Lao People’s Democratic Republic
Peace Independence Democracy Unity Prosperity
Ministry of Posts and Telecommunications No. 3623/MoPT
Vientiane Capital, Date 11th December 2011
Instruction
on Computer Safety
- Pursuant to Law No. 61/NA, dated 15th July 2015 on the Prevention and Defense of Cybercrime.
- Pursuant to Prime Ministerial Decree No. 22/PM, dated 16th January 2017 on the Organizational Structure and Activity of the Ministry of Posts and Telecommunications.
Minister issues instruction as follows:
- Objectives.
This instruction is aimed to roll out the content in article 24 of the Law on the Prevention and Defense of Cybercrime that relating to the specific measures on governing computer safety in order for the creation, prevention, management, surveillance and monitor on computer safety are united throughout the country.
- Network creation and prevention.
- Network creation
The creation of a safe computer network to use in management, administrative, services, and the use of Information Technology and Internet, network management authorities should follow:
- Creating network diagram for convenient management, installation, setting, and repairing;
- Creating specific sectors for computer network according to their functions such as internal and external computer network making it available to systematical monitoring threat;
- Validating devices to be installed in computer network and main computer network for instance scanning virus on computer and determining technical setting in those devices;
- Installing programs to monitor work status of those devices being connected to computer network;
- Accession to organizational computer network through internet connection must be recorded for each time of login and must be correctly authenticated;
- Movement and additional installation of devices are prohibited such as network connection device, computer connection device, main computer network system device or any other devices without permission from system management authorities.
- Main network system protection
To ensure a quick and accurate information providing system from the main computer network system, the management authorities of the main computer network system should follow:
- Determine an inclusive safety policy, accessible or preventing information circulation that might affect the system of main computer network;
- Ability to record all the changes happened to main computer network system for 24/7 or every time that changes happen to the setting of the main computer network system;
- Having procedures and methodology to monitor the safety system of the main computer network, if found any abnormal or having found any changes, a prompt solution must be addressed;
- Recording the history of mal-operation that happens to main computer network system as well as the operation of users, login-out to/from the system;
- Designate particular personnel responsible for the main computer network system to set up, solve, change, and to run the network system responsively;
- Determine necessary service route for accession, use, improvement, setting, solving, and adjusting the network system in order to reduce the risk of being disrupted of the main network system;
- External accession to the main computer network system (remote log in) or accession to internal network devices via FTP, FTPS, SSH must be coherent with organization’s policies.
- Wire network protection
To assure a safe computer network being connected to main computer network system, computer network and the main computer network system managers should follow:
- Install and use devices with international standards;
- Install intrusion prevention system to monitor the intrusion of computer network and find ways to keep computer network secured;
- Install attack prevention system DDoS that includes intrusion search and intrusion elimination system to prevent the main computer network system and computer network from stop working;
- Install Firewall to screen intrusion between internal and external computer network and to set up the system to record information circulation, log in-out of computer network in log management in order to examine, analyze intrusion, and plan for prevention;
- Accessing computer network from outside must be approved from system management authorities and be strictly controlled such as authentication and rights of users;
- Every time of the examination on operation of computer network needs to get approval from system management authorities or head of organizations;
- Edition or changes wish to be made on devices in computer network, computer network management authorities must have their technical staff informed and followed instruction;
- Having timeframe for monitoring, verification, and restoration. Adjustment computer network must be carried out from three to six months per time yearly.
- Wireless network protection
To assure computer network being connected to the main computer network system through the use of wireless computer to execute main computer network management system should follow:
- Install and use devices that have international standards;
- Set password for the log-in to manage signal from wireless fidelity router (Wi-Fi) and authentication password;
- Install Wi-Fi at a proper position and determine the areas of the use at a convenient and easy for restore place;
- Users are not allowed to bring wireless devices to install or use in their organizations such as Access point, Wireless Router, and Wireless card;
- Determine computer password (MAC address) that enables the use of Wi-Fi for authorized computers or authorized list with password that are set within organization;
- Change the name of Wi-Fi that is set from manufacturer to the name of the organization (Service Set Identifier);
- Set a proper Wi-Fi devices based on safety standard setting list for devices;
- Set up wireless router to protect accession to wireless protected access 2 by using password;
- Determine regulations for the use of organization’s Wi-Fi
- Having hardware or software in place to verify the safety of Wi-Fi and to record the abnormal uses
- Any abnormal use of Wi-Fi found should be reported to the management authority for prompt solutions.
