E N D
1. Security Awareness Training:System Administrator
2. Definition The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner, and/or Data Custodian. The System Administrator assists agency management in the day-to-day administration of agency IT systems, and implements security controls and other requirements of the agency information security program on IT systems for which the System Administrator has been assigned responsibility. The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner, and/or Data Custodian. The System Administrator assists agency management in the day-to-day administration of agency IT systems, and implements security controls and other requirements of the agency information security program on IT systems for which the System Administrator has been assigned responsibility.
3. Communication Communicate with Data and System Owners
Implementing their request
Supporting their mission
Business Continuity
Create documentation
Reports and Monitoring
Communicate with Data and System Owners
Implementing their request
Supporting their mission
Business Continuity
Create documentation
Reports and Monitoring
4. Security Have a separate regular account and admin account
Report and Investigate Breaches/Incidents
Ensure adherence to policies and regulations
Design procedures
Data Disposal
Implement as designated
Access controls
Encryption
Remote Access
Patch and address security issues and reports
Logging
System hardening
Baseline Security for all systems
Additional security for sensitive systems
Have a separate regular account and admin account
Report and Investigate Breaches/Incidents
Ensure adherence to policies and regulations
Design procedures
Data Disposal
Implement as designated
Access controls
Encryption
Remote Access
Patch and address security issues and reports
Logging
System hardening
Baseline Security for all systems
Additional security for sensitive systems
5. Risk Management & Business Continuity Perform Backup and restore
Recovery/COOP
Create and use Testing EnvironmentsPerform Backup and restore
Recovery/COOP
Create and use Testing Environments
6. System Interoperability Assist data Owner:
Document Systems with shared data
Type
Data flow
Contact info
Written agreement with security requirements
Specify how data is stored
System Owner agrees to abide by legal requirements
System Owner’s authority to approve access
Approve and enforce
Inform others who share the system or data to include new shares
Assist data Owner:
Document Systems with shared data
Type
Data flow
Contact info
Written agreement with security requirements
Specify how data is stored
System Owner agrees to abide by legal requirements
System Owner’s authority to approve access
Approve and enforce
Inform others who share the system or data to include new shares
7. Other Security Considerations Phishing/Social Engineering
Passwords/Passphrases
Systems that don’t meet requirements need exception
Phishing/Social Engineering
Passwords/Passphrases
Systems that don’t meet requirements need exception