PSN Code of Connection v1.32
PSN Code of Connection v1.32
Version 1.32
September 2022
Organisation details
Date:
Organisation name:
Full postal address:
Company/Charity/
other registration
number (if applicable):
Name:
Position:
Telephone no:
Email:
Address:
Overview
The PSN (Public Services Network) is a network operated by several suppliers for
government that provides a trusted, reliable, cost-effective solution to departments,
agencies, local authorities and other bodies that work in the public sector, which
need to share information between themselves.
You are required to use PSN Standard Terms and Conditions in all supply
agreements between supplier and customer.
Please note that this document requires you to provide the unique identifying code
(formatted as SRV_xxxx) of any PSN services that are delivered from/hosted in your
environment. This code will be in the subject line of any emails you have received
from the PSN team relating to that service. If your environment hosts any services
belonging to another organisation you must find out the service code from them and
provide us with that information.
Under no circumstance should traffic be directed by any other route across the PSN.
Your PSN environment
Environment name:
Size estimates:
● number of users
● number of sites
● number of internal IP
addresses in scope
Unique identifying codes
(formatted as SRV_xxxx) of any
PSN services hosted within this
environment:
Please supply a network diagram detailing the infrastructure. Consult the supporting
guidance on what information should be included in this diagram.
IA conditions
These outline the minimum IA (Information Assurance) standard expected of
organisations connected to the PSN. If you cannot meet these, please get in touch
with the PSN team.
Where you are consuming cloud services from your PSN-connected infrastructure,
we expect that you will have conducted security assessments of these services
against the Cloud Security Guidance from the NCSC. You should be confident that
your use of any particular cloud service does not reduce your overall security state
below that required in the IA conditions below. Where use of a cloud service imposes
a specific security requirement, more detail has been provided below.
It is essential, where cloud services are employed (particularly with respect to IaaS
and PaaS), that you are absolutely clear (whether through contractual agreement or
other arrangements) whether the responsibility to carry out certain actions (ie
patching) lies with you or your cloud supplier. Note that in the case of an audit or site
visit you can expect PSN team assessors to check this.
We expect that the security of your End User Devices (EUDs) meets the relevant
standards below. Where a specific requirement applies to EUDs, more detail has
been provided below. The NCSC has published guidance on End User Devices
Security Guidance. Best practice information is also published on BYOD - Device
Security Guidance.
1. Operational security
An organisation will have appropriate policies, processes and procedures in place to
ensure the operational security of its infrastructure.
This typically will be of the order of: Critical vulnerabilities patched within 14 days,
important vulnerabilities should be patched within 30 days and all others patched
within 60 days.
Where you know that a vulnerability is being actively exploited then mitigating action
(eg patch applied) should be taken immediately.
Where a patch is not deployed (or available) within the timescales above then there
must be alternative mitigating action, such as disabling or reducing access to the
vulnerable service.
b. Secure configuration
You must ensure that all IT systems, software and services are appropriately
configured to reduce the level of inherent vulnerability. In particular, you will have
ensured that applications, services, processes and ports not required are disabled by
default. Default passwords will be changed, especially for any administrative
functions.
You will keep configuration control of applications installed and technology that you
use. All changes and new applications will be recorded and managed (including a
formal approval and documentation process) by the enterprise.
You will ensure that devices, systems and services have the capability to detect,
isolate and respond to malicious software.
c. Physical security
You will ensure that appropriately secure accommodation and appropriate policies
and practices governing its use are in place to protect personnel, hardware,
programs, networks and data from loss, damage or compromise.
If you are using cloud services: Cloud Security Principle 5.2 Protective Monitoring
should be factored into your overall monitoring strategy. Note that a cloud service will
only provide monitoring with respect to the service provisioned. If you consume
Infrastructure as a Service (IaaS) or Platform as a Service (PaaS), you are
responsible for monitoring of capability deployed onto the infrastructure. If you are
consuming Software as a Service (SaaS), you should consider how you will be able
to monitor for any potential abuse of business process or privilege.
End user devices: The capability associated with EUD Security Principle 10 Provide
security logging, alerting and monitoring capabilities should form part of your overall
monitoring strategy.
You must have a security incident management plan, which you should test
periodically. This will include named responsible owners and pre-defined processes
to respond to common forms of attack.
For incidents that impact on the PSN, you must report them to the PSN team and
other entities (NCSC, for example) as required.
In the event of an incident, and where it is appropriate to do so, you will provide the
PSN team with audit logs holding user activities, exceptions and information security
events to assist in investigations.
