Thông tư 01/2011/TT-NHNN về đảm bảo an toàn, bảo mật trong hoạt động ngân hàng
- Tổng hợp lại tất cả các quy định pháp luật còn hiệu lực áp dụng từ văn bản gốc và các văn bản sửa đổi, bổ sung, đính chính…
- Khách hàng chỉ cần xem Nội dung MIX, có thể nắm bắt toàn bộ quy định pháp luật hiện hành còn áp dụng, cho dù văn bản gốc đã qua nhiều lần chỉnh sửa, bổ sung.
thuộc tính Thông tư 01/2011/TT-NHNN
Cơ quan ban hành: | Ngân hàng Nhà nước Việt Nam |
Số công báo: | Đã biết Vui lòng đăng nhập tài khoản gói Tiêu chuẩn hoặc Nâng cao để xem Số công báo. Nếu chưa có tài khoản Quý khách đăng ký tại đây! |
Số hiệu: | 01/2011/TT-NHNN |
Ngày đăng công báo: | Đã biết Vui lòng đăng nhập tài khoản gói Tiêu chuẩn hoặc Nâng cao để xem Ngày đăng công báo. Nếu chưa có tài khoản Quý khách đăng ký tại đây! |
Loại văn bản: | Thông tư |
Người ký: | Nguyễn Toàn Thắng |
Ngày ban hành: | 21/02/2011 |
Ngày hết hiệu lực: | Đã biết Vui lòng đăng nhập tài khoản gói Tiêu chuẩn hoặc Nâng cao để xem Ngày hết hiệu lực. Nếu chưa có tài khoản Quý khách đăng ký tại đây! |
Áp dụng: | |
Tình trạng hiệu lực: | Đã biết Vui lòng đăng nhập tài khoản gói Tiêu chuẩn hoặc Nâng cao để xem Tình trạng hiệu lực. Nếu chưa có tài khoản Quý khách đăng ký tại đây! |
Lĩnh vực: | Tài chính-Ngân hàng, An ninh quốc gia |
TÓM TẮT VĂN BẢN
Trước 07/10/2011 phải nộp quy chế an toàn hệ thống CNTT ngân hàng
Ngân hàng Nhà nước Việt Nam (NHNN) đã ban hành Thông tư số 01/2011/TT-NHNN ngày 21/02/2011 quy định việc đảm bảo an toàn, bảo mật hệ thống công nghệ thông tin (CNTT) trong hoạt động ngân hàng áp dụng đối với NHNN; các tổ chức tín dụng và chi nhánh ngân hàng nước ngoài (sau đây gọi chung là đơn vị).
Theo đó, các đơn vị phải xây dựng quy chế an toàn, bảo mật hệ thống CNTT phù hợp với hệ thống, cơ cấu tổ chức, yêu cầu quản lý và hoạt động của đơn vị. Quy chế an toàn, bảo mật hệ thống CNTT phải được thủ trưởng đơn vị phê duyệt, tổ chức thực hiện và được triển khai tới tất cả cán bộ, nhân viên và các bên liên quan.
Đối với những đơn vị đã ban hành quy chế an toàn, bảo mật CNTT thì phải vị gửi quy chế trong thời hạn 15 ngày (tức ngày 22/04/2011); các đơn vị chưa ban hành quy chế an toàn, bảo mật CNTT thì phải ban hành và gửi NHNN (Cục Công nghệ tin học) quy chế này trong thời hạn 6 tháng (hạn cuối cùng đến ngày 07/10/2011) kể từ ngày Thông tư này có hiệu lực.
Cũng theo Thông tư này, NHNN yêu cầu các đơn vị phải xây dựng và thực hiện các quy định về quản lý truy cập đối với người sử dụng, nhóm người sử dụng, đảm bảo đáp ứng yêu cầu nghiệp vụ và yêu cầu an toàn bảo mật.
Trong đó, quy định về quản lý mật khẩu phải đảm bảo: mật khẩu có độ dài 06 ký tự trở lên, cấu tạo gồm các ký tự, số và các ký tự đặc biệt khác nếu hệ thống cho phép; phần mềm mật khẩu phải có chức năng thông báo cho người sử dụng thay đổi mật khẩu sắp hết hạn sử dụng, cho phép thay đổi ngay mật khẩu bị lộ, có nguy cơ bị lộ hoặc theo yêu cầu của người sử dụng.
