Vulnerability Management |
Apply security patches in accordance with Vulnerability Management Program requirements based on:
- Severity
- Applicability
- Exploitability
|
X |
X |
X |
Acceptable Applications and Configurations |
All operating systems, middleware, applications, and associated code/programs must be supported by the vendor, assessed by UISO, and free from malicious/harmful vulnerabilities and bugs |
X |
X |
X |
Malware Protection |
UISO cybersecurity agents installed and operating according to policy. |
X |
X |
X |
Centralized Logging |
Forward logs to designated log correlator. |
X |
X |
X |
Backups |
Included in UIS backup strategy. Encrypt backup data in transit and at rest. |
X |
X |
X |
Inventory |
Review and update asset records quarterly. |
X |
X |
X |
Configuration Management |
UISO cybersecurity agents installed and operating according to policy. |
X |
X |
X |
Firewall |
Enable host-based firewall in default deny mode and permit the minimum necessary services. |
X |
X |
X |
Credentials and Access Control |
- Review existing accounts and privileges quarterly.
- Enforce password standards.
- Administrative access to designated ports, interfaces, etc via secure methodology only.
|
X |
X |
X |
Multi-Factor Authentication |
Require two-factor authentication for all NetID user and administrator logins. |
X |
X |
X |
Cybersecurity and Capabilities Training |
Complete applicable and required cybersecurity, technology, and role-based trainings annually. |
|
X |
X |
Intrusion Detection |
UISO cybersecurity agents installed and operating according to policy. |
X |
X |
X |
Physical Protection |
Where applicable, place system hardware in a data center, secure lab, or office authorized by UIS. |
|
X |
X |
Administrative Access |
Administrative access to designated ports, interfaces, etc via secure methodology only. |
X |
X |
X |
Cybersecurity, Privacy, and Legal Review |
Applicable Cybersecurity, Privacy, and Legal reviews are required prior to authorization to launch into production. |
X |
X |
X |
Regulated Data Security Controls |
Applicable FERPA, GLBA, PCI DSS, HIPAA, export and privacy controls or other requirements must be implemented and operating per regulations |
not permissible |
not permissible |
X |