Mapping to the Handbook for Election Infrastructure Security#
Handbook BP # |
Handbook Best Practice Title |
Essential Guide Best Practice |
---|---|---|
1 |
Whitelist which IPs can access the device |
|
2 |
Regularly scan the network to ensure only authorized devices are connected |
Public-Facing Network Scanning |
3 |
Limit the devices that are on the same subnet to only those devices required |
|
4 |
Only utilize approved and managed USB devices with appropriate device encryption and device authentication |
|
5 |
Disable wireless peripheral access of devices unless required and the risk is formally approved by election officials |
Managing Wireless Networks |
6 |
Ensure the system is segregated from other independent election systems and non- election supporting systems |
|
7 |
Deploy Network Intrusion Detection System (IDS) (e.g., MS-ISAC Albert sensor) on internet and extranet DMZ systems |
Network Monitoring and Intrusion Detection |
8 |
If wireless is required, ensure all wireless traffic use at least Advanced Encryption Standard (AES) encryption with at least Wi-Fi Protected Access 2 (WPA2) |
Encrypt Data in Transit |
9 |
Use trusted certificates for any publicly- facing website |
Website Security |
10 |
Ensure logs are securely archived |
|
11 |
On a regular basis, review logs to identify anomalies or abnormal events |
|
12 |
Ensure critical data are encrypted and digitally signed |
|
13 |
Ensure staff is properly trained on cybersecurity and audit procedures and audit every election in accordance with local, state, and federal guidelines |
Building and Managing Staff |
14 |
Perform system testing prior to elections (prior to any ballot delivery), such as acceptance testing |
|
15 |
Ensure acceptance testing is done when receiving or installing new/updated software or new devices |
|
16 |
Conduct criminal background checks for all staff including vendors, consultants, and contractors supporting the election process |
Building and Managing Staff |
17 |
Deploy application whitelisting |
|
18 |
Work with election system provider to ensure base system components (e.g., OS, database) are hardened based on established industry standards |
Managing Vendors |
19 |
Regularly run a SCAP-compliant vulnerability scanner |
Public-Facing Network Scanning |
20 |
Utilize EAC certified or equivalent software and hardware products where applicable |
Managing Vendors |
21 |
Store secure baseline configuration on hardened offline system and securely deploy baseline configurations |
Backups |
22 |
Utilize write once media for transferring critical system files and system updates. Where it is not possible to use write-once media, that media should be used one time (for a single direction off transfer to a single destination device) and securely dispose of the media. |
Removable Media |
23 |
Maintain detailed maintenance record of all system components |
|
24 |
Require the use of multi-factor authentication |
User Management |
25 |
Require users to use strong passwords (14 character passphrases) if multi factor authentication is not available |
User Management |
26 |
Limit the number of individuals with administrative access to the platform and remove default credentials |
User Management |
27 |
Ensure that all devices are documented and accounted for throughout their lifecycle |
|
28 |
Utilize tamper evident seals on all external ports that are not required for use and electronically deactivate ports where feasible |
Asset Management |
29 |
Maintain an inventory of assets that should be on the same subnet as the election system component |
|
30 |
Establish and follow rigorous protocol for installing tamper evident seals and verifying their integrity upon removal |
Asset Management |
31 |
Conduct load and stress tests for any transactional related systems to ensure the ability of the system to mitigate potential DDoS type attacks |
|
32 |
Limit the use of personally identifiable information. When it is required, ensure that that it is properly secured and staff with access are properly trained on how to handle it. |
Endpoint Protection |
33 |
Conduct mock elections prior to major elections to help eliminate gaps in process and legal areas |
Exercising Plans |
34 |
Identify and maintain information on network service providers and third-party companies contacts with a role in supporting election activities |
Managing Vendors |
35 |
Implement a change freeze prior to peak election periods for major elections |
|
36 |
Prior to major elections, conduct in person site audits to verify compliance to security policies and procedures |
|
37 |
Work with vendors to establish and follow hardening guidance for their applications |
Managing Vendors |
38 |
Ensure logging is enabled on the system |
|
39 |
Use automated tools to assist in log management and where possible ensure logs are sent to a remote system |
|
40 |
Where feasible, utilize anti-malware software with centralized reporting |
Endpoint Protection |
41 |
Ensure only required ports are open on the system through regular port scans |
Firewalls and Port Restrictions |
42 |
Where feasible, implement host-based firewalls or port filtering tools |
Firewalls and Port Restrictions |
43 |
Verify software updates and the validity of the code base through the use of hashing algorithms and digital signatures where available |
