Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Table E: Security Controls (continued)

7 Personnel Security (continued)


7.3 Acceptable Use In place 1. BFA has elected to use the Virginia Department of Human Resource Management Policy 1.75 Use of Internet & Electronic Communication Systems as its Acceptable Use policy. BFA employees & contractors are required to agree to this policy by completing an online agreement at the conclusion of online IT security training. Planned 2. BFA is in the process of developing its own Acceptable Use policy. Completion is expected in December 2007.

8 Threat Management
8.1 Threat Detection In place Jane Jones, BFA ISO is responsible for BFAs threat detection program, which includes the following components: 1. BFA IRM staff receive threat detection training annually as their advanced IT security training. 2. PSI has deployed & monitors Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS) are in the BFA environment. 3. PSI security staff maintains regular communication with USCERT & other security research & coordination organizations, review IDS & IPS logs in real-time, & recommend

You might also like