Ngoài ra, đơn vị có trách nhiệm xây dựng hệ thống dự phòng cho các hệ thống CNTT trọng yếu của đơn vị với khoảng cách tối thiểu 30 km tính theo đường thẳng nối giữa 02 hệ thống. Hệ thống dự phòng phải thay thế được hệ thống chính trong vòng 04 giờ kể từ khi hệ thống chính có sự cố không khắc phục được…
Thông tư này có hiệu lực thi hành kể từ ngày 07/4/2011 và thay thế các Quyết định số 04/2006/QĐ-NHNN ngày 18/01/2006; 14/2000/QĐ-NHNN16 ngày 07/01/2000; 864/2003/QĐ-NHNN ngày 05/8/2003.
Xem chi tiết Thông tư01/2011/TT-NHNN tại đây
tải Thông tư 01/2011/TT-NHNN
NGÂN HÀNG NHÀ NƯỚC Số: 01/2011/TT-NHNN |
CỘNG HÒA XÃ HỘI CHỦ NGHĨA VIỆT NAM Hà Nội, ngày 21 tháng 02 năm 2011 |
THÔNG TƯ
QUY ĐỊNH VIỆC ĐẢM BẢO AN TOÀN, BẢO MẬT HỆ THỐNG CÔNG NGHỆ THÔNG TIN
TRONG HOẠT ĐỘNG NGÂN HÀNG
Căn cứ Luật Ngân hàng Nhà nước Việt Nam số 46/2010/QH12 ngày 16/6/2010;
Căn cứ Luật các Tổ chức tín dụng số 47/2010/QH12 ngày 16/6/2010;
Căn cứ Luật Công nghệ thông tin số 67/2006/QH11 ngày 29/6/2006;
Căn cứ Nghị định số 96/2008/NĐ-CP ngày 26/8/2008 của Chính phủ quy định chức năng, nhiệm vụ, quyền hạn và cơ cấu tổ chức của Ngân hàng Nhà nước Việt Nam;
Ngân hàng Nhà nước Việt Nam quy định về việc đảm bảo an toàn, bảo mật hệ thống công nghệ thông tin trong hoạt động ngân hàng như sau:
QUY ĐỊNH CHUNG
Trong Thông tư này, các từ ngữ dưới đây được hiểu như sau:
CÁC QUY ĐỊNH VỀ ĐẢM BẢO AN TOÀN, BẢO MẬT HỆ THỐNG CÔNG NGHỆ THÔNG TIN
Khi cán bộ, nhân viên chấm dứt hoặc thay đổi công việc, đơn vị phải:
- Tạm dừng hoặc đình chỉ hoạt động của bên thứ ba tùy theo mức độ vi phạm.
- Thông báo chính thức các vi phạm về an toàn, bảo mật CNTT của nhân sự cho bên thứ ba.
- Kiểm tra xác định, lập báo cáo mức độ vi phạm và thông báo cho bên thứ ba thiệt hại xảy ra.
- Thu hồi quyền truy cập hệ thống CNTT đã được cấp cho bên thứ ba.
- Tách biệt với môi trường phát triển và môi trường kiểm tra, thử nghiệm.
- Chỉ cho phép kết nối Internet đối với hệ thống CNTT đã được áp dụng đầy đủ các giải pháp an ninh, an toàn và đủ khả năng bảo vệ trước các hiểm họa, tấn công từ bên ngoài.
- Không cài đặt các công cụ, phương tiện phát triển ứng dụng trên hệ thống vận hành chính thức.
Xây dựng và thực hiện quy định về phòng chống vi rút, mã độc đáp ứng các yêu cầu cơ bản sau:
Khi xây dựng hệ thống thông tin mới hoặc cải tiến hệ thống thông tin hiện tại, phải đưa ra các yêu cầu về an toàn, bảo mật đồng thời với việc đưa ra các yêu cầu kỹ thuật, nghiệp vụ.
Các chương trình ứng dụng nghiệp vụ phải đạt được các yêu cầu sau:
Các đơn vị có trách nhiệm gửi báo cáo về Ngân hàng Nhà nước Việt Nam (Cục Công nghệ tin học) như sau:
Khi xảy ra các vụ, việc mất an toàn đối với hệ thống CNTT, đơn vị gửi báo cáo đột xuất bằng văn bản, cụ thể như sau:
- Ngày, địa điểm phát sinh vụ, việc;
- Nguyên nhân vụ, việc;
- Đánh giá rủi ro, ảnh hưởng đối với hệ thống CNTT và nghiệp vụ tại nơi xảy ra vụ, việc và những địa điểm khác có liên quan;
- Các biện pháp đơn vị đã tiến hành để ngăn chặn, khắc phục và phòng ngừa rủi ro;
- Kiến nghị, đề xuất.
