Contents
1.0. Purpose ............................................................................................................................................ 3
2.0. Scope ................................................................................................................................................. 3
3.0. Conflict.............................................................................................................................................. 3
4.0. Roles and Responsibilities ....................................................................................................... 3
5.0. Management Commitment ...................................................................................................... 4
6.0. Coordination Among Agency Entities ................................................................................. 4
7.0. Compliance ..................................................................................................................................... 5
8.0. Procedures ...................................................................................................................................... 5
9.0. Document Details...................................................................................................................... 17
10.0. Review ........................................................................................................................................... 17
11.0. Records Management.............................................................................................................. 17
12.0. Public Records Exceptions .................................................................................................... 17
13.0. Definitions.................................................................................................................................... 17
ii
Program Management Policy and Procedures (PM-1)
1.0. Purpose
The purpose of this policy is to provide oversight for organization-wide information
security programs to help ensure the confidentiality, integrity, and availability of
information processed, stored, and transmitted by State of Maine information
systems. The Program Management family provides security controls at the
organizational level rather than at the information system (see Definitions) level.
This corresponds to the Program Management (PM) Control Family of the National
Institute of Standards and Technology (NIST) Special Publication 800-53 (Rev. 4). 1
2.0. Scope
2.1. This document applies to:
2.1.1. All State of Maine personnel, both employees and contractors;
2.1.2. Executive Branch agency information assets, irrespective of location; and
2.1.3. Information assets from other State government branches that use the State
network.
3.0. Conflict
If this document conflicts with any law or union contract in effect, the terms of the
existing law or contract prevail.
1
https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final
Page 3 of 18
Program Management Policy and Procedures (PM-1)
4.3.1. Establishes and maintains the enterprise vision, strategy, and program to
ensure information assets and technologies are adequately protected.
4.3.2. Establishes and enforces the standards for the technical, physical, personnel
and cyber-physical aspects of information security.
4.3.3. Coordinates, develops, implements, and maintains a State of Maine Executive
Branch information security program.
4.3.4. Owns, executes, and enforces this Policy.
4.3.5. Informs involved and affected parties in the event of non-compliance with
information security policies.
4.6. IT Procurement
4.6.1. With support from OIT Information Asset Owners, ensures vendor contracts
contain appropriate security requirement and risk management language.
Page 4 of 18
Program Management Policy and Procedures (PM-1)
with Executive Order 2014-003 2 and Title 5, Chapter 163 §1971-1985. 3 Agencies
and the Office of Information Technology coordinate to meet all state and Federal
audit documentation and reporting compliance requirements. Roles and
responsibilities in this document establish further coordination of the technical,
physical, personnel and cyber-physical aspects of information security.
7.0. Compliance
7.1. For State of Maine employees, failure to comply with this document may result in
progressive discipline, up to and including, dismissal.
7.2. For State of Maine contractors and non-State of Maine personnel, failure to comply
may result in removal of the individual’s ability to access, and use, State of Maine
data and systems. Employers of contractors will be notified of any violations.
7.3. Personnel are also subject to any applicable penalties for statutory requirements
compliance violations. Depending on the requirement, and the nature of the
violation, penalties could include fines and/or criminal charges.
8.0. Procedures
8.1. The following procedures are designed to satisfy the security control requirements
of this Policy (Program Management) as outlined in NIST Special Publication 800-53
(Rev. 4), 4 Internal Revenue Service Publication 1075, 5 Centers for Medicare &
Medicaid Services Minimum Acceptable Risk Standards for Exchanges 2.0, 6 Criminal
Justice Information Services Security Policy, 7 Health Insurance Portability and
Accountability Act Security Rule, 8 and to satisfy Federal law.
2
http://www.maine.gov/tools/whatsnew/attach.php?id=626944&an=1
3
https://legislature.maine.gov/statutes/5/title5ch163sec0.html
4
https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final
5
https://www.irs.gov/pub/irs-pdf/p1075.pdf
6
https://www.cms.gov/CCIIO/Resources/Regulations-and-Guidance/#MinimumAcceptableRiskStandards
7
https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center
8
https://www.hhs.gov/hipaa/for-professionals/security/index.html
Page 5 of 18
Program Management Policy and Procedures (PM-1)
8.3.3. The CISO ensures that security resources are available for expenditure as
planned.
9
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
Page 6 of 18
Program Management Policy and Procedures (PM-1)
10
https://www.whitehouse.gov/wp-content/uploads/2019/11/M-20-04.pdf
11
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/configuration-management-policy.pdf
12
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
13
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/general-architecture-principles_1.pdf
Page 7 of 18
Program Management Policy and Procedures (PM-1)
Page 8 of 18
Program Management Policy and Procedures (PM-1)
8.7.3. The Architecture and Policy Team, in collaboration with the Information
Security Office, the OIT Compliance Officer, IT Procurement, and other
relevant parties, coordinates a review of and vets all proposed new
technologies and technology solutions presented by OIT or Agency Business
Partners to ensure that new products and technologies align with the State of
Maine’s overall security architecture.
