SAM5300 People - Process - Technology Navigational Guide - September 2022
SAM5300 People - Process - Technology Navigational Guide - September 2022
PROCESS
TECHNOLOGY
Information security is an entity-wide responsibility and achieved through a combination of people, process
and technology. The state's information assets, including its data processing capabilities, information
technology infrastructure and data are an essential public resource. For many Agency/state entities, program
operations would effectively cease in the absence of key computer systems. In some cases, public health and
safety would be immediately jeopardized by the failure or disruption of a system. The non-availability of state
information systems and resources can also have a detrimental impact on the state economy and the citizens
who rely on state programs. Furthermore, the unauthorized acquisition, access, modification, deletion, or
disclosure of information included in Agency/state entity files and databases can compromise the integrity of
state programs, violate individual right to privacy, and constitute a criminal act.
This document is intended to help Agencies/state entities better understand the state policy and procedural
requirements for establishment of effective enterprise-wide information security programs. For navigational
ease, the policy requirements have been grouped in this document by categories aligned with People, Process
and Technology so that entities can more easily understand what is needed to achieve state security
objectives. Note: There may be some requirements that appear in multiple groupings. This was intentional.
For the complete published policy visit: http://sam.dgs.ca.gov/TOC/5300.aspx
5305.4 Personnel Management Each state entity must identify security and privacy Information Security Initially,
roles and responsibilities for all personnel to ensure Program ongoing
personnel are informed of their roles and Management
responsibilities for using state entity information Standard (SIMM
assets, to reduce the risk of inappropriate use, and a 5305-A)
documented process to remove access when changes
PERSONNEL MANAGEMENT
occur.
5320 Training And Awareness Each state entity must establish and maintain an NIST SP 800-53: Initially,
For Information Security And information security and privacy training and Awareness and ongoing
Privacy awareness program to assess the skills and Training (AT)
knowledge of its personnel in relation to job
requirements, identify and document training and
professional development needs, and provide suitable
training within the limits of available resources.
5320.1 Security And Privacy Each state entity shall provide basic security and Initially,
Awareness privacy awareness training, which meets state annually
requirements, to all information asset users (all
personnel, including managers and senior executives)
as part of initial training for new users and annually
thereafter.
5320.2 Security And Privacy Each state entity shall determine the appropriate Civil Code section Initially,
Training content of security and privacy training based on the 1798; annually
assigned roles and responsibilities of individuals and NIST SP 800-53:
the specific security requirements of the state entity Awareness and
and the information assets to which personnel have Training (AT)
access.
PERSONNEL MANAGEMENT
5320.4 Personnel Security Each state entity shall establish processes and NIST SP 800-53: Initially,
procedures to ensure that individual access to Personnel Security ongoing
information assets is commensurate with job-related (PS)
responsibilities, and individuals requiring access is
commensurate with job-related responsibilities, and
individuals requiring access to information assets sign
appropriate user agreements prior to being granted
access.
5325.2 Technology Recovery Each state entity shall establish technology recovery NIST SP 800-53: Initially,
Training training and exercises for personnel involved in Contingency Planning ongoing
technology recovery, to ensure availability of skilled (CP)
staff.
5340.1 Incident Response Each state entity shall provide incident response NIST SP 800-53:
Training training to information system users consistent with Incident Response (IR)
assigned roles and responsibilities.
5310.1 State Entity Privacy Information asset owners shall be open about state NIST SP 800-53;
Statement And Notice On entity information handling practices, including the Privacy Statement
Collection purposes for which the state entity collects, uses, and and Notices
discloses personal information of individuals. Each Standard (SIMM
state entity Privacy Program Coordinator shall 5310-A);
DATA MANAGEMENT
prepare, publish, and maintain a General Privacy Government Code
Policy Statement and a Privacy Notice on Collection for section 11019.9
each personal information collection.
5310.2 Limiting Collection Information asset owners shall collect the least NIST SP 800-53
amount of personal information that is required to
fulfill the purposes for which it is being collected.
Information asset owners shall obtain personal
information only through lawful means and shall
collect personal information to the greatest extent
practicable directly from the individual who is the
subject of the information rather than from another
source.
