Security Policy

  • KCCA has been placed in protected zones with implementation of firewalls and IDS (Intrusion Detection System) and high availability solutions.
  • Before launch of the KCCA, simulated penetration tests have been conducted. Penetration testing has also been conducted <x times> after the launch of the KCCA.
  • KCCA been audited for known application level vulnerabilities before the launch and all the known vulnerability has been addressed.
  • Hardening of servers has been done as per the guideline of Cyber Security division before the launch of the KCCA.
  • Access to web servers hosting the KCCA is restricted both physically and through the network as far as possible.
  • Logs at different locations are maintained for authorized physical access of KCCA servers.
  • Web-servers hosting the KCCA are configured behind IDS, IPS (Intrusion Prevention System) and with system firewalls on them.
  • All the development work is done on separate development environment and is well tested on staging server before updating it on the production server.
  • After testing properly on the staging server the applications are uploaded to the production server using SSH and VPN through a single point.
  • The content contributed by/from remote locations is duly authenticated & is not published on the production server directly. Any content contributed has to go through the moderation process before final publishing to the production server.
  • All contents of the web pages are checked for intentional or unintentional malicious content before final upload to web server pages.
  • Audit and Log of all activities involving the operating system, access to the system, and access to applications are maintained and archived. All rejected accesses and services are logged and listed in exception reports for further scrutiny
  • Help Desk staff at the Authority Office monitor the KCCA at intervals of <frequency> to check the web pages to confirm that the web pages are up and running, that no unauthorized changes have been made, and that no unauthorized links have been established.
  • All newly released system software patches; bug fixes and upgrades are expediently and regularly reviewed and installed on the web server.
  • Audit and Log of all activities involving the operating system, access to the system, and access to applications are maintained and archived. All rejected accesses and services are logged and listed in exception reports for further scrutiny.
  • Help Desk staff at the Authority Office monitor the KCCA at intervals of <frequency> to check the web pages to confirm that the web pages are up and running, that no unauthorized changes have been made, and that no unauthorized links have been established.
  • All newly released system software patches; bug fixes and upgrades are expediently and regularly reviewed and installed on the web server.
  • Server passwords are changed at the interval of <x number> months and are shared by <y number> persons <a name> and <b name>.
  • <a name> and <b name> have been designated as Administrator for the KCCA and shall be responsible for implementing this policy for each of the web servers. The administrator shall also coordinate with the Audit Team for required auditing of the server(s).
  • KCCA has been re-audited for the application level vulnerability after major Modification in application development [Not applicable at first launch].
Compliance Audit

The KCCA> has been audited before launch and has complied with all the points mentioned in the policies document of the Cyber Security Group mentioned above. KCCA has also been subjected to an automated risk assessment performed through vulnerability identification software before and after the launch and all the known vulnerabilities have been addressed.

Citizen Services