Instructions on Implementing the Decree on Information Security in

The Government Information Security Management Board
2b/2010
VAHTI
Instructions on
Implementing
the Decree on
Information
Security
in Central
Government
The Government Information Security Management Board
2b/2010
VAHTI
Instructions on Implementing
the Decree on Information Security
in Central Government
Ministry of Finance
PO BOX 28 (Snellmaninkatu 1 A, Helsinki)
FI-00023 GOVERNMENT, FINLAND
Internet: www.vm.fi
Layout: Taina Ståhl
ISSN 1455-2566 (print)
ISBN 978-952-251-380-9 (print)
ISSN 1798-0860 (PDF)
ISBN 978-952-251-381-6 (PDF)
Juvenes Print
Tampereen Yliopistopaino Oy, 2012
441
729
Printed matter
5
To the management of government agencies
The purpose of information security in central government is to ensure the
continuity and quality of official activities as well as the implementation of due
process of law. These instructions provide guidelines of the implementation of
the Decree on Information Security in Central Government (Valtioneuvoston
asetus tietoturvallisuudesta valtionhallinnossa 681/2010; hereinafter Decree
on Information Security).
These instructions are intended for the management of organisations and
for those responsible within organisations for security, information services
and information management.
The general duty of central government authorities to take care of information
security is based on the Act on the Openness of Government Activities (Laki
viranomaisten toiminnan julkisuudesta 621/1999; hereinafter the Openness
Act). Under the Act, the authorities must ensure that the protection, integrity
and quality of documents and information systems, and the information
contained in them, are safeguarded by appropriate procedures and information
security arrangements, taking into account the significance and purpose of
the information as well as the threats directed at documents and information
systems and the costs arising from information security measures (section 18(2)
(4) of the Act).
The Decree on Information Security, issued by the Government on 1 July 2010
based on the Act on the Openness of Government Activities, is applied to central
government authorities. Central government organisations refer to central
government administrative authorities and other central government agencies
and institutions as well as courts of law and other judicial authorities (section
3(1)). The Decree repealed sections 2 and 3 of the Decree on the Openness of
Government Activities and on Good Practice in Information Management
(1030/1999; hereinafter the Openness Decree).
The Decree on Information Security came into force on 1 October 2010. It
contains provisions relating to a transition period, according to which public
authorities must implement their data processing to the base-level information
security requirements prescribed in section 5 of the decree within three years
of the decree having come into force, i.e. by 30 September 2013.
The decree lays down provisions on general information security
requirements and levels of security classification, including requirements
concerning processing of documents at different classification levels. It is worth
6
noting that in the Decree the term document also means information material
saved in electronic form or otherwise saved as a technical record. Especially
secret documents are subject to regulation (Decree on Information Security,
section 8, section 9(2)).
The classification of documents is not compulsory under the Decree. Each
authority must decide whether and when to introduce classification. Processing
requirements relating to classification must be implemented within 5 years of
classification being introduced. Authorities may assign classification to certain
documents only or to such stages of document processing where measures
are necessary in the interest to be protected (Decree on Information Security,
section 8(1)).
Planning the introduction of document classification is important.
Classification should facilitate the exchange of secret information between
authorities. It is particularly recommended therefore that classification be
implemented in public authorities that either receive secret documents from
other authorities or transfer secret documents to other authorities regularly
and in high volume.
Government agencies should ensure that all of the base-level information
security requirements prescribed in section 5 of the Decree on Information
Security are fulfilled within the three-year transition period prescribed in the
Decree. A preparatory survey related to this must be initiated during autumn
2010.
To implement security requirements and, more generally, the good
information management practice prescribed in the Openness Act, it is
important for each authority to ensure that
• an inventory of documents in the public authority’s control has been
made and that the significance of the information contained within the
documents has been assessed in the manner prescribed in section 1 of the
Openness Decree, an analysis of operational information security risks
have been made, and the implementation of information security has been
planned (Decree on Information Security, section 4, section 5(1)(1)),
• the authority has at its disposal sufficient expertise to ensure/safeguard
information security and that tasks and responsibilities relating to the
management of information security are defined;
• tasks and responsibilities relating to document processing are defined,
and that the confidentiality and other protection of documents and the
information contained therein are safeguarded by granting access to
documents only to those who need secret information or personal data
recorded in personal data files in their work;
• the availability and accessibility of information in different situations is
safeguarded and procedures are created to overcome exceptional situations;
7
• unauthorised manipulation and other unauthorised or inappropriate
processing of information is prevented through appropriate and sufficient
security arrangements and other measures concerning access management,
access monitoring, information networks, information systems and
information services;
• document data processing and storage facilities are adequately monitored
and protected;
• the reliability of personnel and others engaged in document processing
tasks is ensured if necessary through the background check procedure or
other available means based on law;
• guidelines and training on the appropriate processing of documents and
the information contained therein are given to personnel and others
engaged in document processing tasks;
• compliance with given instructions is monitored and the need for
instructions to be updated is regularly assessed;
• arrangements are made to ensure that the prescribed information security
requirements are also observed when the public authority’s documents are
processed based on a contract, for example within data processing service
companies (Decree on Information Security, section 6);
• care is taken to ensure that officials know the significance of classification
labelling/ markings and that these do not release the public authority from
their duty on a case-by-case basis to consider the openness of a document
and whether access to a document is in accordance with the Openness
Act and its case law when information is requested on the basis of the
Openness Act.
The Decree on Information Security and these Instructions are an important
part of the implementation of the Government Resolution on Enhancing
Information Security in Central Government Information Security, dated
26 November 2009.
These Instructions replace earlier VAHTI instructions, namely Information
security instructions for the processing of government data VAHTI 2/2000 and
Instructions for processing sensitive international data VAHTI 4/2002, and are
significantly more comprehensive than the latter.
8
9
Introducing the organisation – Vahti’s task
The Ministry of Finance is responsible for steering and reconciling the
development of public administration and particularly central government
information security in Finland. The Government Information Security
Management Board (VAHTI), which has been established by the Ministry
of Finance, is responsible for steering, developing and coordinating central
government information security. VAHTI handles all significant central
government information security policy and information security guidance
matters. In its work, VAHTI supports the Government and the Ministry of
Finance in decision-making and also in the preparation of decisions relating
to central government information security.
VAHTI’s objective is, by developing information security, to improve the
reliability, continuity, quality, risk management and contingency planning
of central government functions and to promote information security so
that it becomes an integral part of central government activity, steering and
performance management.
VAHTI promotes the implementation of the Government Programme, the
Security Strategy for Society, the Government IT Strategy, the Government
Resolution on Security of Supply, the National Information Security Strategy,
the Government Resolution on Enhancing Information Security in Central
Government and other key policy outlines of the Government.
On 26 November 2009, the Government made a Resolution on Enhancing
Information Security in Central Government. The resolution emphasises
VAHTI’s position and tasks as the key body responsible for the steering,
development and coordination of central government information security.
In accordance with the resolution, the administrative branches allocate funds
and resources for the development of information security and for cooperation
coordinated within VAHTI.
VAHTI acts as the cooperation, preparation and coordination body of central
government organisations responsible for developing the central government’s
information security and data protection, and promotes the development of networked operating practices in public administration information security work.
VAHTI’s work has improved central government information security, and
the effectiveness of its work is evident not only in central government but also in
companies and internationally. The result is a very comprehensive set of general
information security instructions (www.vm.fi/vahti). Led by the Ministry of
Finance and VAHTI, a number of joint information security projects have
been implemented with ministries and agencies as well as an extensive central
government information security development programme.
For three years in succession, VAHTI has been recognised with an award for
its exemplary work in improving Finland’s information security.
10
Acknowledgements
The following experts were involved in compiling the Instructions on
Implementing the Decree on Information Security in Central Government:
• Ms Tuire Saaripuu
Population Register Office
• Ms Irma Talonen
Ministry for Foreign Affairs
• Ms Erja Kinnunen
State Treasury
• Ms Hanna Aronen
Ministry of Transport and Communications
• Ms Merja Fleming
Ministry of Finance
• Mr Aku Hilve
Ministry of Finance
• Ms Marja-Leena Viitala
Ministry of Finance.
11
Contents
To the management of government agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Introducing the organisation – Vahti’s task .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Acknowledgements . . . . . . . . ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.1 Purpose and scope of application .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.2 Structure of the instructions
......................................................
17
1.3 Information security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4 Processing and management of information materials .. . . . . . . . . . . . . . . 19
1.5 Legislation and international obligations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.6 Key concepts
. . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
22
1.7 Forms, challenges, opportunities and threats
of the secure processing of information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2
Implementing the Decree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.1 Steering
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
2.2Training . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3Supervision . . . . . . . . . . . . ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.4Monitoring . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.5 Enforcement of the Decree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3
Good information management and
information processing practice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.1 Information management planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2 Mapping and management of information material .. . . . . . . . . . . . . . . . . . . 33
3.3 Cataloguing and recording of information
material, and descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.4 Public and secret documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.5 Availability and accessibility of information material . . . . . . . . . . . . . . . . . . 36
3.6 Requirements relating to personal data
......................................
37
12
4
General information security requirements
for information processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.1 General information security requirements
in the Decree on Information Security .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2 Requirements relating to staff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.3 Basic prerequisites of information security culture . . . . . . . . . . . . . . . . . . . . . 42
4.4 Requirements relating to premises security .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
5
Information security requirements relating
to information technology environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.1 Requirements relating to information technology
environment and information services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.2 Use of service providers and subcontractors to supply and
maintain information technology systems and services . . . . . . . . . . . . . . 46
5.3 Basis for information security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.4 Objectives for the setting of information security levels . . . . . . . . . . . . . . 47
5.5 Assets to be protected and technical protection mechanisms . . . . . . 48
5.6 Specification and assessment of information security level . . . . . . . . . 49
6
Requirements relating to administrative
information security.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Information security development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
6.1 Requirements for information security management . . . . . . . . . . . . . . . . . . 51
6.3 Assessment of information security management . . . . . . . . . . . . . . . . . . . . . . . 53
6.4 Requirements for the management of information systems
and information services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
6.5 Assessment of information systems management . . . . . . . . . . . . . . . . . . . . . . . 55
13
7
Classification of information resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
7.1 Documents within the sphere of classification,
and classification criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
7.2 Secrecy markings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
7.3 Protection levels and associated markings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
7.4 Grouping of information material into protection levels . . . . . . . . . . . . . 61
7.5 Security classification markings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
7.6 Security classification of international information material . . . . . . . 65
7.7 Classification and markings of personal data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
7.8 Recommendations relating to the classification
of extensive information assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
7.9 Requirements set for the integrity and
non-repudiation of information .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
7.10 Requirements set for the availability and
accessibility of information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
8
Processing requirements of classified information materials . . . . . . . . . . 71
8.1 Basic requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
8.2 Creating and editing of information material .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
8.3 Classification, marking and registration .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
8.4Copying
....................................................................................
77
8.5 Document distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
8.6 Sending or transferring documents,
and/or access to information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
8.7 Measures undertaken by the recipient .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
8.8 Saving and storage of documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
8.9 Access to information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
8.10 Archiving of information resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
8.11 Revising the protection level of documents .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
8.12 Destruction of information resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
8.13 Deciding on the disclosure of a document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
8.14 Impact of encryption on the processing
of information material .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
14
ANNEXES . . . . . ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Annex 1: Obligations set by legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Annex 2: Stamps for secret documents and information. . . . . . . . . . . . . . . . 86
Annex 3: Detailed instructions to public authorities
to facilitate the secure processing of documents . . . . . . . . . . . . . 87
Annex 4: Processing requirements for secret documents
and information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Annex 5: Detailed requirements
for information security levels.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Annex 6: Substitute procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Annex 7: Valid VAHTI publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
15
1Introduction
1.1
Purpose and scope of application
The purpose of these instructions is to promote good information management
practice in central government as well as the implementation of the Decree
on Information Security in Central Government (Valtioneuvoston asetus
tietoturvallisuudesta valtionhallinnossa 681/2010).
These instructions outline the requirements for creating operating conditions
that comply with good information management practice. These include a duty
to plan information assets as well as requirements for information networks,
information systems, operating premises, document management and access
rights management. The purpose is to create for those engaged in information
work a secure and efficient working environment for processing information
at all stages of its life cycle.
The Decree on Information Security and these instructions aim to create
conditions to enhance the central government’s information security work
and establish standardised procedures when secret and restricted information
material is processed. A plan formulated in the Ministry of Finance on the
implementation of different information security levels was taken into account
when preparing the decree. This plan helped to reinforce development work based
on the information guidance of the Ministry of Finance’s Public Management
Department as well as the significance of these instructions.
A further objective of the reform is to enhance customers’ and stakeholders’
trust in the central government and its data processing and to create an
appropriate framework for developing electronic case management and
electronic services. Standardised procedures will help create conditions for the
secure processing of information material with the authorities and information
service suppliers operating on their behalf as well as with other parties that
process official information.
These instructions cover in particular the protection of secret information.
Information material is processed in accordance with the technical and
operational requirements prescribed for four different protection levels (see
chapter 5). These instructions also take into account other recommendations
issued by the Government Information Security Management Board (VAHTI) in
16
which more detailed requirements have been prescribed for various processing
stages and for technical and administrative functions.
The term ‘documents’ means documents as defined in section 5 of the
Openness Act, which may also be in an electronic form or information material
otherwise saved as a technical record. In these instructions, ‘information
(material)’ means documents and information on paper or on electronic and
other media.
These instructions specify requirements for the implementation of
operations that facilitate good information management practice, so that users
of information material can at all processing stages act in accordance with set
requirements.
These instructions contain guidelines on the classification and protection
of documents and information as well as on the security requirements and
recommended practices at different stages in the life cycle of information
processing. They also take into account the special requirements for the
processing of personal data set by the Personal Data Act (523/1999). Also
included are requirements for the processing of official documents by external
service providers.
These instructions outline information classification practices that correspond
to good information management practice and the need to safeguard information
security, particularly with regard to the confidentiality of information and
access restrictions as well as information processing instructions based on
this classification. In addition, general requirements relating to integrity and
availability have been specified.
Information security requirements applying to information and documents
at different stages of the manual and electronic processing are presented.
Information security requirements are specified in chapter 4. Case management
type specialist work, in which both paper and electronic documents are involved,
is specifically taken into account. These instructions are also recommended,
where applicable, in standard data processing based on the use of information
systems and databases.
These guidelines are of a general nature in terms of content. The annexes
contain more detailed information on legal provisions and on the marking
and processing of secret information as well as check lists for target groups,
specifying requirements relating to them. It is hoped that the detailed obligations
outlined in Annex 4 will guide the actions of each administrative branch. Here
the emphasis is on facilitating conditions for the implementation of good
information management practice also where a public authority’s information
is processed by different parties.
The ministries attend to the training of the staff of their agencies and bodies
and give, if necessary, guidance on the basis of these instructions.
17
Data processing environments are classified as base, increased and high
information security levels. The same classification scale is used in determining
the level of the information security management system.
Organisations that process documents relating to international cooperation
(e.g. EU, NATO, OECD) must take into account international information
security obligations (see Act on International Information Security Obligations
588/2004). Detailed information on these requirements is given if necessary by
the National Security Authority of the Ministry for Foreign Affairs.
Each organisation specifies requirements in its own guidelines on the basis
of operational needs and information security requirements. More detailed
guidelines and descriptions are given, for example, in information system
descriptions, operating instructions and filing plans as well as, with respect
to personal data, data file or data protection descriptions. Each ministry,
government agency and body must ensure that staff members are properly
familiarised with guidelines for processing information material.
The assessment of the contents, classification and processing of documents
must be carried out separately by each agency to ensure information security,
which is part of safeguarding operations and their quality and continuity.
1.2
Structure of the instructions
The first chapter outlines the purpose and objectives of the instructions; the
second chapter describes how to implement the instructions; the third chapter
presents requirements for implementing good information management and
good data processing practice in the processing of information material. This
part is in the form of lists. The fourth chapter specifies the measures public
authorities are required to take in order to process documents securely. The
fifth chapter presents requirements and obligations for the classification and
marking of information material. The sixth chapter details requirements for
the different processing stages of information material. Issues are discussed on
a general level, taking into account all stages of a document´s life-cycle.
The annexes give more detail on the content of the main text. A list of statutes
is given in Annex 1; Annex 2 presents the stamps and markings required in
the processing of secret information material and Annex 3 provides public
authorities with instructions for the measures required to promote secure
information work. Document processing guidelines for specific security levels
are presented in Annex 4, information security level requirements in Annex 5
and a substitute procedure in Annex 6.
These instructions are intended for widespread use in the various central
government functions, processes, services, systems, documents and procurement.
The different chapters also give end users good additional guidance.
18
1.3
Information security levels
Information security levels specify technical and administrative requirements
for organisations and information processing environments.
Information security levels describe those requirements relating to
information security activities and processes which must be implemented in
every central government organisation. Implementation has previously not been
a statutory requirement, but it has been possible to mandate such fulfilment in
other ways. Some of the requirements are already included in obligations for
public administration to adhere to good information management practice. The
Government IT Shared Service Centre may also require that its customers fulfil
the requirements set in information security levels.
Data processing environments and administration are classified into three
levels: base level, increased level and high level of information security. The
lowest required level of a public authority’s data processing environments is the
base level of information security. In this environment, by the decision of the
competent authority, information requiring protection level IV can be processed
in clear text form (see section 7.4). In an increased information security level
environment, with corresponding authorisations, information can be processed
in clear text form up to protection level III. Correspondingly, in environments
fulfilling a high information security level, information can be processed in
clear text form up to protection level II.
The information security level requirements have been grouped into two: (1)
administrative information security requirements and (2) technical information
security requirements. Information security levels are explained in more detail
in chapters 5 and 6 and in Annex 5.
A public authority may ensure the information security level of its systems
by applying various assessment methods, such as self-assessments and public
or private information security audit services. By these methods, the level of a
public authority’s information security measures can be assessed in relation to
the Decree on Information Security and these instructions or, if the processing
of EU documents, for example, is involved, with reference to EU security rules.
Specific VAHTI instructions (3/2010) have been prepared on the information
security level requirements issued for central government internal networks.
19
1.4
Processing and
management of information materials
The significance of information in society and in official activities is constantly
increasing. Official operational targets set major challenges for information
management.
The implementation of good information management practice requires
management of the information life cycle. The life cycle approach is guided by
the filing plan specified in the Archives Act (Arkistolaki 831/1994).
In the processing of personal data, the Personal Data Act and its provisions
on, for example, duty of care and good data processing practice must be taken
into account.
Each authority must see to it that its information assets and the information
systems and processing that use the information are up to date. Attention
should be paid to implementing the requirements for issues presented in the
VAHTI instruction Information security assessment in central government
(Tietoturvallisuuden arviointi valtionhallinnossa, VAHTI 8/2006).
1.5
Legislation and international obligations
Special care must be exercised in the processing of secret documents. The
relevant obligations are laid down in the Openness Act. The violation of a
confidentiality obligation by a public servant or public organisation employee
is enacted in chapter 40 of the Penal Code, and the violation of confidentiality
by other individuals in chapter 38 of the Penal Code.
According to the Openness Act, official documents are public unless otherwise
prescribed in law. The concept of a document is broad in the Openness Act and
it also covers various technical records (section 5). The most general grounds for
confidentiality are mentioned in section 24 of the Openness Act. Some special
provisions are included in other legislation. According to the Openness Act,
access to each document must be reviewed on a case-by-case basis when someone
asks to see a document or to receive a copy of one. Interpretation guidelines are
provided in section 17 of the Openness Act: secrecy must not be restricted further
than is necessary for the protection of the interests of the person protected. If
only part of a document is secret, a public authority must grant access to other
information in the document (section 10). An authority’s refusal to grant access to
information from a document must be based on a decision and detailed grounds
for the refusal. Additional information on the application of the Openness Act
can be found on the Ministry of Justice website www.om.fi. (Basic provisions;
Act on the Openness of Government Activities; Letter plus annexes sent by the
Ministry of Justice on 23 September 2005 to ministries on the implementation
and partial amendment of the openness legislation).
20
The Openness Act’s provisions (section 18) relating to good information
management practice require, among other things, that public authorities see
to it that their staff is informed about the implementation of the Act.
According to the Act, information from a secret document may be disclosed
only by an authority or official to whom such a right has been specifically granted
in rules of procedure or in some other way.
A public authority or, for example, an official preparing a case in accordance
with general guidance given by a public authority may disclose information
from a document which, under sections 6 and 7 of the Openness Act, has not
yet entered the public domain (discretionary public documents). Note that a
public authority is obliged under section 19 of the Openness Act to provide
information orally on certain matters under preparation.
The classification of documents to safeguard information security and the
corresponding marking of documents do not change the obligation stated above
to evaluate access to each document separately and on a case-by-case basis when
a document is requested from a public authority. The only exceptions to this
rule are documents which have been given a security classification marking in
accordance with the Act on International Information Security Obligations
(588/2004).
International regulations binding on Finland, which are based on either
bilateral or multilateral agreements or EU statutes, are adhered to in the
processing of documents falling within the scope of the Act on International
Information Security Obligations.
Key statutes and instructions relating to the processing of information material:
Acts and international policy outlines:
Instructions on central government information
security:
Archives Act (Arkistolaki 831/1994) Chapter 4, sections 7, 8
Information Security and Management by Results
(VAHTI 1/2005, section 4.2)
Personal Data Act (Henkilötietolaki 523/1999)
Securing the state administration’s key information
systems (Valtionhallinnon keskeisten tietojärjestelmien
turvaaminen, VAHTI 5/2004, Chapter 5)
Act on the Openness of Government Activities
(Julkisuuslaki 621/1999) Chapters 5, 6, 7 sections 1, 3, 10
Decree on the Openness of Government Activities and on
Good Practice in Information Management
(Julkisuusasetus 1030/1999) section 1
Decree on Information Security in Central Government
(Valtioneuvoston asetus tietoturvallisuudesta valtionhallinnossa 681/2010)
Assessment of the information security management
system (Tietoturvallisuuden hallintajärjestelmän
arviointisuositus, VAHTI 3/2003, Chapter 2)
Act on International Security Obligations
(Laki kansainvälisistä tietoturvallisuusvelvoitteista
588/2004)
Information security assessment in central government
(Tietoturvallisuuden arviointi valtionhallinnossa,
VAHTI 8/2006, Annex 3)
21
Acts and international policy outlines:
Instructions on central government information
security:
Government Resolution on Enhancing Information
Security in Central Government, VAHTI 7b/2009
Management of information security incidents
(Tietoturvapoikkeamatilanteiden hallinta,
VAHTI 3/2005, section 2.1.1)
Emergency Powers Act (Valmiuslaki 1080/1991)
From participation to influence – central government
challenges in international information security work
(Osallistumisesta vaikuttamiseen – valtionhallinnon
haasteet kansainvälisessä tietoturvatyössä,
VAHTI 1/2007)
Act on the Protection of Privacy in Electronic
Communications (Sähköisen viestinnän tietosuojalaki
516/2004), Chapters 2, 3, 5
Logging instructions (Lokiohje, VAHTI 3/2009)
Act on Background Checks
(Laki turvallisuusselvityksistä 177/2002)
Personnel security as part of information security
(Tärkein tekijä on ihminen - henkilöstöturvallisuus
osana tietoturvallisuutta, VAHTI 2/2008)
Internal Supervision and Risk Management of Government
Agencies, Institutions and Funds, (Valtion viraston ja laitoksen sekä rahaston sisäinen valvonta ja riskienhallinta),
pages 24, 33, VM 2005
Security and operational continuity of information
technology (Tietotekniikan turvallisuus ja toiminnan
varmistaminen, National Board of Economic Defence,
1/2002, section 3.2)
In order to create and realise good information management practice, the authorities shall see to the appropriate
availability, accessibility, protection and integrity of documents and information systems and the information
contained in them as well as other factors affecting the quality of information.
– Act on the Openness of Government Activities, section 18
Information security management is an integral part of the operational management of an organisation. It should
therefore be included in the responsibilities of every individual working in management positions. Information
security is best implemented when it is built into the organisation’s planning processes (operational development),
quality and other monitoring system (assessment, measurement), and in monitoring the achievement of targets.
– Security and Operational Continuity of Information Technology (National Board of Economic Defence 2002)
Management must be aware of their organisation’s information security level and state of information security
risk management. They must further be aware of the current state of information, the significance of information
security work for operations and how critical it is for each function. The development of information security
requires a development programme, and the monitoring thereof, aimed at a prescribed target state.
– Assessment of Information Security Management System (VAHTI 3/2003, Chapter 2)
22
1.6
Key concepts
Document: By the term document is meant, in addition to a written or
visual presentation, a message relating to a given topic or subject-matter and
consisting of signs which, by virtue of the use to which they are put, are meant
to be taken as a whole, and are decipherable only by means of automatic
data processing or audio and video reproduction equipment or some other
technical device (Openness Act section 5(1); see also Decree on Information
Security in Central Government section 3(3). The concept of a document is
therefore independent of the medium on which or the means by which the
information has been saved. Thus by the term documents is meant not only
traditional documents in paper form but also information material recorded
electronically irrespective of its form.
Document holder: The organisation or individual who possesses the
document.
Document author: The organisation or individual who has prepared the
document.
Personal data file: The term personal data file means, according to section
3(1) of the Personal Data Act, “a set of personal data, connected by a common
use and processed fully or partially automatically or sorted into a card index,
directory or other manually accessible form so that the data pertaining to
a given person can be retrieved easily and at reasonable cost” (i.e. logical
data file concept). The purpose of data processing should be defined so that
those operations of the data controller in which the personal data are being
processed are made clear.
Processing of personal data: Processing of personal data means the collection,
recording, organisation, use, transfer, disclosure, storage, manipulation,
combination, protection, deletion and erasure of personal data, as well as other
measures directed at personal data (Personal Data Act, section 3(2).
Classified document: A classified document means, in these instructions,
a document which has been classified under the Decree on Information
Security as belonging to a protection level outlined in section 9 of the Decree
and under the requirements prescribed therein. Classification of documents
falling within the sphere of international information security obligations is
prescribed in the Act on International Information Security Obligations.