5310.3 Limiting Use And Information asset owners, custodians and users shall Civil Code section
Disclosure not disclose, use, or make available personal 1798.24; NIST SP
information collected from individuals for purposes 800-53: Privacy
other than those for which it was originally collected. Individual Access
(Exceptions for certain situations) Standard (SIMM
5310-B)
5310.4 Individual Access to Each state entity shall ensure individuals are provided NIST SP 800-
Personal Information with information about their access rights and the 53;Privacy
procedures for exercising those rights. Individual Access
Standard (SIMM
5310-B)
5310.7 Security Safeguards Information asset owners shall apply all applicable NIST SP 800-53
statewide and state entity information security laws,
policies, standards, and procedures in order to protect
personal information under the information asset
DATA MANAGEMENT
owner’s responsibility.
5315.2 System Development Each state entity shall manage its information assets NIST SP 800-53:
Lifecycle using a documented SDLC methodology. System and
Services
Acquisition (SA)
5315.3 Information Asset In conjunction with Records Management (SAM NIST SP 800-53:
Documentation Chapter 1600) and Property Accounting (SAM Chapter System and
8600) requirements, each state entity shall ensure Services
information security documentation is prepared and Acquisition (SA);
maintained as part of the overall documentation for all SAM Chapters
information assets. 1600 and 8600
DATA MANAGEMENT
use, modification or disposal, inside or outside of the (MP)
state entity’s control areas whether in storage or
transport.
5365.3 Media Disposal Each state entity shall sanitize digital and non-digital NIST SP 800-53:
media prior to disposal or release for reuse, in Media Protection
accordance with applicable standards and policies, (MP)
including media found in devices such as hard drives,
mobile devices, scanners, copiers, and printers.
ORGANIZATION/STRATEGY
5300.4 Definitions Each state entity shall use the information security SAM 5300 Definitions
and privacy definitions issued by the CISO in
implementing information security and privacy policy
in their daily operations.
5300.5 Minimum Security Each state entity shall use the FIPS and NIST SP 800- FIPS; NIST SP 800-53
Controls 53 in the planning, development, implementation,
and maintenance of their information security
programs. Adoption of these standards will facilitate
a more consistent, comparable, and repeatable
approach for securing state assets; and, create a
foundation from which standardized assessment
methods and procedures may be used to measure
security program effectiveness.
5305 Information Security Each state entity is responsible for establishing an NIST SP 800-53:
Program information security program. The program shall Planning (PL); Program
include planning, oversight, and coordination of its Management (PM);
information security program activities to effectively
manage risk, provide for the protection of
information assets, and prevent illegal activity, fraud,
waste, and abuse in the use of information assets.
5305.2 Policy, Procedure and Each state entity must provide for the protection of NIST SP 800-53:
Standards Management its information assets by establishing appropriate Planning (PL); Program
ORGANIZATION/STRATEGY
administrative, operational and technical policies, Management (PM);
standards, and procedures to ensure its operations Information Security
conform with business requirements, laws, and Program Management
administrative policies, and personnel maintain a Standard (SIMM 5305-
standard of due care to prevent misuse, loss, A)
disruption or compromise of state entity information
assets.
5305.6 Risk Management Each state entity shall create a state entity-wide NIST SP 800-53:
information security, privacy and risk management Planning (PL); Program
strategy which includes a clear expression of risk Management (PM);
tolerance for the organization, acceptable risk Information Security
assessment methodologies, risk mitigation strategies, Program Management
and a process for consistently evaluating risk across Standard (SIMM 5305-
the organization with respect to the state entity’s risk A)
tolerance, and approaches for monitoring risk over
time.
5305.9 Information Security Each state entity shall establish outcome-based NIST SP 800-53: System
Program Metrics metrics to measure the effectiveness and efficiency of and Services
the state entity’s information security program, and Acquisition (SA);
the security controls deployed. Assessment,
Authorization, and
Monitoring (CA);
Contingency Planning
(CP)
5315.7 Software Usage Each state entity shall ensure its Software SAM sections 4846.1
Restrictions Management Plan (SAM sections 4846.1 and 4846.2) and 4846.2; NIST SP
addresses three installation requirements. 800-53: Configuration
Management (CM)
5315.9 Security Authorization Consistent with the State Information Management SAM section 4800
Principles, Record of Decisions (SAM section 4800),
each state entity shall establish a documented
security authorization method which tracks official
management decisions authorizing the operation of
ORGANIZATION/STRATEGY
information assets and explicit acceptance of risks
based on implementation of agreed-upon information
security measures.
5330 Information Security Each state entity shall validate compliance with NIST SP 800-53:
Compliance statewide information security policy, standards, and Assessment,
procedures as set forth in this Chapter, and the state Authorization, and
entity’s internal information security policies to verify Monitoring (CA)
that security measures are in place and functioning as
intended.
