Operating System |
Maintain current supported version as designated by UIS configuration management |
X |
X |
X |
Vulnerability Management |
Ensure server is recorded in Tenable.
- Remediate severity 5 vulnerabilities within 48 hours,
- Remediate severity 4 within 7 days
- Remediate severity 3 vulnerabilities within 14 days.
|
X |
X |
X |
Inventory |
Maintain a list of applications and the associated risk classifications and data volume estimates. Review and update records quarterly. |
X |
X |
X |
Firewall |
Permit only the minimum necessary services. |
X |
X |
X |
Credentials and Access Control |
Review existing accounts and privileges quarterly. Enforce password complexity. Logins with NetID credentials via WebAuth/SAML. |
X |
X |
X |
Centralized Logging |
Forward logs to UIS Splunk. |
X |
X |
X |
Secure Software Development |
Include security as a design requirement. Review all code and correct identified security flaws prior to deployment. Use of static code analysis tools recommended. |
|
X |
X |
Developer Training |
Attend role-based Information Security training course annually. |
|
X |
X |
Backups |
Back up application data at least weekly. Encrypt backup data in transit and at rest. |
|
X |
X |
Multi-Factor Authentication |
Require Duo multi-factor authentication for all interactive user and administrator logins. |
X |
X |
X |
Dedicated Admin Procedures |
Execute system administrative actions in accordance with departmental and security procedures (admin accts, secure devices, etc) |
X |
X |
X |
Security, Privacy, and Legal Review |
Request a Security, Privacy, and Legal review and implement recommendations prior to deployment. |
X |
X |
X |
Regulated Data Security Controls |
Implement PCI DSS, HIPAA, or export controls as applicable. |
not permissible |
not permissible |
X |