Controller: Controller means an individual, corporation, institution or
foundation, or a number of them, for the use of whom a personal data file
23
is established and who is entitled to determine the use of the file, or who has
been designated as a controller by an Act (Personal Data Act, section 3(4)).
Data file description: A data file description is a fixed-form description of the
content use and protection of the data file prepared and made available in the
manner required by the Personal Data Act (Personal Data Act, section 10).
Secret document: A secret document means documents and information
which are deemed secret under section 24(1) of the Act on the Openness of
Government Activities.
Protection levels: Protection levels help to determine the requirements
that a data processing environment and data processing should fulfil when
a classified document is processed. A four-tier classification system is used
for protection levels. Each protection level has been set its own technical
and operational requirements. These procedures help ensure the appropriate
processing of secret and other information that requires classification (chapter
7.3 below; Decree of Information Security, section 9).
Privacy statement: A statement by the party processing personal data
explaining how it processes personal data and how the rights of data subjects
are fulfilled.
Information security levels: Information security levels mean the technical
and administrative arrangements whereby the implementation of information
security at different levels is ensured. In an environment fulfilling base level
requirements, most of a public authority’s data processing needs can be
implemented. In document processing which requires high reliability in all
operating conditions and where classified information requiring protection
level III is widely processed, the authority must maintain structures that
meet the increased information security level. Critical information systems
and those that widely contain information classified at level II must be
implemented in high information security level environments. Documents
requiring protection level I may be processed in closed networks which fulfil
the requirements of the high information security level and which are not
linked to other networks.
Competent authority: The competent authority means the public authority
for whom the document has been prepared or delivered for processing
(exercising) prescribed duties. The competent authority has the right to decide
on the document’s disclosure or determine that the document be processed in
some other way. The competent authority is responsible for the information
systems and documents relating to its activities. In information management
24
and information security work, the concept ‘information system owner’ is
often used for the competent authority or other organisation.
Competent official: In the competent authority, the official responsible for the
processing and classification of a document, who has been assigned the task
on the basis of rules of procedure or other corresponding order and who, on
these grounds, has the right to decide on the matter.
Security classified document: A document containing secret information
which can, under the Decree on Information Security or the Act on
International Information Security Obligations, be given a marking
indicating a security classification, and in whose processing the information
security requirements fulfilling the classification must be adhered to. The
titles of security classified documents by protection level are: TOP SECRET
(protection level I), SECRET (protection level II), CONFIDENTIAL
(protection level III) and RESTRICTED (protection level IV).
Security classification marking: A security classification marking can be
made to certain documents, namely those whose information if unlawfully
disclosed might cause damage to international relations, central government
security, national defence and to other common interests in the manner
referred to in section 24(1)(2, 7–10) of the Openness Act. A security classified
document is always processed according to the corresponding protection level.
A security classification may also be based on an international agreement or
statute binding on Finland.
Official document: An official document is defined as a document in the
possession of a public authority and prepared by an authority or a person in
the service of an authority, or a document delivered to an authority for the
consideration of a matter or otherwise in connection with a matter within the
competence or duties of the authority. In addition, a document is deemed to
be prepared by a public authority if it has been commissioned by the authority;
and a document is deemed to have been delivered to a public authority if it
has been given to a person assigned by the authority or otherwise acting on its
behalf for the performance of the assignment (Openness Act, section 5(2); for
documents deemed not to be official documents, see Openness Act, sections
5(3) and 5(4).
25
1.7
Forms, challenges, opportunities and threats
of the secure processing of information
Information is processed in many types of situations. For example, when
information is processed, this can be considered information work. And when
information is saved electronically in a form that can be examined later, a
record is created. These records may be the result of a person’s direct work or
be generated automatically. Records fall within the sphere of the Openness
Act’s concept of an official document; one record may include a number of
documents referred to in the Act or only part of a document. Examples of
records are word processing products, email messages, text messages, audio
recordings, photographs and videos, information register databases, real-time
monitoring information, and information system log data.
Information has a life cycle whose length varies according to the characteristics
of the information, from microseconds to permanent storage. The length of the
life cycle has a direct impact on information management.
Information is produced and transferred to an increasing extent on
information networks. In open networks, everyone who operates there may
be a customer and processor of information. In official networks, a public
authority has the power to specify who is entitled to access a network and
process information.
Information is widely and rapidly available thanks to information networks,
but the networks also involve major threats. These include, for example, blocking
network traffic, producing false information by combining different information,
and taking unauthorised possession of information in a manner that violates
protection of privacy.
Each authority is required to practice information management both to
achieve its own performance targets and to fulfil the needs of customer service.
26
27
2 Implementing the Decree
2.1
Steering
A public authority must adhere to good information management and data
processing practice (see Decree on Information Security) when developing and
maintaining systems and services required by information work.
A public authority must issue, to individuals in the service of the authority
and to those working on the orders of the authority, instructions on access to
documents, the procedures to be followed in giving and processing information
and in protecting documents and information systems, and also on security
arrangements and division of responsibilities.
A public authority must ensure that information processing and the associated
risks have been assessed as part of risk management.
A public authority must outline the process and sub-processes of the entire
life cycle of information as well as plans relating to them in preparation for
various disruptions.
A public authority must arrange, with the aid of technical solutions, the
security of operating premises so that external parties cannot gain access to
classified information material.
Case management systems must support monitoring and archiving of the
use of information material.
2.2Training
A public authority must issue any necessary authority-specific further
instructions and provide training to those involved in the processing of
information material.
Training in the processing of information at all protection levels must be
arranged regularly and as part of staff induction.
A public authority should train staff involved in planning and implementing
information systems, taking into account the requirements presented in these
instructions for implementing good information management practice in
information services offered by the authority.
28
2.3 Supervision
A public authority should regularly audit the implementation of information
security measures for classified information material and monitor that issued
instructions and technical information security measures are functioning
appropriately.
A public authority should monitor that the correct working methods are in
use and that personnel are working in accordance with the prescribed process
in different processing situations.
Processing of personal data must be monitored using logs. An employer
should ensure that the Act on the Protection of Privacy in Working Life
(759/2004) is adhered to when arranging supervision. Guidelines on supervision
arrangements for information use are outlined in Effective Information Security
(VAHTI 5/2009) and Logging instructions (Lokiohje, VAHTI 3/2009).
When information technology equipment are removed from use or their
intended use changes, a public authority must see to the removal of residual
information using software designed for this purpose, and a record of the
measures performed should be made.
The implementation of the monitoring system for a public authority’s
operating premises should support the protection of information material. The
information security of monitoring systems should be attended to in a similar
way to the information security of other information systems.
2.4 Monitoring
A public authority should ensure that risk monitoring is performed and,
according to an agreed schedule, present to senior management an information
security situation report, containing an assessment of the implementation of
good information management practice, a summary of observed information
security risks, the information security training and instructions provided
to staff, and the present state of the public authority’s information security
culture and any perceived deviations from it. This presentation should include
proposals for corrective measures in respect of any identified problems.
Storage facilities for electronic and other recorded information material
should be audited or inspected regularly and any identified shortcomings
corrected.
Outsourced systems must be approved by the competent authority before
information subject to security requirements can be transferred to them.
29
2.5
Enforcement of the Decree
Each public authority is responsible for enforcing information security levels
in its operations and when cooperating with other parties. The Decree on
Information Security specifies compulsory requirements for information
security levels. Each central government authority must fulfil at least the
base level of information security, which covers the processing of all of the
authority’s secret documents.
The base level of information security must be implemented throughout
central government by 30 September 2013 (Decree on Information Security,
section 23(3)).
In activities that require an operating environment (operations, information
systems and information networks) on an increased or high information
security level and where the documents processed have been classified by a
public authority, the requirements must be implemented within five years of
the authority introducing the classification system.
30
31
3 Good information management
and information processing
practice
3.1
Information management planning
Implementing good information management practice requires that the public
authorities have made appropriate plans (Openness Act, section 18). Planning
begins with an analysis of the authority’s operating processes. Case-related
workflows, case management processes and related documents, and access
rights to documents and their information must be planned accordingly. The
process description should include information on
• how matters are taken up for consideration
• what measures are included at each processing stage
• how matters are decided
• who participates in which stage of the process
• what documents and information are created, accumulated or acquired
at each stage, how they are saved, registered and stored, and how the
documents and information are processed.
In the electronic management of information material and sensitive personal
data classified at protection levels I and II, a key requirement is an unbroken
processing chain whereby all processing stages are to be registered in the
system.
The handling of official documents requires the existence of a filing plan.
More detailed instructions on the structure and maintenance of the filing plan
are outlined in the National Archive Service publication Filing plan (http://
www.ams-opas.fi/).
The filing plan is a set of instructions on the handling, recording and
storage of official documentary information. The filing plan produces metadata
relating to documentary information management in information systems. Case
management procedures and responsibilities must be recorded in archive rules
or some similar set of instructions.
32
Processing of personal data must be planned in the manner laid down in
section 6 of the Personal Data Act. Personal data files must be identified and
mapped, their purpose defined and the necessary data file description prepared.
A public authority must review and assess the availability, accessibility and
protection of its documents and the information contained in them as well as
the threats and risks that may prejudice the integrity of the information and
other aspects of quality. The means and costs available to mitigate risks as well
as the impact of any measures undertaken should also be reviewed and assessed
(Openness Act, section 18(1)(4); Decree on Information Security, section 4,
section 5(1)(1)).
Purpose for the availability and accessibility of information should be
defined in the manner required by the activities concerned. The accessibility
of information is influenced by, among other things, the characteristics of the
information network and information system. Particular attention should be
paid to application interfaces to ensure that the tasks required by the activity in
question can be performed flexibly. This often requires fast information search
functions as well as implementation that supports the operating process. In
order to ensure the availability of information, directories should be designed
and maintained to facilitate the immediate retrieval of information. These can,
moreover, be used to support the distribution of public information to those
who request it.
A public authority is to specify and issue procedures and rules on how
information about its activities is presented on the public domain. When
information is communicated via the internet, a public authority should ensure
that it is up to date and well maintained. Particular attention is to be paid to
safeguarding the integrity of information. It must also be remembered that
secret information must not be communicated to the public.
The processing of secret information should be planned and implemented
such that only those authorised to process the information can do so.
In the planning of information systems, a public authority should ensure
that good information management practice can be carried out undisturbed in
different circumstances. In the planning and implementation of information
systems, an effort should be made to ensure that common information required
in different processes is saved in one place and used by the processes in question.
Parallel processes required to safeguard operations should be planned and
implemented such that information assets remain intact.
A public authority should pay particular attention to the quality of the
information it produces, especially in the case of documents and personal data
files that are used in decision-making relating to individuals, corporations and
public bodies. In quality requirements particular emphasis should be placed
on document content, structure, signatures, distribution and schedules, and
attendance to the integrity and non-repudiation of documents. In accordance
33
with section 9 of the Personal Data Act, the controller must ensure that no
erroneous, incomplete or obsolete personal data are processed.
3.2
Mapping and management of information material
An authority must identify the documents (information assets) in its
possession. These should be based on the filing plan maintained by the
authority and, with respect to personal data, on the planning and the statutory
evaluation of data processing required by the Personal Data Act.
The authority must sufficiently often assess its documents and information
systems as well as the significance of the information saved in them and its
information processing.
In accordance with section 1 of the Openness Decree, particular attention
should be paid to how the following are implemented:
• the right of access to official documents in the public domain
• the obligation to produce and disseminate information and to provide
information on pending matters
• the statutory processing and protection of personal data, in particular
sensitive data
• the protection of information which under law should be kept secret
• restrictions on the purpose for which data can be used (the exclusivity of
purpose requirement of the Personal Data Act, other requirements)
• the protection, availability and accessibility of information as well as the
integrity and quality of information in different circumstances to ensure
undisrupted handling of tasks by the authorities and their cooperation
with other parties
• requirements relating to the quality of the information, particularly when
it is used as the basis for decisions relating to individuals or corporations
and public bodies or as indicators of rights and obligations.
The planning and implementation of personal data processing should be
based on the requirements laid down by the Personal Data Act. The entire
processing chain must be designed to ensure that only those authorised to do
so may access and process data. The Act’s exclusivity of purpose requirement
means that personal data may be used only for the purpose for which it was
collected. The purpose of the processing of personal data should be specified
for each data file. Personal data can be disclosed from the personal data file
of an authority only under certain conditions (Openness Act, section 16(3)).
A data file or data protection description should be prepared and maintained
for each personal data file.
34
3.3
Cataloguing and recording of information
material, and descriptions
The provisions on good information management practice (Openness Act,
section 18(1)(1)) specify for public authorities the obligation to manage
their information assets by maintaining document records and the basic
information included in them to enable case monitoring. Provisions on
document registers are outlined in more detail in Chapter 2 of the Openness
Decree.
A public authority should plan and maintain structures allowing the
recording of documents to facilitate the protection of information and to
safeguard their accessibility, integrity and reliability.
The Openness Decree obliges public authorities to prepare and maintain
publicly available descriptions of the information systems they use. The Personal
Data Act prescribes the obligation to prepare a description of a personal data file.
The cataloguing of information material should be based on an effective and
valid filing plan. Cataloguing needs are specific to each government agency’s own
activities. Cataloguing needs should be identified and their maintenance planned
in connection with case management. The implementation of directories that are
updated automatically as a result of the operating processes should be introduced
as far as possible.
Some directories are records of various events (e.g. log files). These often
contain personal data and form a personal data file, in which case their
processing is governed by requirements in respect of processing rights, nonrepudiation and life cycle.
3.4
Public and secret documents
Official documents, rights of access to them and secrecy obligations are
defined in the Openness Act. As a rule, access should be granted to official
documents. The Act separately specifies those documents that are either
completely or partly secret. There are also provisions on secrecy obligations
in other statutes.
Public documents may be covered by various processing requirements due
to their significance and information content. Documents should be readily
available, taking into consideration a public authority’s own work and its
public services. On the other hand, there are integrity requirements for some
documents. A public authority should ensure that documents fulfil set quality
targets, are up to date and conform to the original documents (information has
not been modified during processing stages).
Only individuals who are authorised to process secret documents are entitled
to do so. This practice is valid for as long as the secrecy obligation is valid.
35
Section 9 of the Decree on Information Security defines the protection levels
which determine the processing of secret information material, and if necessary,
information material which can be made public on discretion and which is
subject to restricted use. Some of these documents may be given a security
classification on the conditions prescribed in section 11 of the Decree. The use
of a security classification marking is permitted only in information material
where unauthorised disclosure or use of the information contained in it may
prejudice international relations, State security, national defence or other public
interests, as prescribed in the Decree on Information Security.
Figure 3.1 presents an outline of official information and documents. Some
of these information resources fall within the sphere of classification (yellow
area). The processing of these documents and information is subject to certain
restrictions and people must be authorised to process them. Some of this material
is secret, some is based on official discretion and some is subject to the exclusivity
of purpose requirement.
Figure 3.1. Official information and documents
OFFICIAL INFORMATION AND DOCUMENTS
- Information and documents created by a public authority
- Information and documents received by a public authority
- Information and documents under preparation by a public authority
Information security classification of official documents
Secret, official discretion, exclusivity of purpose
Protection level marking
Security classification marking
Protection level I
TOP SECRET
Protection level II
SECRET
Protection level III
CONFIDENTIAL
Protection level IV
RESTRICTED
Decree 681/2010, section 9
Decree 681/2010, section 11
Act 621/1999, section 24(1)(3-6,11-33) Act 621/1999 section 24(1)(2,7-10)
Act 523/1999, section 11
Act 588/2004, section 8
Other legislation
PUBLIC INFORMATION
36
Information material falling within the sphere of application of the Act on
International Information Security Obligations is classified in accordance with
international obligations.
It should be noted that provisions on document secrecy (Openness Act,
section 5(5)) must also be applied to a public servant’s drafts and to documents
relating to internal assignments, even though these would otherwise fall outside
the concept of an official document under the Openness Act.
Personal data do not generally fall within the sphere of classification. Special
requirements, such as exclusivity of purpose, have been prescribed for their
processing, for example in the Personal Data Act.
Public access to information marked in document files, for example in
record registers should be assessed separately from public access to documents.
Whether the documents to which references are made in records are secret
or public should not influence this assessment. References to a case and/or
document may be public irrespective of whether the documents themselves are
either completely or partly secret. References should be made in such a way that
they do not disclose the secret content of a secret document.
Public authorities must specify who is responsible for decisions on requests,
made pursuant of the Openness Act, to receive information from a classified
or other secret document. The most expedient approach is to assign this task
to a public servant in a supervisory position, unless there are special reasons
for not doing so.
3.5
Availability and accessibility of information material
Requirements relating to the availability and accessibility of official
information depend on the significance of the information for the authority or
those authorised to access it. Many operating processes set high requirements
for the availability of timely and correct information. The Openness Act
specifies the requirements for giving information to those who request it.
Availability depends, for example, on the characteristics of the information
network, the use of certificates, the information system’s user-interface, the
workstation specifications and the user’s expertise.
With respect to public documents, special attention should be paid to the
availability of information and, depending on the case in question, the fulfilment
of requirements set for the integrity of the information.
The information, information system or service must be available and at
the disposal of those entitled to access it at the time they wish and in the time
required to fulfil the accessibility requirement. In addition, safeguards should
be in place to ensure that information remains unaltered and that any document
modification stages are indisputably identified. The secrecy of information
or restrictions on its use should be addressed so that the information is only
37
available to those entitled to access it, irrespective of the form in which the
information has been saved.
3.6
Requirements relating to personal data
The processing of personal data is guided by, among others, the following
legislative provisions
• the Personal Data Act
• the secrecy provisions of the Openness Act and by section 16(3) of the
Openness Act, which relates to the disclosure of information from a public
authority’s personal data file
• special statutes for certain administrative branches, which specify rules for
the processing of personal data.
Public access to personal data files is assessed in public administration in
accordance with the Openness Act and any possible special statutes. Public
authorities’ personal data files and the information they contain may be public
in the manner referred to in the Openness Act or they may be secret pursuant
to section 24 of the Act or some other statute.
The provisions of the Personal Data Act must be taken into account in the
processing of personal data and when a personal data file is established. The
Personal Data Act applies to the automatic processing of personal data. It also
applies to other processing when personal data form, or their purpose is to form,
a personal data file or part of such a system.
Whenever a personal data file is created and personal data saved in the files
are processed, the public authority must have proper grounds for these actions.
The processing of personal data should be planned so that the whole life cycle of
the data is taken into account. Personal data files and information in them should
be protected so that they can only be accessed and processed by those authorised
to do so. Saved personal data must be error-free, which imposes demands on the
maintenance of data. Only error-free data necessary for the given purpose should
be collected, saved and otherwise processed. In addition, due consideration
should be paid to fulfilling the rights of data subjects: informing data subjects
and processing requests concerning the right to inspect and correct data.
Under section 7 of the Personal Data Act, personal data must, as a rule,
be used or otherwise processed only in a manner compatible with processing
purposes referred to in section 6 of the Act. Information in a personal data file
can be used only for the purposes specified when the data file was established.
Protection obligations must be assessed for each personal data file case
by case. Under the Personal Data Act, the data controller must carry out the
technical and organisational measures necessary for securing personal data
against unauthorised access, accidental or unlawful destruction, manipulation,
38
disclosure and transfer, or other unlawful processing. When implementing
measures, the techniques available, the associated costs, the quality, quantity
and age of the data, as well as the significance of the processing to the protection
of privacy should be taken into account.
Sensitive personal data may only be processed under the preconditions and in
the situations referred to in section 12 of the Personal Data Act. Sensitive data are
generally considered to be secret. The Decree on Information Security contains
certain obligations concerning the processing of classified sensitive personal
data saved in a personal data file, and these obligations are not dependent on
whether or not the data are deemed to be secret (see Decree on Information
Security, sections 13(1), 14(4), 16(3), 19(3) and 20(1)).
39
4 General information security
requirements for information
processing
This chapter presents the general requirements set for information processing.
These include safeguarding the competence and reliability of the staff and
fulfilling the requirements set for information processing environments.
Information security aims to ensure the continuity and quality of public
authorities’ activities and a due process of law. The implementation of information
security is based on a survey of an organisation’s information resources and their
significance as well as the information security risks.
Public authorities should ensure that staff members have secure equipment,
work space and procedures. Staff members must be made aware of the risks
involved in information work, know the correct procedures and contribute
positively with their own attitudes to the creation of a high information security
culture.
The VAHTI Effective Information Security document (5/2009) examines
the subject of information security management.
4.1
General information security requirements
in the Decree on Information Security
Public authorities must implement and maintain an information processing
environment that fulfils at least the base-level requirements of information
security to the extent required by their activities.
Public authorities must ensure that they have sufficient expertise available to
assess the need for information security measures, to implement, develop and
supervise functions, and to provide guidance to staff members.
Under the Decree on Information Security (section 8), public authorities
decide whether classification applies to their documents. If classification
is applied then chapter 3 and 4 of the Decree should be adhered to in the
classification and processing of documents. Where public authorities decide not
40
to classify documents, they must adhere to the obligations prescribed in section
18 of the Openness Act and in section 2 of the Decree on Information Security.
The provisions require a public authority to identify and assess its documents
and information systems as well as the information security risks associated
with its activities (Openness Act, section 18; Openness Decree, section 1;
Decree on Information Security, section 4 and 5(1)(1)). For a public authority,
creating the prerequisites for good information management practice means,
in particular, that documents and information resources are made available
and accessible. Good information management practice involves ensuring a
good access and secrecy structure for records, cases and documents as well
as protecting information that should be kept secret. The Personal Data Act
requires the implementation of good data processing practice in the processing
of personal data.
A public authority should define the duties and responsibilities relating to
the processing of documents and information (Decree on Information Security,
section 5(1)(3)). Those who have the power to decide on the disclosure of secret
documents or personal data or who have the right to process such information
should be specified with internal rules, if not otherwise prescribed.
The measures necessary to protect information should be implemented
both in traditional document management and in information systems to
safeguard the base level of information security. Appropriate identity and
access management, access control and adequate security arrangements for
information networks and information systems must be implemented (section
5(1)(6)) . System functionality as well as the availability of information should
be safeguarded in different situations (section 5(1)(4)).
The premises in which secret information and personal data are processed
must be appropriately protected, monitored and approved for this use (section
5(1)(7)).
In ensuring the reliability of staff, security clearances and other means
provided for by law must be used, if necessary (section 5(1)(8)).
Staff must be given the necessary information security instructions, and
these must be kept up to date (section 5(1)(9)).
These instructions provide guidelines on the processing of secret documents
in order to determine protection levels, make secrecy and security classification
markings, and specify information security levels.
41
4.2
Requirements relating to staff
Personal data recorded in secret documents or personal data files can
be processed only by those individuals who have the right to access the
documents in question. Obtaining an access right requires that
• the individual must have a work-related need, specified by a supervisor, to
process the information contained in a document
• the individual must know and have a full understanding of the processing
rules for secret documents
• the individual’s reliability has been ascertained, if necessary, in an
appropriate manner, for example with the aid of the security clearance
procedure. This requirement particularly applies to the processing of
information material requiring protection levels I and II
• an individual must have a valid access right to process information
according to the protection level specified for a document. This requirement
particularly applies to the processing of information material requiring
protection levels I and II as well as to information according to security
classifications I–III.
Access rights must be linked to task. People must have access to the
information and documents required by their tasks. If their right to possess
secret material changes, access rights to the said material must be withdrawn
from them via access rights management procedures and they must surrender
the secret information material in their possession or destroy it in a way
specified by the senior management of the public authority. Secret documents
should be processed with care, such that only those who have right of access
can process secret information.
Staff must know and have a full understanding of the security procedures
of the tools required in the processing of information. At regular intervals and
always in connection with changes, staff must be given the necessary training
and advised of perceived risks.
A public authority must maintain a list of tasks of its own staff, namely
information about who can, and in which tasks, process secret documents or
personal data contained in personal data files. Typical information processing
needs associated with a particular task can be described in the job description.
At protection levels III and IV, public servants have the right to process
information according to the needs of their tasks, based on decisions of the
senior management of the public authority (Decree on Information Security,
section 13). The fulfilment of international information security obligations
generally requires a public authority to maintain a list of staff members who
have right of access to information.
Detailed instructions for each protection level are presented in Annex 3,
section 2.
42
A public authority may require that staff in its service pass, to the extent
necessary, an information security competence test.
4.3
Basic prerequisites of information security culture
A public authority should maintain information security training for all staff
and ensure that they have sufficient expertise and that they understand the
risks associated with information security.
Staff must have sufficient knowledge of the public authority’s information
security policy and its information security instructions.
Staff must be committed to adhering to the issued information security
instructions.
All those who process secret and classified documents should be aware that
most information security problems are caused by an organisation’s own staff.
There are many reasons for this. One connecting factor is generally carelessness
when handling information material or equipment; another general reason is
disregard for issued instructions; thirdly staff are not given sufficient training
and instruction.
4.4
Requirements relating to premises security
The purpose of premises security is, as part of physical security, to protect
staff, information and material. Premises security means all structural
and monitoring arrangements by which a public authority ensures that its
premises remain solely in the control and use of authorised staff and in the
condition required for their intended use. Structures include walls, roofs,
windows, doors, fire safety cabinets and safes, and other mechanical solutions.
The term monitoring systems generally means access control systems as well
as penetration detection, camera surveillance and condition alarm systems.
Electrical monitoring systems also include property automation systems,
which are used to monitor and control premises’ operating conditions.
No general standards exist for premises security, but official requirements for
each information security level are outlined in detail in the chapter on physical
security in the National Security Auditing Criteria (KATAKRI).
A public authority should specify security solutions for its premises. The
specification should take into account, among other things, structural solutions,
necessary monitoring systems and possible issues relating to access rights to
premises.
Premises security should be examined as a whole. This includes, for example,
attending to the premises security of information network equipment and cross-
43
connection facilities as well as ensuring that unauthorised parties do not gain
access to active junction boxes.
