#
|
Requirement
|
|
Complies?
Yes/No
|
Comments
|
1
|
The
solution must require users to individually login to the system with a
uniquely identifiable username and password
|
M
|
Yes
|
Minimum
password is 8 characters. Password policy setting requires usage of
upper-case and lower-case letters, number and special characters.
After 3 unsuccessful attempts account will
be locked.
Password
can be restored via email.
Multi-factor
authentication is supported.
|
2
|
The
solution must be compatible with the latest version of the Microsoft Internet
Explorer web browser
|
M
|
Yes
|
Microsoft
IE is fully supported. For the best
user experience, we recommend the use of Chrome, Edge or Firefox
|
3
|
The
solution must be compatible with the latest version of the Microsoft Edge web
browser
|
M
|
Yes
|
Microsoft
Edge web browser is fully supported
|
4
|
The
solution must be compatible with Microsoft Windows 7, 10 and any future
releases of the Microsoft Windows Operating System.
|
M
|
Yes
|
As a
browser-based application, ISO Manager is compatible with all modern operating
systems – including Microsoft Windows 7 and 10. It is actively developed and will
continue to support future releases of the Microsoft Windows Operating
System.
|
5
|
The
solution should be compatible with the latest version of the Google Chrome
web browser
|
HD
|
Yes
|
Google
Chrome web browser is fully supported and recommended
|
6
|
The
solution must encrypt information and data in transit. Encryption protocols
and ciphers must meet the requirements of the Queensland Government Data
Encryption Standard.
|
HD
|
Yes
|
ISO
Manager is implemented with TLS1.2 as a mandatory requirement. It fully supports encryption of data at rest and in transit
|
7
|
The
solution should support API integration to other systems (for example,
iServer, ServiceNow). This will be used to import information assets from our
enterprise architecture solution into the ISMS assurance solution.
|
HD
|
Yes
|
ISO Manager
supports API integration to other
systems and is actively developing a range of connectors. Development costs may apply for systems not
currently with an active connector.
Custom asset import
requirements can be factored in at implementation time.
|
8
|
The
solution should support federated identity management and authentication
using SAML for single-sign-on.
|
HD
|
Yes
|
ISO Manager supports federated identity management and authentication using SAML2 for
single-sign-on. (eg Okta).
|
9
|
The
solution should support multi-factor authentication for users connecting from
outside of ’s internal computer network.
|
HD
|
Yes
|
Duo (OTP), email and google authenticator out of box, others
can be integrated upon request.
|
10
|
The
solution, including application, database and underlying operating system(s)
hosting electronic information should
be scanned monthly for security vulnerabilities.
|
HD
|
Yes
|
ISO
Manager hosted on customer-dedicated Windows Server 2019 platforms with a
fortnightly patch cycle. A range of
vulnerability scanning tools (including Qualys) are run daily to check for
vulnerabilities.
The
platform’s Web Application Firewall and Anti-malware platforms are updated
daily.
Access
to the platform can also be limited to a range of IP addresses (IP
whitelisting) if additional access restrictions are required.
|
11
|
Vulnerabilities
should be scored against the Common Vulnerability Scoring System (CVSS 3.0).
Where a vulnerability is scored 7.9 or higher (up to a total of 10) the
security vulnerability needs to be patched / mitigated within 48 hours.
Security vulnerabilities lower than 7.9 need to be patched / mitigated within
1month of identification.
|
HD
|
Yes
|
ISO
Manager will provide vulnerability patches according to SLA defined in the contract.
Product
and platform vulnerabilities are remediated rapidly according to our Patch
Management policy and SLAs.
|
12
|
should have the right to undertake annual
system penetration testing of the solution when required; Alternatively, the
supplier should agree to undertake annual system penetration testing of the
entire solution.
|
HD
|
Yes
|
ISO
Manager conducts penetration testing at least once a year (or based on major
release) with an independent contractor.
Additional
penetration tests are done several times a year by ISO Manager clients from
different business sectors according to their requirements.
ISO
Manager is happy to grant , permission (with
mutually agreed date/time) to conduct non-destructive penetration testing on
their ISO Manager Australian instance.
We do
note that penetration testing can potentially cause availability issues where
not properly conducted and should only be carried out within agreed
parameters.
|
13
|
The
supplier agrees to allow to ingest
system security logs into our threat intelligence platform. Alternatively,
the supplier should monitor logs via their own SIEM / threat intelligence
solution.
|
HD
|
Yes
|
ISO
Manager Australia (Gadget Access) agrees
to allow to ingest logs into a threat
intelligence platform as required but does already monitor logs via our own
SIEM.
|
14
|
should be notified within 8 hours of
suspected or confirmed information security incidents and data breaches.
Information security incidents and data breaches must be defined within the
agreement.
|
HD
|
Yes
|
ISO
Manager Australia (Gadget Access) will notify of any security incident that has
the potential to impact Confidentiality, Integrity or Availability of ’s data
within 8 hours.
A full
PIR and investigation will be conducted for any incident that materially
impacts data confidentiality or integrity.
Availability
issues (eg. Emergency server patching), will be
notified immediately wherever possible.
|
15
|
The solution should comply with the requirements of the;
Queensland Government Information Security
Policy.
International information security standard
ISO / IEC 27001:2013
Australian Signals Directorate’s ‘Essential 8’
controls to mitigate Cyber Security Incidents.
Queensland Government Information Security Classification Framework,
Queensland Government Data Encryption Standard
Queensland Government Authentication Framework and
OWASP Top 10.
|
HD
|
Yes
|
The
solution is designed to meet the requirements of Australian and International
businesses and has been customised to specifically meet those needs of
Queensland businesses.
The
guidance of the ASD and OWASP have featured in design and testing decisions.
Encryption
meets the requirements of QLD Govt. Data Encryption standards.
Pentesting
and secure code development is conducted agains the
OWASP Top 10 and OWASP ASV.
|
16
|
The
solution should include the ability to assign different access permissions
and rights to different users.
|
HD
|
Yes
|
ISO
Manager has granular (role based) access control.
Please
see Annex 14
|