Software Updates |
44 |
Ensure vendors distribute software packages and updates using secure protocols |
|
45 |
Maintain a chain of custody for all core devices |
Asset Management |
46 |
All remote connection to the system will use secure protocols (TLS, IPSEC) |
Managing Remote Connections |
47 |
Users will use unique user IDs |
User Management |
48 |
Use a dedicated machine for administrative tasks to separate day to day functions from other security critical functions (For some components this may not be practical to implement) |
|
49 |
Ensure that user activity is logged and monitored for abnormal activities |
User Management |
50 |
Regularly review all accounts and disable any account that can’t be associated with a process or owner |
User Management |
51 |
Establish a process for revoking system access immediately upon termination of employee or contractor |
User Management |
52 |
Ensure that user credentials are encrypted or hashed on all platforms |
User Management |
53 |
Ensure all workstations and user accounts are logged off after a period of inactivity |
|
54 |
Ensure your organization has a documented Acceptable Use policy that users are aware of which details the appropriate uses of the system |
Building and Managing Staff |
55 |
For data transfers that utilize physical transmission, utilize tamper evident seals on the exterior of the packaging |
|
56 |
Disable wireless peripheral access of devices |
Managing Wireless Networks |
57 |
Ensure staff is properly trained on cybersecurity and audit procedures and audit every election in accordance with local, state, and federal guidelines |
Building and Managing Staff |
58 |
Conduct criminal background checks for all staff including vendors, consultants and contractors supporting the election process |
Building and Managing Staff |
59 |
Ensure staff is properly trained for reconciliation procedures for the pollbooks to the voting systems and reconcile every polling place and voter record in accordance with local, state, and federal guidelines |
Building and Managing Staff |
60 |
Store secure baseline configuration on hardened offline system and securely deploy baseline configurations |
Backups |
61 |
Work with the vendor to deploy application whitelisting |
|
62 |
Utilize the most up-to-date and certified version of vendor software |
Managing Vendors |
63 |
Utilize write once media for transferring critical system files and system updates. Where it is not possible to use write-once media, that media should be used one time (for a single direction off transfer to a single destination device) and securely dispose of the media. |
Removable Media |
64 |
Only use the devices for election related activities |
|
65 |
Maintain detailed maintenance records of all system components |
|
66 |
Limit the number of individuals with administrative access to the platform and remove default credentials |
User Management |
67 |
Utilize tamper evident seals on all external ports that are not required for use |
Asset Management |
68 |
Ensure that all devices are documented and accounted for throughout their lifecycle |
|
69 |
Establish and follow rigorous protocol for installing tamper evident seals and verifying their integrity upon removal |
Asset Management |
70 |
Perform system testing prior to elections (prior to any ballot delivery), such as logic and accuracy testing |
|
71 |
Ensure acceptance testing is done when receiving or installing new or updated software or new devices |
|
72 |
Conduct mock elections prior to major elections to help eliminate gaps in process and legal areas |
Exercising Plans |
73 |
|
|
74 |
Implement a change freeze prior to peak election periods for major elections |
|
75 |
Prior to major elections, conduct in person site audits to verify compliance to security policies and procedures |
|
76 |
Verify software updates and the validity of the code base through the use of hashing algorithms and digital signatures where available |
Software Updates |
77 |
Ensure the use of unique user IDs |
User Management |
78 |
Ensure individuals are only given access to the devices they need for their job |
User Management |
79 |
Maintain a chain of custody for all core devices |
Asset Management |
80 |
Ensure all workstations and user accounts are logged off after a period of inactivity |
|
81 |
Regularly review all authorized individuals and disable any account that can’t be associated with a process or owner |
User Management |
82 |
Ensure your organization has a documented Acceptable Use policy that users are aware of which details the appropriate uses of the system |
Building and Managing Staff |
83 |
Use secure protocols for all remote connections to the system (TLS, IPSEC) |
Managing Remote Connections |
84 |
Ensure critical data is encrypted and digitally signed |
|
85 |
Ensure the use of bidirectional authentication to establish trust between the sender and receiver |
|
86 |
For data transfers that utilize physical transmission utilize tamper evident seals on the exterior of the packaging |
Asset Management |
87 |
Conduct criminal background checks for all staff including vendors, consultants and contractors supporting the election process |
Building and Managing Staff |
88 |
Track all hardware assets used for transferring data throughout their lifecycle |
|