Technology Services security policies

Policies outlining best practice for maintaining technology security at Essex County Council.

The technology security policies shown below ​must be followed by all Technology Services staff, contractors and any third parties working on their behalf when providing services to customers​.​​

A

Access Control Policy (PDF, 312KB) - management of access to information, premises and resources.

B

Backup Policy (PDF, 244KB) - policy on the best practice for backing up information.

Business Continuity Management Policy (PDF, 240KB) - policy on business continuity management.

C

Cloud Security Policy (PDF, 308KB) - ensuring secure implementation of Cloud services.

Cryptography Policy (PDF, 213KB) - the use of cryptography to protect information.

I

IT Disaster Recovery Policy (PDF, 281KB) - ensuring plans are in place to recover IT infrastructure following a disaster, should one occur.

L

Logging and Monitoring Policy (PDF, 271KB) - how activities should be logged and monitored.

M

Malware Protection Policy (PDF, 257KB) - ensuring protection from malware, such as viruses and worms.

N

Network security policy (PDF, 238KB) – Securing network communications.

O

Operations Security Policy (PDF, 249KB) - ensuring secure operation of information processing facilities.

S

Secure Asset Management Policy (PDF, 273KB) - how to manage assets securely.

Secure Configuration Policy (PDF, 249KB) – Configuring devices, systems, and services securely to prevent them being compromised. 

Secure Design, Development and Testing Policy (PDF, 231KB) – designing and developing systems and services securely, and confirming this through appropriate security testing. 

Security Incident Management Policy (PDF, 260KB) - the controls that must be applied to effectively handle information security incidents, should they occur.

Security Organisation and Compliance Policy (PDF, 271KB) - ensuring security organisation and compliance.

Supplier Security Management and Assurance (PDF, 251KB) – making sure there is appropriate assurance of the services suppliers provide being securely delivered, operated and maintained. 

T

Technical Vulnerability Management Policy (PDF, 265KB) - best practice for ensuring that technical vulnerabilities are managed appropriately.