CHRS Knowledge Base

Security Plan and Requirements

Updated on

image of technical letter

1.0 Introduction

Document Purpose

This document describes the CHRS Security Plan and Requirements as required by the system owner, CSU Systemwide HR (SWHR). The protection measures described in this document were designed to ensure CHRS complies with CSU Systemwide HR Policies, CSU Systemwide Information Security Standards and Policies governing information technology (including those with specific relevance to HR operations), information security and human resources as well as all pertinent state and federal regulatory requirements.

Security within CHRS will be addressed throughout the software development life cycle and within the environment supporting CHRS, including but not limited to the production and non-production network, operating system, and application levels.

Document Scope

This strategy was developed to ensure the confidentiality, integrity and availability of CHRS information assets. It outlines security controls that must be in place to reduce and mitigate CSU security risks with associated data from 23 campuses and the Chancellor’s Office (CO) residing in one consolidated environment. The CHRS Security Plan and Requirements is not intended to be a campus procedural document or a campus operational guide; however, it will include specific protocols that will govern the security of CHRS Systemwide data. The CHRS Security team will develop and distribute additional documents to support the implementation of this plan.

Requirements

  • The core security design for CHRS will include the following elements:
    • Security Administrators will be assigned to CHRS to support the security management activities at the CO and campus offices.
    • The CO Chief Information Security Officer (CISO) will be an integral part of the Security Administrator group to ensure security within CHRS is managed by subject matter experts and complies with CSU Systemwide Information Security Standards and Policies governing information security.
    • CHRS users will be permitted to view data applicable to their job duties only.
    • Campus Distributed Security Administrators (DSAs) and other designated employees may be permitted to access systemwide data to support development within a specific CHRS workstream, for a specified time, with appropriate approvals from Systemwide HR.
    • Authentication controls will be managed similar to the Common Financial System (CFS) through Systemwide Identity Access Management (IAM) infrastructure.
    • Access to the CHRS systemwide data will be based on the principles of “need-to-know” and least privileges.
    • All users will comply with all CSU policies governing information security.

2.0 Systemwide HR Requirements (SWHR)

  • Each campus is its own appointing authority. As such, all campus information must be secured at the campus level both in production and non-production database instances. Applicable CSU Systemwide HR and Security Policies must be followed. Refer to the CSU Information Asset Management Policy.
  • Where specific approvals have been documented, an employee may be granted access to data at another campus when working on a specific CHRS systemwide project for a specified duration. In those instances, a Confidentiality Agreement must be signed by the employee and approvals to grant such access must be obtained from SWHR. Periodic audits of changes made to permissions and security roles must be performed to ensure the access assigned was authorized, appropriate and applicable to the functions being performed. The annual user access review will be based on the CSU Information Security Policy. The details around these processes will be documented in the CHRS Security/Operational Guide.
  • In all other situations, all security strategies must be administered in such a way that campus employees are able to only access information needed to perform their job duties. All regulatory laws and CSU policies requiring the protection of confidential personal data as mandated by the Information Practices Act must be adhered to, as identified in coded memo HR 2005-16.
  • The CSU also complies with the Family Educational Rights and Privacy Act (FERPA), which prohibits the release of education records without student permission. Each campus is responsible for campus record-keeping and procedures relating to student and employee personal information. In addition, each campus is required to maintain appropriate access, disclosure, and confidentiality of student and employee personal information.
  • Each campus must ensure that all employees with access to confidential personal information have a legitimate CSU need to have such access. These employees must understand the responsibility they have under the Information Practices Act and Title 5 to protect sensitive personal data.
  • Confidential personal information should not be transmitted outside the CSU unless it is for legitimate CSU purposes. Recipients must be informed that the information provided is confidential and is provided for the sole purpose of the specific business need. Also, recipients must be informed that they are responsible for the protection of the information and the destruction of all files after the intended use is satisfied

System Applications/Specific Processes

  • The following system application security requirements, in addition to the information outlined above, must be adhered to for CHRS. These operational security requirements apply to production and non-production CHRS database instances.