Monitoring systems are used to control access to premises and to detect
unauthorised movement in them. Monitoring systems are also information
systems and as such often generate personal data files. Video monitoring must
comply with the provisions of the Act on the Protection of Privacy in Working
Life (759/2004).
The information security of monitoring systems should be attended to in a
similar way to the security of other information systems.
The information security of property automation systems should be
appropriate, with particular attention paid to monitoring the management of
access rights. Property automation systems are used to safeguard engine rooms´
operating conditions; outsiders may cause the collapse of the information system
services. Property automation systems can often be controlled remotely, in
which case conditions may be changed from outside a public authority’s control.
Premises security should also take into account the sound insulation of
premises. Sound insulation must be installed in all premises where secret
information is processed. Particular attention should be paid to the insulation
of sound passing through cable ducts and the ventilation system.
In premises security, due consideration should also be given to the threat
arising from electromagnetic radiation in separately specified cases, to the extent
specified by the competent authority (Tempest protection).
An organisation is responsible for ensuring that premises used for
information processing are appropriately protected. Users must know the
premises classification (security zone) of the place in question, particularly
when secret information is being processed.
The National Archives Service of Finland has issued instructions on
requirements for archive premises.
Detailed instructions for each protection level are presented in Annex 3,
section 4.
44
45
5 Information security
requirements relating
to information technology
environment
5.1
Requirements relating to information technology
environment and information services
The information networks and information systems used in the processing
of information should be implemented in a manner that enables secure
information work in all situations.
The equipment and components of information networks and information
systems should be located in secure premises (Security recommendation
for ICT premises, Tietoteknisten laitetilojen turvallisuussuositus, VAHTI
1/2002). Systems should be built so that the information work required by an
organisation’s activities can be performed in accordance with set availability
requirements.
Information technology environments are classified using information
security levels. A public authority should implement at least a base security
level operating environment.
An information system and information network in which secret information
is processed must fulfil the requirements set for the protection level of the
information in question.
Access to information networks, information assets and office premises
should be monitored.
A public authority should ensure that equipment and systems for processing
information contain the necessary security arrangements, for example malware
protection systems and encryption methods as well as access rights management
procedures.
Use of a workstation that contains classified information should be possible
only through an access rights verification procedure.
46
Information processing environments should be adequately protected against
electromagnetic radiation.
A public authority must specify who is responsible, under the Openness Act,
for deciding on requests to receive information from a classified document. The
most appropriate course is to assign this task to a public servant in a supervisory
position, unless there are special reasons for doing otherwise.
Detailed instructions are presented in Annex 3, section 5.
5.2
Use of service providers and subcontractors
to supply and maintain information technology
systems and services
Cooperation with interest groups is regulated by national legislation. The
Constitution, the Openness Act, the Personal Data Act, the Act on the
Protection of Privacy in Electronic Communications and the Decree on
Information Security, for example, set requirements that must be taken
into account when using external organisations in managing official duties.
Such requirements include location restrictions with respect to privacy and
contingency planning.
Many public authorities have duties involving the processing of security
classified information assets that impact on the development and maintenance
of information systems and services. For this reason, assignments should be
planned in advance with care and the capability of suppliers to protect the
classified information resources entrusted to them should be verified.
Cooperation should be conducted with companies that have established
sufficiently strong operations and support in Finland for the assignments in
question.
If an acquisition or service includes the processing of classified information,
security arrangements should be verified with the supplier in advance. If foreign
operators and individuals are involved, the National Security Authority should
be consulted to ascertain the required information with respect to the said
operators and individuals.
The first proposal for National Security Auditing Criteria (KATAKRI) was
completed in 2009 in cooperation with public authorities, business and security
industry organisations. The criteria do not as yet constitute a set of instructions
and their main aim is to help business and other private organisations in their
internal security work. They do, however, contain recommendations that public
authorities are advised to consult when planning information security measures.
In this context, organisations should also take into account the Government
Decision on Safeguarding the Security of Supply (539/2008), according to
which organisations, when planning and constructing information systems
critical for the functioning of society, should ensure that expertise in the
47
control, maintenance, systems management and technical support of such
systems is maintained in Finland or that it is possible to return such control
and maintenance ability to Finland. The decision requires that the information
assets used by key applications be held in Finland.
5.3
Basis for information security levels
For central government information technology environments and their
management, the following information security levels are defined:
• Base information security level environment (base level)
• Increased information security level environment (increased level)
• High information security level environment (high level).
The Decree on Information Security sets for central government authorities a
requirement to fulfil at least the base level of information security.
The base-level environment allows the processing of information and
documents belonging to protection level IV in clear text form.
The increased information security level environment allows the processing
of information and documents belonging to protection level III in clear text
form (Decree on Information Security, section 16(3)).
The high information security level environment allows the processing of
information and documents belonging to protection level II in clear text form
(Decree on Information Security, section 16(2)).
The clear text processing of information belonging to protection level I
can be implemented only in dedicated network environments, which have no
connections to a lower information security level environment.
Equipment (workstations etc.) used for information processing must fulfil
the requirements set for the information security level in question.
Based on separate official approval, a workstation that itself fulfils the
requirements of a higher information security level can be connected to a lower
information security level environment.
More detailed instructions on the requirements set for different information
security levels are presented in Annex 5.
5.4
Objectives for the setting of information
security levels
Information security levels are used to set requirements for implementing
and maintaining both technical security arrangements and administrative
procedures in information processing environments. The higher the
information security level the environment fulfils, the better opportunities
48
it provides for the handling of information assets belonging to different
protection levels.
The information security level to be implemented in each operating
environment should be determined based on the content and significance of
operating processes and the information processed in them as well as on the
threats and risks directed at them.
When the information security level of the information processing
environment is known, the processing taking place in the said environment
can be implemented based on standardised rules (Annex 4).
Information security levels increase opportunities to exchange secret
information between various public authorities as well as service suppliers and
subcontractors that provide services to public authorities. Information processing
environments and functions must be assessed against set requirements (section
5.6 and Annex 5.1.6).
A public authority should decide on the role that information security has in
the performance of the organisation’s key tasks, the resources required to achieve
this and the nature of the threats against which these resources are primarily
directed. Management can employ such steering mechanisms to ensure that the
investment made in information security is directed to the operationally correct
assets and that the information security level has been set correctly with respect
to operations. Effective steering mechanisms are of assistance in achieving an
adequate level of information security.
A public authority may have procedures, information systems and
information networks at different information security levels. Their classification
must be based on the reconciliation of risk assessments and cost-effectiveness.
5.5
Assets to be protected and technical
protection mechanisms
One of the key tasks of information security development is to identify the
assets of an organisation that should be protected. They include, for example,
information materials, workstations, information systems and their premises,
and information networks.
Development work must be based on continuous risk assessment. Risks to
information and information security should be identified, and procedures
suitable for the organisation’s activities created to control these risks. Different
means can be employed, ranging from training, instructions and agreements
to technical software and procedures.
The use of individual increased-level or high-level requirements may be
considered necessary in an organisation even at lower levels. Much information
on possible means of protection can be found in the instructions published by
the Government Information Security Management Board (VAHTI).
49
5.6
Specification and assessment of information
security level
A public authority should assess the information security level of the
environments it uses in the processing of information. This can be done by
using a self-assessment method or through an external assessment. VAHTI
instructions as well as instruments provided by the Government IT Shared
Service Centre can be used to assist in this.
A basic requirement is that each information processing environment
and administrative function fulfils the requirements set for the base level of
information security. This applies both to a public authority’s own arrangements
and to parties who carry out tasks as an assignment on the public authority’s
behalf.
As a rule, central government authorities should fulfil the requirements of
either the increased or high information security level when processing official
documents critical for functions vital to society.
50
51
6 Requirements relating to
administrative information
security
Information security development
A public authority should develop and maintain an information security
management system built to facilitate the implementation of the tasks set for
the authority in compliance with good information management practice.
Information security management must be integrated into the organisation’s
other management and development practice.
In central government, legislation as well as the VAHTI instructions form the
basis of the information security management. A description of an information
security management system is presented in Effective Information Security
(VAHTI 5/2009).
6.1
Requirements for information security
management
Information security management is covered in this document based on the
Common Assessment Framework (CAF) quality model structure:
• Leadership
• Strategies and planning
• People
• Partnerships and resources
• Processes
• Measurement.
52
Leadership includes the following items:
• Strategic control
• Resourcing and organising
• Coordination of cooperation
• Reporting and communicating to stakeholders
• Management in special situations
• Reporting to management.
The following items can be recognised in the specification of information
security strategy and in operational planning:
• Impact of operating environment
• Specification of objectives
• Developing operations through risk assessment
• Operating network management
• Special situations management.
In information security staff management, the following items can be identified:
• Developing expertise and awareness, and sanctions
• Management of human resources and tasks
• Actions in special situations.
Management of partnerships and resources can be divided into the following
items:
• Contract management
• Securing operations in special situations.
The term information security operating processes means, in this context, all
of those processes in which information is processed or an information service
is provided. These are covered in the item
• Information resources management.
Information security measurement and assessment means measures by which
the current level of operations is verified. These are covered in the item
• Assessment and verification of operations.
An information security management system ensures the implementation
of information security in all operating processes. It is used to monitor
the current state of processes and possible problems and to direct the
implementation of corrective measures. It also helps to focus development
work on the information security of information systems and services.
Administrative and technical requirements for the above-mentioned items
should be set for each information security level environment.
53
Annex 5 presents detailed requirements for the management of information
at the different information security levels. Most of the detailed requirements
are based on the content of VAHTI instructions.
6.3
Assessment of information security management
A public authority should maintain a sufficiently comprehensive monitoring
system to assess the status of the different information security elements.
A public authority should prepare at regular intervals a monitoring report
on the state of information security and present this to senior management in
management reviews.
The monitoring report should contain results according to the diagram below
(figure 6.1), in which a set target and an assessment of the current situation is
presented for each issue.
Figure 6.1. An example of the information security management target state
of an information processing environment under examination and
of the current state based on assessment.
Information security management – organisation, Organisation A - dd.mm.yyyy
6. Measurement
6.1 Assessment and verification of operations
5. Processes
5.1 Information resources
management
1.1 Strategic control
5
1.2 Resourcing and organising
4
Target level
of organisation / unit
Current level
1.3 Coordination of
cooperation
1. Leadership
3
4.2 Securing operations in special situations
2
4.1 Contract management
1
4. Partnerships and resources
0
3.3 Actions in special situations
3.2 Management of human resources and
tasks
3.1 Developing expertise and awareness, and sanctions
3. People
2.5 Special situations
management
1.4 Reporting and communicating
to stakeholders
1.5 Management in special situations
1.6 Reporting to management
2.1 Impact of operating environment
2.2 Specification of objectives
2. Strategies
and planning
2.3 Developing operations through risk assessment
2.4 Operating network management
Senior management should be made aware of existing critical risks and decide
on corrective measures.
54
6.4
Requirements for the management of information
systems and information services
A public authority should ensure that the management of its information
systems and information services meets its requirements and is sufficiently
effective.
Management should include effective procedures in the following fields:
• Reporting to the information security officer
• Asset management
• Introduction and removal of information processing environments
• Updating and change management of information processing environments
• Formation of secure areas and filtering between them
• Access control
• Identity and access management
• Malware protection
• Protection of physical environment
• Back-up management
• Monitoring of information security incidents
• Recovery of information systems from disruptions
• Management of information system development and application
maintenance.
Management of information systems and information services requires the
existence of adequate maintenance resources. This need is underlined in
environments which are subject to continuous development and which are
used to facilitate a public authority’s core functions.
Operations should include traceable processes to verify the functions that
describe the state of information processing environments, information systems
and other aspects of information security, and changes to such functions.
Annex 5 presents detailed requirements for the management of information
systems and services.
55
6.5
Assessment of information systems management
A public authority should maintain a sufficiently comprehensive monitoring
system to assess the status of the different elements of information systems
management.
A public authority should prepare at regular intervals a monitoring report
on the state of information systems management and present this to senior
management in management reviews.
The monitoring report should contain results according to the diagram below
(figure 6.2), in which a set target and an assessment of the current situation is
presented for each issue.
Figure 6.2. An example of the target state of IT environment management and
of the current state constructed on the basis of an assessment.
Information security management - ICT processes, Organisation A - dd.mm.yyyy
A: Reporting to the information security officer
5
M: Management of information system
B: Asset management
development and application maintenance
4
L: Recovery of information system
from disruptions
K: Monitoring of information
security incidents
J: Back-up management
I: Protection of physical environment
H: Malware protection
3
Current level
Target level
C: Introduction and removal
of information processing environments
2
1
0
D: Updating and change management
of information processing environments
E: Formation of secure areas and
filtering between them
F: Access control
G: Identity and access management
Senior management should know the existing critical risks and decide on
corrective measures.
56
57
7 Classification of information
resources
The Openness Act sets obligations for public authorities to manage the
information assets in their possession according to good information
management practice. An archive formation plan and the necessary data file
systems and directories help to manage information assets. The availability
and accessibility of information as well as its integrity and confidentiality
are managed by classifying material into different classes based on its
requirements.
7.1
Documents within the sphere of classification,
and classification criteria
The processing of information is managed by means of protection levels
(Decree on Information Security, section 9). Primarily secret documents are
brought within the sphere of classification. An official document is considered
secret if it has been prescribed as secret in the Openness Act or some other
statute or if it contains information covered by a non-disclosure obligation
prescribed in law. Courts of law may also order, based on law, that a document
be secret.
It is not necessary nor, in accordance with the Decree on Information Security,
possible to classify all secret documents in protection levels. Classification is
possible only if the impacts outlined in section 9(1) of the Decree on Information
Security may arise from the unauthorised disclosure of information. The fact
that a document has been prescribed as secret does not yet in itself specify to
which protection level the document should be assigned. Each information
resource should be assessed from the point of view of the potential consequences
of its disclosure. The evaluation process should also examine the interest under
protection as a whole.
Section 9(2) of the Decree on Information Security prescribes other
documents that may be classified as documents requiring protection level IV.
These are documents whose disclosure has been left to the discretion of a public
authority (e.g. discretionary public documents; Openness Act, section 9(2)) or
58
which may, according to law, be disclosed only for a given purpose (e.g. personal
data files; Openness Act, section 16(3)).
Classification should not be extended to documents or parts of them where
compliance with processing requirements is not necessary for the interest to
be protected. Classification can therefore be done so that information security
requirements are applied only to documents or document processing stages
where special measures are necessary for the interest being protected (Decree
on Information Security, section 8(1)).
Public authorities issue instructions on the classification of documents in
their own operating environments.
The signatory of the document or an individual separately prescribed in rules
of procedure determines the classification marking to be given to a document.
The classification marking reflects the view of the author or signatory on how
the document should be protected.
It should be noted that disclosure to third parties of secret information
contained in a document is not permitted even when a document is not marked
with a protection level. There might be no classification marking when secret
information constitutes only a small part (e.g. a name or a section) of an extensive
document or information package or when an annex of a document is secret but
the document is otherwise public. There might be no classification marking if
the disclosure of a document is not considered to lead to consequences referred
to in section 9(1) of the Decree on Information Security.
Classification markings do not release parties from assessing documents in
accordance with the Openness Act; classification markings do not as such give
rise to a secrecy obligation. A document may be secret only by virtue of the
Openness Act or some other Act.
Security classification markings (Decree on Information Security, section
11) may be made to secret documents, the unauthorised disclosure of whose
information could cause damage to international relations, State security,
national defence or to other public interests in the manner referred to in section
24(1)(2, 7–10) of the Openness Act.
Classified documents, when used in a national context, are marked with a
protection level marking only. A security classification marking must not be
used other than in cases prescribed in section 11(1) of the Decree on Information
Security, unless it is necessary for compliance with international information
security obligations or unless the document is otherwise related to international
cooperation (section 11(3)).
Because the expression LUOTTAMUKSELLINEN (CONFIDENTIAL) is
a security classification referred to in the Decree on Information Security, it is
not legal to make such a marking except when the document really belongs to
the said protection level.
59
7.2
Secrecy markings
A public authority must make a secrecy marking on a document which it gives
to a party and which is secret because of the public interest or the interest
of a third party (Openness Act, section 25). A marking can also be made on
other secret documents. It is recommended that a marking also be made when
giving a secret document to another public authority or to a party which
processes secret documents as an assignment on a public authority’s behalf.
Secrecy markings can be implemented in information systems, employing
various methods. In accordance with the case management metadata
specification (SÄHKE2), metadata relating to secrecy come by default from the
archive formation plan. Secrecy markings and their life cycle stages, such as the
expiry of secrecy, can be described in the metadata elements. Users should be
able to find information on the nature and level of secrecy from the display at the
different processing stages. Users should know the features of the applications
well enough to be able to distinguish secret and otherwise restricted information
from other information.
The marking should show the extent to which a document is secret and on
the grounds for secrecy. A secrecy obligation is expressed either by indicating
the secret parts of the document (e.g. section n.n of an annex) or specifying
what kind of information is secret (e.g. information concerning the state of
health of an applicant).
If secrecy is based on a legal provision that contains a damage condition
clause (minor damage, operational threat, significant damage, threat to certain
key interests), the marking can, however, be made indicating only the provision
on which the secrecy is based.
Damage condition clause refers to a secrecy provision in which secrecy is
dependent on the disclosure of information to an unauthorised party and on
the damage arising to the organisation from such disclosure (e.g. Openness
Act, section 24(1)(1–3, 6–15). More detailed information is available on the
Ministry of Justice website (www.om.fi; Basic provisions; Openness Act; Letter
of 23 September 2005 sent by the Ministry of Justice to ministries on the
implementation and partial amendment of the openness legislation, including
its annexes).
If secrecy ends at a certain time or due to a certain event, this can be marked
below the secrecy stamp, for example manually with justifications, if this option
has not been taken into account in some technical solution (metadata) in advance.
The secrecy of information ends when the disclosure of the document in
question does not lead to the effects that are the condition for secrecy or when
the secrecy period prescribed in section 31 of the Openness Act has expired.
60
7.3
Protection levels and associated markings
The processing of public authorities’ classified documents is controlled by
means of protection levels (PL).
The protection levels are:
• protection level I (PL I), if unauthorised disclosure of secret information
could cause particularly grave prejudice to a public interest referred to in a
secrecy provision
• protection level II (PL II), if unauthorised disclosure of secret information
could cause significant prejudice to a public interest referred to in a secrecy
provision
• protection level III (PL III), if unauthorised disclosure of secret information
could cause prejudice to a public or private interest or right referred to in a
secrecy provision
• protection level IV (PL IV), if unauthorised disclosure of secret information
could be disadvantageous to a public or private interest referred to in a
secrecy provision or, in the event of documents referred to in section 9(2)
of the Decree on Information Security being involved, if unauthorised
disclosure of information could be disadvantageous to a public or private
interest or adversely affect the ability of a public authority to perform its
functions.
It is recommended that classification be only used for secret documents.
Therefore personal data information, for example, should be classified only
if the information in the personal data files are either completely or to some
extent secret, or if sensitive information referred to in section 11 of the
Personal Data Act is recorded in the personal data files.
The main principle is that a protection level marking (stamp) be made on a
secret document. If a security classification marking can be made on a document,
it may replace a protection level marking (Decree on Information Security,
section 11(1)). The markings (stamps) to be used are presented in Annex 2.
A classification marking is not necessary if all those processing a document
are aware of the document’s secrecy as well as of the procedures to be adhered
to in its processing. For example, in information systems in which separately
authorised users merely process personal data belonging to personal data
files, the use of the markings mentioned in Annex 1 is not required in normal
handling situations. Those handling the information must recognise, however,
the restrictions concerning the handling of these documents and information.
It is also recommended that no classification marking be made on a document
when a secrecy obligation and the consequent handling requirements are valid
only for a relatively short period or when a document has only some information
falling within the sphere of a secrecy obligation and where all those handling
61
the document are aware of its nature. In these cases, it is more appropriate for
information relating to secrecy and processing requirements to be marked on
a separate document to be attached to the document (Decree on Information
Security, section 10(2)).
The protection level should be indicated to users with a marking that
expresses the class in question.
An official document must not be considered secret if a secrecy period
enacted in law or prescribed by virtue of a law has expired. In such cases, the
grounds for classification are also terminated.
The secrecy of a document ceases when the period enacted in law or
prescribed by virtue of a law has passed from the preparation of the document.
If the secret information is such that the need for it to remain secret ceases after
a designated period, that designated period should be indicated by the author or
holder of the document on the document or in a separate written or electronic
note. If a document has a classification marking, it is appropriate to indicate the
expiry of secrecy in connection with the classification marking.
A document in the possession of a public authority which includes
information that can be used only for a certain purpose may be classified if
conditions of the Decree on Information Security are fulfilled.
7.4
Grouping of information material into
protection levels
Secret information material is placed into a protection level determined based
on the significance of the information and the consequences of its disclosure,
if the conditions prescribed in section 9(1) of the Decree on Information
Security are fulfilled. Determining the correct level must be done with care.
A protection level requirement must not extend to those parts of information
material in which processing requirements are not necessary concerning the
interest to be protected (Decree on Information Security, section 8(1)). It is
also worth noting that it is neither necessary nor permitted to classify all
secret documents.
When a document is prepared, attention should be paid to processing
requirements of the document or its information. Documents should be prepared
so that their processing supports the availability and integrity of information
as well as the implementation of secrecy and restrictions on use.
The default protection level of documents and the need to use security
classification can be specified in the archive formation plan. The classification
need and class of each document should, however, always be assessed separately
and the marking of information corresponding to this should be made in the
document or its metadata specifications.
62
As a general principle, public and secret information must be kept separate.
Therefore documents should be prepared paying attention to which of them
can be implemented as public document material and which of them requires
the preparation of a document (good openness and secrecy structure) to be
processed separately.
Information belonging to different protection levels should, as a rule,
be placed in different documents, thereby facilitating the accessibility and
management of the documents throughout their life cycle.
When preparing documents, attention should also be paid to the extent to
which the information contained will be needed. Documents which will have a
wide distribution should be written so that they can be processed at protection
level IV or III. In these documents, reference can be made to documents at a
higher protection level. The more sensitive the information is, the higher the
security arrangements required for the entire processing chain.
Official documents, that may require extensive processing and whose
disclosure may cause minor harm or loss of trust, should be classified in
protection level IV.
The above-mentioned restrictions on the extent of distribution relate to
controlling human risk. Documents whose secrecy period is, for example, 25
years require controlled processing of information throughout the secrecy period.
The wider the group to which information is distributed, the greater the risk
of secrecy being compromised is. It is also necessary to take into consideration
that the processing of documents belonging to protection levels I and II must
be traceable throughout the entire life cycle of a document (processing log etc.).
Even if a document under preparation does not contain secret information,
it may be classified in protection level IV if the unauthorised disclosure of the
information could be disadvantageous to a public or private interest or adversely
affect the ability of a public authority to perform its functions. The ability of
a public authority to perform its functions cannot generally be considered to
be jeopardised when pending matters of general importance are involved, in
which case there is limited scope for the use of classification. In any event,
classification must not influence to any extent the fulfilment of obligations
relating to access to pending matters prescribed for public authorities in the
Openness Act (section 19).
In certain cases there is good reason to highlight which part of a document
contains secret or other classified information. This can be done, for example,
by paragraph or section. A classification marking indicating the protection level
can be made in brackets at the beginning of the paragraph containing classified
information in order to indicate the processing level of the information contained
in the paragraph. This marking method helps those processing the document
later to recognise the parts of the document requiring special handling and to
assess the need to continue classification. This is also helpful in situations where
existing information is used to assist in the preparation of new documents.
63
Classified material should be marked with protection levels when it is
transferred to another party. At the same time, it is necessary to verify that
such a transfer is possible according to law and that the recipient fulfils the
requirements for the processing of the information material. It is recommended
that classified material should always be marked with the stamps and markings
mentioned in Annex 2 throughout the life cycle of a document for as long as
information is secret.
7.5
Security classification markings
A security classification marking may be made on official documents in
the cases indicated in section 11 of the Decree on Information Security.
The security classification markings indicate four different levels. Security
classified material is processed in accordance with the requirements given for
the corresponding protection levels mentioned in section 7.3.
The security classification markings are:
• protection level I: ERITTÄIN SALAINEN (TOP SECRET), if unauthorised
disclosure of secret information could cause particularly grave prejudice to
international relations, State security, national defence or to other public
interests in the manner referred to in section 24(1)(2, 7–10) of the Openness
Act
• protection level II: SALAINEN (SECRET), if unauthorised disclosure
of secret information could cause significant prejudice to international
relations, State security, national defence or to other public interests in the
manner referred to in section 24(1)(2, 7–10) of the Openness Act
• protection level III: LUOTTAMUKSELLINEN (CONFIDENTIAL), if
unauthorised disclosure of secret information could cause prejudice to
international relations, State security, national defence or to other public
interests in the manner referred to in section 24(1)(2, 7–10) of the Openness
Act
• protection level IV: KÄYTTÖ RAJOITETTU (RESTRICTED), if unauthorised disclosure of secret information could be disadvantageous to
public interests in the manner referred to in section 24(1)(2, 7–10) of the
Openness Act.
Please note! The term security class is often used in connection with security
classified documents. A public authority may, in its own activities, use suitable
organisation-specific terms and abbreviations. The terms security class I – IV
are also used in connection with international security classified information
material, and material belonging to these security classes is protected in
accordance with protection levels I – IV mentioned in this document.
64
Stamps associated with security classification markings are presented in
Annex 2.
The equivalence of protection levels and security classification titles is
presented in the table below.
PROTECTION LEVEL
SECURITY CLASSIFICATION TITLE
ABBREVIATION
Protection level I
TOP SECRET
ERSAL (E)
Protection level II
SECRET
SAL (S)
Protection level III
CONFIDENTIAL
LUOT (L)
Protection level IV
RESTRICTED
RAJ (R)
Abbreviations can be used in information systems and documents where
applicable.
