Indian Railway
Indian Railway
Indian Railway
August 2007
1
Substantial presence of IT systems in critical areas of Railway working.
2
Nation wide network to support these applications at different stations/locations.
3
Higher threats perception and damage that can be caused to the system.
Table of Contents
Background 5
Definitions 6
Approach 8
Classification 11
Coverage 14
Identity Management 16
Equipment Procurement 17
Recommendations 17
IT Governance 20
Further Action 21
Appendix E: Bibliography 29
Confidentiality
IT Security
Integrity Availability
Threat Security
[External Might exploit Vulnerability Might result in incident
environment, [IT Asset] [Service
Internal interruption /
source
Should reduce
data
(inadvertent /
the extent of
compromise]
malicious)]
lead to
Should
lead to
Should
Preventive Incident
Risk assessment measures response
[IT Security Manager, [IT Security [Incident
Technical team] Manager, Response Team]
Technical
team]
3.1. The Core Group has kept in view the following guiding principles in
drawing up its recommendations:
3.1.1. All information is not similar in value to the organization. Highly
valuable information needs to be protected more stringently than less
valuable information: a balanced approach is therefore advocated.
The guiding principle followed is that the minimum level of security
required should be provided to each information asset.
3.1.2. IT Security standards have been laid down internationally:
ISO:17799 defines elements of an Information Security Management
System and ISO:27001 defines the security auditing process. The
definition of IT security has been adopted from these
standards. It is the intention that all the critical IT assets
(applications, databases, networks) ultimately be brought up to the
level of the ISO:17799 and ISO:27001 standards, and maintained at
that level through regular security audits. A gist of the provisions of
these standards appears at Appendix B of these recommendations.
3.1.3. The IT Security standards follow a 3-tier structure: guidelines and
baseline policies provide the basis for procedures and work
instructions applicable to individual units, and finally result in
Information
security
Program
Data security security
2 Zone Based Applications PRIME, AFRES, MMIS CCA Dte of Railway Board
/ Zonal EDP Centres
7. Identity Management
8.1. In the past, hardware and software required for effective IT security such
as operating systems, firewalls, intrusion detection systems, access
control systems, etc., have themselves suffered from design defects,
making them susceptible to electronic attacks. They have been rendered
ineffective at the very time that they were needed.
8.2. To combat this problem, a set of Common Criteria for IT security have
been drawn up by an association of Government and industry bodies
known as the Common Criteria Project (in India, STQC IT Services of the
Ministry of IT is a member).
8.3. Software and hardware products are certified against the defined criteria
by the authorized members of the Common Criteria Project. Certified
products (Targets of Evaluation or TOEs) are assessed at one of 7
Evaluation Assurance Levels (EALs).
8.4. The EAL at which a particular piece of equipment is assessed, is
juxtaposed against a pre-defined Protection Profile (PP) required by a
particular IT asset to meet a particular security objective.
8.5. It is therefore recommended that future procurement of critical IT
equipment should specify the minimum EAL expected to meet its IT
security objectives.
8.6. Normally, a level of EAL-4 is adequate for most equipment. However, the
required level varies from application to application.
9.4.5. The nominated IT Security Manager must ensure that adequate staff
is deployed for monitoring and incident response as detailed in the
“Baseline IT Security Policy for Indian Railways”.
9.5. IT Security Group in CRIS
9.5.1. CRIS should set up a dedicated IT Security Group with adequate
strength to ensure that all the applications managed by it are
adequately secured.
9.5.2. CRIS’ IT Security group should provide technical support to Cert-
Rail. Technical staff for Cert-Rail might also be drawn from CRIS.
9.5.3. CRIS’ IT Security group should also provide technical consultancy to
Zonal Railways to set up and maintain their IT Security systems. This
should also include coordination of the training of IT Security
Managers and staff on request from the Zonal Railways / units.
9.5.4. CRIS’ IT Security group should also set out norms for procurement
of sensitive IT equipment; for example, recommending which
equipment should not be bought without Common Criteria
certification, and at what level it should be assessed.
9.6. Training in IT Security
9.6.1. As mentioned above, CRIS’ IT Security group should coordinate IT
Security related training for all the nominated IT Security Managers
11.1. Since this is the first attempt at setting down the IT Security Policy
for Indian Railways, this document and the Baseline Security Policy will
need to be reviewed and improved in future.
11.2. The Core Group recommends that Railway Board review the
progress in this area after a period of twelve months, and also set up a
committee / core group to review these recommendations and the
Baseline Security Policy at periodic intervals.
Plan (establish the Establish ISMS policy, objectives, processes and procedures
ISMS) relevant to managing risk and improving information
security to deliver results in accordance with an
organization’s overall policies and objectives.
Act (maintain and Take corrective and preventive actions, based on the
improve the ISMS) results of the internal ISMS audit and management review
or other relevant information, to achieve continual
improvement of the ISMS.
The standard also lays down that the ISMS should be developed after
including all the control objects and controls defined in ISO-17799:2005.
ISO-27001:2005 specifies that organizations should also get their ISMS
reviewed annually by the Management Representative nominated for the
purpose.
The ISMS should also be audited through authorized IT Security auditors at
periodic intervals, normally two years.
Within these four domains, 34 processes have been defined. An outline of the
defined processes is given in the figure below. The framework further defines
COBIT Framework
To lay down well defined All sections of the Baseline IT Security Policy
procedures for safeguarding cover this aspect
computer hardware / software
and data / information stored
and transacted, in stand-alone
computers or computer
networks.
Appendix E
Bibliography
10. “Approach Paper on IT for the 10th Five Year Plan”, C&IS Directorate,
Ministry of Railways, 2001.