- Malware prevention
In the prevention of Malware or computer virus from not spreading to shared computer networks, computer management authorities and users should follow:
- Install anti virus programs on computers with permission to use (software license) and restore them in a working mode;
- Use Windows Firewalls that come with window operation system to prevent virus from intrusion;
- Use virus detection or anti-virus programs that come with operation system such as Windows Defender;
- Detect and remove computer virus in information files and other documents before using and saving information files on files storing devices;
- Detect and remove computer virus on external hard disk, memory stick, and others before using;
- Never click on links or open documents that do not have sources or the attached documents in electronic mails that do not include senders’ addresses;
- Never open website or download computer programs that do not have trusted sources;
- In an event of virus, instant virus removing must be applied or informing the case to concerned authorities.
- Network management
- Computer user listing
Computer management authorities should determine rights, scope, and users’ history that will help enable verification and monitoring the use of computer network as follows:
- Accession to computer network;
- Accession to importation information in document management system;
- The use of specific programs such as accounting, human resource management, computer database, and others;
- Should immediately stop or remove irrelevant computer network users’ accounts in organizations;
- The irrelevant users are not allowed to make copies, destroy or change organizations’ information.
- Computer password setup
Computer network management authorities or its owners should set password for accession to computer as follows:
- Password should include digits, uppercase and lowercase letters and symbol or marks;
- Password should contain more than 8 letters;
- Easily doubtable password should be avoided such as abcdef, aaaaa, 123456;
- Password that contains users’ personal information such as name, surname, date of birth and phone number;
- Shall not allow other people to use one’s own user name and password;
- Shall not determine password in dictionary;
- System management authorities should change password 03 months per time;
- General users should change their password 06 months per time.
- The use of electronic mail
The use electronic mail in a correct and safe way should follow:
- Use electronic mail that is created and managed by one’s own organization;
- Immediately renew password after first log-in;
- Renew password for electronic mail should follow the process in above section III, number 2;
- Set up password for confidential information before sending through electronic mails;
- Shall not save password in computer or in places that can be easily seen;
- Shall not use others’ electronic mails without permission;
- Shall not fake senders’ names by hiding one’s own address or source of electronic mails;
- Shall not use organization’s electronic mails to register for services in websites;
- Shall logout from electronic mail system every time after finished using it.
- The use of internet
To use a secured internet, computer network management authorities and users shall follow:
- Determine regulations for the use of internet in organizations so that It can be conveniently checked and monitored;
- Computer network management authorities shall determine internet connection routes through Firewall system for their users in organizations;
- Computer network management authorities shall determine the rights to access to information based on specified organizations’ responsibilities;
- Internet users shall validate information retrieved from internet before utilizing it;
- In an event of accession to database through website browsers, internet users shall immediately close web browsers to prevent intrusion in database;
- Entering information password every time before sending through internet network.
- Safety awareness
Organizations or safety management units shall organize activities that will help raise awareness among internet network users in organizations so that they could acknowledge about internet intrusion as follows:
- Organizations or safety management units shall regularly organize trainings to help maintain computer network for users and management authorities within organization. Being prepared for harm that might happen in order to be able to restore damaged computer system back to working mode;
- Create motto on computer intrusion for instance advertisement, magazines, videos, safety tips to disseminate within organizations;
- Shall not press or express any extreme behavior when computers or programs stop working;
- Shall not fix or solve problems happened to computer system in organization without permission;
- In an event of not knowing how to fix problems happened to one’s own or organizations’ computers, computer system management authorities shall be informed;
- Read the popped up warning messages from operation system before accepting;
- Immediately log out from service system when not using it;
- Lock computer screen when not using it;
- Study and follow a guideline to use computer network devices safely.
- Computer data restoration
To assure the safety of computer data, the prevention of damages, and the regular function of computer, computer network management authorities and the users shall follow:
- Determine process or methodology to store data for instance backed up data, type of data, amount of backed up data, data storing process, the store of data, determination of time to store data, places for data to be stored and the recording of operation history;
- Create a safe data storing system;
- Store data in external hard disk regularly;
- Validate the stored data from 03 to 06 months to assure accuracy and readiness of data;
- Regulate plans or methodologies to regularly recover data capacities immediately when system downs/collapses.
- The store of safe data.