When expressing a security classification by paragraph, the security
classification marking in question is placed at the beginning of the paragraph,
e.g. using brackets. For example (S) at the beginning of a paragraph indicates that
there is SECRET (SALAINEN) information in the paragraph. Correspondingly,
in connection with metadata, the longer abbreviations are recommended, such
as SAL. If the information system set restrictions on the length of abbreviations,
shorter forms can be used, such as ERS and LUO instead of the abbreviations
ERSAL and LUOT.
Information belonging to protection levels I – III should be presented to
users on displays by a marking expressing the class in question.
The distribution of documents marked with the security classification
marking TOP SECRET (ERITTÄIN SALAINEN) should be carefully considered
on the basis of need to know and taking the secrecy period requirement (right to
process) into account. In any case, the author and signatory must always decide
on the distribution of a document belonging to protection level I. Copies must
not be made of a document furnished with the security classification marking
TOP SECRET (ERITTÄIN SALAINEN), nor should it be distributed further
without the written permission of the document author or signatory.
Distribution of documents in which the security classification marking
SECRET (SALAINEN) is used should be restricted on the basis of need and
taking the secrecy period requirement into account.
65
7.6
Security classification of international
information material
Documents that come from international organisations and other states may
have their own classification markings. Markings of a security classification
system corresponding to Finland’s are made on such a document if an
agreement binding on Finland has been made on the bilateral protection of
security classified information or a document otherwise falls within the sphere
of application of the Act on International Information Security Obligations
(e.g. an EU Commission or Council security classified document).
If there is no binding agreement or document on security classification
arrangements with a foreign state or international organisation, a public
authority must decide on the markings to be made in accordance with Finnish
legislation (Openness Act, section 24(1)(2, 7-10).
The table below presents the equivalence of certain international
organisations’ and Finland’s security classifications.
Translation of Table:
Country/
organisation
Protection
level I
Protection
level II
Protection
level III
Protection
level IV
Finland
ERITTÄIN SALAINEN
SALAINEN
LUOTTAMUKSELLINEN
KÄYTTÖ RAJOITETTU
EU
TRÉS SECRET UE/
EU TOP SECRET
SECRET UE /
EU SECRET
CONFIDENTIEL UE /
EU CONFIDENTIAL
RESTREINT UE /
EU RESTRICTED
NATO
COSMIC TOP SECRET
NATO SECRET
NATO CONFIDENTIAL
NATO RESTRICTED
A “LIMITE” marking on EU internal documents means that their distribution
is restricted. This is not a marking indicating a security classification.
Documents labelled with this marking are not for public distribution. The
same applies to NATO UNCLASSIFIED documents. The classification of both
document groups in Finland should be assessed case-by-case in accordance
with national legislation.
7.7
Classification and markings of personal data
Personal data files and the processing of personal data are governed by the
Personal Data Act, the Openness Act and a numbers of special Acts on the
processing of personal data, which set special requirements for, among other
things, the processing of sensitive data and the protection of information.
Exclusivity of purpose and disclosure criteria set their own requirements for
the processing of personal data.
66
Unless otherwise provided by a document, documents containing personal
data may be placed at either PL III or PL IV in accordance with an impact assessment made on the basis of section 9(1) of the Decree on Information Security.
Even if, due to the protection of privacy, an absolute secrecy obligation
applies to certain documents, all secret documents relating to an individual
or their information will not necessarily fall under protection level III. When
secrecy provisions relating to the protection of privacy have been enacted,
secrecy has been grounded on an assessment made at a general level of the
risks compromising the protection of privacy in case information is made public
(Government Proposal 30/1998, p. 88). Classification according to protection
levels, on the other hand, is a matter of assessing which information falling
within the sphere of a secrecy obligation could concretely compromise protection
of privacy as an object of legal protection.
Personal data do not need to be marked separately with stamps if they are
processed only by individuals who have received sufficient training and possess
the relevant access authorisations.
Necessity and accuracy requirements as well as the obligation to protect and
duty of care must be fulfilled in the processing of personal data. For this, effective
access management and a monitoring and supervision system must be in place.
The processing of sensitive and biometric data saved in personal data files
should be recorded in a log (Decree on Information Security, section 20(1)).
Sections 9 and 13 of the Personal Data Act should be taken into account when
personal identification numbers are used. Documents containing a personal
identification number must be processed in accordance with protection level
IV, unless the content of the documents necessitates processing according to
the requirements of a higher protection level.
67
7.8
Recommendations relating to the classification
of extensive information assets
In this context, the term extensive information assets means information
saved in one or more places, accessible by the user in one go. Information is
gathered from many different sources and by combining it new information is
formed to serve different purposes.
Even if individual documents included in an information asset are public
or classifiable at a low protection level, the information asset might constitute
an entity whose protection requirement is higher than that of the individual
documents contained within it. For example, the disclosure of information
about the weapons owned by an individual might be disadvantageous to a
private interest, but information about the whole country’s weapons register
could prejudice public safety.
The protection level requirement of each information asset is determined
on the basis of the protection level requirements of the individual documents
included within it. The Decree on Information Security prescribes the minimum
level for the information security requirement of classifiable documents. Section
7(2) of the Decree does not prevent a public authority from applying in its own
activities information security requirements higher than those prescribed in
chapter 4 of the Decree. It is recommended that a public authority assess the
protection requirements of its all information assets. It is also recommended
that the impact assessment of the protection requirements is broader than when
individual documents are assessed, and that information security procedures
are implemented accordingly.
When granting access rights to different information assets, attention must
always be paid to how access rights are defined and monitored.
When implementing an information system and specifying its functions,
public authorities must consider the protection level arrangements on which
the said documents and information resources may be processed.
Extensive information assets are generally processed by data processing
professionals or by companies providing data processing or security services
under contract. It is important that decisions on protection levels and on the
procedures and security arrangements to be followed are made by different
people than those who process the information assets.
When specifying access rights to information assets, public authorities must
ensure that situations do not arise in which access right holders can access
unauthorised information.
In the implementation of information systems and functions, due
consideration should be given to all information processing stages so that they
can be performed in an environment that offers an adequate protection level.
68
An access rights review procedure can be applied to all information assets
irrespective of whether the said information assets contain secret information
or not. Public and secret information should be kept separate through technical
(network, disk space, encryption, user identification) and administrative means
(access rights, logs, identification). Information system planning and access
rights management should ensure that those who do information work in a
public authority receive for their use the information they require to perform
their tasks.
7.9
Requirements set for the integrity and
non-repudiation of information
Various requirements relating to the integrity and non-repudiation of
information are set for official documents and the information they contain
because of the significance and use of the information in question. Such
requirements are included, for example, in all financial transactions and in
documents for which an official signature is required. In these situations, a
public authority should put in place procedures to ensure that the information
it generates cannot be changed and that it is accurate, and that the original
documents are verifiable.
When documents are saved and transferred electronically, various hash
functions and electronic signatures are available to ensure integrity and nonrepudiation.
In electronic information transfer, the competent authority must ensure
that information conveyed and maintained by a public authority is transferred
so securely that third parties cannot change the information unintentionally.
A public authority may classify its information resources on the basis of
integrity requirements; for example, (1) information that must be accurate and
(2) other information.
69
7.10 Requirements set for the availability and
accessibility of information
The accessibility requirements of official information depend on the content
of the information and its purpose. Many operating processes set high
requirements for the availability of timely and correct information. The
Openness Act specifies the requirements for giving information to those who
request it. The information accessibility requirement is also highlighted by
the need to implement good information management practice. Accessibility
consists of several elements. Accessibility depends, for example, on
information network characteristics, assurance, the implementation of the
user interface, workstation specifications and user expertise.
Different documents are generally used for different operational purposes.
When processing involves information and documents requiring a high
protection level and high availability, the high requirements for information
processing are emphasised. These requirements are to be taken into account
when the information systems are planned. Such information is often included
in information produced and processed by various monitoring systems.
In the processing of public documents and information, special attention
should be paid to the accessibility of information and, depending on the case,
also to requirements set for the integrity of information. From the point of view
of accessibility, this means, among other things, that the information in question
is as easy as possible to access by those who need it in their tasks, even to the
extent that the information is an integral part of the work.
The critical nature of information means those requirements that the
implementation of activities demands. When some activity requires the
immediate availability of certain information, this information is considered
to be critical. Examples of critical information:
• a project meeting (information about place and timing and the need to
participate)
• training session (information about trainers, training objectives and
teaching material).
The availability of information can be examined from a process perspective,
for example:
• highly important documents and information for the implementation of
functions
• important documents and information for the implementation of functions
• documents that support functions
• other documents.
70
Operations often require both public and secret information. Those
responsible for certain activities should be aware of the required information.
When structures required by information work are planned and developed,
particular attention should be paid to safeguarding the availability of
necessary critical information. A public authority should identify in advance
the critical information required by a function.
71
8 Processing requirements of
classified information materials
The aim of these instructions is to create standardised procedures and
conditions for the processing of information materials in central government.
A further goal is to harmonise procedures with respect to national and
international classified documents in different situations throughout their life
cycle.
The requirements of international obligations differ to some extent from
the measures outlined both in the Decree on Information Security and in these
instructions. Therefore such obligations must be taken into account by a public
authority case by case in activities subject to international obligations.
8.1
Basic requirements
Requirements set for the processing of information apply to its whole life cycle.
A number of critical requirements are set in particular for the secrecy period
of information. In the implementation of these requirements, those who
process information are in a special position. They are responsible for ensuring
that processing of information is done correctly and using the equipment
given by the employer.
The competent authority or its representative must be identified for the
official information in question. This competent authority has key responsibility
for the information over which it exercises authority. A public authority should
specify the parties responsible for all of its information assets. Markings (such
as stamps) can be prepared in advance for electronic documents and form
templates, for example. Protection levels must be set for the entire life cycle of
information material.
The processing of a secret electronic document must be recorded in an
electronic log, information system, case management system, manual register
or in the document itself. The recommended recording location for electronic
processing is a log or corresponding electronic tool.
Information requiring a protection level classification should be saved
according to the requirements set for the class in question. Protection level
72
III information can be saved as clear text in monitored, increased information
security level networks in which access rights are checked and which incorporate
an effective, document-specific access management procedure.
Secret documents are not public; they are secret in accordance with secrecy
criteria. This means that the parties authorised to process a document are those
mentioned in the said document or group of cases. Information can be given
from a document only to those who have been granted the right to process
documents belonging to the protection level required by the document and who
have a need, based on their tasks, to process that information.
The table below presents the processing rights, distribution, traceability
and IT processing of documents for each protection level. Material requiring
a security classification is processed in accordance with the corresponding
protection level.
PL IV
PL III
PL II
PL I
Processing right
Processing right
granted
Processing right granted Processing right
granted
Mentioned in
distribution,
processing right
granted
Distribution
According to tasks
According to tasks
Author specifies
individual distribution
Recording
of processing
Recording
of processing events
of documents
containing
information in
personal data files
or biometric data.
Recording of processing
events of documents
containing sensitive
information in personal
data files or biometric
data.
Recommended for
other information
Specified by author,
based on tasks
Recommended for other
information
Traceability
No monitoring
No monitoring
Document copy-specific Document
traceability
copy-specific
traceability
Transfer in open
networks
Encrypted or
otherwise protected
Encrypted or otherwise
protected
Not permitted
Not permitted
Transfer in official
networks
As clear text in
base and higher
information security
level networks
As clear text in
increased or high
information security
level networks
As clear text in
controlled high
information security
level networks
Strongly encrypted or
otherwise protected
in controlled separate
networks
Processing in
workstation
connected to open
network
Permitted
in base and higher
information security
level environments
Permitted in increased
or high information
security level
environments
Permitted in controlled
high information
security level
environments
Not permitted
Processing in
workstation
connected
to official network
Permitted
in base and higher
information security
level environments
Permitted in increased
or high information
security level
environments
Permitted in a
controlled high
information security
level environments
Permitted in a high
information security
level separate
network, to which
there is no connection
from other
information networks.
73
PL IV
PL III
PL II
PL I
Saving in data
storage medium
(hard drive, transferable memory)
Protected
Encrypted or otherwise
protected
Strongly encrypted
or otherwise strongly
protected
Strongly encrypted
or otherwise strongly
protected
Saving on official
network server
Protected with
user IDs
Encrypted or otherwise
protected in an
increased information
security level
environment
Encrypted or otherwise
protected in an high
information security
level environment
Strongly encrypted
or otherwise strongly
protected if system
fulfils high
information security
level requirements.
More detailed instructions for each protection level are presented in Annex 4.
The classification (protection level PL) governing the processing of documents
is expressed with the marking allocated for this purpose (Annex 2). A marking
is made by the author or the first recipient of the material or by the individual
who has the right to decide on the processing and use of the said material. A
classification marking is decided by the document signatory with his or her
manual or electronic signature.
Processing requirements corresponding to the classification of documents
depend on the significance of prejudice caused by the disclosure of information
contained in the documents for the public or private interests protected by
secrecy provisions.
The secrecy period of secret official documents is not dependent on whether a
document is classified or whether it has received a secrecy marking. All classified
documents are secret for as long as the grounds for secrecy exists, but not
exceeding 25 years from the signing of the document. In certain special cases,
however, the secrecy period may be longer.
Information in a secret document may be disclosed to a third party only if
the giving of the information or the right to receive the information have been
separately and expressly prescribed in law.
In assignments or cooperation projects etc. in which secret information
needs to be processed with external parties, the following conditions must be
fulfilled in advance:
• the security of a foreign party has been verified in accordance with the
procedure described in the Act on International Information Security
Obligations (588/2004)
• in the disclosure of information, the procedures according to these
instructions are observed
• the said organisation has the premises and procedures required by the
protection level in question and for the processing of the information
• those who are authorised to access the information know the public
authority’s processing rules applying to secret documents and information.
74
The assignment should, if necessary, include an agreement on security
arrangements (e.g. appended to the procurement contract). If an extensive
project or partnership requiring a high protection level has been agreed with
an external party, the following principles mentioned should be observed in
addition to the conditions mentioned above:
• a separate security agreement, specifying the security procedures to
be adhered to in assignments, should be prepared between the said
organisation and the public authority. With respect to procurements,
security requirements can be reviewed within the framework of the set
security arrangements.
• the staff of the said organisation may be required to sign a separate nondisclosure agreement specified by the public authority. The objective of this
is to ensure that staff know the set security obligations.
The appropriate records should be kept of secret documents given to external
parties.
A secret document should be managed in accordance with the requirements
set for the protection level required by the information contained by the
document, throughout the entire life cycle of the document, from preparation
to destruction.
Information systems should take into consideration the protection levels
required by the information contained within them. The working environment
should be protected with sufficient premises security, so that they are sufficiently
monitored and allow access only to authorised staff.
If a document contains both public and secret information, the public and
secret parts should be clearly specified.
If an information system has both public and secret information, secret
information should be given a protection level marking. For example, in database
systems this can be specified by table, field or information, depending on the
structure and the information material in question.
A document is classified in the class indicating the protection level required
by the information contained in it. If a document consists of several parts,
for example a main document and annexes, the main document should be
furnished with a stamp that represents the highest confidentiality level of the
whole document. The protection levels of both the main document and annexes
should accordingly be apparent from the main document if they differ from
one another. If a document and its annexes can be processed separately, their
protection level may also be indicated as required by each subdocument.
When a document contains secret information under a number of different
secrecy criteria, these secrecy criteria should be evident from the main document.
The importance of this information is highlighted when, for example, assessing
the distribution of a document and the disclosure of information from public
75
and secret parts of a document and when reviewing the ending of a document’s
secrecy period.
The diagram below presents the life cycle stages of a typical document.
8.2
A.Reception
Drafts
B. Creation,
preparation,
updating
and
maintenance
Stages of document processing
8.3
Classification,
marking and
registration
8.4
Copying
(numbers refer to the corresponding sections below)
8.5
Distribution
8.6
Transfer
8.7
Reception
8.11
Review and
removal of
classification
8.8 Saving
and storage
8.9 Access to
information
8.10
Archiving
8.12 Destruction
8.2
Creating and editing of information material
In the preparation of information material, particular attention must be
paid from the start to whether the material will be public or whether it will
contain secret information. Those engaged in the preparation of material are
responsible for it. The party preparing a document decides who will receive
the document in question. A case in preparation is not as a rule intended for
external parties, irrespective of whether the draft document contains public
or secret information. When a document reaches the stage where it becomes
an official document, it is incorporated into the public authority’s information
assets.
A document containing classified information should be processed during
its preparation in the same way as a public authority’s other documents. The
processing of information does not depend on the form in which the information
has been saved.
When classified information is processed in documented form, for example
as text, images, audio or video samples, in electronic form in information systems
or as separate records, the requirements prescribed for a public authority’s
documents should always be followed.
76
Information material to be used in all training events, meetings and
other special situations should be prepared so that the protection level of the
information and all identifying information (e.g. date, author and document
identifying details) is evident from the material in question. Presentation
material should be processed just like other official documents, applying the
requirements given in these instructions. Such information material includes,
for example, unregistered and unclassified presentation slides.
If it is necessary in these situations to process material belonging to protection
levels II (SECRET) or I (TOP SECRET), information on those who participated
in such processing should be recorded in the document’s processing history.
In addition, it is essential to check in advance that participants have both the
processing right required by the said protection level and a need to know the
presented information.
It is highly recommended that information belonging to the highest
protection levels is presented and saved only as part of a public authority’s
documentation.
Documents may refer to a document in a higher protection level. This also
applies to public documents.
When preparing documents that require actions, the case should be
presented so that the document in question can be classified as low as possible.
This procedure will help achieve the accessibility required by activities. Explicit
information etc. requiring a higher protection level is correspondingly indicated
in the reference data of the main document.
Moreover, the same processing rules set for official documents should be
observed in structural documentation and in metadata. When documents
are managed in case management systems using metadata, the aim should
be to implement information resources containing metadata so that the
information is, as far as possible, public or classified at as low a protection
level as practicable. These actions help promote the implementation of good
information management practice.
When preparing documents, their purpose should be taken into account
and an effort made to achieve a good openness and secrecy structure. This
means that, as far as possible, secret information must be set apart from public
information. In addition, information belonging to different protection levels
should as a rule be presented in different documents. These procedures guarantee
that document accessibility requirements are met.
77
8.3
Classification, marking and registration
The document author (generally the case presenter) makes a proposal on the
classification of the document. The classification is decided by the person who
is otherwise responsible for the case (first signatory in presentation cases).
A document is furnished with a marking corresponding to the highest
protection level of the information it contains. If a protection level requirement
applies to only part of a document, the marking should indicate which part of
the document it concerns.
A public authority’s document register should reveal the protection levels
required for documents. A register of documents requiring the highest protection
level can, if necessary, be classified and separated from other information by
means of limited access rights.
8.4Copying
Both electronic and paper copies may also be taken of classified documents
with due regard to the restrictions and processing rules prescribed for the
protection level in question.
Copies should be handled like the original documents.
Copies should be marked like the original documents and steps taken to
ensure that recipients of copies have a right inherent in their tasks to process
secret information material.
8.5
Document distribution
The distribution of documents is implemented as required by the document
in question. The document signatory specifies the distribution and processing.
A document can only be delivered to a recipient who has the necessary rights
to manage the material in question.
In information systems, the distribution is implemented primarily by email
or by granting access rights to the information. Secret information should be
processed using access rights, taking the requirements of each protection level
into account.
When expanding distribution:
• The recipient of a document must follow legislation, agreements and
protection level restrictions
• The distribution of a document must be specified, based on the information
it contains, for the parties to whom the document applies.
78
A classified document may be distributed to other public authorities and
stakeholders by taking into consideration the requirements set by the
document’s protection level, author and agreements.
8.6
Sending or transferring documents,
and/or access to information
When a document is delivered to a recipient, it is transferred with its
information content to the recipient’s control together with all rights and
obligations relating to it, if not otherwise prescribed by special provisions.
Documents requiring protection level I – III are assigned to an individual, to
a person responsible for the processing of a designated task or to an organisation.
The sender must ensure that a secret document is delivered only to those who
have a right in linked with their tasks to process the document in question.
The delivery of a document classified at protection level I or II must be
documented and the delivery of a document requiring protection level III must
be traceable.
Information contained in a document classified at protection level IV may
in certain cases be discussed with discretion over the telephone. The sending
of classified documents by telefax must be carried out in accordance with the
requirements of each protection level (Annex 4, table 5).
Classified documents are delivered to the recipient in accordance with
protection level requirements. A classified document should be distributed so
that third parties cannot access protected information.
In information systems, the distribution is implemented primarily by
email or by granting access rights to the information. Information contained
in a classified document should be processed using access rights, taking the
requirements of each protection level into account.
Information contained in a classified document can be processed, transferred
or saved only in the parts of information systems and networks that fulfil the
security requirements set for the processing of information in the said protection
level.
A public authority should maintain procedures ensuring that information is
processed throughout its entire life cycle in accordance with good information
management practice.
A document may include both security classified information and information
that is secret because of another interest. A document must accordingly be
processed in an environment required by the information it contains and in
accordance with set requirements.
When transferring international security classified information (e.g. EU,
NATO) electronically or by other methods, a public authority should make sure
what has been agreed in relevant bilateral security agreements.
79
8.7
Measures undertaken by the recipient
The recipient of a classified document records the received material in a
register corresponding to the document’s protection level. If a document
comes directly to a recipient, he or she is responsible for registering the
document.
The recipient of a document checks that the individual responsible for
processing it has the right to process classified documents.
The recipient of a document forwards the document to the person responsible
for the case - if a classified document is involved in a closed envelope - and
otherwise observing the procedures relating to the transfer of documents.
On departing working premises, staff must not leave secret information
material in plain view and unsupervised.
The recipient of a document is responsible for all obligations including
processing and access rights.
A public authority should also verify the relevant provisions agreed in
bilateral security agreements when receiving international security classified
information (e.g. EU, NATO) electronically or by other methods. If necessary,
foreign documents should also be marked with domestic protection level/
security classification markings.
8.8
Saving and storage of documents
Public and classified document material should be kept separate.
Documents containing classified information should be stored so that only
staff possessing access rights can process the material.
Electronic systems should use solutions that fulfil the requirements of each
protection level.
Supervision of the storage of classified information must be arranged.
Classified information saved in data storage media should be protected by
using approved encryption solutions in accordance with the protection level
in question.
Classified (protection levels I – III) paper documents, including drafts, should
be stored in at least a Euro II standard data cabinet or safe, in accordance with
documents’ protection level. Documents belonging to protection level IV should
be stored in a locked location.
80
8.9
Access to information
A public authority should maintain secure procedures to ensure that only
those authorised to do so are allowed to process secret information or
information protected for some other reason.
A public authority should employ a sufficiently strong procedure to
authenticate persons and/or parties requesting a service when providing an
opportunity to process secret information or information protected for some
other reason.
8.10 Archiving of information resources
Archiving must be based on structures and requirements specified in archive
formation plans.
In archiving, conditions set for processing by the protection level and
agreements must be taken into account.
Documents relating to international activities must be archived in the
manner prescribed in agreements.
With respect to permanently archived documents, the regulations of the
National Archive Service should be observed.
8.11 Revising the protection level of documents
A public authority must assess the currency of its documents’ protection levels
when giving information from them to those that request it.
A document’s author and/or competent authority is responsible for
reclassifying the document and discontinuing its protection requirement.
8.12 Destruction of information resources
Unnecessary copies of documents should be disposed of after their purpose
has been served. They should be destroyed by a person authorised to do so by
the organisation. Those who prepare documents are responsible for destroying
draft documents during the preparation stage.
In the destruction of material, steps must be taken to ensure that it does not
come into the possession of unauthorised parties.
Paper documents are destroyed using a procedure fulfilling the requirements
set for the protection level in question.
Electronic files are erased from digital media, workstations and servers as
well as from other equipment in the manner required by the protection level
81
in question. Temporary files generated while using information systems must
be deleted after their purpose has been served in accordance with information
management instructions.
A public authority must ensure that, an information system does not save
information requiring a security classification in the memory of a workstation
or a server environment that could be accessed by unauthorised parties. This
requirement also applies to temporary files and other records.
Secret paper documents should be destroyed by incineration, shredding or
by collecting them in a locked container, whose contents are destroyed in an
audited and controlled environment.
8.13 Deciding on the disclosure of a document
The disclosure of information from a document in the possession of a public
authority is determined in accordance with the Openness Act. A document’s
classification marking does not affect a public authority’s obligation to review,
on a document-by-document basis, access to a document when a party
requests information from it by virtue of the Openness Act. Markings made
in accordance with the Act on International Information Security Obligations
do not allow scope for discretion in terms of secrecy, unlike markings in
accordance with the Openness Act.
The disclosure of a document is, as a rule, decided by the public authority
which possesses the document. A public authority may, however, forward a
request to receive information to the authority that prepared the document or to
the authority responsible for processing the case. Under the Act on International
Information Security Obligations, a request relating to the receipt of a security
classified document must always be forwarded to the public authority to which
the party to the agreement has supplied the document. Forwarding is also
obligatory when a request concerns documents requiring a security classification
marking in accordance with provisions separately issued by the Government.
No such provisions have been issued to date.
The secrecy provisions of the Openness Act prevent the disclosure of
information to a third party. A staff member whose task it is in the authority to
handle the issue in question is not considered to be a third party as referred to in
the Act. In accordance with section 26(3) of the Openness Act, information may
also be disclosed, under the conditions prescribed therein, to a party working on
an assignment on the authority’s behalf. It is worth noting that those working
on assignments on behalf of public authorities are governed by a non-disclosure
obligation in accordance with section 23(2) of the Openness Act, so a secrecy
obligation exists without a separate non-disclosure agreement. A party given an
assignment on a public authority’s behalf and those employed by such parties
should always be informed of any secrecy obligation.
82
If it is essential to disclose classified information material to those working
on an assignment on a public authority’s behalf, steps should be taken in advance
to ensure that they have at their disposal the necessary premises required for
processing such information as well as appropriate procedures and knowledge
of the public authority’s processing requirements. Specific provisions should
be included in contracts to verify that information is processed appropriately.