End user devices: EUDs must form part of the incident response plan. Mobile
devices especially will get lost or stolen and your response plans should include how
to manage (eg remotely wipe) such devices. Refer to EUD Security Principle 12
Incident Response.
Users must identify and authenticate to devices and services. For passwords, you
must:
NCSC has published best practice in its Password policy: updating your approach
document
End user devices: Users will identify and authenticate to devices and services.
Additionally only appropriately authorised devices will be provided with access to
services. Device Security Guidance Security Principle 2: Support appropriate
authentication.
Network traffic, services and content should be limited to that required to support
your business need (for example, by setting effective firewall rule sets).
Services presented outside of the protected enterprise (online services for staff,
mobile working etc), should be delivered from an appropriate architecture, with
access to any core information or services constrained.
The architecture will include services to identify malware at the gateway. Where
encryption prevents this, the organisation shall implement an equivalent level of
protection at the end point.
If you are using cloud services: You may consider procurement of services which
respond to different business needs and therefore have different security attributes.
It is important that any interfaces between services are within scope.
Unmanaged devices: must not have access to the PSN. Where a corporate service
contains information that has been sent over the PSN, you should have the data
owner’s permission before allowing unmanaged devices to access that data.
Additionally, you must ensure that an unmanaged device:
● Is not able to use the corporate service to access the PSN in an unmediated
fashion
● Accesses the corporate service through an appropriately secured connection
● For example, at the network layer via a VPN, or at the application layer via a
protocol that implements TLS.
● Is authenticated prior to the information being accessed with a mechanism that
does not solely rely on a username and password.
Where data is released via vulnerable channels (eg unprotected email, or removable
media) the user must make an active decision and pay due regard to any applicable
handling instructions for that information.
If you are using cloud (or shared) services: Separation should exist between
consumers of the service to prevent a malicious or compromised user from affecting
another. See Principle 3 Separation between consumers. Separation techniques
ensure a customer's service can't access or affect the service (or data) of another.
See also Cloud Security Principle 9 Secure Consumer Management
6. Users
For users who have administrative privileges (for example, users who are able to
reconfigure your network or system administrators) you should implement pre-
employment checks which are aligned with the Baseline Personnel Security
Standard (BPSS).
Your users should be trained to understand their obligations with regards to system
security, data handling, and acceptable use.
It is important that issues identified in the ITHC (including systemic issues) are
addressed. Critical and High risks (CVSS 3 or 3.1 scoring 7.0 and above) should be
addressed normally closed through upgrade or removal of an unsupported system or
a vulnerability addressed using the pen-testers recommendations. Medium and Low
risks may be accepted or subject to remedial action plans.
Security gaps
If you are not meeting any of the IA conditions above, please provide details below.
Please also provide details where you are not meeting any of the IA conditions 1 to 7
but are mitigating the associated risk with an alternate arrangement.
By signing this, you agree to the obligations spelled out in this document in order to
be connected to the PSN. If you are unable or unwilling to meet any of these, you
should inform the PSN team immediately.
You agree to meet the IA conditions outlined in the Code of Connection (CoCo),
subject only to those exceptions specifically identified in your Security Gaps
(above), and will submit the CoCo to the PSN team for a compliance assessment
annually, or less frequently as required by the PSN team. If you have a concern that
the IA conditions are not being met by other customers or suppliers, you have a
responsibility to notify the PSN team.
Upon receipt of a compliance warning notice, you must respond within five working
days. You’ll undertake suitable remedial action as directed by and agreed with the
PSN team. If the PSN team rescinds your compliance certificate, you’ll disconnect
from the PSN in the timeframe specified.
Should the PSN team initiate a compliance review, you’ll allow reasonable access to
your site(s) and personnel within 25 working days of receiving notice of the review.
In the event of an incident, you must:
● conduct initial diagnosis of the incident to determine which service is the cause
(or most likely cause of the incident)
● raise the incident to the service provider/customers with whom you have a PSN
supply agreement for the affected service
● if required, inform the PSN team and complete actions assigned by the PSN
team in an agreed timeframe to support resolution of the incident
● if the PSN team contacts you to help resolve an incident or problem, you must
respond as you would for one of your own customers or users
● depending on the nature of the incident, provide audit logs holding user activities,
exceptions and information security events to assist in investigations.
● where your organisation holds the supply agreement for PSN services on behalf
of other PSN customers you should manage incidents received from those
customers on their behalf
● notify other PSN customers with whom you share a PSN service of any incident
that has been communicated to you by the provider
Authorised signatory
Name:
Position:
Telephone no:
Email:
Address:
Date:
Signed: