Policy Statement: The Commonwealth Office
of Technology (COT) is responsible for providing a Commonwealth network
architecture and computing environment that enables its customers to protect
resources. In order to better protect
and secure the resources of the state computing environment, it is necessary to
enhance the Enterprise Network Security Architecture and to segregate resources
and types of activities.
Commonwealth Office of Technology, Office of Infrastructure Services, Division
of Communications, has the responsibility for the maintenance of this policy.
42.726 authorizes the Commonwealth Office of Technology (COT) to develop
policies that support and promote the effective application of information
technology within the executive branch of state government, as well information
technology directions, standards, and necessary management processes to assure
full compliance with those policies.
policy is to be adhered to by all Executive Branch agencies and staff,
including employees, contractors,
consultants, temporaries, volunteers and other workers
within state government.
for Compliance: Each agency is responsible for
assuring that staff members under its authority have been made aware of the
provisions of this policy, that compliance is expected, and that intentional,
inappropriate use of resources may result in disciplinary action up to and
including dismissal. It is also each Agency’s responsibility to enforce and
manage this policy. Failure to comply may result in additional shared service
charges to the agency for COT’s efforts to remediate issues relating to the
lack of adherence to this policy.
Cycle: This policy will be reviewed at least every two years.
furnishes the communications backbone for users of the Commonwealth of Kentucky
network, an enterprise shared resource. COT and its customers are required to
align access and resources in the most appropriate secure zone. In order to
better protect and secure the resources of the state’s computing environment,
it is necessary to enhance the Enterprise Network Security Architecture and
segregate resources and types of activities. This architectural change creates six
secure domains in the Commonwealth of Kentucky network (listed below).
1. Direct Internet Access Zone: The Direct Internet Access zone houses the
internet access for all other zones. This zone hosts no internal resources,
exists outside of the internet firewall, and has limited security.
2. Extranet Zone: The Extranet zone supports network
connections for agencies that are not part of the state Intranet (consolidated)
infrastructure. This zone is mainly used by non-traditional state government
agency/users and external business partners.
Limited connectivity is offered from this zone into the state network
infrastructure for resource access. This
zone has limited security and exists outside of the Internet firewall.
3. E-Government (E-Gov) Zone:
The E-Government (E-Gov) zone is the portion of the state network
infrastructure that provides access and services to quasi government
agency/users. This zone exists behind
the Internet firewall and has limited firewall and security services.
4. Enterprise DMZ Zone:
The Enterprise DMZ zone provides access to all consolidated public facing
servers. This is the only acceptable
zone within the state network infrastructure to house servers that can be
reached from the Internet. The DMZ
resides behind the Internet firewall and has the most restrictive port access
of any other zone.
5. Intranet Zone:
The Intranet zone is the core shared services container for all consolidated
agencies, which exists behind the Internet Firewall. COT controls all policies and access within
6. Agency Zone:
The Agency zone is used by various consolidated agencies that have their own
security zones, housing their specific services and users. These zones have
their own firewalls and related security services separating them from the
The Commonwealth does not allow the use of unencrypted
protocols (Telnet, FTP, HTTP) for the means of file transfer. The use of
unencrypted protocols opens the Commonwealth up to the unauthorized disclosure
and compromise of sensitive data, such as administrative user accounts,
passwords, and configuration files.
The usage of external “publicly
available” file transfer products (i.e. DropBox, SkyDrive, Google Drive and
similar others) is strictly prohibited.
Commonwealth does not allow the use of split tunneling for VPN
connections. Split tunneling opens up
additional risk by allowing pathways for data that bypass the secure boundaries
established to protect the network.