- Physical safety
Physical safety shall follow:
- Names, date and time on the coming in-out of people at data center shall be recorded;
- The entry and exit to/from equipment room must be installed fingerprint screening system, required for password to enter and exit the specified doors, requested for identification cards and installed closed-circuit camera for monitoring and the safety;
- Strictly create policies or regulations to service customers;
- Set up special technical room for service users to be able to inspect, monitor and for the convenience of improving equipment system of their own;
- Install warning alarm to notify when emergencies happen;
- Shall have automatic uninterruptible power supply system to respond to when electricity does not function properly;
- Temperature inside equipment room should not exceed 20-22 degrees Celsius;
- Shall install smoke or heat smoke detection system to notify the circumstances happening inside the buildings;
- Regularly test on harm prevention systems in data center in order for their readiness to function.
- hard ware maintenance
In order to keep computer network safe, rightly maintenance of hard wares, validation of operation or function shall be conducted as follows:
- Budgeting for the purchase of hard wares;
- Users or computer network management authorities must regularly check hard wares to be used in computer network management of their own, if damages or expired date found immediate replacement shall be planned;
- Computer system, main network system, connecting devices and receiving/forwarding signal devices must contain uninterruptible power supply (UPS) to ensure the continuous function when confronting irregular electricity supply;
- Routinely cleanse up computers to keep dust away from screen, keyboard, mouse, and computer case.
- Software maintenance
To maintain a safe computer network, software maintenance, operation monitoring or accurate function shall be practiced as follows:
- Regularly repair the computer operation system;
- Install and use authorized software license alongside with monitoring and inspecting valid date;
- Disk defragment to increase the data running capacity;
- Remove the unused computer programs.
- Electronic data safety
The store of a safe electronic data shall be prioritized in order:
- Prioritize the importance of electronic data;
- Use password to access electronic data;
- Determine rights for accessing electronic data;
- Electronic data stored in different places must be accurate and consistent in terms of quantity and content;
- Use software and destruction machine to eliminate data saved in devices such as hard disk, CD, DVD, hard drive.
- Coordination and Cooperation
Solving emergency problems happened to computer in data center shall be acted as follows:
- Data center shall establish a computer safety unit to coordinate for the defense and emergency solving work (Lao CERT center);
- Apply the process, technical standards when solving emergency problems happened to computers;
- Create and notify address, phone number and email to relevant organizations or computer emergency defense units;
- Coordinate to organize technical trainings, practicing to solve and respond to computer emergencies.
- Safety monitoring of main computer network and computer network system
- Cybercrime monitoring.
- Computer network management authorities and its general users shall follow information, warning and ways to handle with website hacking threat, computer network intrusion, and the expansion of Malware and others;
- Follow prevention guidelines and apply technical solutions from safety management units or from the defense and computer emergency solving center that issue notification periodically.
- Risk assessment.
To prevent the system of main computer network and computer network from damages, system management authorities shall have risk assessment in place and follow these steps:
- Analyst the intrusion on computer network that might happen;
- Assess the risk of connecting devices of computer network;
- Assess the risk of operators that might occur from operation, prioritization of information accession or information accession services;
- Assess the technical risk that might happen to computer, tools and equipment from being attacked by virus, computer programs or the computer system hacking;
- The risk that might come from natural disasters that will cause damages such as impaired function of the main computer network and computer network.
- Impact assessment and damages to organizations.
- Safety monitoring
Checking for defects or gaps that might occur to the main computer network that requires the system management authorities to follow these steps:
- Check the gaps in main computer network system and computer network to seek for defects, ways to improve, prevent, and solve;
- Test the operation of the main computer network system and computer network inside outside organization through hacking or stopping the operation.
- Safety surveillance
Data center safety surveillance shall follow these steps:
- Install surveillance system to monitor and check the intrusion that might happen to main computer network system and computer network;
- Establish monitoring surveillance to check the intrusion on the main computer network system and computer network for 24/7.
- Implementation
Defense and computer emergency response unit is assigned to collaborate with relevant sectors including local administration to advertise, disseminate, guide and implement this Instruction for its effectiveness.
Ministries, organizations equivalent to ministries and local administration, individuals, legal entities residing in Lao PDR shall accurately acknowledge and practice.
- Effectiveness
This Instruction is effective since the date of signature and practicable 15 days after posting on Lao Official Gazette.
Minister
(Signature and Sealed)
Dr. Thansamay kommasith
Download English:
Guidelines on Computer Systems Security No. 3623, dated 11 December 2017
Download Lao:
Guidelines on Computer Systems Security No. 3623, dated 11 December 2017