Employment information

  • Employee information must be secured at the campus and department levels and only accessible to employees based upon a “need-to-know” basis to perform their assigned job duties.
  • Employment information includes but is not limited to information identified as Level 1 and/or Level 2 data. Refer to the Data Classification standards referenced in section 2.1.5 below.

Campus Conversion Validation

  • The approach used for campus validation of converted data for CHRS must adhere to the security requirements outlined previously to ensure all data is secured by the campus. Access must be provided in a manner that enables campus designated employees to validate data at their respective campus by specific job function(s).

CHRS Development

  • CHRS development will be handled by the CMS central. Campus-specific modifications to CHRS are not allowed. Therefore, campus development access will not be authorized, unless it is granted to support a specific CHRS Program workstream activity.

CHRS Intergration with Campus Solutions (CS)

  • For CHRS, data will not be kept in sync between CHRS and the 23 CS systems. Instead there is a more complicated relationship with shared data elements that are documented in the CHRS Integration Guide.
  • Each campus must secure their campus CS system to ensure any access to HR data is authorized and appropriate based on the employee’s assigned job duties. Periodic audits will be governed by a Central Security Administrator to ensure campus compliance; details of these audits and controls will be included in the CHRS Security Guide.
  • Systemwide HR is the data owner of employee Person Data and a designated delegate will work with respective campus representative(s) to manage demographic related data discrepancies. Operational processes that govern how personal information will be updated within CHRS and how the Personal Data Management system will be defined for use for CHRS Integration Guide.

CHRS Non-Production Data Masking

  • Specific development functions must be performed in the CHRS non-production environments where data may not be fully secured. In these instances, sensitive data must be masked and/or scrambled to minimize the possibility that personally identifiable information could be associated with actual employees. (All exceptions must be approved by the CHRS Program Leadership.) To protect information in this category, the following data elements, at a minimum, are considered sensitive and must be protected as noted above.
    1. SSN – National ID
    2. Name
    3. Bank Account Number
    4. Credit Card Number
    5. Email Addresses

CHRS Data Classification

  • Access, storage and transmissions of sensitive data are subject to restrictions as described in the CSU Asset Management Standards. The definitions of data items are defined in the Information Security Data Classification. Employees may be granted access to these data items only as it is relevant and necessary to perform their job duties.

CHRS Data Access

PeopleSoft Reporting

  • Access to PeopleSoft query and reporting capabilities will use delivered PeopleSoft application security controls and row level security. This is to ensure that query access maintains the same level of controls as access given to menus and pages.
  • PeopleSoft online reporting and query is one of the reporting tools for CHRS. Direct SQL access is not intended for reporting and is provided for technical support and integration purposes. The CHRS data repository/reporting solution will be the primary reporting tool. Campuses will, for a specified time, maintain a copy of their legacy system to allow for historical reporting. Retention timeline of the legacy database will be required to adhere to data retention schedules.

Database SQL Access

  • Access to the CHRS production database for technical support and service accounts, e.g. 3rd-party integrations, will be allowed using Oracle accounts. The default and standard CSU_SELECT role as outlined in the Validating Oracle Users and Roles document will not include any tables that contain employee specified confidential data such as Social Security Number and Bank Information. The CSU_UPDATE role will be limited to CO staff within the CHRS environment.
    • Only a limited number of campus-based employees may be granted direct database access for their respective campus to view and/or query information containing sensitive data.
    • Level 1 and 2 data will be segregated by campus using campus specific Oracle views/roles which must be requested and approved by Systemwide HR.
    • A few predefined tables that include employee related data will be secured by campus and provided as a baseline.
    • Access to the campus-specific Oracle views will be provided by way of campus-specific Oracle roles.

Roles and Permissions

  • Security Roles and Permissions lists for CHRS will be defined and maintained by the CHRS Security Team. A systemwide set of security roles and permission lists will support approved job functions required to implement the CHRS business practices defined and approved by Systemwide HR.
  • Campuses will have the ability to assign roles to users based on the job function(s).
  • Campuses may create/modify roles and permissions lists in a development instance for testing and may submit a request to the Central Security Office to implement those changes in PRD, supplying the required specific business need/function this addresses. The request will be reviewed by the CHRS Security Team and approved by the Systemwide HR for inclusion in CHRS.

