CIO-051 IT Information Technology Standards PolicyEstablishes the standards for the development and maintenance of Kentucky Information Technology Standards (KITS). This policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-072 IT Access Control and User Access Management PolicyProvides guidance in decision-making and practices to mitigate risk, protect the privacy, security, confidentiality, and integrity of the Commonwealth of Kentucky resources and data, and prevent unauthorized access to such resources.
Policy
CIO-073 Anti-Virus PolicyHelps protect computing devices (servers, desktops, laptops and tablets) from malware (viruses, Trojans, worms, hoaxes, etc.).
Policy
CIO-078 Wireless LAN PolicyOutlines security and data integrity measures required for secure wireless LAN installations within the state's intranet zone.
Policy
CIO-091 Enterprise Information Security Program PolicyThis policy has been created to align the Commonwealth's Enterprise Information Security Program with the security framework of the current National Institute of Security Standards (NIST) Special Publication 800-53.
Policy
CIO-092 Media Protection PolicyEnsures proper provisions are in place to protect information stored on media, both digital and non-digital, throughout the media's useful life until its sanitization or destruction.
Policy
CIO-093 Risk Assessment PolicyEnsures proper application of risk management principles through proactive risk identification, management and acceptance pertaining to information technology activities. It also identifies the family of controls for Risk Assessment as defined in NIST Special Publication 800-53.
Policy
CIO-102 Technology Sunset PolicyEstablishes the responsibilities for addressing technology in sunset status. Due to high support costs and increased security risks incurred through continuing use of out-of-support or "sunset" software that is non-compliant with the Commonwealth's Information Technology Standards, this policy is to establish appropriate cost recovery charges, in addition to normal services charges, when agencies continue to employ such software.
Policy
CIO-103 Independent Verification and Validation PolicyEstablishes controls related to the management of information technology (IT) projects within the executive branch of the Commonwealth. The controls provides guidance in decision-making and practices that optimize resources, mitigate project risk, and maximize return on investments.
Policy
CIO-104 Configuration Management PolicyProvides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment while also addressing purpose, scope, and compliance.
Policy
CIO-105 System and Information Integrity PolicyEstablishes a COT Enterprise System and Information Integrity for managing risks from system flaws, vulnerabilities, malicious code, unauthorized code changes, and inadequate error handling through the implementation of an effective system and information integrity program.
Policy
CIO-106 Enterprise Privacy PolicyProvides a structured set of principles for protecting privacy and serves as a roadmap for agencies to use in identifying and implementing privacy principles for the entire life cycle of Personal Information (PI), whether in paper or electronic form.
Policy
CIO-107 Enterprise Managed Print Services PolicyProvides a structured set of principles for Enterprise Managed Print Services (MPS). The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investments.
Policy
CIO-110 Enterprise Data Management PolicyEstablishes controls related to Enterprise Data Management. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-111 Software Development Life Cycle PolicyEstablishes controls addressing the approach to software development. The controls provide guidance in decision-making and practices that optimize resources, mitigate risk and maximize return on investments.
Standards
CIO-112 Security Planning PolicyEstablishes controls related to security planning. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-113 Contingency Planning PolicyEstablishes controls related to Contingency Planning. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-114 System Maintenance PolicyEstablishes controls related to maintenance of the Commonwealth of Kentucky’s information systems. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-115 Physical and Environmental ProtectionEstablishes controls related to Physical and Environmental Protection. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-116 Personnel Security PolicyEstablishes controls related to Personnel Security. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-117 System and Services Acquisition PolicyEstablishes controls related to System and Services Acquisition. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-118 System and Communications ProtectionEstablishes controls related to system and communications protection. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-119 Audit and Accountability PolicyEstablishes controls related to audit and accountability. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-120 Security Assessment and Authorization PolicyEstablishes controls related to security assessment and authorization. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-121 Security Awareness and Training PolicyEstablishes controls related to security awareness and training. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO-122 Enterprise Document Management PolicyEstablishes controls related to enterprise document management, including associated standards and supporting guidelines. The policy's chief focus is the creation of executive branch agency-specific Document Management Plans.
Policy
CIO-123 Identification and Authentication PolicyEstablishes controls related to identification and authentication. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
CIO–124 Commonwealth Asset Warehouse Physical Access PolicyEstablishes controls related to physical access to the Commonwealth Asset Warehouse. This policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment. Specifically, the policy ensures physical access is reviewed and implemented in a rational and predictable manner to increase efficiency and minimize the impact of change-related incidents upon service quality.
Policy
CIO-125 Supply Chain Risk Management PolicyEstablishes controls related to identification and authentication. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Policy
ENT-101 Enterprise Data Classification StandardDefines the classification scheme for public records and outlines data handling requirements throughout the lifecycle of data. It also provides recommended sample disclaimers for use when storing and transferring data of various classifications.
Standards
ENT-201 Enterprise Security Controls and Best PracticesDetails the security controls that COT’s Office of the CISO requires for information systems and activities for the Commonwealth of Kentucky. COT established this security framework using the moderate-level controls outlined in NIST Special Publication 800-53 Rev 5.
Standards