ĐIỀU KHOẢN THI HÀNH
Các tổ chức, cá nhân vi phạm quy định tại Thông tư này, tùy theo mức độ vi phạm sẽ bị xử lý theo các quy định của pháp luật.
- Quyết định số 04/2006/QĐ-NHNN ngày 18/01/2006 của Thống đốc Ngân hàng Nhà nước ban hành Quy chế an toàn, bảo mật hệ thống công nghệ thông tin trong ngành Ngân hàng;
- Quyết định số 14/2000/QĐ-NHNN16 ngày 07/01/2000 của Thống đốc Ngân hàng Nhà nước về việc ban hành Quy chế quản lý, sử dụng hệ thống tin học trong ngành Ngân hàng;
- Quyết định số 864/2003/QĐ-NHNN ngày 05/8/2003 của Thống đốc Ngân hàng Nhà nước về việc sửa đổi, bổ sung một số điều của Quy chế quản lý, sử dụng hệ thống tin học trong ngành Ngân hàng ban hành kèm theo Quyết định số 14/2000/QĐ-NHNN16 ngày 07/01/2000.
Nơi nhận: |
KT. THỐNG ĐỐC |
THE STATE BANK OF VIETNAM | SOCIALISTREPUBLIC OF VIETNAM |
No: 01/2011/TT-NHNN | Hanoi, February 21, 2011 |
CIRCULAR
PROVIDING FOR ENSURING SAFETY, KEEPING SECRETS THE INFORMATION TECHNOLOGY SYSTEM IN BANKING OPERATION
Pursuant to the Law on State Bank of Vietnam No.46/2010/QH12 dated 16/6/2010;
Pursuant to the Law on credit institutions No.47/2010/QH12 dated 16/6/2010;
Pursuant to the Law on Information Technology No.67/2006/QH11 dated 29/6/2006;
Pursuant to the Decree No.96/2008/ND-CP dated 26/8/2008 of the Government regulating functions, tasks, powers and organizational structure of the State Bank of Vietnam;
the State Bank of Vietnam provides for ensuring safety, keeping secrets the information technology system in banking operation as follows:
Chapter 1.
GENERAL PROVISIONS
Article 1. Scope of governing and subjects of application
1. This Circular provides for requirements of ensuring safety, keeping secrets the information technology system (IT) in banking operation.
2. This Circular applies to the State Bank of Vietnam; credit institutions; branches of foreign banks (hereinafter collectively called as units).
Article 2. Interpretation of terms
In this Circular, the below terms are construed as follows:
1. Information technology system: means a structured set of hardware equipment, software, databases and network systems for one or more technical operations, operations of the banks.
2. IT assets:means equipments, information under IT system of the units, including:
a)Physical assets:mean IT equipment, mass media and equipment for the operation of IT systems.
b)Informationassets:mean data and documents relating to IT systems. Information assets are represented by paper documents or electronic data.
c)Software assets:include the applicable programs, system software, databases and development tools.
3.IT risk:means ability of happening loss when making activities related to IT systems. IT risk related to management, use of hardware, software, communications, interface systems, operating and people.
4.Risk management:means the coordinating activities aiming at determining and controlling IT risk which may happen.
5.Third parties: mean organizations and individuals having professional skill hired by or coordinate with units to provide goods, technical services for the IT system.
6.Network security systems:a set of firewall devices and equipment to control and detect illegal access, management software, monitoring and logging of network security status and other equipment with function to ensure the safe operation of the network, all work together in a synchronized network security policies in order to strictly control all activities on the internet.
7.Firewall: means a collection of components or a system of equipment and software placed between two networks to control all connections from inside to outside of the network or vice versa.
8.Virus: means a computer program enabling to spread, causing abnormal operation to the digital device or copy, modify and delete the stored information in digital equipment.
9.Malicious-logic software (mal-ware):means software that its features cause harmful such as viruses, spy-ware (spy-ware), advertising software (ad-ware) or other similar forms.
10.Technology weak points:mean its position in the IT system vulnerable when being attacked or illegally invaded.
Article 3. General principles
1. Each unit must ensure safety; keep secrets IT system of its unit according to provisions in this Circular.
2. Promptly identify, classify, evaluate and effectively handle IT risk which may occur in the unit.
3. To build, deploy safety regulations, keep secrets IT system on the basis of harmony between benefits, costs and risk acceptable level of the unit.