Distributed Security Administrator Access

  • To highlight the shared responsibilities of CHRS, campus security administrators will be referred to as Distributed Security Administrators (DSA’s) and will have full access to Distributed User Profiles. They will have to submit a CMS Data Center Campus Security Administrator “CSA” Application in order to gain access.

Person Data1 (Demographic) /Searches

  • HR Person Data may be viewed by campus employees on a “need-to-know” basis to perform their job. Certain Person Data elements may also be viewed to preclude duplicate records from being added to the system, e. g. Search Match functionality. Data available for online viewing and searches include information contained in the existing CSU ID Search Modification.
Search Criteria Search Results
Name Name
SSN (full) SSN – last 4 digits
Employee ID/Record Number Empl ID/Record Number

Job Code and Description

HR Status (Active/Inactive)

Department ID and Description

Date of Birth (Month and Date)

Organization Relationship

Employee Class

POI Type

Business Unit

3.0 CHRS Security Oversight Structure

  • The CHRS security oversight structure defines the functions, relationships, responsibilities, and authorities of committees and individuals that support CHRS.

Systemwide Human Resources

  • The data owner for CHRS are representatives within Systemwide Human Resources, Vice Chancellor for Human Resources and the Associate Vice Chancellor of Human Resources Management. The data owner is ultimately responsible ensuring that CHRS data is securely and consistently maintained.

CHRS Data Standarization

  • CHRS will bring about common usage of fields in the PeopleSoft application wherever required based on all campuses being in a single instance. Core Standardization team(s) were formed along with the designation of campus Data Coordinators. The Core CHRS Standardization team will work closely with campus teams to define
  • 1 Refer to the data standards defined as part of the CHRS Systemwide HR Data Standardization project for a complete listing of Person Data elements (Phase I).
  • and provide data definitions/standards in accordance with applicable laws, SWHR policies, CBA provisions and/or HR best practices. The Core Standardization team also facilitates agreement among campuses on fields to be used consistently where there are no applicable policies or CBA provisions.

CHRS Security Team

  • A review team, comprised of leads and subject matter experts (SMEs from campuses and CMS Central, was created to support CHRS information security requirements and initiatives. This team is responsible for developing the system roles and permission lists approved for CHRS which Distributed Security Administrators will use to control access for users. A security matrix that describes what access basic roles need will be made available based on position requirements, security guidelines and input from the CHRS Solution Module Design teams. Any requests to modify or add roles and permissions will be reviewed by this team and a recommendation and/or approval will be submitted to the Central Security Administrator.

Central Security Administrator

  • The Central Security Administrator (CSA) will work with the CO (CMS and SWHR) and campus staff, to validate the security design and provide post-implementation support. The CSA’s duties include but are not limited to the following:
    • Consultation with campus and CO staff to meet operational security needs.
    • Consultation with the project team to ensure CHRS compliance with CSU Systemwide Information Security Policies and Standards.
    • Evaluation of user security requests and consultation with appropriate resources to ensure requests comply with CHRS security policies, standards and audit guidelines.
    • Providing support to campuses and CO during audits.
    • Granting access of DSA User Accounts:
      • On-going responsibility will be performed by Systemwide Security Maintenance rather than Administration.
    • Monthly, quarterly, and annual review of CHRS security to ensure compliance with Segregation of Duties policies.

Systemwide Security Maintenance

  • CO Systemwide Security Maintenance will have full access to the CHRS User Profile pages and will manage the following tasks:
    • Completion of quarterly access reviews
    • Granting of access to all security roles as requested by campuses
    • Granting access of all Distributed Security Administrator (DSA) roles

CMS Technical Services and Application Development Team

  • CMS Technical Services will manage the production infrastructure associated with the application and web tiers, supporting the CHRS environment in accordance with CSU Systemwide Information Policies and Standards.
  • This includes all tasks associated with application server setup, configuration and management, process
  • scheduler setup, configuration and management, FTP accounts, and web server setup configuration and management. CMS Technical Services is responsible for ensuring appropriate resources at the web and application tier and include responsibilities for capacity planning, tuning, and installation.

