Viewable by the world
Group Access to CIO
Can VIEW the space: cio-editors ,  anonymous ,  all-lbnl-users ,  confluence-administrators , 
Can EDIT the space: confluence-administrators , 
Can ADMINISTER the space: confluence-administrators , 

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

* Update the BSE cyber security plan. We will proceed with updating this plan as scheduled for October 2011.
* User Account Administration. We will support HR functional owners to put in place a new annual privileged account review process. We will update account management procedures for the System Support group as part of the update of the BSE cyber security plan update.
* Update the inventory of business systems containing PII.
* Enhance the detection of PII by requiring the groups with high access to PII to run Identify Finder every six months versus annually.
* Enhance the protection of PII by adding encryption to backup tapes of PII (in addition to existing controls of chain of custody for tapes, insured backup transportation providers, and locked transportation containers).
* Update incident handling procedures to include procedures specific to PII.

Performance Measures

...

PEMP Goals, Objectives, Notable Outcomes

"In measuring the performance of the above Objectives, the DOE evaluator(s) shall consider performance trends, outcomes and continuous improvement in the safeguards and security, cyber security and emergency management program systems. This may include, but is not limited to, the commitment of leadership to strong safeguards and security, cyber security and emergency management systems; the integration of these systems into the culture of the Laboratory; the degree of knowledge and appropriate utilization of established system processes/procedures by Contractor management and staff; maintenance and the appropriate utilization of Safeguards, Security, and Cyber risk identification, prevention, and control processes/activities; and the prevention and management controls and prompt reporting and mitigation of events as necessary."

The Laboratory remains strongly dedicated to appropriate cyber security management, as evidenced through its continuous assessment and improvement program for incidents and threats, as well as its strong technical cyber security program.  See further discussion regarding Q3 incident performance.
{color:}}No notable outcome is defined for cyber security. h2.

Laboratory Management Performance Measures

Performance against each Laboratory Management Performance Measure, as detailed in the Cyber Security Assurance Plan follows.

Cyber Security Incident Analysis

Berkeley Lab experienced a "normal" incident profile in Q3. Instances of malicious code were within current trends and there were no instances of mal code escalation or compromise of other hosts at the Laboratory. Newer detection measures implemented over the past 18 months continue to pay dividends in terms of speedy detection of these issues. Details provided on Operations Dashboard.

System Availability and Function Data
Cyber security systems experienced normal uptime profiles during this quarter.  

...