Polisi Keselamatan Siber JPA Versi 2.0

2 Polisi Keselamatan Siber – Jabatan Perkhidmatan Awam | Versi 2.0 ISI KANDUNGAN ISI KANDUNGAN ........................................................................................................................................... 2 SEJARAH POLISI KESELAMATAN SIBER ............................................................................................. 6 PENGENALAN................................................................................................................................................ 7 OBJEKTIF ........................................................................................................................................................ 7 PERNYATAAN POLISI .................................................................................................................................. 8 SKOP ................................................................................................................................................................ 9 PRINSIP-PRINSIP ........................................................................................................................................11 PENILAIAN RISIKO KESELAMATAN ICT ..............................................................................................13 BAB 1 : KAWALAN ORGANISASI ...........................................................................................................14 1.1 Polisi untuk Keselamatan Maklumat ......................................................................................15 1.2 Peranan dan Tanggungjawab Keselamatan Maklumat .....................................................16 1.3 Pengasingan Tugas ....................................................................................................................19 1.4 Tanggungjawab Pengurusan ...................................................................................................24 1.5 Hubungan dengan Pihak Berkuasa ........................................................................................29 1.6 Hubungan dengan Pihak Berkepentingan............................................................................29 1.7 Risikan Ancaman ........................................................................................................................30 1.8 Keselamatan Maklumat Dalam Pengurusan Projek ...........................................................30 1.9 Maklumat Inventori dan Aset ...................................................................................................31 1.10 Penggunaan Maklumat dan Aset ICT yang Boleh Diterima Penggunaan ........................ Maklumat dan Aset yang Diterima ..........................................................................................32 1.11 Pemulangan Aset ICT.................................................................................................................33 1.12 Klasifikasi Maklumat ..................................................................................................................34 1.13 Pelabelan Maklumat ...................................................................................................................35 1.14 Pemindahan Maklumat ..............................................................................................................35 1.15 Kawalan Capaian ..........................................................................................................................36 1.16 Pengurusan Identiti ....................................................................................................................39 1.17 Pengesahan Maklumat...............................................................................................................41 1.18 Hak Akses .....................................................................................................................................43 1.19 Keselamatan Maklumat dengan Pihak Luaran ....................................................................44 1.20 Keselamatan Maklumat Dalam Perjanjian Pihak Luaran ..................................................46 1.21 Pengurusan Keselamatan Maklumat Dalam Rantaian Maklumat ....................................... dan Komunikasi ICT ...................................................................................................................47

RkJQdWJsaXNoZXIy MTc1NDAy