4. To allocate adequate qualified resources appropriate to the scale aiming at ensuring safety, keeping secrets IT systems.
5. Clearly define powers and responsibilities of heads of units, levels, departments and each individual in the unit for the acts to ensure safety and keep secrets IT system.
Article 4. Regulations on safety, keeping secrets information technology system
1. The units must build safety regulations; keep secrets IT system suitable to the units’ IT system, organizational structure, managerial requirement and operation. The regulations of safety, keeping secrets IT system must be approved and organized to implement by heads of units and be deployed to all managers, staffs and relative parties.
2. The regulations on safety, keeping secrets IT system must include the basic provisions on:
a) Management of IT assets;
b) Management of human resource;
c) Physique and environment;
d) Communications and operation;
đ) Accessing management;
e) Receipt, development, maintaining information system;
g) Trouble-shooting;
h) Storage and disaster prevention.
3. Periodically, the units must review, edit, improve safety regulations and keep secrets IT system at least once a year, ensuring the suitableness, adequacy and efficiency of the regulations. In case of detecting the inadequacies and irrationalities causing unsafe to the IT systems or at the request of the competent agencies, units must conduct to amend, supplement immediately its regulations.
Chapter 2.
PROVISIONS ON ENSURING SAFETY, KEEPING SECRETS THE INFORMATION TECHNOLOGY SYSTEM
ITEM 1. ORGANIZATION ENSURING SAFETY, KEEPING SECRETS THE INFORMATION TECHNOLOGY
Article 5. Safety management, keeping secrets information technology inside of units
1. Heads of units must directly guide the acts of ensuring safety, keeping secrets IT and stipulate clearly responsibilities in the acts of ensuring safety, keeping secrets IT to individuals, divisions.
2. Individuals in the units relating to keeping secrets information must sign commitments to keep secrets information.
Article 6. Safety management, keeping secrets information technology of the unit to third party
1. Evaluating technical capability, personnel, financial ability of third parties before signing the contract to provide goods and services.
2. Clearly define responsibilities, powers and obligations of the parties on security, IT security when signing the contract. Contracts with third parties must include the clauses of the sanctions against third parties due to violate safety regulations, information security and the responsibility to pay damages of third parties in case of having damages caused by the violation of third parties.
3. Specially pay attention to issues of confidentiality, integrity, availability, reliability, maximum performance, ability to recover disaster, storage mean of information systems.
4. Fully determine the risks of units related to third parties which may arise and apply risk management measures.
5. To apply measures to closely monitor and restrict right to access of third parties when allowing them access to IT systems of units.
ITEM 2. MANAGEMENT OF INFORMATION TECHNOLOGY ASSETS
Article 7. Responsibility for information technology assets
1. To make statistics, inventory of IT assets in the unit at least once each year. Contents of the property statistics must include the following information: type of property, values, important levels, the installation location, backup information, copyright information.
2. To classify, arrange priority order at value, the importance of IT assets to take measures to protect the assets accordingly and build and implement regulations on management, use of assets.
3. To add the right to use property to individual or specific department. IT property user must comply with the regulations on management and use of the property, ensuring the property which is used for proper purposes.
Article 8. Classification of information technology assets
1. To classify IT property according to criteria of value, sensitivity and importance, frequency of use, storage time.
2. To implement the management measures suitable to each type of information asset classified.
ITEM 3. MANAGEMENT OF HUMAN RESOURCE
Article 9. Management of internal human resource of unit
1. Before the recruitment or duty assignment
a) To define responsibility for safety, IT security of the position need to be recruited or assigned.
b) To check background, review, valuate strictly ethics, professional qualifications when recruiting, assigning managers, staffs members to work in the key position of IT systems such as system administration, management of security systems, system operation, database management.
c) Decision or an employment contract (if any) must include the Articles, clauses of responsibility to ensure safety, IT security of persons who are employed during and after working in the unit.
2. Within working time
a) The units are responsible for dissemination and updating of regulations on safety, IT security to managers, staffs.
b) Requiring and examining the execution of regulations on safety and IT security of individuals, organizations to be of units at least once a year.
c) Applying discipline measures to managers, staffs of the unit who committed violations of safety and IT security.
d) The important works such as network security system configuration, operating system parameters change and firewall device installation, the device of detection and intrusion prevention (IPS) must be performed by at least two people or must have a supervisor.
đ) Not to grant administrative right (who can edit the configuration, data, logs) on the main IT system and backup system for the same individual.
