Its Sec 02
Its Sec 02
1.0 Purpose
This state IT standard specifies the minimum requirements for information security in all
agencies and identifies the National Institute of Standards and Technology (NIST) Special
Publication (SP) 800-53 (Revision 4), “Security and Privacy Controls for Federal
Information Systems and Organizations,” as the framework for information security
controls implementation for the state.
2.0 Scope
Pursuant to Ohio Administrative Policy IT-01, “Authority of the State Chief Information
Officer to Establish Ohio IT Policy,” this state IT standard is applicable to every organized
body, office, or agency established by the laws of the state for the exercise of any function
of state government except for those specifically exempted. Non-participating agencies
are encouraged to comply with this standard as well as all enterprise policies, standards
and guidelines.
3.0 Background
The State of Ohio has adopted NIST SP 800-53 (Revision 4) as the information security
controls framework for the state.
• Agencies can share a common vocabulary and common set of concepts related to
information security controls, which will improve communication and
understanding of this topic within and among the agencies.
Office of Information Technology | 30 East Broad St., 39th Floor Katrina Flory
Columbus, Ohio 43215 | 614-644-6446 | [email protected] State Chief Information Officer
STATE OF OHIO IT STANDARD ENTERPRISE SECURITY CONTROLS FRAMEWORK
• When everyone is using the same information security controls framework, greater
insight is provided into the overall security posture of the state, which can help
determine the most efficient and effective deployment of security resources.
• Using NIST SP 800-53 (Revision 4) as its security controls framework, allows the
state to leverage research already performed and implementation guidance
already produced by the federal government and provides the opportunity for
better alignment between state and federal security requirements.
The complexity involved in securing agency systems can be enormous and focus is
necessary to ensure that limited resources are prioritized and applied to the areas of
highest risk. Significant work has been done to address this concept and the result is the
Center for Internet Security (CIS) Controls. The CIS Controls complement the security
controls in NIST SP 800-53. The controls identified in the CIS Controls address the highest
threat areas for the enterprise environment.
4.0 Standard
State agencies shall use NIST SP 800-53 (Revision 4), as the basis for selecting
information security controls. The selection and implementation of individual controls shall
be based upon system classification and an overall understanding of the risks posed to
that system.
To establish an information security baseline across all state agencies and address the
currently known, high-priority attacks, agencies are required to implement the enterprise
controls listed below.
DAS OISP provides all state agencies with access to the CIS Benchmarks,
which offer secure baseline configurations for common laptop, workstation,
and server operating systems (refer to section 5.0 Procedures).
5.0 Procedures
5.1 Exception Process: To request an exception to one or more of the requirements
outlined in this standard, please complete an IT Security Exception Request form.
5.1.1 The form is located within the IT Enterprise Services Portal under the
“Services & Products” category.
5.1.2 If you have any questions, please contact DAS OISP (refer to Section 9.0
Inquiries for contact information).
6.0 References
6.1 Ohio Administrative Policy IT-01, Authority of the State Chief Information Officer to
Establish Ohio IT Policy, defines the authority of the state CIO to establish State of
Ohio IT standards as they relate to the acquisition and use of information technology
by state agencies, including, but not limited to, hardware, software, technology
services and security.
6.2 Ohio Administrative Policy IT-14, Data Encryption and Securing Sensitive Data,
outlines the requirements for identifying and securing sensitive data as well as the
devices and media on which sensitive data resides.
6.3 Ohio Administrative Policy IT-15, Information Security and Privacy Awareness
Training, provides information security and privacy awareness training
requirements for organizational users.
6.4 OIT Enterprise Procedure OEP-SEC.4001, Statewide Incident Response
Reporting, defines the steps to be followed by State of Ohio agencies reporting
information, computer system, privacy or network security incidents.
6.5 NIST Special Publication 800-53, Security and Privacy Controls for Federal
Information Systems and Organizations, provides guidelines for selecting and
7.0 Definitions
Availability Ensuring timely and reliable access to and use of
information. 1
DAS-managed
Information System Information systems that reside in facilities or infrastructure
managed by DAS OIT personnel. Primary responsibility for
managing these systems may be assigned to DAS OIT
personnel or other outside entities.
1 “NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems
and Organizations,” U.S. Department of Commerce National Institute of Standards and Technology, April, 2013
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf>.
2 Ibid.
3 “NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems
and Organizations,” U.S. Department of Commerce National Institute of Standards and Technology, April, 2013
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf>.
Personally Identifiable
Information “Personally identifiable information” is information that can
be used directly or in combination with other information to
identify a particular individual. It includes:
Document Name
FIPS Publication 199: Standards for Security Categorization of Federal Information and
Information Systems is available at the following location:
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf
NIST Special Publication 800-53, “Security and Privacy Controls for Federal Information
Systems and Organizations,” and other NIST Special Publications of interest to the
information security community can be found at the following location:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Center for Internet Security (CIS) Controls are available at the following location:
https://www.cisecurity.org/controls/
9.0 Implementation
Due to the length of time that this standard has been in effect, state agencies should
already be in alignment with the requirements. The revisions capture current statewide
IT security practices. For compliance related questions, please contact DAS OISP (refer
to section 11.0 Inquiries for DAS OISP contact information).
11.0 Inquiries
For information regarding this state IT standard or the NIST Special Publication 800-53
security controls framework, please contact:
12.0 Attachments
None.