Tasks involving the processing of personal data can be commissioned to be
carried out abroad only under the conditions prescribed in the Personal Data
Act. Under preparation are provisions on corporate security reviews. Their use
is always worth considering if processing extensive and significant tasks for the
functioning of society are commissioned to be performed outside the public
administration.
A document´s secrecy obligation is dependent on the time at which an issue
is examined. A secrecy marking stating a security or protection level indicates
the situation when the information material was prepared. A secrecy obligation
and information security requirements can change over the course of time.
Accordingly, when deciding on a request for information, it is necessary to
review whether the grounds for a secrecy classification and secrecy still exist.
If documents falling within the sphere of international information security
obligations are involved, the party that prepared the document must be contacted.
8.14 Impact of encryption on the processing
of information material
Encryption methods are used to change the information into an
incomprehensible form. Information is restored to clear text form using the
correct additional information (encryption key). Encryption methods can also
be used to safeguard and verify the integrity of information.
External memories used for saving information, hard drives of portable
workstations, network services and email are entities in which encryption is
typically employed. Protecting the information contained in the memories of
equipment as well as telecommunications using encryption techniques ensures
that the information they contain is not disclosed to third parties even in the
event of equipment being stolen or lost.
Information belonging to protection level I must always be strongly
encrypted or otherwise strongly protected and it is stored or processed only
in controlled separate networks. Information belonging to protection level II
must be strongly encrypted when it is transferred or processed in a base- or
increased-level information processing environment. Information belonging to
protection level III can be saved in clear text form in the servers of a controlled
increased or high information security level network. In other network
environments, protection level III information can be transferred or saved
83
only when appropriately encrypted. Information belonging to protection level
IV should also be encrypted when it is transferred or saved in a public network
and its servers, unless some other security arrangement has been agreed between
the sender and recipient.
The encryption of information may be strong or weak. Different levels of
encryption can be obtained with various encryption methods. When using
a strong encryption method, the interpretation of the information can be
considered to last sufficiently long.
Secret information can be transferred and stored only when protected by
encryption methods etc. approved by the public authority. Special care should
be taken with the security of passwords and tools used in encryption.
A document that is sufficiently strongly encrypted can be processed like a
public document.
84
85
ANNEXES
Annex 1: Obligations set by legislation
A review of legislation with respect to information security can be found in
the publication Effective Information Security (VAHTI 5/2009).
In terms of these instructions, the key items related to normative guidance are:
In Finnish legislation
• Act on the Openness of Government Activities (625/1999):
- Good information management practice, fundamentals of information
security work, secrecy and confidentiality obligation, secrecy markings,
classification criteria
• Decree on the Openness of Government Activities and on Good
Practice in Information Management (1030/1999):
- Reports and assessments for the implementation of good information
management practice
- Registers and other document records
• Decree on Information Security in Central Government (681/2010)
- General fundamentals of information security, requirements for the
classification and handling of documents
• The Act on International Information Security Obligations (588/2004):
- Handling of international material
• Personal Data Act (523/1999)
- Good information processing practice, exclusivity of purpose,
protection obligation
• Special statutes relating to the processing of personal data
• Archives Act
- Document management and archiving
• Special legislation
More on normative guidance from FINLEX (www.finlex.fi).
In international information security obligations binding on Finland
• PFP Document Security Agreement between Finland and NATO,
22 September 1994
• Security Agreement between Finland and the WEU, 22 April 1997
(SopS 42/1998)
• EU Council Decision on adopting the Council’s security regulations
(2001/264/EC)
• Agreement between the European Space Agency and the European Union
on the security and exchange of classified information (SosO 95/2004)
• Bilateral information security agreements binding on Finland: e.g. with
Germany, France, Slovakia, Estonia, Italy and Poland
Further information on international agreements is available at the address:
www.formin.fi
86
Annex 2: Stamps for secret documents and information
Secrecy stamp and protection level marking
SALASSA PIDETTÄVÄ
Suojaustaso __
JulkL (621/1999) 24.1 §:n _______k
Lain (___/______) ___ §:n ______k
A protection level (suojaustaso) may, if necessary, be stated on the SALASSA
PIDETTÄVÄ (SECRET) stamp. A number indicating the protection level is
written manually or mechanically on the stamp. The salassa pidettävä (secret)
stamp is used in documents that contain secret information as defined in
either subparagraphs 1, 3–6, 11–32 of section 24(1) of the Openness Act or
in other statutes. In addition, the stamp can be used on protection level IV
documents that contain classified information subject to official discretion or
exclusivity of purpose.
Security classification marking stamps
KÄYTTÖ RAJOITETTU
Suojaustaso IV
LUOTTAMUKSELLINEN
Suojaustaso III
ERITTÄIN SALAINEN
Suojaustaso I
SALAINEN
Suojaustaso II
JulkL (621/1999) 24.1 §:n _______k
L (____/_____) ____ §:n ____k
JulkL (621/1999) 24.1 §:n _______k
L (____/_____) ____ §:n ____k
JulkL (621/1999) 24.1 §:n _______k
L (____/_____) ____ §:n ____k
JulkL (621/1999) 24.1 §:n _______k
L (____/_____) ____ §:n ____k
A special security classification marking may be made in connection with,
or instead of, a secret document’s protection level marking. A security
classification marking can only be used with secret documents that are
deemed secret on the basis of subparagraphs 2, 7-10 of section 24(1) of the
Openness Act or the Act on International Information Security Obligations. A
security classification marking must always be made on international security
classified material (588/2004, section 8).
87
Annex 3: Detailed instructions to public authorities
to facilitate the secure processing of documents
This Annex presents detailed instructions to public authorities on the
measures necessary to create a secure environment for the processing of all
secret information, both domestic and foreign. Requirements are given in the
order presented in the main document (chapter 4).
1. General requirements at all protection levels
(1) A public authority must maintain procedures that ensure the controlled
processing of documents and information throughout their entire life
cycle. These procedures must meet the requirements of good information
management practice.
(2) The procedures must be based on a process-based archive formation plan
maintained by the public authority.
(3) Processing rules are set up to ensure that secret information can only be
used by those who have the right to access such information (confidentiality).
At the same time, the aim is to ensure that information is available
(availability) and accurate (integrity).
(4) Documents must be protected for as long as they are subject to security
measures in accordance with the law and agreements and statutes binding on
Finland and any notification made by the author of the material.
(5) A public authority must ensure that staff in the service of the public
authority have the necessary knowledge concerning: whether the documents
being processed are secret or public; the procedures to be followed in giving
and processing information; and the procedures, security arrangements and
division of responsibilities to be followed in the protection of documents and
information systems.
(6) A public authority must provide necessary additional guidance and
training. The competence of staff should be monitored.
(7) A public authority must regularly audit the implementation of information
security measures concerning sensitive information material and monitor
the effectiveness of issued instructions and technical information security
measures.
88
2.
Requirements relating to staff
(1) Staff members must know and have a good understanding of the operation
and instructions of the work equipment they use.
(2) They must master the processing rules for secret documents.
(3) Processing rights must be linked to their tasks and based on the decision
of a supervisor.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION
LEVEL II
PROTECTION
LEVEL I
(4)
When a person’s right to possess
material changes, the material must
be destroyed or removed in a manner
determined by the organisation’s
management.
yes
yes
yes
yes
(5)
no
The granting of a processing right
requires that a basic background check
(security clearance) be performed.
yes *
yes
yes
(6)
A public authority must maintain a
list of processing rights to classified
information:
(7)
domestic information material
international information material
no
no
in accordance
with
agreements
yes
yes
yes
yes
Processing right requires individual
to pass an information security
competence test
recommended yes, when
processing
information
in a network
environment
yes
yes
* The organisation decides separately which staff groups should be subject to a basic background check (security clearance).
International agreements also set obligations with respect to background checks for those processing classified information.
3.
Requirements relating to information security culture
(1) A public authority must arrange information security training for all
staff and ensure that they have sufficient expertise and understand the risks
associated with information security.
(2) For more detailed information see section 4.3 of these instructions.
4. Requirements relating to premises security
(1) The purpose of premises security is, as part of physical security, to protect
staff, information and material.
89
(2) A public authority must specify security solutions for offices and computer
rooms. Instructions should specify the required structural solutions and
monitoring systems, and possibly access rights to premises.
(3) A public authority is responsible for the security of premises used in
information work.
For an outline of premises security, see section 4.4 of the main document.
5. Requirements set for IT environment and information services
5.1. IT environment implementation and maintenance
(1) A public authority should plan and maintain its information systems
and services so that the information processing required by the authority’s
procedures can be performed in all of its premises in accordance with good
information management practice. Information processing environments
are classified at the base, increased and high information security level
environments according to how they fulfil the technical and administrative
requirements set for the different security levels (see Annex 5).
(2) Premises are classified into 4 different classes (security zones). Premises in
which information of protection levels I - III is held must have, for example,
continuous access control, an intrusion detection system and a documented
locking system. The above-mentioned IT environments must take into account
the risks of electromagnetic radiation.
See the IT environment description in chapter 5 of the main document.
5.2. Implementing information services
A public authority should plan and maintain an infrastructure, which
enables the recording of documents and facilitates the protection of
information and safeguards their accessibility, integrity and reliability. Even
if the implementation of these objectives is achieved in electronic operating
environments partly by developing information security and IT solutions, it
is ultimately a question of good planning and of developing an organisation’s
practices that support them.
The table below presents, by protection level, certain essential requirements
for implementing information services. A more detailed list of requirements is
presented in Annex 4.
90
Position Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION
LEVEL II
PROTECTION
LEVEL I
(1)
Secret information material
must be stored throughout
its secrecy period so that it
is accessible only to those
authorised to do so. Use of
premises must be monitored
using access control and other
measures.
yes
yes
yes *
yes *
(2)
Back-ups taken of information
systems must be processed like
the original documents. The
protection level of back-ups
is determined according to the
highest protection level class
of the information contained
in the back-ups.
yes
yes
yes
yes
(3)
Premises that contain secret
information must be locked on
departing and/or the possibility
of the information being
processed by third parties
must be otherwise prevented.
yes
yes, and it is
recommended
that documents
be transferred
to a safe.
International
documents
must be stored
in a safe.
yes,
and documents
must be
transferred
to a safe.
yes,
and documents
must be
transferred to a
safe (computer
or data storage
medium)
(4)
The processing of secret
electronic information material
must be recorded in an electronic
log, information system, case
management system, manual
register or in the document itself.
recommended;
yes with
respect to
personal
data (PDA,
section 11)
recommended;
yes with respect
to sensitive
personal data
yes
yes
(5)
Processing of secret information
material in open information
networks.
encrypted
or protected
in open
information
networks
encrypted
or protected
in open
information
networks
encrypted or
protected in
open information networks
processing not
permitted in
open information
networks
(6)
Processing of secret information
material in public authorities’
information network.
as clear
text in base
information
security level
information
network,
checking access
authorisations
as clear text
in increased
or high
information
security level
information
networks
as clear text
in controlled
information
networks
fulfilling high
information
security level
requirements
permitted
in strongly
protected
separate network
fulfilling high
information
security level
requirements and
to which there
is no connection
from other
information
networks
(7)
Saving of secret information
material in public authorities’
information network.
can be saved
on base
information
security level
servers
as clear text
protected by
user Ids;
encryption is
recommended
encrypted or
protected on
base information security
level servers;
permitted as
clear text on
increased and
high information security
level servers
strongly
encrypted
or otherwise
strongly
protected if
system fulfils
high information security
level requirements
permitted
in strongly
protected
controlled
separate network
fulfilling high
information
security level
requirements.
91
Position Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION
LEVEL II
PROTECTION
LEVEL I
(8)
permitted;
information
must be
protected
e.g. using
encryption
permitted;
information
must be saved
in encrypted
form
special
approval,
information
must be saved
using strong
encryption
not permitted
without a
case-by-case
official
decision
Processing of secret information
material in electronic form
outside the workplace
Processing requires official
decision in all classes
(cf. Decree on Information
Security, section 16)
* Information can be stored only in premises covered by monitored and documented access control and locking arrangement
and belonging to classified security areas.
5.3 Deciding on the disclosure of a document
(1) The disclosure of information from a document in the possession of a
public authority is determined in accordance with the Openness Act.
(2) A public authority must specify who is responsible for deciding on
requests, made under the Openness Act, to receive information from a
classified document. The most appropriate course is to assign this task to a
public servant in a supervisory position, unless there are special reasons for
doing otherwise.
(3) To perform an assignment requiring transfer of classified information, the
assignee must know the processing rules for classified information and the
requirements set by agreements.
When a public authority has a need to transfer classified information, it must
in advance ensure that concerning the assignment
(a)the authority has with the information recipient a valid security
agreement covering security arrangements corresponding to the
documents’ security classification
(b)the information recipient and those in its service have given a nondisclosure agreement, where an international agreement or statute so
requires
(c)those who receive and process information know the authority’s
processing rules in respect of such information.
(4) It is appropriate that a request to receive information from a document
that contains classified information be forwarded to the public authority
responsible for considering the matter as a whole (Openness Act, section 15).
(5) When handling requests for documents that contain classified information,
a check should be made to ensure that the grounds for the classification and
secrecy of the information still exist.
92
Annex 4: Processing requirements for secret documents
and information
This annex presents detailed processing instructions for documents containing
secret information. Processing requirements are presented in table form by
protection level.
Requirements have been grouped into different life cycle stages.
The diagram below presents the typical processing of a document and its
stages. The item “Access to information” is particularly relevant to information
users.
The diagram does not present all of the different situations that information
users may encounter in different tasks.
Revision and removal of classification is done by making a proposal on this
for its reassessment.
Public access to documents in archives is directed by secrecy legislation.
2. Luokittelu
2.
Classification
and marking
B. Creation,
preparation,
updating
and
maintenance
3.
Registration
Drafts
1.
A.Reception
4.
Copying
Stages of document processing
(numbers refer to the corresponding sections below)
5.
Distribution
6.
Transfer
7.
Reception
11.
Review and
removal of
classification
8. Saving
and storage
9. Access to
information
10.
Archiving
12. Destruction
Requirements relating to entire life cycle
The following table presents general processing instructions for documents
that require processing in accordance with a protection level. These
instructions relate to the entire life cycle of information. In the sections that
follow, requirements are more detailed and concern the processing stages in
question.
93
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Protection level-specific requirements
for documents must be taken into
account during their entire life cycle.
yes
yes
yes
yes
(2)
An official document must display
sufficient information to identify it.
yes
yes
yes
yes
(3)
Documents must be processed with care
so that only those who have the right to
do so can access information. Protection
of documents must be safeguarded
particularly in situations where in the
same premises there are staff who have
no right to process the information in
question.
yes
yes
yes
yes
(4)
With respect to international
documents, international agreements
should be observed, if they have been
enacted. In other situations, Finnish law
should be followed.
yes
yes
yes
yes
(5)
Document processing requirements
apply, irrespective of the form in which
the information is stored or presented.
yes
yes
yes
yes
(6)
Documents must be processed in
accordance with the archive formation
plan.
yes
yes
yes
yes
(7)
Documents must not be left in clear view yes
or unsupervised on departing working
premises. Protection level IV documents
may be left temporarily in clear view,
taking into account premises and locking
arrangements.
yes
yes
yes
(8)
In document processing, the classspecific requirements set for the
processing environment should be taken
into account.
yes
yes
yes
yes
(9)
In document processing, the
requirements set for staff security
(processing right conditions and
knowledge of processing rules) should
be taken into account.
yes
yes
yes
yes
(10)
Document processing outside the
workplace should be avoided. If tasks
so require, however, documents should
be processed in accordance with the
principles and requirements given in
these instructions.
yes
yes
yes
yes
(11)
A record should remain of the processing
of a document to facilitate its monitoring
and any copies made of it during the
period for which protection is required.
Not required
except for
personal
data
Recommended,
obligatory for
sensitive
personal data
Log data or
processing
acknowledgement
list
Complete,
copy-specific
record
of those
who have
viewed the
document
94
1. Document creation and reception
Reception of information means (1a) those situations in which an organisation
receives documents produced elsewhere.
The document creation stage (1b) means those processing stages when
new information is introduced to the information material or updates are
made. Often the producer of the information is a person, but various processes
of information systems may produce information automatically for certain
information assets.
Position Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
yes
When collecting and transferring
information material and preparing and
creating a document, due consideration
must be given to secrecy legislation,
archive formation plan requirements and
instructions issued by public authorities.
yes
yes
yes
(2)
While preparing documents, due
consideration should always be given to
the fact that, during the entire process,
material is processed in an environment
in which only those who are authorised
to process the material can do so.
yes
yes
yes
yes
(3)
When preparing information material,
information belonging to different
security classes should be presented as
far as possible in different documents.
yes
yes
yes
yes
(4)
An official document must be registered,
or managed in some other way.
yes
yes
yes
yes
(5)
International security classified
documents are stamped with the
corresponding domestic security class
stamps if so prescribed in an agreement
binding on Finland or if otherwise
required by Finnish law. A security
classification marking must always be
made on international security classified
material (588/2004, section 8).
yes
yes
yes
yes
(6)
In information systems that automatically yes
produce information such as monitoring
and log data or other secret information,
those who process information should
make sure that they have the right to
access the information in question.
yes
yes
yes
95
2. Document classification and marking
Document classification means the measures required when specifying the
correct protection level for a document or information. Marking means
the stamping of a document to indicate its protection level or security class
(Annex 2).
Position Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Secret documents must be classified
in accordance with laws and decrees.
yes
yes
yes
yes
(2)
Information is classified by the person
who issues an assignment relating to
the case or creates the information
for the first time or who decides on the
classification of documents. The Act
on International Security Obligations
must be taken into account.
yes
yes
yes
yes
(3)
A protection level marking is made by
the author or the first recipient of the
material or by the person who has the
right to decide on the processing and
use of the material.
yes
yes
yes
yes
(4)
The classification is confirmed by the
signatory of the document with his/her
manual or electronic signature.
All information does not necessarily
have a signatory.
yes
yes
yes
yes
(5)
yes
Documents are marked with a stamp
corresponding to the highest protection
level of the document’s parts. It is
recommended that documents be
prepared so that information belonging
to different protection levels is presented
in separate documents.
yes
yes
yes
(6)
Secret documents should be furnished
with the appropriate stamps and
corresponding markings when an
organisation has decided on their use.
yes
yes
yes
yes
(7)
The stamp is positioned in the upper
right corner of the first page.
yes
yes
yes
yes
(8)
The stamp is also placed
on the document’s other pages.
not required
not required
yes
yes
(9)
The colour of the stamp is red
not required
not required
yes
yes
(10)
Paper marked with a red diagonal
line or a printing method that makes
a corresponding marking is used.
no
no
yes
yes
(11)
Document pages are numbered and
the number of pages is marked.
not required
yes
yes
yes
(12)
In documents that have a metadata
structure, the security class is marked
with a corresponding abbreviation.
not required
RAJ (R)
yes
LUOT (L)
yes
SAL (S)
yes
ERSAL(E)
96
Position Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(13)
When information is processed
electronically, screens should display
the classification of the information
being processed with the markings
presented in Annex 2.
recommended * recommended * yes
yes
(14)
A domestic stamp is added to a
document by the organisation that
receives the document from a foreign
party.
not required
yes
recommended yes
* Not required in information systems in which access rights are restricted only to those processing the information,
nor in monitoring and security sector and corresponding information systems in which secret information is processed
as a rule and where access rights are restricted only to those authorised to access the information.
3.Registration
Document registration means in this context the measures by which a
document is marked in the register or corresponding record that is used to
monitor a public authority’s information resources.
Position
Issue
PROTECTION
LEVEL IV
(1)
Documents are entered according
to protection level in a register or other
record specified for this purpose.*
recommended recommended yes
yes **
(2)
It is recommended that protection
level abbreviations be used in the
register or other record.
ST IV
ST III
ST II
ST I
(3)
It is recommended that security
classification abbreviations be used
in the register or other record.
RAJ (R)
LUOT (L)
SAL (S)
ERSAL (E)
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
* In case management systems, register information (record information) includes information on document protection
levels. Such a register can be used, if necessary, to present lists of documents belonging to different protection levels
in different views. Information recorded in the public part of the register should be public. Secret registers should be
implemented so that only those who possess access rights can process the registers in question.
** A separate register or other record should be maintained for documents belonging to protection level I.
97
4.
Copying
Copying of information material means the measures by which copies are
made of the original document. These include, for example, photocopying and
copying of files to various data storage media as well as extracts taken from
documents and information material.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Copies are processed in the same way
as the original document.
yes
yes
yes
yes
(2)
In the case of electronic document
copies, the document identity should
be verified (integrity verification).
yes
yes
yes
yes
(3)
Both electronic and paper copies may
be made of the original document.
yes
yes
yes;
traceability
must be
secured
not without
the author’s
permission,
traceability
must be
secured
(4)
Copies must be stamped with the stamp original is
corresponding to the original document sufficient
(a copied stamp is sufficient, as is a black
and white stamp).
original is
sufficient
should be
stamped
with a red
stamp
should be
stamped with
a red stamp
5. Distribution
Document distribution covers the decision of the document’s recipients and
verification of the recipients’ need for, access rights to and ability to process
the document (secret information material).
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
The document signatory decides the
distribution and processing.
yes
yes
yes
yes
(2)
The document should show to whom
the document or its parts are distributed.
Metadata and database information
should show the protection level and
distribution of the information.
yes
yes
yes
yes
(3)
The distribution of a document is
specified, based on the information
contained in the document, for the
parties to whom it applies.
yes
yes
yes
yes
(4)
Distribution should be addressed
to an organisation, which confirms
registration of document. A person’s
name or task can also be used in
distribution information.
yes
yes
yes
yes
98
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(5)
Disclosure of a secret document must
be documented.
not required
yes
yes
yes
(6)
A prerequisite of document disclosure is
that a right to disclose the information
has been prescribed in law and that
the recipient has the necessary rights
to handle the material as well as the
competence to process it in accordance
with requirements. *
yes
yes
yes
yes
(7)
The distribution of international documents is implemented in accordance
with international agreements and/or
the requirements prescribed for each
document in question.
yes
yes
yes
yes
* Documents are generally delivered to an organisation. When transferring documents between public authorities, it is
recommended that both the recipient’s need for the information and the correct address of the receiving party be verified.
This is underlined particularly with respect to documents requiring processing at protection levels I and II. The competence
to process secret information requires that staff know the processing rules and possess the right to process the information
in question, and the organisation has premises and information systems that fulfil the requirements. In assignments given
to partners, contracts must include security requirements in which detailed procedures are agreed. Disclosure of secret
information must be traceable and in accordance with procedures specified in the contract.
6. Transfer of information material
Transfer of information material means in this context the measures by
which copies taken of documents are transferred to the parties specified in
distribution. Transfer can take place, for example, via post, email, electronic
storage media or by granting processing rights.
Position
Issue
(1)
(2)
PROTECTION
LEVEL III
PROTECTION
LEVEL II
PROTECTION
LEVEL I
A secret document should be distributed yes
so that unauthorised parties cannot gain
access to secret information.
yes
yes
yes
In information systems, the distribution
of information is implemented either
via email or by granting access rights.
Processing of secret information should
be based on access rights.
yes
yes
yes
on a limited
basis *
(3)
The sender must ensure that a secret document is transferred only to those who
have a right to it based on their tasks.
not required
recommended yes
yes
(4)
When transferring a document by email, yes
the sender should verify the recipient’s
address.
yes
yes
use
of email not
permitted
(5)
Document transfer by transportation
company (e.g. postal service)
based on a
risk analysis,
by registered
mail or in
some other
secure way
not permitted;
transfer only
by courier or
internally by
own staff
not
permitted;
transfer only
by courier
In the case of international documents,
the security classification procedures
specified in contracts between parties
should also be observed.
PROTECTION
LEVEL IV
in a closed
nontransparent
envelope
99
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION
LEVEL II
PROTECTION
LEVEL I
(6)
Processing of secret security classified
information by telephone
(without encryption device)
yes, with due
care
not permitted
not permitted
not
permitted
(7)
Discussing secret information on the
telephone (without encryption device)
yes, with due
care
yes, with due
care
not permitted
not
permitted
(8)
Discussing secret information on a
telephone equipped with an encryption
device (telephone connection with
end-to-end encryption; official approval
required for encryption device for the
processing of information belonging to
the protection level in question)
as clear text
as clear text
as clear text
not
permitted
(9)
Transfer of secret information as text
(SMS) message
not permitted not permitted
without
without
encryption
encryption
not permitted not
without strong permitted
encryption
(10)
Telefax: unencrypted line transfer
(point-to-point)
not permitted
yes, but
recipient’s
presence should
be ensured
not permitted
not
permitted
(11)
Telefax: encrypted line transfer
(point-to-point). Encryption device
requires official approval.
yes
yes
yes
not permitted, except
with special
permission
of competent
authority
(12)
Transfer of electronic document in open
information network
encrypted
or protected
in a manner
decided by
the authority
encrypted
or otherwise
protected
not permitted
not
permitted
(13)
Transfer of electronic document in
public authority’s internal network.
Secret information material and
information can be transferred only
in the parts of information systems
and information networks that fulfil
the requirements for the transfer of
information resources prescribed for the
protection level in question.
as clear text
in base
information
security level
environment
encryption
recommended,
as clear text
in increased
information
security level
environment
strongly
encrypted
as clear text
in high
information
security level
environment
on a limited
basis *
(14)
Transfer of electronic document using
storage medium
Storage media used outside a
permanent office should be equipped
with methods that encrypt the entire
information resource. In addition, there
are class-specific requirements:
(See also table 8, item 5)
When they contain information, storage
media (hard drive, memory sticks etc.)
should be processed according to the
highest protection level required by
the information they contain.
yes
yes
yes
yes
All transfers of
information
between work
equipment must
be recorded
in a log. The
same applies
to destruction
of information.
Storage of
information is
permitted only
in separately
controlled
storage media.
Permitted
only in
named
workstations.
Copying of
information
only with
the written
consent of
the author.
* Information and documents belonging to protection level I may be transferred only in specified and approved high information security level systems, strongly encrypted or otherwise protected. In these systems, the requirement is that information
is encrypted on servers/workstations and that only those entitled to receive a document can gain access to it.