3. When terminating or changing jobs
When managers, staffs terminate or change jobs, the unit must:
a) Clearly defining responsibility of managers, staffs and relative parties on IT system.
b) Making asset transfer minute to staffs, managers.
c) Withdrawing or changing right of accessing IT system of staffs, managers to suit the job changed.
Article 10. Management of third parties’ human resource
1. Before deploying works
a) Requiring third parties to supply list of personnel who join in.
b) Examining legal status, professional capability of personnel of third-parties suitable to job requirements.
c) Requiring third parties to sign commitment of not disclosing the unit’s information for the important information.
2. Within the time of deploying works
a) Providing and requiring third parties to comply in full with the regulations and provisions on safety and IT security of unit.
b) Monitoring the compliance with regulations on safety, IT security of third parties’ personnel.
c) In case of detecting signs of violation or committing violations of regulations on safety, information security of third parties, the unit needs:
- Suspending or terminating third parties’ operation depending on the seriousness of violation.
- Officially notify violations on safety and IT security of personnel to third parties.
- Checking to determine, making report on seriousness of the violation and notifying to third parties about the damages caused.
- Withdrawing IT system accessing right which was granted to third parties.
3. When finishing works
a) Requiring third-parties to transfer using assets of the unit during the job deployment.
b) Withdrawing IT system accessing right which was granted to third parties right after finishing the jobs.
c) Changing the locks, passwords receiving from third parties’ delivery.
ITEM 4. ENSURING SAFETY ON PHYSICAL AND ENVIRONMENTAL ASPECT
Article 11. Physical safety and environment
1. The areas of handling, storing information and information handling facilities must be protected safely by walls, controlled gateway.
2. The areas having high requirements on safety and security as server room must apply suitable entry and existing control measures, to ensure that only those who have duties can enter into that area.
3. Having measures to protect, prevent, combat risks from fire, explosion, flood, earthquake and other disasters caused by natural and human being. The server room must be ensured industrial hygiene: not to be leaked, waterproof; equipment installed on the technical floor is not shone directly by the sun shining; the humidity, the temperature reaching the standards as prescribed for devices and servers; equipping in full devices to prevent fire, explosion, flood, lightning;.
4. Having internal rules, guidance to work in the safe, secure area.
5. Areas of common use, distribution and shipping must be controlled and isolated from in the safe, secure area.
Article 12. Safety, keeping secrets information technology assets
1. IT assets must be located and installed at the safe location and be protected to minimize the risks due to intimidation, danger from environment and illegal intrusion.
2. IT assets must be secured on the power and support system when the main power is interrupted. Must take measures to resist overload or voltage drop, surge lightning; with adjacent systems; a system backup generators and UPS systems to ensure equipment operating continuously.
3. Cable providing power and communications cables used in transmitting data or information support services must be protected from intrusion or damage.
4. All data storage devices must be checked to ensure that critical data and copyrighted software stored in the device to be deleted or overwritten unable to recover before removing or re-used for other purposes.
5. IT assets shall be sent out only when the unit has permission of the competent levels.
6. The equipment used for installing operations outside of unit’s head office must take measures to monitor, secure safely against unauthorized access.
ITEM 5. OPERATING MANAGEMENT AND COMMUNICATIONS
Article 13. Process of operation
1. Promulgating and deploying the process of operating IT systems to users including: The process of turning on, off device, the backup, data recovery, device maintenance, operating application; troubleshooting.
2. Controlling change of IT systems including software version, hardware configuration, documentation, operating procedures; having backup plans for recovery if the change is not successful or meeting unanticipated problems; recording changes; making plan of implementation and examination, test of the changes before the formal application.
3. The official operating system must meet the requirements:
- Separating from development environments and test, examination environments.
- Only allowing to connect Internet for the IT system has been adopted fully safety, security solution and able to protect against threats and attacks from outside.
- Not to install tools, means of developing application on the official operating system.
4. For the professional information system:
a) Not to assign an individual to do the whole processes from initial process to an approval of a professional transaction.
b) Every action on the system is tracked, ready for inspection and control as needed.
Article 14. Management of services supplied by third parties
1. Must supervise and inspect the services provided by third parties to ensure service supplying levels, the system operating ability to meet in accordance with agreements signed.
2. Ensuring to implement, maintain security, safety measures of services provided by third parties in accordance with agreement.
3. Managing changes for services provided by third parties including: Upgrading the new version, using new techniques, tools and new development environment; valuating fully impact of the change to ensure safety when putting into use.
