Para 3.22.45 — MSO (Audit)
Original Rule Text
What This Means
When government organisations use local area networks (LANs), wide area networks (WANs), or web-enabled systems, they must implement comprehensive network communication security controls. These cover protecting sensitive information during transmission, safeguarding network hardware, documenting network configurations, controlling changes, monitoring for security incidents, restricting physical and logical access, using firewalls, and designating a trained Network Administrator responsible for security.
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.
Key Points
- 1Sensitive information on networks must be protected using appropriate techniques
- 2Network devices (routers, switches, modems) must be physically protected from damage
- 3Network configuration must be documented, and changes require prior authorisation from the Network Administrator
- 4Firewalls must isolate internal networks from external connections; web servers must be separated from data servers
- 5A trained Network Administrator must be designated to monitor security, investigate unusual activity, and respond to breaches
Practical Example
A regional government office connects its 50 computers through a LAN and has internet access for email. The Network Administrator maintains a documented network diagram showing all routers, switches, and connections. When a new department is added, the administrator must formally authorise the network change and update documentation. A firewall separates the internal network from the internet, and the web server hosting public information is on a separate network segment from the database server containing financial records. The administrator reviews access logs daily for any suspicious activity.
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.
Frequently Asked Questions
Why must firewalls be tested for vulnerability regularly?▼
Why should database servers not have direct internet access?▼
What is the role of the Network Administrator in security?▼
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.