100
7. Measures undertaken by the recipient
Measures undertaken by the recipient mean the measures that the recipient
should perform when receiving secret information material.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
(1)
The recipient of a document records
the received material in a register or
other record.
recommended
recommended yes
yes
(2)
Acknowledgment of receipt
not required
as required
yes
yes
(3)
Record of receipt
not required
recommended yes
yes
(4)
Having received a document,
the recipient is responsible for all
obligations and has the right to access
and process information.
yes
yes
yes, but no
right to
expand
distribution
8. PROTECTION PROTECTION
LEVEL II
LEVEL I
yes, in
relation to
handling of
tasks
Storage and saving of information material
Storage and saving of information material means the measures employed to
store information during the stages when it is prepared and used.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Public and secret document material
(information) must be managed
throughout its entire life cycle.
yes
yes
yes
yes
(2)
Users must process and attend to
secret information for which they are
responsible so that only authorised
staff can gain access to it.
yes
yes
yes
yes
(3)
Information saved on information
network servers must be protected
by access rights.
yes
yes
yes
yes *
(4)
Encryption or other strong protection
of information assets saved on
information servers.
in base
information
security level
environment,
can be saved
as clear text,
encryption
recommended
encrypted
on base
information
security level
servers,
permitted
as clear text
on increased
and high
information
security level
servers
encrypted
on high and
increased
information
security
level servers
on a limited
basis *
(5)
Data storage media must be processed
according to the highest protection
level required by the information they
contain. Equipment should incorporate
methods that encrypt the entire
information asset.
encryption
yes
recommended
yes, using
strong
encryption
on a limited
basis *
101
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(6)
Users should make sure that the
documents they process are stored in
the environment intended for them.
More detailed instructions are available
in application-specific instructions or
those issued by the organisation.
This applies to all documents.
yes
yes
yes
yes
(7)
Draft documents are stored and
saved like corresponding completed
documents.
yes
yes
yes
yes
(8)
Paper documents, external data storage
media containing secret information
and corresponding equipment must be
stored in the safes and vaults intended
for them or in corresponding locked and
monitored premises.
recommended, yes
measures
should be
taken to
ensure that
external
parties cannot
access the
information
yes
yes
* Information and documents belonging to protection level I may be stored only in separately specified and approved
high information security level environments, strongly protected. In these environments, the requirement therefore is that
information is encrypted on servers/workstations and that only those entitled to receive the document can gain access to it.
9. Access to information (use of information)
Access to information means in this context the situations and procedures by
which users receive secret information for processing. In information systems,
these are implemented by means of access management and user authentication.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Reading of information on network
servers.
as clear text
starting
from base
information
security level
networks
as clear text
starting from
increased
information
security level
networks
as clear text on a limited
basis *
in high
information
security level
networks
(2)
Remote access using equipment and
a connection given by the employer for
this use, provided that the operating
environment fulfils the requirements
set for the protection of information.
permitted
using
protected
connection
permitted
using
protected
connection,
strong
authentication
of users
not
permitted
using strong- permitted
ly encrypted
or protected
connection
in controlled
high information security level network, strong
authentication of users
(3)
Minimum requirements
for user’s workstation connected
to information network.
base
information
security level
workstation
increased
information
security level
workstation
high information security level
workstation
not
permitted
* Information and documents belonging to protection level I may be processed only in separately specified and approved high
information security level environments, strongly protected. In these systems, the requirement therefore is that information
is encrypted on servers/workstations and that only those entitled to receive the document can gain access to it.
102
10. Archiving of information material
Archiving of information material means the procedures by which the storage
of information is ensured during a set life cycle. Generally, archives are located
outside the operating environment.
Position
Issue
(1)
(2)
(3)
11. PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
yes
Archiving must be based on structures
and requirements specified in an archive
formation plan.
yes
yes
yes
In archiving, attention must be paid
to the conditions set by the protection
level and agreements.
yes
yes
yes
yes
International documents are archived
in the manner specified in legislation
and agreements
yes
yes
yes
yes
Revision and removal of classification
Revision of classification means assessing a document’s level of secrecy taking
into account the grounds for secrecy at the time of assessment. If there are no
legal grounds for secrecy, the protection level obligation should be removed or
amended correspondingly.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
(1)
A re-assessment of classification is
performed by the organisation that
prepared the document.
recommended yes
yes
yes
(2)
A document becomes public when the
longest secrecy period mentioned in
law has passed from the preparation or
receipt of the document or when there
are no longer any legal grounds for
secrecy. A marking on this is made on
the document, for example by striking
through the secrecy marking.
yes
yes, each
case should
be confirmed
with the
authority
that
prepared the
document
yes, each
case should
be confirmed
with the
authority
that
prepared the
document
(3)
If a document’s protection level is
changed in an assessment, a marking,
signature and justification for the
change should be recorded.
recommended yes
yes
yes
(4)
The parties entitled to receive a
document and any copies taken of
it should be informed of the change.
recommended recommended yes
yes
yes
PROTECTION PROTECTION
LEVEL II
LEVEL I
103
12.
Destruction of information material
Destruction of information material means the measures, which are meant
to destroy information material, such as documents. The shred size is in
accordance with DIN 32757/DIN 4.
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(1)
Original documents must be destroyed
in accordance with the archive
formation plan after their purpose has
been served.
yes
yes
yes
(2)
Unnecessary copies of documents
must be destroyed after their purpose
has been served.
yes
yes
immediately! immediately!
(3)
Draft documents must be destroyed
after their purpose has been served.
yes
yes
immediately! immediately!
(4)
Destruction must be performed so that
secret information and information
containing personal data does not fall
into the hands of unauthorised parties.
yes
yes
yes
yes
(5)
The author of information is
responsible in the preparation stage
for the destruction of information not
transferred to an organisation for use.
yes
yes
yes
yes
(6)
Staff authorised by an organisation
are responsible for the destruction
of completed documents contained in
the organisation’s case management
system.
yes
yes
yes
the document
signatory is
responsible *
(7)
Those who possess information
are responsible for the destruction
of information (copies, corresponding
information).
yes
yes
no, see (6)
no, see (6)
(8)
Documents included in PL I and PL II
classes are destroyed by authorised
responsible persons assigned by the
organisation. When documents are
destroyed, a list of those who have
viewed them is retained. In electronic
systems, log files etc. that contain
processing information are saved.
-
-
yes
responsible
person *
(9)
The archive manager is responsible
for destroying the original document.
In situations where a document is not
transferred to the archive manager
(e.g. documents stored for a fixed term,
electronic documents), the holder
of the document is responsible for
destruction in the manner required by
the protection level.
yes
yes
yes
responsible
person *
yes
104
Position
Issue
PROTECTION
LEVEL IV
PROTECTION
LEVEL III
PROTECTION PROTECTION
LEVEL II
LEVEL I
(10)
Electronic files are destroyed from
workstations and servers and from
other storage media in accordance
with more detailed instructions issued
by the authority in question.
The DELETE function alone does not
destroy information.
yes
yes
yes
yes
(documents
are not
saved on
information
network
servers)
(11)
Temporary files created while using
information should be removed
sufficiently often.
yes
yes
yes
yes
(12)
Storage media containing information
should be destroyed in accordance with
more detailed instructions issued by
the authority in question. Storage
media include all equipment that store
information.
yes
yes
yes
yes
(13)
Information in information systems
and assets should be destroyed in
accordance with requirements
specified for them.
yes
yes
yes
yes
(documents
not on
servers)
(14)
The following procedures are used in
the destruction of paper documents:
1. supervised incineration
2. in a shredder whose shred size is,
by class, at most
3. transferred to an incineration plant
etc. in a closed container
1. yes
1. yes
1. yes
1. yes
2. 3.9 x 30 mm 2. 1.9 x 15 mm 2. 1.9 x 15 mm 2. 0.78 x 11 mm
3. yes
3. permitted, 3. not
permitted
whenclosed
container is
located in
locked and
monitored
premises.
3. not
permitted
* Destruction of documents belonging to protection level I may also be specified as belonging to a certain position within
an organisation. This procedure helps ensure the practical implementation of measures. The signatory must give permission
for this procedure when preparing /distributing the document.
105
Annex 5: Detailed requirements for information security
levels
1
Requirements for information security management
1.1
Leadership requirements
Subarea name
1.1.1 Strategic control
Objectives
The organisation has recognised the factors and obligations linked with its core functions
that steer the management of continuity and special situations as well as the protection
of information. Continuity management and information security measures support the
objectives of the organisation’s core functions.
Base-level
requirements
1. The requirements set by legislation in respect of the organisation’s activities have been
recognised and communication of these to staff has been organised and responsibilities
assigned.
2. The organisation’s core functions and processes have been recognised and organised,
and responsibilities assigned.
3. The organisation has a written information security policy approved by its management.
Increased-level
additional
requirements
4. The organisation has a written strategy-level plan, which expresses how information
security work is organised and responsibilities assigned to achieve the core objectives.
High-level
additional
requirements
5. The organisation has an annual information security development plan.
6. Information security elements are also used in performance guidance.
Examples of good
practices
• For requirements 3 and 4: An organisation has an information security policy and
an information security strategy based on it, which describes how the policy goals will
be achieved.
Tools and models
Effective Information Security (VAHTI 5/2009)
• particularly Annex 1: Model policies and planning frameworks
Setting and measuring information security objectives
(Tietoturvatavoitteiden asettaminen ja mittaaminen, VAHTI 6/2006)
Information Security and Management by Results (VAHTI 1/2005)
Government Resolution on Information Security in Central Government 2009, and
background material
CAF assessment model www.vm.fi/caf
Observations
Everything is based on the organisation management’s commitment to information
security and its ability to apply the requirements of core functions in information security
management.
106
Subarea name
1.1.2 Resourcing and organising
Objectives
Sufficient resources for the objectives have been allocated to continuity management
and information security.
Base-level
requirements
1. The organisation has a nominated information security officer, whose information
security responsibilities are outlined in his/her job description.
2. The information security officer has time to carry out his/her information security
responsibilities.
Increased-level
additional
requirements
3. The responsibilities have been mentioned in the job descriptions of all those who have
information security responsibilities.
4. The organisation has sufficient information security staff for its size and objectives.
5. Resourcing of information security has been taken into account in the organisation’s
operational and financial planning or budget and implementation is monitored.
High-level
additional
requirements
6. The position of information security officer is a full-time job.
Examples of good
practices
• For requirement 1: The administration manager who processes information security
matters alongside his/her main occupation acts as the organisation’s information
security officer.
• For requirement 3: An organisation does not use personal job descriptions, but role
descriptions. The role description of the case management system administrator includes
responsibility for removing access rights as requested.
• For requirements 4 and 5: An organisation will be assigned new tasks that will require
moving to the high information security level in 2012. As a result, more should be invested
in information security work and this should be entered in the budget.
Tools and models
Effective Information Security (VAHTI 5/2009)
• Information security example donut dial for annual planning, p. 25
• Annex 2: Information security responsibilities by role
Observations
Even a small organisation can reach the base level with modest resources.
If a higher information security level is needed, resources should be increased.
107
Subarea name
1.1.3 Coordination of cooperation
Objectives
Planning of continuity management and information security is implemented as a joint
effort between core and support functions.
Base-level
requirements
1. Organisation management and the staff responsible for different subareas of information
security engage in regular discussions.
2. The organisation has a task force for information security which meets regularly.
Increased-level
additional
requirements
3. Management and information security officer meet at least once per year.
4. The task force meets at least twice per year.
High-level
additional
requirements
5. Perceived risks, set information security objectives and their achievement, and changes
arising from future needs are among the topics discussed at the meetings.
6. Minutes are kept of the meetings and implementation of agreed measures is monitored.
Examples of good
practices
• For requirements 1, 3, 5: An organisation following an information security management
model in accordance with the ISO27001 standard arranges management review events
every six months.
• For requirement 1: An agency’s information security officer meets the senior
management of the agency once per month. The information security officer of an agency’s local office also meets the management of the office regularly in a monthly meeting.
• For requirements 2 and 4: An organisation has a group that meets monthly and discusses
all security issues.
• For requirement 2: The management group of a small organisation discusses information
security issues at least once per year and the information security officer participates in
the discussion.
Tools and models
General instructions on ICT contingency planning (ICT-toiminnan varautuminen häiriö- ja
erityistilanteisiin, VAHTI 2/2009)
• Chapter 2
Observations
The objective is for information security officers and the organisation’s senior
management to engage in regular discussions with each other. Cooperating with other
levels of the organisation hierarchy and with those responsible for other areas of security
is recommended, but these instructions focus on providing senior management with tools
to direct information security work.
108
Subarea name
1.1.4. Reporting and communicating to stakeholders
Objectives
Communication and reporting responsibilities and the procedures with stakeholders are
specified so that the parties have the information necessary for cooperation, its development
and decision-making.
Base-level
requirements
1. The organisation identifies stakeholders and their liaison points to whom it is responsible
for information security.
2. Management has organised and assigned responsibilities for the reporting of information
security issues affecting stakeholders as well as the communication of information
security incidents.
Increased-level
additional
requirements
3. Information security issues are reported to stakeholders annually or in a manner
determined by management.
4. There must be a model template of the stakeholder report.
High-level
additional
requirements
5. If not otherwise agreed, the report includes indicators on conformance with requirements,
the achievement of information security objectives, incidents, measures undertaken as a
result of incidents, and other major information security changes.
6. Reporting is developed on the basis of stakeholder feedback.
Examples of good
practices
• For requirements 1 and 3: A service centre is responsible for the information security
of services to those who order services, and part of the service is a quarterly report which
has a section on information security.
• For requirement 2: An organisation that processes personal data of citizens has a model for
how any leaking of these data is to be communicated to stakeholders, including citizens.
Tools and models
Setting and measuring information security objectives (Tietoturvatavoitteiden
asettaminen ja mittaaminen, VAHTI 6/2006)
• Section 5.6: Example of reporting procedures and report contents
Management of information security incidents (Tietoturvapoikkeamatilanteiden
hallinta, VAHTI 3/2005)
• Section 2.2.6: Creating an incident communications plan
Observations
The purpose of this section is to encourage organisations to identify the parties to whom
information security issues should be reported, even if the party itself has not yet
independently requested this information. This promotes the information security of central
government as a whole.
109
Subarea name
1.1.5 Management in special situations
Objectives
Management of special situations is organised and taken into account in procedures.
Base-level
requirements
1. Processing of information security incidents is organised and responsibilities assigned.
2. Serious information security incidents are reported without delay to management and
a record is kept of them.
Increased-level
additional
requirements
3. The organisation has a written model for processing information security incidents. The
instruction has specified on a role level who will investigate what has happened on whose
orders and who will decide on official contacts (e.g. making a preliminary investigation
request) and on communication.
4. A follow-up analysis is made of information security incidents and the necessary corrective
measures initiated to prevent a repetition of the incident.
High-level
additional
requirements
5. An annual summary is made of perceived information security incidents.
6. Information on the incidents is exchanged with partners and partners’ experiences used.
Examples of good
practices
• For requirement 5: An annual trend analysis of information security incidents is made,
with the causes of problems itemised.
• For requirement 6: Cooperation is implemented in connection with benchmark
evaluations.
Tools and models
Management of information security incidents (Tietoturvapoikkeamatilanteiden
hallinta, VAHTI 3/2005)
• Section 2.2.4: Incident response organisation and powers
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
Observations
An information security incident is, according to VAHTI’s definition, an intentional or
unintentional state that has or may compromise the integrity, confidentiality or availability
of an organisation’s information or services.
110
Subarea name
1.1.6 Reporting to management
Objectives
Information on the implementation and costs of development activities is communicated
to the organisation’s management.
Base-level
requirements
1. Reporting of information security is organised and responsibilities assigned.
2. Information security issues are reported regularly to the organisation’s management.
Increased-level
additional
requirements
3. The reporting procedure has been outlined in writing.
4. Information security issues are reported to the organisation’s management at least
annually.
High-level
additional
requirements
5. Continuous reporting is based on specified operational indicators.
6. The report includes measurement data on use of resources, achievement of information
security objectives, incidents, measures undertaken as a result of incidents, and other
major information security changes.
Examples of good
practices
• For requirements 1 and 3: An organisation has a management-approved template for
an annual information security report. The information security officer is responsible
for creating the report.
Tools and models
Setting and measuring information security objectives (Tietoturvatavoitteiden
asettaminen ja mittaaminen, VAHTI 6/2006)
• Section 5.6: Example of reporting procedures and report contents
Observations
Management is responsible for an organisation’s activities. For management to make wellgrounded decisions on necessary risk management measures, it must receive information
about the adequacy and impact of measures already undertaken as well as possible problem
areas.
111
1.2 Requirements set for strategies and planning
Subarea name
1.2.1 Impact of operating environment
Objectives
The operating environment and its impact on activities are recognised.
Base-level requirements
1. Separate operating environments for the processing of information and the associated
systems and processes have been recognised.
2. The special requirements of each operating environment and the information security
objectives have been recognised.
Increased-level
additional requirements
3. Operating environments and associated systems have been documented.
4. Environment and system listings are reviewed and if necessary updated at least annually.
High-level
additional requirements
5. The life-cycle stages of environments have been documented and the document contains
criteria on when and how an environment moves from one stage to another.
6. The special information security requirements of each life-cycle stage have been specified
and documented.
Examples of good
practices
• For requirement 1: An organisation has a head office and regional unit. The regional unit
handles permit issues; other functions take place at the head office. Information systems
relating to permit issues have also been located in the regional unit’s premises.
• For requirements 1 and 2: An organisation has three separate environments for the same
information system, which is critical for the organisation activities: development, testing
and production environments, each of which has a separate user IAM policy.
• For requirement 5: An organisation changes its email system to another and in the
transition stage there are two email systems, the old one and the new one. The old system
is in the withdrawal stage of its life cycle, the new one is in production.
• For requirement 6: An organisation has made the decision that personal data contained
in test material in the testing stage of an information system should be scrambled.
Tools and models
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
• Section 1.3
ITIL and ISO/IEC20000.
Observations
It is important to recognise the degree of integration or fragmentation of one’s own operating
environment, be it operating premises, remote operating locations or information resources.
An organisation’s operating environment influences, via risk analysis, elements of information
security and it is particularly important also in terms of continuity and recovery planning.
When listing environments it is important to understand not only that they are physically
separate but also that they are at a different life cycle stage.
112
Subarea name
1.2.2 Specification of objectives
Objectives
Requirements for service continuity management, special situations and the protection
of information are based on the requirements of the organisation’s core functions.
Base-level requirements
1. The assets to be protected in respect of the information security of each core function
and process have been recognised and classified according to the required information
security level.
2. Information security objectives have also been incorporated into core functions and
processes.
Increased-level
additional
requirements
3. Confidentiality, integrity and availability have been taken into account in
the specification of information security objectives.
4. There are high-level descriptions of core functions and processes.
High-level
additional
requirements
5. Essential information security processes or measures have been incorporated into
function or process descriptions or they have been documented separately.
6. Performance indicators have been linked to operational information security objectives.
Examples of good
practices
• For requirement 1: In handling of benefit applications, personal data files consisting of
applicant information, the decision database and the information system facilitating
public electronic services have been specified as protected assets and they have been
classified according to the confidentiality of the information they contain.
• For requirement 2: Operational information security objectives have been specified in
each function’s own scorecards.
• For requirements 3 and 6: An individual security objective is that public electronic
services are accessible to citizens during 99.9% of official opening hours and that the
number of information security incidents in which citizens are able to see or change
each others’ information when using the service is zero on an annual level.
• For requirement 5: One of an organisation’s core functions is the transaction process.
The process describes how customer identities are checked, how transaction data are
stored and how information is protected if it is transferred to another public authority.
Tools and models
Setting and measurement of information security objectives (Tietoturvatavoitteiden
asettaminen ja mittaaminen, VAHTI 6/2006)
• Section 3: Information security performance management
• Section 4.4: Information security activity indicators
Description of processes (JHS 152)
• Annex 1: Process basic information form
• Annex 2: Table of functions
Observations
Information security targets are specified from the perspective of core functions.
The specification of the core function assets to be protected (i.e. information resources,
information systems, register etc.) and these assets’ information security requirements
constitute a significant background factor in the setting of information security objectives.
Some of the protected assets are common to the whole organisation (e.g. workstations,
telecommunications), but their importance varies for the operation of different key
processes.
When objectives are identified, a risk assessment is made in order to ascertain what risks
there are to the fulfilment of the objectives in the operating environment.
113
Subarea name
1.2.3 Developing operations through risk assessment
Objectives
The organisation ensures that the level of information security corresponds with the
organisation’s strategic objectives. Information security development takes into account
the information security threats and risks confronting the organisation. A regular risk
management procedure is in use.
Base-level requirements
1. The organisation regularly makes information security risk assessments.
2. Based on the risk assessment, information security is improved in terms of excessive
risks through measures decided by management.
Increased-level
additional
requirements
3. The organisation makes an assessment of core function information security risks
at least annually.
4. The organisation has a risk assessment procedure and instructions.
5. The organisation has a written information security plan, which specifies which
technical and administrative measures and processes are used in the organisation
to manage perceived information security risks.
High-level
additional
requirements
6. The organisation makes an assessment of information security risks also in connection
with major changes.
7. The organisation has a risk management policy.
8. A record is kept of the biggest risks on an organisational level and the implementation
of risk management measures is monitored.
Examples of good
practices
• For requirements 1 and 4: An organisation has agreed that the assessment of
information security risks is done in two parts. Firstly, individuals in positions of
responsibility in core functions make their own information security risk assessment
within their own function and thereafter the organisation holds a joint information
security assessment event at which common issues and risks highlighted at the
assessment event are discussed.
• For requirements 2 and 5: In a risk assessment, an accidental disclosure of non-public
information via portable data storage media was identified to carry a very high risk
to an organisation. The organisation decided to invest in user-friendly encryption
software and in staff training in order to reduce the risk to the desired level. The
information security plan was updated accordingly.
Tools and models
Instructions on risk assessment to promote information security in central government
(Ohje riskien arvioinnista tietoturvallisuuden edistämiseksi valtionhallinnossa, VAHTI
7/2003)
• Section 3.2: Model process for risk assessment
• Table 5, p. 47 – example of risk management plan
• Annex 2: Check lists for the recognition of information risks
Effective Information Security (VAHTI 5/2009)
• Information security plan framework, p. 88
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
• Chapter 6
ENISA, risk management procedures information portal
Observations
A risk analysis is made only when the operating environment and the objectives set for
operations by the core functions are known. Based on a risk analysis, the necessary
technical measures and information security management processes are planned to
ensure that the objectives set for information security are achieved and that risks remain
at an acceptable level in the operating environment. Selected measures and principles are
described or updated in the information security plan or other corresponding document.
114
Subarea name
1.2.4 Operating network management
Objectives
Continuity of services and protection of information in the partner network has been
planned and agreed.
Base-level
requirements
1. The organisation is aware of the operating networks in which it is involved and knows
which subcontractors and partners are working with its information and in which roles.
Increased-level
additional
requirements
2. The organisation has a written document which outlines its participation and role
in various subcontractor and cooperation networks as well as the general information
security requirements for participation.
High-level
additional
requirements
3. Operating networks are classified according to information security level and each class
has its own information security requirements.
4. Only service providers which have the capacity to protect the confidentiality of
documents and, if necessary, investigate violations of confidentiality in the manner
referred to in sections 13a-13k of the Act on the Protection of Privacy in Electronic
Communications (516/2004) may be selected as service providers.
Examples of good
practices
• For requirement 1: In connection with the specification of job descriptions, those
responsible for purchases maintain situation awareness of the operating network with
respect to subcontractors.
• For requirement 2: The information management strategy mentions that, when ICT
support functions are outsourced, subcontractors and partners must have at least the
same information security level as the organisation itself.
• For requirement 2: A service centre maintains a record of services ordered by each
customer organisation and of the information security levels they require.
Tools and models
Change and information security, from regionalisation to outsourcing – A controlled
process (Muutos ja tietoturvallisuus, alueellistamisesta ulkoistamiseen – hallittu
prosessi, VAHTI 7/2006)
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
• Chapter 5
Observations:
In this field, it is essential that an organisation recognises the subcontractor chains and
other cooperation networks in which it is involved and what this means for the information
processed in the networks. Operating networks can be reviewed in either a centralised or
decentralised manner according to whether decision-making on acquisitions and
cooperation is centralised or decentralised.
115
Subarea name
1.2.5 Special situations management
Objectives
Special situations management procedures have been planned, training given and exercises
held.
Special demands
for Finland
1. The organisation’s management is aware of the organisation’s responsibilities relating
to securing the functions vital to society (YTS).
Base-level
requirements
2. The organisation has a continuity plan or plans.
Increased-level
additional
requirements
3. The updating and review of continuity plans has been organised and responsibilities
assigned.
4. The functioning of continuity plans is tested and assessed regularly.
High-level
additional
requirements
5. Exercises are held with key partners on the functioning of continuity plans.
Examples of good
practices
• For requirement 2: Different continuity plans are tested in alternate years as table tests
or checklist tests.
• For requirement 4: An organisation arranges the testing of plans annually, simulating
a situation that poses a threat to continuity.
Tools and models
Effective Information Security (VAHTI 5/2009)
• Continuity plan framework, p. 76
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
Recommendations of the National Emergency Supply Agency
The Strategy for Securing the Functions Vital to Society, Government Resolution 2006
• Section 3.3: Strategic tasks of the ministries in securing the vital functions
• Annex 2: Preparedness for special situations
Observations
Continuity means the continuation of an organisation’s functions in the event of incidents.
Plans for the technical recovery of ICT systems from various incidents are discussed in
the item 2.12 “Recovery of information systems from incidents” below.
Work on requirements relating to securing functions vital to society as well as security
of supply is under way (VARE, HUOVI) and they will be specified separately.
116
1.3
Requirements set for people
Subarea name
1.3.1 Developing expertise and awareness, and sanctions
Objectives
Role- and task-specific requirements have been set for continuity management and
information protection expertise, its level is known, and it is developed.