Article 15. Management of setting up plan and accepting information technology system
1. Monitoring and maximizing performance of IT systems, planning on performance and capacity of IT systems in the future to ensure the necessary standards.
2. Setting up requirements and standards such as performance, time to recover when meeting troubles, ensuring the continuity; training and technical transfer to the changing contents to users and implementing the examination, valuation the ability of new IT systems or upgraded systems before the official application.
Article 16. Storing for backup
1. Promulgating and implementing backup procedures and recovery for software, data needed.
2. Make a list of data, software need to be backed up with classification according to storage time, backup time, backup methods and system recovery inspection time from backup data.
3. Backup data must be stored securely and checked regularly to ensure readiness for use when needed. Inspecting and recovering system from backup data at least every six months.
Article 17. Management on safety, keeping secrets internet
1. Performing network management and control to prevent hazards and maintain safety to systems, applications using network:
a) Having logical outline and physique on network system;
b) Using a firewall device or equipment to detect and prevent intrusions and other equipment to ensure safety, network security.
2. Setting up, configuring fully all the features of network security devices. Use tools for detecting and timely finding out weak points, vulnerabilities and unauthorized access to the network. Regularly inspecting and detecting the connections, equipment and software installed illegally into the network.
3. Identifying and clearly writing safety features, the security level of service and management requirements in the agreements on network services provided by third party.
Article 18. Information exchange
1. Promulgating regulations of exchanging information and software through communication network in the unit and with other units. Determining responsibility and liability for the components involved.
2. Having agreement to the information exchange with the external.
3. Taking measures to protect means of keeping information when moving.
4. Setting up and implementing measures to protect the information exchanged between IT systems.
Article 19. Electronic trading services
1. Taking measures to protect information in electronic commerce to combat activities of fraud, illegal modification:
a) Transmission and communication protocols must be encrypted;
b) Using strong authentication methods such as multi-component authentication or digital signatures for members participating in the transaction.
2. Information in online transactions must be transmitted in full and correct address, avoiding being modified, disclosure or an unauthorized duplicate.
3. Public information on the IT systems must be protected to prevent unauthorized modification.
Article 20. Supervision and writing up operation diary of information technology system
1. Logging and prescribing storage time of information on the operation of IT systems and users, errors arising and incidents causing unsafe to the information to assist in later investigation, supervision.
2. Reviewing and making periodic reports on logs and activities dealing with errors and necessary incidents.
3. Protecting features logging and log information, anti-counterfeit and unauthorized access. System administrators and users may not delete or modify the system log which records their own activities.
4. There are mechanisms of time synchronization between IT systems.
Article 21. Prevention and combat of virus and mal-ware
Setting up and implementing regulations on anti-virus, malicious code to meet the following basic requirements:
1. Developing systems to prevent computer viruses for the entire IT system of units.
2. Inspecting, killing virus, malicious code for the entire IT system of units every day and means of keeping information from the outside before using.
3. No opening strange e-mails, the attachments or links in the strange email to avoid viruses, malicious code.
4. No accessing websites which have no clear origin, suspicious.
5. Promptly updating the model virus, mal-ware and antivirus software, new mal-ware code.
6. Immediately notifying to the system administrators to handle in the cases detecting but unable to kill viruses, malicious code.
7. No installing software self-willed without permission from the system administrator.
ITEM 6. MEASURES OF ACCESSING MANAGEMENT
Article 22. Professional skill requirements for accessing control
1. Building and implementing regulations on accessing management for users, user groups, guaranteeing to meet business requirements and safety, security requirements. Provisions on accessing management include the following basic contents:
a) Registration, issuance, renewal and withdrawal of access right of users;
b) Limitation and control of privileges accesses;
c) Management and allocation of passwords;
d) Review, examination and revision of access right of users.
2. Regulations on accessing management must meet the following requirements:
a) Password length must be six characters or more, madeup of numeric, text and other special characters if the system allows. Requirements of valid password must be checked automatically when setting up password;
b) The default password of the manufacturer installed availably on the equipment, software, databases must be changed right when put into use;
c) Password management software must have the functions: to announce to users for changing their passwords which are going to expire; to cancel the validity of the password expired; to allow changing immediately the password disclosed, to be in danger of being disclosed at the request of users; to stop the use the old password in a certain time.
3. Stipulating liability of users when being granted right to access: Using password in compliance with regulation, keeping confidential password, exiting from the system when not working on it or temporarily not working on it.