8.7.4. IT Procurement, in collaboration with the Architecture and Policy Team, the
Information Security Office, the OIT Compliance Officer, and other relevant
parties, vets all technology related procurement contracts – both new and
renewed – through contract review to ensure that contracts align with the
State of Maine’s overall security architecture.
8.8.2. The Maine Information Analysis Center (MIAC) 24 also plays a role in critical
infrastructure planning. A program of the Maine Department of Public Safety,
the MIAC is Maine's designated fusion center (see Definitions). The MIAC's
21
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/waiver.pdf
22
https://www.cisa.gov/homeland-security-presidential-directive-7
23
https://www.maine.gov/mema/homeland-security/critical-infrastructure-protection
24
https://www.maine.gov/dps/msp/specialty-units/MIAC
Page 9 of 18
Program Management Policy and Procedures (PM-1)
8.8.3. The CISO supports the protection of Critical Infrastructure Planning by:
8.8.3.1. Supporting MEMA planning efforts (e.g., Comprehensive Emergency
Management Plan);
8.8.3.2. Maintaining a formalized relationship with the MIAC (i.e.,
Memorandum of Understanding) to increase collaboration,
information sharing, and support for Federal, State, and county
stakeholders; and
8.8.3.3. Performing its day-to-day information security mission to include
the development contingency plans related to improving business
resiliency.
25
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/data-exchange-policy.pdf
26
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/application-deployment-certification_0.pdf
27
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/application-deployment-certification-
guidelines_1.pdf
28
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/infrastructure-deployment-certification.pdf
29
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/sdlc-procedure.pdf
30
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/sdlc-policy.pdf
31
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/vulnerablity-scanning-procedure.pdf
32
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/risk-assessment-policy-procedure.pdf
Page 10 of 18
Program Management Policy and Procedures (PM-1)
8.9.2. For remote-hosted information assets, the Hosting Partner is responsible for
risk management, with oversight from OIT Application Development Teams
in collaboration with IT Procurement and Agency Business Partners, in
accordance with the Remote Hosting Policy. 34
8.10.2. OIT works with agencies to complete security assessments to fulfill Federal
regulatory requirements or as otherwise required in accordance with the
Security Assessment and Authorization Policy and Procedures (CA-1). 35
33
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
34
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/remote-hosting-policy.pdf
35
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
36
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/change-management-policy.pdf
37
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/application-deployment-certification_0.pdf
Page 11 of 18
Program Management Policy and Procedures (PM-1)
8.10.5. Routine scans of information assets are carried out in accordance with the
Vulnerability Scanning Procedure (RA-5). 42
8.11.2. Additionally, OIT is subject to Federal audits, and part of OIT’s business
process is to meet these Federal audit requirements, which also ensures
strong security and privacy for State and citizen data.
38
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/application-deployment-certification-
guidelines_1.pdf
39
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/infrastructure-deployment-certification.pdf
40
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/sdlc-procedure.pdf
41
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/sdlc-policy.pdf
42
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/vulnerablity-scanning-procedure.pdf
43
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
44
https://legislature.maine.gov/statutes/5/title5ch163sec0.html
45
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/general-architecture-principles_1.pdf
Page 12 of 18
Program Management Policy and Procedures (PM-1)
8.11.3. The Information Security Office works with agencies and subject matter
experts to implement appropriate measures for information protection (see
OIT Risk Assessment Policy and Procedure (RA-1). 46
46
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/risk-assessment-policy-procedure.pdf
47
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-awareness-training-policy.pdf
48
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/access-control-procedures-for-users.pdf
49
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
50
http://inet.state.me.us/oit/policies/documents/IdentificationAuthenticationPolicy.pdf
51
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/RulesofBehavior.pdf
Page 13 of 18
Program Management Policy and Procedures (PM-1)
8.13.2. The knowledge and skill levels to perform information security duties and
tasks are outlined in the job description and requirements of positions with
information security duties and tasks.
8.13.3. Individual development plans for personnel with information security duties
and tasks are developed in collaboration between the employee and manager
during the annual performance review process. These also ensure that
personnel obtain and maintain certification and training on an ongoing basis.
8.13.5. OIT offers a training stipend for certain job classifications, tuition
reimbursement for relevant courses, certificates, degree programs, and
employee access to online learning platforms in order to encourage growth
and develop a strong information security workforce.
8.13.6. As risks, threats, and the organization itself changes, workforce knowledge
and skills are re-evaluated and remediated using the above-mentioned
employee development tools.
8.13.7. Security awareness training is required for all employees at least annually
(see Security Awareness Training Policy (AT-1)). 55 Role-based security
awareness training is administered within OIT in accordance with
52
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/system-information-integrity-policy.pdf
53
http://inet.state.me.us/oit/policies/documents/IncidentResponsePlan.pdf
54
http://inet.state.me.us/oit/policies/documents/IncidentResponsePolicy.pdf
55
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-awareness-training-policy.pdf
Page 14 of 18
Program Management Policy and Procedures (PM-1)
8.14.2. The procedures for testing contingency plans and incident response plans
are detailed in Contingency Plan Training, Testing, and Exercise Procedures
(intranet only). 58
8.14.2.1. This policy is reviewed and updated as required, and at least
annually, to reflect an evolving information security environment
and to ensure consistency with the organizational risk management
strategy and priorities for risk response actions.
