Protecting Public Services
A comprehensive operational framework to strengthen the security of local authorities’ information systems, integrating governance, priority measures, business continuity, and effective crisis management.
Main Risks for Local Authorities
Threats
-
-
Ransomware: data encryption, service interruption (civil registry, school meals, payment office).
-
Phishing: credential theft, wire fraud.
-
Exposure of public-facing tools: misconfigured RDP/VPN, unpatched CMS.
-
Data leaks: sharing errors, lost devices, uncontrolled cloud services.
-
OT / Connected urban systems: cameras, access control, signage, smart buildings.
-
Summary
-
-
Multi-factor authentication (MFA) for email, VPN, and line-of-business systems
-
3-2-1 backups, tested and offline
-
Updates and patches within 14/30 days depending on severity
-
Network segmentation (users / servers / OT / guest Wi-Fi)
-
Email filtering + anti-phishing training
-
Centralized logging + monitoring (SIEM/EDR/antivirus)
-
Objectives
-
-
Protect the confidentiality of administrative data
-
Ensure confidentiality for both staff and citizens
-
Strengthen access and action traceability
-
Prevent unauthorized alteration or manipulation of data
-
Ensure traceability and compliance (GDPR, audit logs)
-
12 Priority Actions
-
- Generalized MFA, including email, VPN, admin access, and business apps
- 3-2-1 backup strategy: three copies, two media types, one offline or immutable + quarterly restoration tests
- Structured patch management, based on updated inventory, CVSS prioritization, and phased rollout
- Hardening of workstations and servers, disabling macros, enabling local firewall, and application control
- Network segmentation, VLANs per usage, inter-zone filtering, isolated guest Wi-Fi
- Supervised EDR/antivirus, with detection, analysis, and quarantine
- Mail & web filtering, sandboxing, DMARC/DKIM/SPF, blocking recent/suspect domains
- Identity management with least privilege, named accounts, and automatic revocation
- Centralized logging (syslog/SIEM), NTP timestamping, retention ≥ 6 months
- Business continuity, with BCP/DRP, critical service prioritization (civil registry, payroll, school meals…), and regular tests
- Ongoing awareness training, micro-learning and phishing simulations
- Supplier management, including monitoring, controls, and security obligations
Modes & Policies
Information Security Policy (ISSP/PSSI)
Provides a clear framework covering governance (elected official, IT dept, CISO), data classification, access rules, backup practices, incident management, and requirements applied to service providers.
Charters & Procedures
-
-
User / administrator charter
-
Access rights procedure & periodic review
-
Password / MFA policy
-
Backup & restoration procedure
-
Incident Response Plan (IRP)
-
Incident Response
-
-
- Detect: EDR/antivirus alerts, SIEM, user reports
- Qualify: type (malware, leak, fraud), scope, criticality (impact on services/citizens)
- Contain: isolate devices/servers, disable compromised accounts, block IOCs
- Eradicate: remove root cause (malware, accounts), fix vulnerabilities
- Recover: restore from clean backups, test, phased return to service
- Communicate: crisis unit (official, CEO, IT, comms), inform citizens if required
- Notify: regulatory reporting (e.g., CNIL for personal data)
- Post-incident review: lessons learned, action plan
-
Compliance
-
-
- Data protection: processing register, minimization, legal basis, DPIA if needed, citizen information
- Log management: proportionality, purposes, appropriate retention periods
- Public procurement: security requirements in contracts (SLA, incident reporting, encryption, reversibility)
- Administrator access: traceability, named accounts, strong access control
- Archiving: integrity, long-term preservation, document lifecycle
-