Distributed Security Administrators

  • To highlight the shared responsibilities of CHRS, campus security administrators will be referred to as Distributed Security Administrators (DSA’s). The DSA’s will be managed using PeopleSoft delivered Distributed User Profiles functionality. They will be given the capability of assigning roles restricted to those in their Role Grant domain.
  • DSA’s will provide security support for operational activities at the campus within the limitations of the access provided to them. Other duties of the DSA’s include but are not limited to the following:
    • Establish and maintain user profiles in CHRS for their respective campus.
    • Process user access requests by assigning privileges to user accounts once campus approval process has been completed.
    • Maintain campus documentation related to users’ requests and approvals.
    • Accept and review user requests to access non campus-based security objects. Such requests are forwarded to the Central Security Administrator based on approval from Campus Application Owner.
    • Participate in audits of user accounts in accordance with CSU Information Security Policies.
    • De-provision accounts when a user has separated from the institution by removing administrative access.
    • Dynamic roles will be removed based on the criteria that has been defined.
    • Monthly, quarterly and annual reviews of SoD reports for compliance.
  • DSA’s and their backups can grant any level of access or responsibility within the roles granted to them for the CHRS PeopleSoft application. This responsibility includes delegating limited administrative capabilities to Application Leads. This special role provides the ability to administer the rights to any menu, component, page or tool within CHRS, again delineated by the role granted through the Role Grant functionality, and therefore should be deployed sparingly.

4.0 CHRS Security Training

  • A Systemwide CHRS implementation support program will be provided and will include training for the CHRS security model. Information Security Awareness and Training policy mandates that all employees with access to protected data and information assets must participate in appropriate information security awareness training.

5.0 Authentication and Access Control

  • CHRS will implement a custom end-user authentication process that uses systemwide federated authentication. Users that successfully log in will be able to access resources based on their roles as defined and granted within CHRS.
  • The following approach provides an example of this model:
    1. A user attempts to access the main page of CSYou.
    2. The user is redirected to their local campus Shibboleth Identity Provider (IAM infrastructure) to present their campus managed credentials.
    3. Once authenticated, the user will be redirected back to CSYou where they will find a link to access CHRS.
    4. This link executes the custom login process that works in conjunction with the PeopleSoft Sign-In code to create the user login session.
    5. If the user has been provided roles, they will be able to perform any functions granted to them.

Password Management

  • The PeopleSoft Password Management feature will NOT be used in CHRS. Campuses are responsible for managing their campus login credentials used for federated authentication and as a result are encouraged use implement strong passwords that meet or exceed the systemwide information security guidelines.

Multi-factor Authentication (MFA)

  • Multi-factor authentication must be used with any login and is a requirement for access into CHRS.

6.0 CHRS Security Incident Management

  • CHRS will comply with the Information Security Incident Management Polices as defined in the California State University Systemwide Information Security Policy.

7.0 CHRS Business Continuity and Disaster Recovery

  • Campus and CO users and administrators access the CHRS at the Unisys data center. Disaster recovery for all of CMS, including the CHRS, is managed and coordinated within the purview of the Unisys data center contract.

8.0 CHRS Infrastructure

  • This section describes differences to the CMS security infrastructure made to support the CHRS application environment. All current CMS security practices, policies and procedures will be in place for CHRS. This includes all current security components such as VPN, IDS, and Firewalls that are in place for the CMS environment. This section covers only areas where CHRS is different from current Common Management System, Common Financial System, Human Resources and Student Administration 9.0 environments.

Oracle Database User Accounts Password Management

  • The Oracle account’s password controls will comply with CSU Policy Access Control and Standard 8060.S01 Access Control and Access Control Chancellor’s Office Password Standard 8060.COS001.

9.0 Data Retention

  • Reference CSU Records/Information Retention and Disposition Schedule which outlines requirements based on Executive Order 1031.

Additional References

CSU Policy Library – Title Search

Access Control 8060.S01

Configuration Management Policy 8050.0.

HIPPA Regulations as Amended by the HITECH Act

Information Asset Management Policy 8065.0.

Information Security Data Classification 8065.S02.

End of Article

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Previous Article (job aid) Security Dynamic Roles
Next Article (job aid) Security Roles for CHRS
Do you need an article? Contact Us