8.14.2.2.The Information Security Office ensures that testing procedures are
executed in a timely manner.
8.14.2.2.1. Exercises to test security incident response capabilities
are conducted periodically, and at least annually.
8.14.3. The procedures for security training are detailed in the Security Awareness
Training Policy (AT-1). 59 The plan for contingency plan training is detailed in
Contingency Plan Training, Testing, and Exercise Procedures (intranet
only). 60
8.14.3.1. These policies are reviewed and updated as required, and at least
annually, to reflect an evolving information security environment
and to ensure consistency with the organizational risk management
strategy and priorities for risk response actions.
8.14.3.2. The Information Security Office and Agency Business Partners share
the responsibility for ensuring training plans are executed in a
timely manner.
56
http://inet.state.me.us/oit/policies/documents/TrainingTestingExercises.pdf
57
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
58
http://inet.state.me.us/oit/policies/documents/TrainingTestingExercises.pdf
59
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-awareness-training-policy.pdf
60
http://inet.state.me.us/oit/policies/documents/TrainingTestingExercises.pdf
Page 15 of 18
Program Management Policy and Procedures (PM-1)
8.14.4. The procedures for information system monitoring are detailed in System
and Information Integrity Policy and Procedures (SI-1). 61 The plan for
continuous monitoring is detailed in Security Assessment and Authorization
Policy and Procedures (CA-1); 62
8.14.4.1. These policies are reviewed and updated as required, and at least
annually, to reflect an evolving information security environment
and to ensure consistency with the organizational risk management
strategy and priorities for risk response actions.
8.14.4.2. The Information Security Office is responsible for ensuring these
monitoring procedures are executed in a timely manner.
8.16.2. Information shared with the Information Security Office is further shared
with the impacted Information Asset Owners and Agency Business Partners
for action as required.
8.16.3. Annual security awareness training as part of initial training for new users,
when required by information system changes, and at least annually is
another component of the Threat Awareness Program.
61
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/system-information-integrity-policy.pdf
62
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/security-assessment-authorization-policy.pdf
63
http://inet.state.me.us/oit/policies/documents/IncidentResponsePlan.pdf
Page 16 of 18
Program Management Policy and Procedures (PM-1)
10.0. Review
This document will be reviewed annually, and when substantive changes are made
to Policies, Procedures, or other authoritative regulations affecting this document.
13.0. Definitions
13.1. Information System: Used interchangeably with information asset. A discrete,
identifiable piece of information technology, including hardware, software,
firmware, systems, services, and related technology assets used to execute work on
behalf of OIT or another State agency.
13.2. Insider Threat: The potential for individuals (e.g., employees, contractors, former
employees) to use insider knowledge of sensitive agency information (e.g., security
practices, systems that hold sensitive data) to perform malicious actions, including
64
https://legislature.maine.gov/statutes/5/title5ch163sec0.html
65
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/waiver.pdf
66
https://www.maine.gov/oit/policies-standards
Page 17 of 18
Program Management Policy and Procedures (PM-1)
13.3. Fusion Center: Fusion Centers are state-owned and operated centers that serve as
focal points in states and major urban areas for the receipt, analysis, gathering and
sharing of threat-related information between State, Local, Tribal and Territorial,
Federal and private sector partners.
Source: the Department of Homeland Security. 67
13.5. Security Authorization: The official management decision given by a senior official
to authorize operation of a system or the common controls inherited by designated
organization systems and to explicitly accept the risk to organizational operations
(including mission, functions, image, and reputation), organizational assets,
individuals, other organizations, and the Nation based on the implementation of an
agreed-upon set of security and privacy controls. Also known as authorization to
operate.
13.6. Traffic Light Protocol (TLP): The Cybersecurity and Infrastructure Security Agency
(CISA) Traffic Light Protocol (TLP) used by OIT for the classification of PII impact
level. OIT’s four data, communication, or network classification levels are Public
(TLP: White), Internal (TLP: Green), Sensitive (TLP: Amber), and Restricted (TLP:
Red) (See Data Exchange Policy). 69
14.0. Abbreviations
14.1. CIO: Chief Information Officer
14.2. CISO: Chief Information Security Officer
14.3. FISMA: The Federal Information Security Management Act. 70
14.4. MEMA: Maine Emergency Management Agency
14.5. MIAC: Maine Information Analysis Center
14.6. NCSR: Nationwide Cybersecurity Review
14.7. NIST: National Institute of Standards and Technology
14.8. OIT: Office of Information Technology
14.9. PII: Personally Identifiable Information
14.10. POA&M: Plan of Actions and Milestones
67
https://www.dhs.gov/fusion-centers
68
https://csrc.nist.gov/glossary/term/personally_identifiable_information
69
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/risk-assessment-policy-procedure.pdf
70
https://www.congress.gov/bill/113th-congress/senate-bill/2521
Page 18 of 18
Program Management Policy and Procedures (PM-1)
Page 19 of 18