the requirements of DSD002 Annex 2 ‘Detailed DIP Operational Requirements’and DSD002 Annex 3 ‘The DIP-PKI (Public Key Infrastructure) Policy’ are in place;
Statements of Applicability demonstrating that all applicable ISO/IEC 27001 controls have been applied, where appropriate (where an organisation is ISO 27001 certified);
evidence of compliance with other recognised security frameworks such as Cyber Essentials or Cyber Essentials Plus;
written confirmation that the DIP Rules have been read and understood;
documents and processes are in place to ensure compliance with Data Protection Legislation. The DIP User shall provide, on request, evidence of compliance including relevant data protection policies, processes and, where applicable, data protection impact assessments. DIP Users acknowledge and agree that, notwithstanding the DIP Manager undertaking non-functional checks in accordance with this section, compliance with Data Protection Legislation remains the responsibility of the DIP User, and the DIP Manager checks shall not constitute validation of the completeness or correctness of a DIP User’s documentation or approach;
process for retaining all audit logs of basic user activities (e.g., logon, logoff, failed attempts) and security events for all information systems and services that interact with the DIP, within legal constraints, for a minimum of 3 months of live data and 12 month archived;
demonstration of logical network schematic of the information systems and services in scope that interact with the DIP, and include:
services and functionality;
gateway/boundaries functionality;
processes are in place for key management – demonstrable by written processes, logical diagrams and, at DIP Manager’s discretion (if possible), demonstration of process to place messages in storage;
process for retention of security events for all information systems and services that interact with the DIP – demonstrable by production of written process and, at DIP Manager’s discretion, demonstration of how record is accessed;
DIP Users systems are backed-up in accordance with best practice – demonstrable by ISO 27001 certification or equivalency and production of written process to back up systems, to include logical process diagrams;
processes, protocols and liabilities between the DIP User and any third Party they have contracted with - demonstrable by production of written documents (within limits of confidentiality); DIP Manager may contact the third party directly for verification at their discretion;
DIP User has a Cyber Incident Response Plan – demonstrable by production of written documents;
DIP User is aware of their responsibilities as a Data Processor/Controller in accordance with relevant Data Protection Legislation – demonstrable by production of applicable documentation detailing the DIP User’s responsibilities – this may be part of a wider document;
DIP User shall have processes in place to deal with breaches of DIP Data. This shall include process for informing relevant authorities and stakeholders, including the DIP Manager –demonstrable by production of written processes and, if applicable, any evidence that the DIP User has already carried out such processes; and
adherence to the Authority’s data best practice – demonstrable by production of written procedures and demonstration of examples of adherence.
Version | Date | Description of Change | Approval Reference |
1.0 | 01/10/24 | 01 October 2024 Non- Standard Release | P353/08 |