60FF-3.004. Protection Standards for State Network  


Effective on Thursday, May 19, 2022
  • 1To protect the integrity, predictability and availability of state communications services, Customers shall adhere to the following security specifications and directives:

    22(1) Any configurations of Network Equipment, Network Software or Communications Devices that allow for Unauthorized Activity are prohibited.

    40(2) Absent written approval from the Department, the following are prohibited:

    51(a) Any non-SUNCOM connections to or from the State Intranet without SUNCOM managed or sanctioned filtering;

    67(b) Any configurations creating non-SUNCOM managed Virtual Connections to or from the State Intranet;

    81(c) Any configuration creating non-SUNCOM managed tunnels to or from the State Intranet;

    94(d) Any configuration creating non-SUNCOM managed remote access Connections to or from the State Intranet; and

    110(e) Any non-SUNCOM managed equipment without two-factor authentication access. Authentication factors include, but are not limited to, something a person knows (e.g., password or personal identification number) and something a person has (e.g., cryptographic identification device or taken).

    148(3) To obtain approval for any of the conditions described in subsection 16060FF-3.004(2), 161F.A.C., Customers shall submit a Notice of Security Concern Regarding a Network Solution in accordance with Rule 17860FF-1.005, 179F.A.C. Additionally, if the Department does not keep a log for the Customer, the Customer shall maintain current 15-day log(s) for all of the Customer firewalls that connect any Customer Sub-network to any SUNCOM services outside of the Sub-network. The logs shall contain records for every transaction processed by the firewall with each record containing the following at a minimum:

    239(a) Source and destination ports contained in the transaction;

    248(b) Source and destination addresses contained in the transaction;

    257(c) The date and time for the transaction.

    265(4) The Department shall take several findings into consideration in determining whether or not to approve any of the conditions described in subsection 28860FF-3.004(2), 289F.A.C. Those findings shall determine whether or not the Customer has in place:

    302(a) The appropriate and generally accepted processes for protecting the State Intranet;

    314(b) A modern firewall using contemporary tools and functionality for protecting the State Intranet;

    328(c) Trained staff available to inform and work with the Department;

    339(d) Monitoring activities and modern tools that are adequate for protecting the State Intranet;

    353(e) Ongoing transparent access available to the Department to the information necessary to verify paragraphs (a)-(d) and perform associated diagnostics.

    373(5) Customers shall not use or allow scanning tools, Traffic generating stress testing of applications or communications, or network topology discovery tools that automatically generate repeated contact with other nodes outside the Customer’s Sub-network or across the SUNCOM network without written authorization from the Department. Customers shall request authorizations via email through the SUNCOM Network Operations Center. If the Customer is requesting authorization of a repetitive activity, the request must comprehensively define the repetitive activity. Authorizations shall be granted based upon the Department verifying that:

    458(a) The activity shall not impair the capacity of SUNCOM circuits to accommodate communications traffic; and

    474(b) The initiator of the activity shall coordinate the timing and extent of the activity to minimize impact on the State Network and its Customers.

    499(6) The Customer’s Information Security Manager, as established by section 509282.318(4), F.S., 511or the highest level information security official for the Customer, shall work with the Department to ensure that the Customer adheres to the Department’s security rules and any SUNCOM service requirement based on the appropriate technical specifications and procedures associated with the applicable service, as outlined in the Portfolio of Services.

    562(a) Customers shall adhere to all other applicable security requirements, including, but not limited to, chapter 282, F.S., and Rule Chapter 60GG-2, F.A.C.

    585(b) The Customer’s designees are responsible for:

    5921. Keeping any Unauthorized Traffic or Connection from traversing the SUNCOM network; and

    6052. Notifying the SUNCOM Network Operations Center (888-478-6266) immediately upon discovery, and in no case more than fifteen (15) minutes after, a Security Exposure (e.g., a virus, Denial of Service, worm, hoax email, discovery of hacking tools, or altered data) that impacts or has the potential to impact the State’s information resource is suspected or confirmed.

    661(7) Network Solutions obtained outside the official SUNCOM offering are subject to the Security Breach Protection provisions stated in Rules 68160FF-3.004 682through 68360FF-3.007, 684F.A.C., and shall be documented by the Customer, as required in subsection 69660FF-1.008(6), 697F.A.C., for Required Users or in Rule 70460FF-1.013, 705F.A.C., for other Customers.

    709(8) SUNCOM communication Traffic shall be monitored by the Department’s Division of Telecommunications for Unauthorized Activity. The Department will report violations to the Customer having appeared to have facilitated the Unauthorized Activity as well as the appropriate authority with jurisdiction over associated prevention and enforcement, which shall include the Florida Digital Service, and be remedied through the provisions of Rule 76960FF-3.006, 770F.A.C.

    771(9) The Customer shall provide documentation of network topology and configuration information to the Department during any related Network Security audits or during resolution or investigation of security incidents.

    800(10) Customers shall be responsible for resolving all Security Breaches, Security Exposures, and System Failures for conditions within the Customer’s purview and shall cooperate with the Department on SUNCOM resolution efforts through the provisions of Rule 83660FF-3.006, 837F.A.C.

    838Rulemaking 839Authority 840282.702(2), 841(9), 842282.707(2) 843FS. Law Implemented 846282.702(2), 847(8), (12), 849282.703, 850282.704, 851282.705, 852282.706, 853282.707 FS. 855History–New 6-25-08, Amended 5-19-22.