Article 23. Management of internet access
1. Promulgating regulations on use of the network and network services, the licensing procedures, removing the right to connect to the network and network services, the ways and means of network access, network services. In which specifying clearly:
a) The network and network services are permitted to use;
b) Conditions for being connected to the network.
2. Using appropriate measures to authenticate users connecting from outside into the unit s internal network ensuring safety, security.
3. Controlling the access to the ports used to configure and manage network devices.
4. Splitting the network into different network regions according to using object, purposes and information systems.
Article 24. Control of operating system access
1. Having procedures to control the access to operating system; provisions on managing password to access into operating system safely, securely.
2. Person who uses operating system must have a unique identifier and to be verified, identified, saved traces when accessing into the operation system.
3. Using more other authentication methods such as biometry or card for critical servers besides the authentication by password.
4. Providing for limits and strict control of the system utility which is able to affect systems and other applications programs.
5. Automatically disconnecting the working shift after a period of not using, to prevent unauthorized access.
6. Providing for time limits connected with the high risk applications.
Article 25. Control of information access and application
1. Managing and assigning the right to access to information and applications suitable to the functions and responsibilities of users:
a) Assigning the right to access to each folder, the function of program;
b) Assigning the right to read, write, delete, execute to information, data and program.
2. The important information system must be put in a private computer network environment. If the information systems together use common resources, they must be accepted by the system administrator.
ITEM 7. RECEIPT, DEVELOPMENT, MAINTENANCE OF INFORMATION SYSTEM
Article 26. Requirements on safety, keeping secrets to the information systems
When building new information systems or improving existing information systems, relative persons must offer requirements on safety, security, simultaneously with the offering of technical, professional requirements.
Article 27. Ensuring safety, keeping secrets of applications
The business applications program must meet the following requirements:
1. Checking the validity of data entered into the application, ensuring data is entered correctly and valid.
2. Checking the validity of data need to be handled automatically in the application to detect incorrect information due to errors in the course of processing or behaviors of modifying information deliberately.
3. Having measures to ensure the authenticity and protect integrity of data to be processed in applications.
4. Checking the validity of the output from applications to ensure the course of processing information of the applications is accurate and valid.
Article 28. Management of encryption
1. Stipulating and putting to use encryption measures and key management in accordance with national or international standards which have been recognized to protect the information of the unit. Using encryption algorithms such as:
a) AES: Advanced Encryption Standard;
b) 3DES: Triple Data Encryption Standard;
c) RSA: Rivest-Shamir-Adleman;
d) Other algorithms.
2. Data on customer passwords, user passwords and other sensitive data must be encrypted when transmitted over the network and stored.
Article 29. Safety, keeping secrets system files
1. Providing for management, installment, updating of the software on existing systems, ensuring safety for the file system.
2. Checking, testing data must be selected, protected, managed and controlled carefully.
3. The access to source program must be managed and controlled strictly.
Article 30. Safety, keeping secrets in the process of support and development
1. There must be regulations on management and change control of information system.
2. When changing the operating system must examine and review critical business applications to ensure the system operating stably, safely in the new environment.
3. The amendment of software packages must be managed and controlled strictly.
4. Supervision and strict management of hiring, purchasing external software.
Article 31. Management of weak points on technology
1. Having provisions for the assessment, management and control of technical weak point of IT systems in use. Periodically assessing and reporting on technical weak point of IT systems in use.
2. Developing and implementing solutions to overcome the technical weak point, limiting the concerned risks.
ITEM 8. MANAGEMENT OF TROUBLES ON INFORMATION TECHNOLOGY
Article 32. Troubleshooting report
1. Setting up the process of report, report templates and specifying clearly the reporting recipients for IT problems.
2. Clearly defining responsibilities of report of managers, staffs and third parties about the IT problems.
3. The unsafe incidents must be immediately reported to the competent persons and those relating to remedies in the shortest time.
Article 33. Controlling and troubleshooting
1. Promulgating procedures, responsibilities to overcome and prevent IT problems, ensuring incidents to be handled in the shortest time and minimizing the possibility of repeated incidents.
2. The course of handling troubleshooting must be recorded and stored in the unit.
3. Collecting, recording, preserving evidence and proof for examination, treatment, recovery and prevention of incidents. In the case of having IT incidents related to violations of law, the unit is responsible for collecting and providing evidence to the competent authorities in accordance with the provisions of law.
ITEM 9. ENSURING OF CONTINUOUS OPERATION OF THE INFORMATION TECHNOLOGY SYSTEM
Article 34. Ensuring of continuous operation
1. Depending on the size and importance level of each IT system for operation of the unit to select the critical IT systems, can significantly affect the operation of the unit.