The organisation encourages staff to observe and develop good continuity management
and information protection procedures.
The organisation has an agreed way of acting in the event of security incidents and cases
of misuse.
Special demands
for Finland
1. Technical supervision of employees is processed in accordance with the statutory
cooperation procedure (Act on the Protection of Privacy in Working Life, section 21).
Base-level
requirements
2. The organisation regularly arranges information security training for staff and other
interest groups. The expertise of information security staff is developed and maintained.
3. Information security issues are also discussed in the induction of staff.
4. All who work in the organisation are informed about amended information security
instructions and practices.
5. Compliance with rules is monitored and any failures to observe them are addressed.
Increased-level
additional
requirements
6.
7.
8.
9.
High-level
additional
requirements
12. Information security training takes into consideration changes and information security
incidents that have taken place in the organisation and its environment.
13. Positive attention is given to good information security work.
Examples of good
practices
• For requirement 2: An organisation arranges annually information security training
for staff as well as separate information security training for subcontractors. Information
security officer attends relevant seminars.
• For requirements 2 and 9: The information security policy outlines the consequences
of failure to comply with information security rules and instructions. Practical training
also mentions which issues must not be discussed outside the organisation.
• For requirement 8: The names of participants in information security training are listed
and the number of trained staff is monitored annually.
• For requirement 8: An organisation uses in its information security training a computerassisted training package that maintains a record of those who have completed training
and reminds those who have not yet attended a training course to register.
• For requirement 11: A regular information security survey of staff is conducted to
ascertain whether training has increased understanding and awareness.
• For requirement 13: Management or the information security manager praises individuals
and groups publicly for good work in taking information security into account.
The organisation has a written information security training plan.
Inductors have a written list of information security issues to be discussed.
The participation of staff in training is monitored.
The consequences of violating information security rules and instructions have been
described in the organisation and communicated to all employees.
10. Supervisor and subordinate have an annual discussion on the information security
responsibilities and on the need to develop expertise.
11. The information security expertise of staff is ascertained.
117
Tools and models
Information Security Instructions for Personnel (VAHTI 4/2009)
• Training Material (PowerPoint) (in Finnish)
Guide for information security trainers (Tietoturvakouluttajan opas, VAHTI 11/2006)
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
• Chapter 4
ENISA Information Security Awareness Guide
• Annexes 1–4, Information security awareness planning templates
• Annex 5: Citizens’ information security awareness survey sample
Online Safety School
Observations
The information security awareness of staff and a positive attitude towards information
security play a key role in preventing information security incidents arising from staff’s lack
of knowledge. Because information security can be perceived as a negative and complicating
issue , the influence of positive feedback should not be underestimated.
118
Subarea name
1.3.2 Management of human resources and tasks
Objectives
Staff and their roles have been planned and scaled in the manner required by the continuity
management and protection of information in an organisation’s core functions. Key roles and
key individuals have been specified and back-up arrangements planned.
Base-level
requirements
1. Information security measures and processes selected for implementation have been
organised and responsibilities assigned.
2. Key roles in information security have been specified and a deputy or deputies named
for them.
Increased-level
additional
requirements
3. There is a list of information security processes or measures selected for implementation
and of the individuals responsible for them.
4. The deputies to key information security staff have been trained in their tasks.
High-level
additional
requirements
5. The organisation has specified tasks or roles for which applicants must undergo
background checks, and the background check process is documented.
6. The organisation has carried out a survey of information security expertise.
Examples of good
practices
• For requirement 1: Firewall maintenance is perceived as a necessary information security
process and an owner and implementers is specified for it. An outsourcing partner is
selected as an implementer.
• For requirement 2: The information security manager has been confirmed in the
organisation as a key role and he or she has a named deputy. The information security
manager can be contacted by email via the role address [email protected]
([email protected]), and his or her deputy has access to this email
box to be able to review pending issues.
Tools and models
Personnel security as part of information security (Tärkein tekijä on ihminen henkilöstöturvallisuus osana tietoturvallisuutta, VAHTI 2/2008)
• Section 4.6.2: Background checks
• Annex 4: Agencies’ use of background check process
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
• Chapter 4
Observations
Information security measures and processes selected for implementation can arise in a
number of ways. Typically, new information security measures or processes to be
implemented arise as the result of the item “Developing operations through risk assessment”,
discussed above, and the item “Assessment and verification of operations” discussed below.
It is recommended that these items be documented in an information security plan.
Information security processes relating to information systems are discussed in section 2
below.
119
Subarea name
1.3.3 Actions in special situations
Objectives
Instructions for managing disruptions to critical functions have been prepared, training
given and exercises held
Special demands
for Finland
1. The confidentiality and correct processing of electronic messages, email, identification
information and geographic information are also addressed when information security
incidents are investigated (Act on the Protection of Privacy in Electronic Communications,
section 4 and 5; Act on the Protection of Privacy in Working Life, chapter 6).
Base-level
requirements
2. Staff knows where to report information security incidents and events or threats.
Increased level
additional
requirements
3. Staff who investigate information security incidents have been trained in their task.
High-level
additional
requirements
4. The organisation has a group trained in investigating information security incidents,
which holds regular exercises.
Examples of good
practices
• For requirement 1: An organisation has a written email policy, which takes into account
chapter 6 of the Act on the Protection of Privacy in Working Life.
Tools and models
CERT-FI instructions of the Finnish Communications Regulatory Authority
Management of information security incidents (Tietoturvapoikkeamatilanteiden
hallinta, VAHTI 3/2005)
Electronic Mail-handling Instruction for State Government, VAHTI 2/2006
• Annex 2: Email handling rules
• Annex 5: Model for email box opening form
Observations
Assignment of responsibilities and organisation of tasks in special situations belong to the
item “Management in special situations”, discussed in the management section above. Log
management of ICT systems is discussed in item 2.11 “Monitoring of information security
incidents” below.
Ensuring an organisation’s operational continuity is discussed in the item 1.2.5 “Special
situations management” above. ICT systems recovery planning is discussed in the item 2.12
“Recovery of information systems from incidents” below.
.
120
1.4 Requirements set for partnerships and resources
Subarea name
1.4.1 Contract management
Objectives
Contracts include requirements for operational continuity management, special situations
management and the protection of information as well as their implementation.
The management obligation concerning the continuity of critical operations and the
protection of information covers the entire supplier network
.
Base-level
requirements
1. Partnership and procurement activity is organised and responsibilities are assigned.
2. A written contract is concluded with each partner, specifying the information security
requirements of the cooperation or acquisition as well as how supervision, monitoring,
auditing and reporting of information security will take place.
Increased-level
additional
requirements
3. The necessary information security requirements are set for partners at the invitation to
tender or partnership negotiation stage.
4. The partnership contract specifies the information security level that the partner and any
possible subcontracting network should observe, taking the nature of the cooperation
into account.
High-level
additional
requirements
5. Before entering into a contract, the organisation audits the partner’s information security
procedures relating to the object of cooperation or asks for a written report on them.
6. The contract specifies the sanctions for information security incidents and violations.
Examples of good
practices
• For requirement 2: When contracts are prepared, a standard security annex, which also
covers information security issues, is used.
• For requirement 2: Selected partners have a framework agreement with the entire
administrative branch. If the framework agreement already has sufficient information
security requirements applying to the procurement object, a new information security
agreement does not need to be prepared.
• For requirement 3: The information security needs of the procurement object are taken
into account at the invitation to tender stage by making a risk analysis concerning the
procurement object and, based on this, information security requirements are specified
in the invitation to tender.
• For requirement 4: A base-level agency outsources information system maintenance to
an external organisation. The information system processes personal data, so the service
provider maintaining the information system must fulfil the high-level requirements
of this publication.
121
Tools and models
Personnel security as part of information security (Tärkein tekijä on ihminen
– henkilöstöturvallisuus osana tietoturvallisuutta, VAHTI 2/2008)
• Section 4.7: International personal security clearance
• Section 4.10: Security of purchased services
General Terms and Conditions of Government IT Procurement JIT 2007 (JHS 166)
• General Terms and Conditions, Chapter 27
• Model Contract for Application Procurement, Chapter 10
• Model Contract for Services, Chapters 7 and 11
• Model Contract for Consulting, Chapter 8
Change and information security, from regionalisation to outsourcing
– A controlled process (Muutos ja tietoturvallisuus, alueellistamisesta
ulkoistamiseen - hallittu prosessi, VAHTI 7/2006)
• Annexes 1A and 1B: Security contract models
• Annex 5: Personal data processing checklist
• Annex 6: Partner information security procedures checklist
National Emergency Supply Agency’s Sopiva project, Contract-based continuity and
preparedness requirements
Observations
The closer the object of a contract is to an organisation’s core activity, the better that
information security requirements included in invitations to tender or contracts can be based
on the results of the “Specification of objectives” and “Developing operations through risk
assessment” items, discussed above.
In the JIT 2007 model contract, information security has been taken into account on a fairly
general level. When using this, it is recommended that a separate information security annex
is prepared for each procurement object and that an opportunity to audit is required.
122
Subarea name
1.4.2 Securing operations in special situations
Objectives
Partners’ capability to manage disruptions and special situations has been specified and
verified.
Base-level
requirements
1. Monitoring of information security as well as recording and reporting of incidents
has been organised and responsibilities assigned concerning the cooperation.
2. Perceived information security incidents relating to partners are reported to them
immediately and corrective measures initiated as agreed.
Increased-level
additional
requirements
3. Written guidelines are available on the handling of information security incidents
with partners.
4. A written report is prepared on incidents and their causes.
5. Organisation-specific continuity exercises are held regularly.
High-level
additional
requirements
6. Exercises on cooperation in special situations are held with partners.
7. Information on the causes of incidents is used to improve contracts and operations.
Examples of good
practices
• For requirement 2: A service level agreement is concluded with a subcontractor, specifying that incidents are communicated by telephone to a contact person and corrective
measures are initiated within an agreed time.
• For requirement 7: A subcontractor mistakenly connected a test service to the internet.
The confidentiality of the test system and material was not originally taken into account
in the contract, and so this was added to the contract.
Tools and models
Management of information security incidents (Tietoturvapoikkeamatilanteiden
hallinta, VAHTI 3/2005)
• Section 2.2.5: Incident exercises
General instructions on ICT contingency planning (ICT-toiminnan varautuminen
häiriö- ja erityistilanteisiin, VAHTI 2/2009)
Observations
The responsibilities of each party in a joint information security incident should be agreed,
because they may differ from the organisations’ internal operating models. It is worth
noting that a major disruption in service may also be an incident.
123
1.5
Requirements set for processes
Subarea name
1.5.1 Information resources management
Objectives
The security of documentary and other information material is maintained throughout its
life cycle. Information resources are handled in the organisation in accordance with the law
and good administrative practice.
Special demands
for Finland
1. The organisation has an archive formation plan (Archives Act, section 8), which is often
also called an information management plan.
2. The organisation keeps an index of any matters submitted and taken up for consideration
and any matters considered and decided (Openness Act, section 18).
Base-level
requirements
3. Employees know how information is processed in the organisation.
4. Every written document produced by the organisation contains an indication of
who has prepared it, when it was prepared and what its status of approval is.
5. Documents intended for destruction are destroyed so that confidentiality and data
protection are ensured.
Increased-level
additional
requirements
6. The organisation has written instructions on the processing of information, describing
how documents are approved and reviewed and which material is secret or subject to
some other non-disclosure obligation.
High-level
additional
requirements
7. The information management tools used by the organisation support the classification
and archiving of information.
Examples of good
practices
• For requirement 3: Induction highlights the basic issues in the processing of documents.
• For requirement 4: The organisation’s document template has designated places for the
names of the author and the approver, dates, and an explanation of any changes made.
Tools and models
Instructions for information security in case management
(Asianhallinnan tietoturvallisuutta koskeva ohje, VAHTI 5/2006)
• Section 9: Case management information security checklist
National Archives Service, Archive Formation Plan Guide
Instructions and models of the National Archives Service
Logging instructions (Lokiohje, VAHTI 3/2009)
Observations
The requirements of the item “Special demands for Finland” do not need to be implemented
in private sector organisations.
124
1.6
Requirements set for the measurement
Subarea name
1.6.1 Assessment and verification of operations
Objectives
The state of information security management in the organisation is monitored to ensure
that it serves the organisation’s core functions.
Base-level
requirements
1.
2.
3.
4.
Increased-level
additional
requirements
5. Information security audits or assessments are carried out every year.
6. The organisation has a written audit or assessment process approved by management,
which specifies, for example, the qualifications for the auditors or assessors.
7. Based on the report, the owner of the function or asset specifies and assigns responsibility
for the improvement measures by which perceived risks are reduced to an acceptable level.
High-level
additional
requirements
8. Audits or assessments thoroughly review the organisation’s core functions over a
five-year period.
9. External resources are also used in information security audits or assessments.
Examples of good
practices
• For requirement 1: An organisation may follow its own donut dial.
• For requirement 1: A party (e.g. internal auditing) decided by an organisation makes an
overall assessment of information security using, for example, the VAHTI 8/2006 instruction.
• For requirements 1-2: The management of an organisation has approved principles
according to which units assess the information security of their own activities every
other year and report on the results.
• For requirement 7: An organisation has created an audit plan according to which IAM
processes are audited in 2010, information security requirements for all outsourcing
and service level agreements are audited in 2011, and public electronic services processes
and information systems are audited in 2012.
Tools and models
See all VAHTI instructions www.vm.fi/vahti and particularly
Assessment of information security in central government
(Tietoturvallisuuden arviointi valtionhallinnossa, VAHTI 8/2006)
• Administrative security RTF assessment template
• Personnel security RTF assessment template
• Physical security RTF assessment template
• Telecommunications security RTF assessment template
• Software security RTF assessment template
• Hardware security RTF assessment template
• Information resources security RTF assessment template
• Operational security RTF assessment template
• Continuity planning RTF assessment template
• Contingency planning RTF assessment template
• Outsourcing RTF assessment template
CAF assessment model www.vm.fi/caf/
The State Treasury’s VIP audit experts are available for assessments www.statetreasury.fi/ttt
Observations
In audits and assessments, information security and its management should be considered
as an entity that serves the requirements of core functions. These can be implemented, for
example, by performing various technical information security audits and self-assessments.
A public authority can verify the information security level of its systems by using auditing
services in which the level of the authority’s information security measures is assessed
in relation to the Decree on Information Security and these instructions or, if the processing
of EU documents is involved, with reference to EU security rules.
It is essential for information security that the results of assessments and audits are
discussed and operations improved based on them.
Regular information security audits or assessments are carried out in the organisation.
Audits or assessments are planned and then approved by management.
The results of audits or assessments are reported to the owner of the function or asset.
A record of audit or assessment recommendations is kept on an organisation level and
implementation of improvement measures monitored.
125
2
Requirements for the management of information systems
2.1
Reporting to the information security officer
Subarea name
2.1 Reporting to the information security officer
Objectives
The information security officer receives information about the state of information security
for reporting to management and for assessing the sufficiency and effectiveness of information security mechanisms and processes.
Base-level
requirements
1. Regular reporting to the information security officer on the state of IT systems’
information security and their management has been organised and responsibilities
assigned.
2. Serious information security incidents are reported to the information security officer
without delay.
Increased-level
additional
requirements
3. Reporting is in writing.
High-level
additional
requirements
4. Reporting is based on agreed information security objectives and their indicators.
Practical examples
• For requirement 1: The information security manager attends each month a meeting with
information management staff at which any information security measures and updates
made as well as new perceived threats and risks are discussed.
• For requirement 1: An organisation has outsourced IT systems maintenance to two
different subcontractors. Service level agreements outline how a subcontractor reports
on the information security situation to the person responsible for the service. The person
responsible for the service then reports to the information security manager.
Tools and models
Setting and measuring information security objectives
(Tietoturvatavoitteiden asettaminen ja mittaaminen, VAHTI 6/2006)
• Section 5.6: Example of reporting procedures and report contents
Observations
Information must travel from the practical level upwards. On the base level, oral reporting
is sufficient, but email or other written means are better.
126
2.2
Asset management
Subarea name
2.2 Asset management
Objectives
The equipment, software and data files for which the organisation is responsible, as well
as the information systems consisting of them, have been recognised so that their security
can be ensured.
Special demands
for Finland
1. In respect of personal data files owned by the organisation, there is a data file system
description in accordance with section 10 of the Personal Data Act, and it is available for
data subjects to view.
2. There is an information system description in accordance with section 18 of the Openness
Act for each information system.
Base-level
requirements
3. The organisation has directories of the physical or virtual equipment, information systems,
services, software and licences owned or used by the organisation.
4. Ownership of equipment, data files and information systems has been organised and
responsibilities assigned.
5. The updating of equipment, information system, service and software directories
and their statutory descriptions has been organised and responsibilities assigned.
Increased-level
additional
requirements
6. The owner has documented the information content of equipment, information systems
and data files.
7. The owner has classified assets in accordance with the required information security levels.
8. Owners regularly review the content of equipment, information system, service and
software directories and their statutory descriptions.
High-level
additional
requirements
-
Practical examples
• For requirement 1: The user data file description of an organisation’s electronic public
service is available for viewing on the internet.
• For requirement 3: An organisation has acquired for its use virtual servers from a service
provider. Accounting for the virtual servers is accordingly obtained from the service
provider.
• For requirement 4: An organisation’s case management system is owned by the
administration unit and network infrastructure by the information management unit.
Units appoint the individuals to whom an ownership role belongs.
• For requirement 5: When a new workstation is taken into use, the workstation support is
to record the device and its information in an Excel table that serves as the workstation
device directory.
• For requirement 7: An organisation has two information systems: a travel management
system with an increased information security level and an electronic public services
system with a high information security level. Behind both systems are databases
operating on the same physical server due to appropriate use of resources.
The information security level of the database server must accordingly be high.
• For requirement 7: Information systems have been classified both according to information
security level and according to how essential they are for the organisation’s activities.
Tools and models
Personal data file system description RTF form template, www.tietosuoja.fi
Information system description RTF form template, www.tietosuoja.fi
Observations
It is essential to recognise the technical assets to be protected. The items “Specification of
objectives” and “Impact of operating environment”, in section 1 of Annex 5 above, discussed
the same issue from the perspective of an organisation’s main functions. This item goes
deeper into ICT aspects, because the perspective of main functions alone is not sufficiently
specific in terms of overall information security.
In addition to the recognition of assets to be protected, they must have an owner who has
the right to make practical decisions relating to them (e.g. risk level, introduction, removal
and installation changes). The owner may be an organisational unit; within the unit the
holders of the ownership roles should also be specified.
127
2.3
Introduction and removal of information processing environments
Subarea name
2.3 Introduction and removal of information processing environments
Objectives
Information processing environments, mainly information systems and workstations, are
taken into and removed from use securely in accordance with their life-cycle management
process.
Base-level
requirements
1. The information security requirements of a system’s information content are taken into
account in the installation of information systems and workstations and in their removal
from use.
2. Measures relating to the introduction of information systems and workstations and their
removal from use have been organised and responsibilities assigned.
Increased-level
additional
requirements
3. There are written guidelines for the first installation of information systems and workstations and their removal from use. They specify, for example, the information security
settings to be used at different security levels as well as the procedures for the handling
of equipment and the erasure of mass storage media when they are transferred from one
environment to another or when they are removed from the organisation’s control.
4. The updating of instructions has been organised and responsibilities assigned.
High-level
additional
requirements
5. High information security level information systems and workstations are hardened.
6. Information systems and workstations are maintained so that the information on mass
storage media is not disclosed to external parties.
Practical examples
• For requirements 1 and 3: An organisation has acquired workstations from an external
service provider, which is responsible for first installations and removal from use in
accordance with technical instructions specified in the information security annex of
the contract.
• For requirements 2-3: An organisation which has outsourced operating services has
prepared information system installation instructions with the subcontractor. They
outline how different information system platforms are installed by default and which
information security features are used in different information security level systems,
for example concerning logs, passwords and available services.
• For requirement 5: An organisation has agreed that the information security settings
of the Solaris operating system will be hardened using the Solaris security toolkit,
and Windows Server 2003 systems by using a Group Policy prepared on the basis of
CIS instructions.
Tools and models
Securing the central government’s key information systems (Valtionhallinnon keskeisten
tietojärjestelmien turvaaminen, VAHTI 5/2004)
• Chapter 12: Operational security
General instructions on protection against malware (Haittaohjelmilta suojautumisen
yleisohje, VAHTI 3/2004)
• Section 5.1: Workstation security settings
NIST maintenance and configuration instructions for technical systems
NIST information security checklists for technical systems
Center for Internet Security: hardening guidelines for different systems
• The guidelines are free but require registration.
Darik’s Boot and Nuke, free hard disk erasure program.
Observations
A careful basic installation which takes information security into account is a cornerstone
of the systems’ technical information security. Maintenance is facilitated by the systems
being as similar as possible. Hardening is recommended in high information security level
systems, which means that default settings affecting information security are tightened.
Hardening guidelines are available for various operating systems, databases and routers
from the USA’s NIST and CIS.
To prevent information leaks, measures should also be put in place to ensure that hard disks
of equipment removed from use are overwritten or reliably destroyed before their removal
from an organisation’s possession.
128
2.4
Updating of information processing environments and change management
Subarea name
2.4 Updating and change management of information processing
environments
Objectives
Information processing environments are updated in an orderly manner to prevent
information security problems and the exploitation of vulnerabilities.
Base-level
requirements
1. Monitoring the need for equipment and information system updates, making update
decisions and installing updates has been organised and responsibilities assigned,
particularly for information security updates.
2. Assessing whether equipment and information systems need to be updated, deciding
about them and implementing the updates have been organised and responsibilities
assigned.
3. The organisation has principles that outline which updates or changes are installed
immediately and which updates and changes require assessment that takes the risk
level into account.
Increased-level
additional
requirements
4. Non-urgent updates or changes are only made at a time agreed in advance
(‘maintenance window’) based on the update or change management principles.
5. Only programs and equipment approved by the system owner can be installed in or
connected to an information system.
6. The organisation’s update and change principles are in writing.
High-level
additional
requirements
7. The currency and success of updates is measured and monitored.
8. Updates and changes are tested before they are taken into production.
9. Organisation staff participate in information security cooperation groups.
Practical examples
• For requirements 1-3: An organisation has taken into use ITIL Change Management
process.
• For requirement 1: Workstation support has been assigned responsibility for monitoring
the information security situation of the Windows XP and Office environments.
Responsibility for monitoring the updates of an organisation’s Linux and Apache
environments has been assigned to a server maintenance group. Server update decisions
are made by the operations manager, and workstations are updated automatically.
• For requirement 2: An organisation has a standard installation for workstations.
In addition, it has been agreed that, with the supervisor’s permission, certain additional
applications can be installed on workstations.
• For requirement 4: An ICT service organisation has a maintenance window each Thursday
evening from 7–9 p.m. when necessary updates can be installed and changes made
without disrupting production too much.
• For requirement 7: Workstation support uses software that can be used to monitor in
what percentage of an organisation’s workstations a certain update has been made.
• For requirement 9: An organisation monitors the CERT-FI mailing list and participates
in joint meetings of central government’s information security staff.
129
Tools and models
Securing the central government’s key information systems (Valtionhallinnon keskeisten
tietojärjestelmien turvaaminen, VAHTI 5/2004)
• Section 12.4: Change management
Management of information security incidents (Tietoturvapoikkeamatilanteiden hallinta,
VAHTI 3/2005)
• Section 2.1.8. Secure maintenance of information systems
General instructions on protection against malware (Haittaohjelmilta suojautumisen
yleisohje, VAHTI 3/2004)
• Section 5.2: Software vulnerabilities and corrective updates
Observations
According to item 2.3 above technical information security is based on a standard
installation that takes information security into account. The level of information security
level deteriorates rapidly, however, if changes are made to an operating system or software
in a disorderly manner or information security updates are not installed at all.
Organisations have various kinds of information systems. Some systems are more susceptible
to attacks than others, due to their location, for example. In some systems the updating
is very simple, and in others rather challenging, due to accessibility requirements or lack
of software supplier support, for example. It is essential that challenging systems have
been recognised and consideration given to the way in which updates, particularly critical
information security updates, are made. If updating is not possible, the owner should
consider what other measures can be employed to reduce risk.
Development of information systems and applications is discussed in the item “Management
of information system development and application maintenance” below.
130
2.5
Formation of secure areas and filtering between them
Subarea name
2.5 Formation of secure areas and filtering between them
Objectives
Transferring information from one network to another requires authorisation.
Base-level
requirements
1. The organisation has recognised and separated the parts of an information network that
require different protection levels, and restricts and filters traffic between networks of
different protection levels.
2. Adding, changing and removing rules on firewalls and other telecommunications devices
is organised and responsibilities assigned.
3. Rules of firewalls or other filtering devices have been documented.
4. Incoming traffic from a public network is restricted and filtered on the principle “all traffic
is prohibited unless separately permitted”. Outgoing traffic is also filtered.
5. The organisation has a remote access policy.
Increased-level
additional
requirements
6. The organisation has a written firewall and traffic filtering policy and the updating
of rules process is documented.
7. The currency of firewall and other filtering device rules are regularly reviewed.
8. Only equipment approved by the network owner can be connected to information networks.
9. The remote access policy is in writing. The policy specifies which equipment and networks
are approved for accessing and which systems can be used and maintained.
High-level
additional
requirements
10.Networks are monitored for information security incidents and breaches, and perceived
incidents are addressed.
Practical examples
• For requirement 1: An organisation has differentiated three logically separate information
network segments: a semi-trusted network (DMZ) containing public services, a workstation network containing workstations and a server network containing storage and
servers, which have been isolated with a firewall.
• For requirement 2: An organisation has agreed that only the information security manager
can request a telecommunications service provider to change the public network firewall.
• For requirement 3: In the firewall management user interface, every opening rule contains
a comment field in which the maker of the opening request, the reason for the request and
its validity are entered of.
• For requirement 8: The permission of the network owner must always be requested
to connect a new server. The owner of a WLAN visitor network has given permission to
visitors to connect their computers to the network.