5330.2 Compliance Reporting Each state entity shall comply with reporting Designation Letter Varies by
requirements as directed by the CISO. These reports (SIMM 5330-A); report.
include Designation Letter, Information Security and Information Security
Privacy Program Compliance Certification, and Privacy Program
Technology Recovery Program Certification and/or Compliance
Technology Recovery Plan, and the California Certification (SIMM
Compliance and Security Incident Reporting System 5330-B); Technology
(CAL-CSIRS) Report. Recovery Program
Certification (SIMM
5325-B); California
Compliance and
Security Incident
Reporting System (CAL-
CSIRS); Risk Register
and Plan of Action and
Milestones (SIMM
5305-B); Risk Register
and Plan of Action and
Milestones Worksheet
(SIMM 5305-C)
5340.2 Incident Response Testing Each state entity shall exercise or test their incident NIST SP 800-53:
response capability to determine its effectiveness, Incident Response
INCIDENT MANAGEMENT
document the results and incorporate lessons (IR)
learned to continually improve the plan.
5340.3 Incident Handling Each state entity shall implement incident handling SAM section 5325;
for information security and privacy incidents that NIST SP 800-53:
includes preparation, detection and analysis, Incident Response
containment, eradication, and recovery. Incident (IR); Risk Register
handling shall coordinate with business continuity and Plan of Action
planning activities (SAM section 5325). and Milestones
(SIMM 5305-B); Risk
Register and Plan of
Action and
Milestones
Worksheet (SIMM
5305-C)
5340.4 Incident Reporting Each state entity shall follow the incident reporting NIST SP 800-53:
procedures as described in SIMM 5340-A. Incident Response
(IR); Incident
Reporting and
Response
Instructions (SIMM
5340-A)
5315.5 Configuration Each state entity shall establish a documented NIST SP 800-53:
Management process regarding controlled modifications to Configuration
hardware, firmware, and software to protect the Management (CM)
information asset against improper modification
before, during, and after system implementation.
THREAT MANAGEMENT
NIST SP 800-53:
Assessment,
Authorization, and
Monitoring (CA)
NIST SP 800-53:
Audit and
Accountability (AU);
Physical and
Environmental
Protection (PE); Risk
Assessment (RA)
5335.2 Auditable Events Each state entity shall ensure that information NIST SP 800-53:
systems are capable of being audited and the events Audit and
necessary to reconstruct transactions and support Accountability (AU);
after-the-fact investigations are maintained. Physical and
Environmental
Protection (PE); Risk
Assessment (RA)
5350 Operational Security Each state entity shall develop, implement, and NIST SP 800-53:
document, disseminate, and maintain operational System and
security practices and each state entity’s security Information
THREAT MANAGEMENT
architecture shall align with best practices and Integrity (SI);
documented security controls. System and
Communications
Protection (SC)
5355.2 Security Alerts, Each state entity shall continuously identify and NIST SP 800-53: Risk
Advisories, and Directives remediate vulnerabilities before they can be Assessment (RA);
exploited. System and Services
Acquisition (SA);
System and
Communications
Protection (SC)
5315.8 Information Asset Each state entity shall carefully consider the risks that NIST SP 800-53:
Connections may be introduced when information assets are Access Control (AC)
connected to other systems with different security
requirements and security controls, both within the
state entity and external to the state entity.
Each state entity shall identify and maintain an
inventory of its authorized information system
connections with other state entities which establish
authorized connections from information assets as
defined by their authorization boundary, to other
information systems.
ACCESS MANAGEMENT
5350 Operational Security Each state entity shall develop, implement, and NIST SP 800-53:
document, disseminate, and maintain operational System and
security practices and each state entity’s security Information
architecture shall align with best practices and Integrity (SI);
documented security controls. System and
Communications
Protection (SC)
5355 Endpoint Defense Each state entity shall be responsible for protecting NIST SP 800-53:
information on computers that routinely interact with System and
untrusted devices on the internet or may be prone to Information
loss or theft. Integrity (SI)
5355.1 Malicious Code Protection Each state entity shall employ malicious code NIST SP 800-53:
protection mechanisms at information asset entry System and
and exit points and at workstations, servers, or Information
mobile computing devices on the network to detect Integrity (SI)
and eradicate malicious code.
