System Configuration
All servers and network devices on USI networks, whether managed by employees or by third parties, must be built and deployed in accordance with this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
- All systems are created via system intake process.
- All systems must be documented for initial build and subsequent updates and patches in the asset inventory tracking system.
- All systems commonly affected by viruses such as servers, workstations and laptops on USI networks, whether managed by employees or by third parties, must be configured with IT Security approved anti-virus software.
- All systems must have a defined backup plan.
- All systems must log access control events, the audit trail must be secured, and history retained.
- All system patches and updates must be reviewed for significance and appropriately applied, and vulnerabilities managed as defined in the Vulnerability Management section.
- All systems must adhere to firewall requirements as stated in the Firewall and Router Security Administration section.
Firewall and Router Security Administration
-
All server firewalls and all network firewalls and routers on USI networks, whether managed by employees or by third parties, must follow this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
System Administrator Responsibilities
- Assuring changes to hardware, software, and security rules of firewalls and routers are included in IT Security Change Control
- Enabling appropriate logging on all security systems and performing active daily monitoring of the logs that report security events.
- Providing IT Security with read-only access to security event logs.
- Reporting network and server security incidents to IT Security immediately upon discovery.
- Ensuring that server firewalls and network firewalls and router configuration files are secured and synchronized properly.
.
Software Development
All development efforts of software designed to run on USI Enterprise Resource Planning (ERP) computing systems, whether managed by employees or by third parties, must follow this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
ERP systems have a test/development environment, separate from the production environment, used to test all new software. If the test environment has connectivity with the production USI network, access controls must be in place to enforce the separation. If the test system uses data copied from production systems, then the same data and systems security enforced on the production system must be enforced on the test system.
Managed Detection and Response (MDR)
IT Security with support from the MDR provider and the Student Security Operations Center (SOC) is charged with protecting the University’s electronic information assets, including performing ongoing, routine network security monitoring and using technologies to detect and/or prevent network intrusion.
IT Security may use the following monitoring technologies on the USI network:
- Intrusion Detection
- Intrusion Prevention
- Firewalls
- Network layer antivirus and anti-malware
- Network layer advanced threat protection
- URL / IP based reputation filtering
- Data Loss Prevention
- Netflow traffic monitoring.
Vulnerability Management
All servers and network devices on USI networks, whether managed by employees or by third parties, must be built and deployed in accordance with this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
Critical servers and network devices are routinely scanned for known published vulnerabilities. Identified vulnerabilities are reviewed weekly for significance and are appropriately applied. Designated industry websites are reviewed weekly for security advisories.
Encryption
This policy documents encryption standards that must be used on all applicable mechanisms and systems on USI networks, whether managed by employees or by third parties.
Encryption is required for all laptops, and workstations that may be used to store or access critical and restricted information. Portable drives may only be used to store or access critical and restricted information if an approved encryption solution is available.
Critical and restricted information must be encrypted during transmission over networks in which it is easy and common for the data to be intercepted, modified or diverted (such as the Internet, wireless network, GSM, and GPRS). Some examples of strong encryption that is acceptable are:
- Transport Layer Security (TLS) v1.2 or higher
- Internet Protocol Security (IPSEC)
- SSH-2 or higher with a 2048 bit or larger key
The encryption technology used must only accept trusted keys and/or certificates, use secure configuration and not use insecure versions. The encryption strength must be strong and based on vendor recommendations or industry best practices. Any exceptions must be authorized by CIO/CISO.