• For requirement 10: An IDS/IPS system is used in a high protection level information
network to detect and prevent information security breaches.
Tools and models
Instructions on internet information security in government information management
(Valtion tietohallinnon internet-tietoturvallisuusohje, VAHTI 1/2003)
• Section 3.2: Connection to internet
Secure remote access from insecure networks (Turvallinen etäkäyttö turvattomista
verkoista, VAHTI 2/2003)
General instructions on protection against malware (Haittaohjelmilta suojautumisen
yleisohje, VAHTI 3/2004)
• Section 5.4: Protecting an organisation network
• Section 5.5: Work outside the organisation
Observations
After the introduction of the central government’s shared telecommunications network,
most of the requirements relating to external connections are automatically fulfilled in the
network’s user organisations.
Operational separation of networks and traffic filtering are essential in preventing threats
coming from networks. Technically this is fairly simple, but the management of firewalls
and their filtering rules is a very common problem. Particularly when outsourcing, it must
be agreed very clearly who can make changes, on the basis of what information changes
can be made, and who has responsibility for different parts of the maintenance process.
For example, the service provider cannot approve a change, but can perform a technical
check and implementation.
131
2.6
Access control
Subarea name
2.6 Access control
Objectives
Access to information only by authorised users.
Base-level
requirements
1. The information system owner approves the reliability of the identity and the strength
of the identification required to access information contained by the system.
2. Both successful and unsuccessful log-ins are recorded in a log file, so that the system
log-ins of an individual user can be ascertained and reliably linked to his or her identity.
3. Use of weak passwords is prevented.
Increased-level
additional
requirements
4. The organisation has a written access control policy, which specifies, among other things,
the technical identification methods acceptable at different security levels,
user ID locking and opening principles, and quality requirements and change principles
for passwords and other identifiers.
5. Access control logs are stored so that they cannot be modified later.
6. Too many unsuccessful authentications in succession to the most important systems
or services lock the user ID in question.
High-level
additional
requirements
7. There are written instructions on the granting, use and renewal of certificates and
an up-to-date list of the certificates in use.
8. In high-level systems, access control logs and audit trails are also produced for actions
within a system in accordance with operational requirements.
9. Statistics are maintained on instances of unsuccessful authentication as well as
attempted actions that fail due to lack of authorisation.
Practical examples
• For requirement 1: Based on risk analysis, an organisation has found that authentication
is not needed for use of a WLAN visitor network, because no access to protected
information on the organisation’s internal network is technically possible; a user ID/
password combination is sufficient for use of workstations; authentication with a smart
card is needed to access the organisation’s human resources and payroll system.
• For requirement 1: An organisation has a systems priority classification approved by
systems owners determining the strength of authentication required.
• For requirement 1: Different authentication methods have been specified for an
organisation’s network services in accordance with VAHTI 12/2006 instructions. Systems’
owners approve proposals presented by information management if they are in line with
the requirements of the information contained in the systems.
• For requirement 3: The organisation has issued written instructions on good password
practice, including the minimum length of passwords. Quality checking of passwords has
been introduced in systems where it is possible.
• For requirement 8: A health information system logs any viewing of a patient record;
if necessary, the viewer’s need for information and access to it can be traced.
Tools and models
Principles and good practices of identity and access management (Käyttövaltuushallinnon
periaatteet ja hyvät käytännöt, VAHTI 9/2006).
Identification in public administration network services (Tunnistaminen julkishallinnon
verkkopalveluissa, VAHTI 12/2006)
• Sections 4.2−4.3: Reliability of user identification and Reliability of user identification
required by service types.
Personnel security as part of information security (Tärkein tekijä on ihminen – henkilöstöturvallisuus osana tietoturvallisuutta, VAHTI 2/2008)
• Section 4.12: Access management and identification
Observations
Access control is one of the most important practical information security measures. It is
an advantage for an organisation to have standardised principles for authentication and the
logging of access control data, but system-specific principles are also acceptable when, for
example, a jointly agreed way cannot be implemented for technical reasons. It is probable
that a unit that serves as a system owner does not have the necessary expertise to make
concrete technical procedure decisions. Accordingly, IT experts present options and their
risk levels and the owner approves the most suitable option. A user’s first registration as
a user of an organisation’s systems and the granting of access authorisations is discussed
in item 2.7 below.
132
2.7
Identity and access management
Subarea name
2.7 Identity and access management
Objectives
User IDs and access rights can be connected to the individuals that use them.
Base-level
requirements
1. The organisation has agreed identity and access management (IAM) principles.
The granting, changing and removal of user IDs and authorisations has been organised
and responsibilities assigned in accordance with these principles.
2. Access rights are personal or role-specific.
3. Access rights are based on an employment relationship or other written contract, and use
of systems is prevented technically without undue delay after the justification for access
expires.
4. The access rights of individual users can be ascertained.
5. When a new staff member joins the organisation, the first identification is made from
photographic proof of identity or, for an electronic service, using a similar level of
authentication.
Increased-level
additional
requirements
6. The organisation has a written IAM policy and management process.
7. Every access right has an owner.
8. System access rights are reviewed at least once per year, and unnecessary user IDs,
roles and authorisations are closed or removed.
9. The granting process leaves a record of the grounds on which a user was granted an
access right.
10.Prohibited task- and role-combinations have been documented, and when authorisations
are granted or changed the creation of prohibited combinations is monitored and
prevented.
High-level
additional
requirements
11.The number of maintenance and administrator authorisations is monitored and statistics
are kept.
12.Time devoted to the removal of access authorisations is monitored and statistics are kept.
13.The organisation has a documented procedure for the immediate removal or suspension
of user IDs or access rights.
Practical examples
• For requirement 1: An organisation has agreed that all individuals in a public service or
employment relationship automatically receive a user ID for a workstation; user IDs for
applications or servers are given only when a supervisor considers this necessary for their tasks.
• For requirement 2: Workstation user IDs connected to the Virtu trust network are personal.
• For requirement 3: A large organisation operates an automated identity management
system, which is used, among other things, to delete an individual’s user IDs immediately
when the individual’s employment or public service relationship ends.
• For requirement 5: The identity of a potential employee is checked at the interview stage
from photographic proof of identity. In electronic public services, users can register with
bank identity codes.
• For requirement 7: An organisation has agreed that a system owner also owns the
authorisations made for that system, whether they are personal or role-specific or
between technical systems.
Tools and models
Principles and good practices of identity and access management (Käyttövaltuushallinnon
periaatteet ja hyvät käytännöt, VAHTI 9/2006).
• Section 2.2: Access authorisation register planning requirement.
• Chapter 3: Creating preconditions for good access authorisation management.
Personnel security as part of information security (Tärkein tekijä on ihminen – henkilöstöturvallisuus osana tietoturvallisuutta, VAHTI 2/2008)
• Section 4.5: Authorisation
Observations
In an organisation, it would be advantageous for all systems to be covered by the IAM
policy and process, but if this is not possible then principles and processes should be made
specific to each information security level. System-specific implementations should be
avoided, because their maintenance and deployment consume more resources than standard
principles. Most of the measures mentioned here are not in the operating area of the
IT department; they should be part of the processes of staff administration.
133
2.8
Malware protection
Subarea name
2.8 Malware protection
Objectives
The organisation’s information assets are protected from damage caused by malware
(viruses, spyware, back doors etc.).
Base-level
requirements
1. The organisation filters malware both at the workstation level and at all email and WWW
traffic entry and exit points.
2. Malware descriptions are updated regularly and automatically.
Increased-level
additional
requirements
3. Users are advised how to identify email that disseminates malware and what to do when
they suspect malware is present.
4. The currency of malware descriptions is monitored.
High-level
additional
requirements
5. A workstation must not be connected to high information security level networks, unless
it has been ascertained that it is free of malware.
6. The coverage of malware filtering is measured and monitored.
Practical examples
• For requirement 1: Based on risk analysis, an organisation has found that at the
workstation level malware protection is needed only in Windows-based workstations
and in smartphones in which the organisation’s email and calendar services are in use. In
addition, a malware filter is installed in the email server and in the WWW proxy server.
Tools and models
General instructions on protection against malware (Haittaohjelmilta suojautumisen
yleisohje, VAHTI 3/2004)
• Chapter 5: How to avoid infection
• Annex 3: User’s quick guide
ISO/IEC27002 standard
• Sections 10.4 and 10.6
Observations
Malware spreads in a number of different ways; email and WWW pages are the most typical
but certainly not the only channels. Increasing malware filtering to WWW connection points
may require additional financial investment, but will probably reduce the amount of work
arising from malware removal.
Recognition and blocking of tailored malware attacks is technically difficult. For this reason,
raising user awareness of the problem is very important.
134
2.9
Protection of physical environment
Subarea name
2.9 Protection of physical environment
Objectives
Realisation of information security risks is also prevented by using suitable physical security
procedures.
Base-level
requirements
1. The organisation has recognised the protection class required for its own premises and
differentiated the parts requiring a different protection class by restricting movement
between premises.
2. The organisation has agreed on a personal and role level who can access IT equipment
premises, and access control has been organised accordingly.
Increased-level
additional
requirements
3. The differentiation of premises into protection classes has been documented.
4. The locations of telecommunications equipment, connections and connection points
have been taken into account in protection classification.
High-level
additional
requirements
5. Premises and movement in them is monitored and the monitoring procedure is
documented.
6. Outsiders’ activity in computer rooms is monitored.
Practical examples
• For requirements 1 and 4: An internal network telecommunications socket was removed
from sauna facilities used by an organisation, because they were also hired to outsiders.
Tools and models
Recommendation on premises security in central government (VM 1/01/1999)
Effective Information Security (VAHTI 5/2009)
• Section 12.2: Classification of facilities.
Security recommendation for ICT premises (Tietoteknisten laitetilojen turvallisuussuositus,
VAHTI 1/2002)
• Chapter 3: Information security measures for IT equipment premises by subarea.
Personnel security as part of information security (Tärkein tekijä on ihminen – henkilöstöturvallisuus osana tietoturvallisuutta, VAHTI 2/2008)
• Annex 5: Implementation of access management in accordance with EU regulations
Protective construction requirements
• S1-S3, Internal Security Programme STOII
Observations
In physical security, this corresponds to information network differentiation.
135
2.10
Back-up management
Subarea name
2.10 Back-up management
Objectives
Uncontrolled loss of information from the organisation is prevented, and the impact of
various disruptions on the organisation’s activities is reduced.
Base-level
requirements
1. The making of back-up copies in the organisation has been organised and responsibilities
assigned.
2. The organisation has recognised the essential assets to be protected by back-up copying
to be made according to a plan. The restoration of back-up copies has also been planned.
Increased-level
additional
requirements
3. The organisation has a back-up policy and process, which have been prepared taking
operational requirements into account and which provide instructions on the handling
of back-up and safe copies during transfer and storage.
4. The organisation makes safe copies of the most important systems and they and the
original back-up copies are stored in different premises.
High-level
additional
requirements
5. The restoration of different systems’ back-up copies is tested regularly.
6. Statistics are kept on the amount of information restored from back-up copies and
the reasons for restoration.
Practical examples
• For requirement 2: An organisation for which telecommunications infrastructure is
a critical protected item also makes back-up copies of the configurations of routers
and other active network devices.
• For requirement 3: A full back-up of a high-level information system is made every
week, and a back-up of altered information is made every night, because a system
requirement is the capability to return to the previous day’s situation after a malfunction.
An unencrypted safe copy of a system can be transferred to another building only when
accompanied by an organisation employee.
• For requirement 5: Every six months, a test is made of the restoration of some back-up
volume to a test system.
Tools and models
The Finnish Pension Alliance (TELA) insurance industry recommendation
• making safe copies
Observations
Back-up copying policies may be system-specific.
A safe copy means a full back-up of a system and is intended for long-term storage.
When planning back-up copying, it is important to decide what will be back-up copied and
how often (database, software with settings, operating system). In addition, time limits
of continuity and recovery plans should be taken into account.
Ensuring an organisation’s operational continuity is discussed in the item 1.2.5 “Special
situations management” above. ICT systems recovery planning is discussed in the item 2.12
“Recovery of information systems from disruptions” below.
136
2.11
Monitoring of information security incidents
Subarea name
2.11 Monitoring of information security incidents
Objectives
Information security incidents can be detected and investigated.
Special demands for
Finland
1. The confidentiality and correct processing of electronic messages, identification data
and location data are also addressed in the processing of log data (Act on the Protection
of Privacy in Electronic Communications, sections 4 and 5).
Base-level requirements
2. Equipment, software and information systems make sufficient logs and audit trails
of their activities.
Increased-level
additional requirements
3. The organisation has a written log collection, alert and monitoring policy, which has
been prepared taking operational requirements into account.
High-level
additional requirements
4. On the basis of log monitoring, a situation picture is formulated, information security
incidents detected and operations developed.
Practical examples
• For requirements 2 and 3: In an organisation, all equipment and information
systems write their logs into a centralised log server, which maintenance staff
can use, if necessary, to investigate the causes of malfunctions and information
security incidents.
Tools and models
Instructions for information security in case management
(Asianhallinnan tietoturvallisuutta koskeva ohje, VAHTI 5/2006)
• Chapter 5: Log and change history data.
Logging instructions (Lokiohje, VAHTI 3/2009)
ISO/IEC 27002
• Section 10.10: Monitoring
Observations
The item 2.2 “Asset management” above covers the equipment, software and systems
that an organisation has. Concrete log instructions may be system- or platform-specific,
but the organisation should have general principles on what is logged, where and for how
long; the kinds of signals that trigger an immediate alert to maintenance staff should also
be specified. The automation of log monitoring saves staff costs.
Requirements relating to the handling of information security incidents have also been
outlined in the items 1.1.5 “Management in special situations” and 1.3.3 “Actions in special
situations” above.
137
2.12
Recovery of information systems from disruptions
Subarea name
2.12 Recovery of information systems from disruptions
Objectives
Contingency plans are prepared for disruptions encountered by ICT systems,
to ensure that the systems recover sufficiently quickly from such disruptions.
Special demands
for Finland
1. ICT system owners know their responsibilities in respect of ICT contingency planning,
and operations have been organised and responsibilities assigned accordingly.
Base-level
requirements
2. The investigation of ICT system disruptions and recovery from them has been organised
and responsibilities assigned.
3. The organisation has a general recovery strategy and plan for disruptions to its own
most important systems, including a management-approved order of importance
for ICT services.
Increased-level
additional
requirements
4. The organisation has written recovery plans for its most important systems.
High-level
additional
requirements
5. A record is kept of system disruptions and their causes. This information is used in risk
analyses and service level agreements.
Practical examples
• For requirement 2: In an organisation, the information management operations
manager is responsible for the smooth operation of ICT services. The operations manager
has appointed for each ICT service a technical officer to initiate measures in accordance
with the recovery plan if necessary.
• For requirement 3: As a general recovery strategy, an organisation has selected the
outsourcing of services and sufficient service level agreements. Recovery plan
preparation is thus the responsibility of the service provider.
• For requirement 4: An organisation has selected the use of back-up equipment as a
general ICT services recovery strategy. As a result the organisation has plans concerning
the transfer of the most important services to the back-up equipment if the situation
so demands.
Tools and models
Effective Information Security (VAHTI 5/2009)
• Recovery plan framework p. 77
Securing the central government’s key information systems
(Valtionhallinnon keskeisten tietojärjestelmien turvaaminen, VAHTI 5/2004)
• Sections 4.3, 5.7 and 10.6: Special characteristics of the recovery of different systems
Preliminary study of ICT contingency planning in central government
Tools to continuity management prepared by the National Emergency Supply Agency
Observations
Securing the continuity of organisations’ core processes and operations is discussed in
the item 1.2.5 “Special situations management” above. Here, only the recovery of ICT
systems from various disruptions and problems is addressed.
138
2.13
Management of information system development and application maintenance
Subarea name
2.13 Management of information system development and
application maintenance
Objectives
The correspondence of developed and maintained information systems with the desired
information security level is ensured, irrespective of the system development method
(e.g. commercial off-the-shelf, customised or the result of own development).
Base-level
requirements
1. The system owner approves the information security level which the system will follow
when ready or after changes.
2. A risk analysis is carried out to identify the system’s information security requirements
for an invitation to tender, requirement specification or project plan for the installation
of a new version.
3. Functionality tests are performed before the system is taken into production.
Increased-level
additional
requirements
4. The procuring organisation has an information system architecture policy containing
information security requirements which procured and developed systems must fulfil.
5. If the organisation procures customised information systems or develops them itself,
it has a documented development process, and information security has been taken into
account in its various stages.
6. As part of a procurement or development project, a written security plan and users’
manual is prepared for each system, specifying how the system is protected in production
and the nature of the information security measures required of users.
7. The information security of system specifications and implementations has been audited.
High-level
additional
requirements
8. The information security officer checks each system’s information security description
or plan(s).
9. During development or customisation work, information security reviews of critical
elements are arranged and minutes kept of these reviews.
Practical examples
• For requirement 1: An organisation has a systems priority classification approved
by systems owners, on the basis of which the required information security level is
determined.
• For requirement 2: In addition to a risk analysis, the contents of section 10.3 of VAHTI
instructions 5/2004 are used as a checklist in preparing information security requirements
for acquired software.
• For requirement 9: Reviews are arranged, for example, as peer reviews, in project group
or programming team meetings, or using an external auditor.
Tools and models
Information security recommendation for central government information system
development (Tietojärjestelmäkehityksen tietoturvallisuussuositus, VAHTI 3/2000)
Securing the central government’s key information systems
(Valtionhallinnon keskeisten tietojärjestelmien turvaaminen, VAHTI 5/2004)
• Chapter 10: Software security
• For application maintenance also section 12.4: Change management
Change and information security, from regionalisation to outsourcing – A controlled
process (Muutos ja tietoturvallisuus, alueellistamisesta ulkoistamiseen – hallittu
prosessi, VAHTI 7/2006)
• An information security assessment model for outsourced information systems, p. 61
Observations
Good operating practices concerning the procurement and development of information
systems, taking information security into account, help an organisation in safeguarding
its overall information security. The earlier the information security requirements set for
software are known, the better the quality of the result and the lower the costs. A risk analysis
is an excellent tool in the preparation of information security requirements, provided that
it focuses on the system itself and not on the project’s scheduling or staff risks. Particularly
at the invitation to tender stage, detailed requirements for information security are
recommended, to ensure that information security is taken into account at as early a stage as
possible.
One of the best means of positively impacting the quality of programming is to arrange
reviews and make developers aware of the reviews.
139
Annex 6: Substitute procedures
For a good reason owing to the special characteristics of an organisation’s
functions, it may not be able to implement individual requirements set by the
information security levels. It is therefore possible to take into use substitute
procedures to fulfil the original objective of the requirements and to ensure
an adequate level of information security. Substitute procedures can be used
temporarily, for example, when implementing an original requirement is set
in the budget at the end of an organisation’s operating and financial planning
period. A technical restriction relating to a single system is not, however,
sufficient justification to deviate from a requirement in all systems.
It should be noted that substitute procedures may not be used for statutory
requirements.
A substitute procedure can only be approved if the organisation has
documented sufficient justifications to deviate from the original requirement,
assessed the risks arising from deviation, and specified and implemented adequate
controls to reduce risk to the level demanded by the original requirement. The
management of the organisation must approve these justifications.
The internal approval of an organisation alone is not sufficient for information
processing environments relating to a number of organisations; the use of a
substitute procedure is always approved by an external auditor, approved by the
Ministry of Finance. The use of substitute procedures should be avoided; they
are always individual cases and their number should be minimised.
The following description must be completed for each substitute procedure:
Description of substitute procedure
Requirement being
replaced
State here the original requirement to which the substitute procedure relates.
Justification for why
the requirement
cannot be fulfilled
Describe why it is not possible for the organisation to implement the original requirement.
The objective of
the requirement,
and risk assessment
Describe the objective of the original requirement or the risk that the original requirement
controls, and the risk caused by deviation from the requirement.
Description of
substitute procedure
Describe the alternative way or ways by which the objective of the original requirement is
fulfilled in the organisation or the risk caused by deviation from the requirement is reduced
to a level which corresponds to the required level of implementation or is higher than that.
Validity of the
substitute procedure
Substitute procedures are mainly meant to be temporary solutions. Give the timetable
within which the organisation intends to fulfil the original requirement.
Approvals
A prerequisite for the use of substitute procedures is that at least the organisation’s
management has reviewed them and approved that they are necessary and adequate.
140
Annex 7: Valid VAHTI publications
• VAHTI Annual Report 2011 (VAHTIn toimintakertomus 2011, VAHTI
1/2012)
• Instructions on government ICT procurement
(Valtion ICT-hankintojen tietoturvaohje, VAHTI 3/2011) *
• Information security instructions for management
(Johdon tietoturvaopas, VAHTI 2/2011) *
• Information Security Instructions for Social Media, VAHTI 4b/2010
• Information security instructions on internal networks
(Sisäverkko-ohje, VAHTI 3/2010) *
• Instructions on Implementing the Decree on Information Security
in Central Government, VAHTI 2/2010
• Government Resolution on Enhancing Information Security
in Central Government, VAHTI 7/2009
• Targeted cyber attacks
(Kohdistetut hyökkäykset, VAHTI 6/2009) *
• Effective Information Security, VAHTI 5/2009
• Information Security Instructions for Personnel, VAHTI 4/2009
• Logging instructions
(Lokiohje, VAHTI 3/2009) *
• General instructions on ICT contingency planning
(ICT-toiminnan varautuminen häiriö- ja erityistilanteisiin,
VAHTI 2/2009) *
• General instructions for projects´ information security
(Hankkeen tietoturvaohje, VAHTI 9/2008) *
• Central government information security glossary
(Valtionhallinnon tietoturvasanasto, VAHTI 8/2008)
• Informationssäkerhetsanvisning för personalen, VAHTI 7/2008
• Information security is an attitude
– A report of public administration information security training needs
(Tietoturvallisuus on asenne! Selvitys julkishallinnon
tietoturvakoulutustarpeista, VAHTI 6/2008) *
• Preliminary study on government 24/7 information security monitoring
(Valtionhallinnon 24/7-tietoturvavalvonnan hanke-ehdotus,
VAHTI 5/2008) *
• Information security instructions on central government encryption
practices (Valtionhallinnon salauskäytäntöjen tietoturvaohje,
VAHTI 3/2008) *
• Personnel security as part of information security
141
(Tärkein tekijä on ihminen - henkilöstöturvallisuus osana
tietoturvallisuutta, VAHTI 2/2008) *
• Smartphone information security – Good practices
(Älypuhelimien tietoturvallisuus - hyvät käytännöt, VAHTI 2/2007) *
• From participation to influence – Central government challenges in
international information security work
(Osallistumisesta vaikuttamiseen - Valtionhallinnon haasteet
kansainvälisessä tietoturvatyössä, VAHTI 1/2007) *
• Identification in public administration network services
(Tunnistaminen julkishallinnon verkkopalveluissa, VAHTI 12/2006) *
• Guide for information security trainers
(Tietoturvakouluttajan opas, VAHTI 11/2006) *
• Principles and good practices of identity and access management
(Käyttövaltuushallinnon periaatteet ja hyvät käytännöt, VAHTI 9/2006) *
• Information security assessment in central government
(Tietoturvallisuuden arviointi valtionhallinnossa, VAHTI 8/2006) *
• Change and information security, from regionalisation to outsourcing
– a controlled process
(Muutos ja tietoturvallisuus, alueellistamisesta ulkoistamiseen
- hallittu prosessi, VAHTI 7/2006) *
• Setting and measuring information security objectives
(Tietoturvatavoitteiden asettaminen ja mittaaminen, VAHTI 6/2006) *
• Instructions for information security in case management
(Asianhallinnan tietoturvallisuutta koskeva ohje, VAHTI 5/2006) *
• A survey of information security resources in central government
(Selvitys valtionhallinnon tietoturvaresurssien jakamisesta,
VAHTI 3/2006) *
• Electronic Mail-handling Instruction for State Government,
VAHTI 2/2006
• Management of information security incidents
(Tietoturvapoikkeamatilanteiden hallinta, VAHTI 3/2005) *
• Information Security and Management by Results, VAHTI 1/2005
• Securing the state administration’s key information systems
(Valtionhallinnon keskeisten tietojärjestelmien turvaaminen,
VAHTI 5/2004) *
• Datasäkerhet och resultatstyrning, VAHTI 4/2004
• General instructions on protection against malware
(Haittaohjelmilta suojautumisen yleisohje, VAHTI 3/2004) *
142
• Instructions on risk assessment to promote information security
in central government
(Ohje riskien arvioinnista tietoturvallisuuden edistämiseksi
valtionhallinnossa, VAHTI 7/2003) *
• Recommendation on the assessment of the information security
management system
(Tietoturvallisuuden hallintajärjestelmän arviointisuositus,
VAHTI 3/2003) *
• Secure remote access from insecure networks
(Turvallinen etäkäyttö turvattomista verkoista, VAHTI 2/2003) *
• Central government internet information security instructions
(Valtionhallinnon tietohallinnon internet-tietoturvallisuusohje,
VAHTI 1/2003) *
• Central government remote working information security instructions
(Valtionhallinnon etätyön tietoturvallisuusohje, VAHTI 3/2002) *
• Information security recommendation for ICT premises
(Tietoteknisten laitetilojen turvallisuussuositus, VAHTI 1/2002) *
• General instructions of the information security of e-services
(Sähköisten palveluiden ja asioinnin tietoturvallisuuden yleisohje,
VAHTI 4/2001) *
• Information security recommendation on central government
information system development
(Tietojärjestelmäkehityksen tietoturvallisuussuositus, VAHTI 3/2000) *
* Only available in Finnish
MINISTRY OF FINANCE
Snellmaninkatu 1 A, Helsinki
PO BOX 28, 00023 Government
Tel. +358 2955 30009
Fax +358 9 160 33123
www.financeministry.fi
2b/2010
VAHTI
August 2012
ISSN 1455-2566 (print)
ISBN 978-952-251-380-9 (print)
ISSN 1798-0860 (PDF)
ISBN 978-952-251-381-6 (PDF)