2. Developing and implementing plans and processes to ensure continuous operation of critical IT systems.
3. Minimum every six months, inspecting, testing, evaluating and updating processes to ensure continuous operation of critical IT systems.
4. Plans, processes to ensure continuous operation must be examined, evaluated and updated when the system changes.
Article 35. Acts of disaster prevention
1. Building backup system for critical IT systems of the unit. The backup system must be away from the main system at least 30 kilometers calculating upon a straight line connecting the two systems.
2. Backup system must be able to replace the main system within four hours since the system has the unable to overcome problem.
3. Minimum every three months, the unit must move operations from the main system to the backup system to ensure the uniformity and availability of backup systems.
4. Minimum every three months, conducting inspections, evaluating operation of the backup system.
ITEM 10. INTERNAL EXAMINATION AND REPORT
Article 36. Internal examination
1. The units must self-organize to examine the compliance of the provisions of this Circular at least once a year.
2. Inspection results and recommendations must be made into the report.
Article 37. Report
The unit is responsible for submitting reports to the State Bank of Vietnam (Department of Information Technology) as follows:
1. Regulation of safety, IT security of the units:
a) For the units issued regulations on safety, IT security before the effective date of this Circular: The units send regulations of safety, IT security within 15 days from the effective date of this Circular.
b) For units not yet issued regulations on safety, IT security from the effective date of this Circular: The units must issue and sent the regulation on safety, IT security within six months from the effective date of this Circular.
2. Annual report:
a) The amendments, supplementation of IT security, safety regulations, if any, reports of internal inspection of units under the provisions of Article 36 of this Circular.
b) Deadline for sending report: before the 15thof March annually.
c) Forms and report form: Under the guidance of the State Bank of Vietnam (Department of Information Technology).
3. Irregular report:
Upon the occurrence of cases, the safety loss for IT systems and units shall send irregular report in writing, specifically as follows:
a) The deadline for submission of report: Within 10 days from the time the case is detected.
b) Contents of irregular report:
- Date, place where arises the case;
- The cause;
- Assessment of risk, impact on IT systems and operations at the place of incident and other relevant locations;
- The measures that the units were taken to remedy and prevent risks;
- Petition and proposal.
Chapter 3.
IMPLEMENTATION PROVISIONS
Article 38. Handling of violations
Organizations, individuals who commit violations of provisions of this Circular, depending on the nature and seriousness shall be handled according to provisions of law.
Article 39. Effect
1. This Circular takes effect after 45 days since the date of issuing and replaces the following documents:
- Decision No.04/2006/QD-NHNN dated 18/01/2006 of the Government of the State Bank on stipulating regulation of safety, keeping secrets IT system in banking field;
- Decision No.14/2000/QD-NHNN16 dated 07/01/2000 of the Government of the State Bank on stipulating regulation of management, use of IT system in banking field;
- Decision No.864/2003/QD-NHNN dated 05/8/2003 of the Government on amending, supplementing a number of Articles of management, use of IT system in banking field issuing together with this Decision No.14/2000/QD-NHNN16 dated 07/01/2000.
2. During the course of implementation, if any problems, difficulties arise, relative units promptly reflect to the State Bank of Vietnam for consideration, supplementation and modification.
Article 40. Responsibility of implementation
1. Department of Information and Technology is responsible for supervision, inspection of the implementation of this Circular of the Units.
2. The inspection agency, banking supervision are responsible for coordination with Department of Information and Technology to inspect the implementation of this Circular over the credit institutions, branches of foreign banks and handling administrative violations for the violations according to law regulations.
3. Department of Internal Audit is responsible for the implementing internal audit the implementation of this Circular for the units under the State Bank of Vietnam.
4. Heads of relative units under the State Bank of Vietnam; Directors of branches of the State Banks provinces, cities directly under the central; Chairman of management board, General Directors (directors) of the credit institutions, branches of foreign banks are responsible for deploying and inspecting the implementation at its unit in compliance with law regulations of this Circular.
| FOR THE GOVERNOR |
Vui lòng Đăng nhập tài khoản gói Nâng cao để xem đầy đủ bản dịch.
Chưa có tài khoản? Đăng ký tại đây
Lược đồ
Vui lòng Đăng nhập tài khoản gói Tiêu chuẩn hoặc Nâng cao để xem Lược đồ.
Chưa có tài khoản? Đăng ký tại đây
Chưa có tài khoản? Đăng ký tại đây