5360.1 Remote Access Each entity shall establish, and document allowed NIST SP 800-53:
methods of remote access to its information systems; Access Control (AC);
establish usage restrictions and implementation Telework and
guidance for each allowed remote access method; Remote Access
and monitor the information asset for unauthorized Security Standard
remote access. Allowed methods shall comply with (SIMM 5360-A)
the Telework and Remote Access Security Standard
(SIMM 5360-A).
ACCESS MANAGEMENT
5360.2 Wireless Access Each state entity shall establish appropriate NIST SP 800-53:
restrictions and implementation instructions for Access Control (AC);
wireless access and enforce requirements for wireless Telework and
connections to information systems. Each state entity Remote Access
shall also proactively search for unauthorized wireless Security Standard
connections including scans for unauthorized Wi-Fi (SIMM 5360-A)
access points.
5365 Physical Security Each state entity shall establish and implement NIST SP 800-53:
physical security and environmental protection controls Physical and
to safeguard information assets against unauthorized Environmental
access, use, disclosure, disruption, modification or Protection (PE)
destruction.
5365.1 Access Control for Output Each state entity shall control access to information NIST SP 800-53:
Devices system output devices, such as printers and facsimile Physical and
devices, to prevent unauthorized individuals from Environmental
obtaining the output. Protection (PE)
5325.1 Technology Recovery Plan Each state entity shall develop a TRP in support of the NIST SP 800-34;NIST
state entity’s Continuity Plan and the business need SP 800-53:
to protect critical information assets to ensure their Contingency
availability following an interruption or disaster. Each Planning;
state entity must keep its TRP up-to-date and provide Technology
annual documentation for those updates to the CISO. Recovery Plan
Instructions (SIMM
5325-A);
Technology
Recovery Program
Certification (SIMM
CONTINGENCY PLANNING
5325-B)
5325.3 Technology Recovery Each state entity shall test the TRP to determine its NIST SP 800-53:
Testing effectiveness and the state entity’s readiness to Contingency
execute the TRP in the event of a disaster. Each state Planning
entity shall initiate corrective actions and
improvements to the TRP based upon deficiencies
identified during testing and exercises.
5325.4 Alternate Storage and Each state entity shall establish an alternate storage NIST SP 800-53:
Processing Site site, including the necessary agreements to permit Contingency
the storage and recovery of backup information. Each Planning
state entity shall ensure that the alternate storage
site provides information security safeguards
equivalent to that of the primary site.
5325.5 Telecommunications Each state entity shall ensure they have alternate NIST SP 800-53:
Services telecommunications services including necessary Contingency
agreements to permit the resumption of information Planning
asset operations for essential missions and business
functions when the primary telecommunications
capabilities are unavailable at either the primary or
alternate processing or storage sites.
CONTINGENCY PLANNING
5325.6 Information System Each state entity shall perform regularly scheduled NIST SP 800-53:
Backups backups of system and user-level information. Contingency
Planning
5315.4 System Developer Each state entity shall require that system developers NIST SP 800-53:
CONTRACTS/PROCUREMENT MANAGEMENT
Security Testing create and implement a security test and evaluation System and Services
plan as part of the system design and build. When a Acquisition (SA)
contract is required, it shall specify the acceptance
criteria for security test and evaluation plans and
vulnerability remediation processes.
5315.5 Configuration Each state entity shall establish a documented NIST SP 800-53:
Management process regarding controlled modifications to Configuration
hardware, firmware, and software to protect the Management (CM)
information asset against improper modification
before, during, and after system implementation.
5335.2 Auditable Events Each state entity shall ensure that information NIST SP 800-53:
systems are capable of being audited and the events Audit and
necessary to reconstruct transactions and support Accountability (AU);
after-the-fact investigations are maintained. Physical and
Environmental
Protection (PE); Risk
Assessment (RA)
5305.8 Provisions for Each state entity shall ensure agreements with state NIST SP 800-53:
Agreements with State and and non-state entities include provisions which System and Services
Non-State Entities protect and minimize risk to the state. Acquisition (SA);
FIPS Publication 199
5315.1 System and Services Each state entity shall determine the information NIST SP 800-53:
Acquisition security requirements (confidentiality, integrity, and System and Services
availability) for its information assets in Acquisition (SA)
mission/business process planning; determine,
document and allocate the resources required to
protect the information assets as part of its capital
planning and investment control process; and,
establish organizational programming and budgeting
documentation.
CONTRACTS/PROCUREMENT MANAGEMENT
5315.2 System Development Each state entity shall manage its information assets NIST SP 800-53:
Lifecycle using a documented SDLC methodology. Systems and
Services Acquisition
(SA)