1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...
|
|
|
- Pauline Cannon
- 10 years ago
- Views:
Transcription
1 Contents 1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network Firewall Standards Wired network Wireless Network Third Party Access Control to the Network External Network Connections Maintenance, contracts, backup and recovery Protection and Malicious attack Enforcement... 8 Information Services (IT), Edinburgh Napier University Page 1 of 8
2 1 Purpose 1.1 The sets out the specific responsibilities, conditions and practices to ensure an available, secure and protected Network 1.2 This policy takes into account the requirements of the Data Protection Act and ISO27001: Scope 2.1 This policy sets out the requirements, roles and responsibilities for a secure Edinburgh Napier University Network. Edinburgh Napier University, Information Systems will; Ensure, where reasonably practicable, that the Network supports the diversity of uses and applications required from the University community, its researchers and partners Ensure availability Protect the Network from unauthorised access Protect the Network from accidental disruption Protect confidentiality Ensure network access can be audited Define what the Network may be used for and what is not acceptable 3 Roles and Responsibilities 3.1 Information Security Board will: Support administrators in defining appropriate user groups and roles to support Role-Based Access Control (RBAC) Audit user and access lists on a quarterly basis to ensure that unauthorised attempts are identified and for anomalies in Super User access Perform annual policy and procedure reviews. 3.2 Network Services & Security Team will: Create and maintain procedures, and document all necessary Network and Network Security configurations Monitor and analyse Network traffic for optimum performance and security. 3.3 All Network Users will act responsibly at all times and be aware of the associated risks and penalties for breaches of this policy. Information Services (IT), Edinburgh Napier University Page 2 of 8
3 4 Physical & Environmental Security 4.1 All core network switching, management systems and port distribution systems will be housed in a secure location with UPS and access control. These secure areas will; Allow entry to secure areas housing critical or sensitive Network equipment only to those who are authorised to do so Have code or card access systems Only allow visitors or 3 rd party access with IS authorisation. A list of authorised users will be maintained and regularly reviewed Have smoking, eating and drinking prohibited 4.2 All visitors or 3 rd party access must have agreed to the University Information Security Policies prior to accessing the secure Network areas and must be made aware of security requirements. 4.3 All visitors to secure network areas must be logged in and out. The log will contain name, organisation, purpose of visit, date, and time in and out. 5 Access Control to the Network 5.1 Access to the network will require a secure log-on procedure (See Edinburgh Napier University Access Control Policy). 5.2 Registration and de-registration procedure for access to the network will, in the first instance, be driven from the HR System to create employee/staff access and from the Student Records System for student and researcher access. Separate authorisation will be required for remote access to the network. 5.3 Access rights to the network will be allocated on the requirements of the user s job, rather than on a status basis. 5.4 Security privileges (i.e. 'Power user' or network administrator rights) to the network will be allocated on the requirements of the user s job, rather than on a status basis. A list of which will be securely maintained and reviewed regularly. 5.5 Users will be sent a Terms of Use agreement on application, which they must familiarise themselves with. 5.6 All users to the network will have a unique user identification and password. 5.7 Users are responsible for ensuring their password is kept secret (see Edinburgh Napier University Access Control Policy and User Policy) 5.8 User access rights will, upon notification from the HR or Student Records Systems, be removed or reviewed for those users who have left the University. Information Services (IT), Edinburgh Napier University Page 3 of 8
4 6 Firewall Standards 6.1 A firewall is defined as any hardware and/or software designed to examine network traffic using policy statements (rule set) to block unauthorised access while permitting authorised communications to or from either a network or electronic equipment. 6.2 All network (physical) firewalls installed and implemented, must be implemented by the Network Services & Security Team All firewall modification requests must be logged in the Information Services call logging system (RMS) All changes to firewall rule sets will be documented (recorded in RMS) All related documentation is to be retained by the Network Services & Security Team and is subject to regular review by the Information Security Board. 6.3 All firewall implementations must adopt the position of "least privilege" and deny all inbound traffic by default (the initial rule set should be set to logging or learning mode to prevent service interruptions). The rule set should be opened incrementally to only allow permissible traffic. 6.4 Firewalls must be installed within production environments where Legally/Contractually Restricted Information is captured, processed or stored, to help achieve functional separation between web-servers, application servers and database servers. 6.5 Firewall rule sets and configurations require annual review to ensure they afford the required levels of protection. 6.6 Network Services & Security Team must review and agree all network firewall rule sets and configurations during the initial implementation process Firewalls protecting enterprise systems must be reviewed twice a year; firewall administrators and IS must collaborate on this review Firewalls not protecting enterprise systems must be reviewed annually by a responsible firewall administrator Firewall administrators must retain the results of firewall reviews and supporting documentation; all results and documentation are subject to regular review by the Information Security Board or University s Auditors Firewall rule sets and configurations must be backed up frequently to alternative storage (not on the same device). Multiple generations must be captured and retained in order to preserve the integrity of the data, should restoration be required. Access to rule sets and configurations and backup media must be restricted to those responsible for administration and review Any University entity operating under an e-merchant license is required to have properly configured firewalls in place to protect credit card data and comply with Payment Card Industry/Data Security Standards (PCI/DSS). Information Services TS will not operate any firewalls installed for the purpose of PCI/DSS compliance. University organisations requiring PCI/DSS compliance should contract with a PCIcompliant vendor. Information Services (IT), Edinburgh Napier University Page 4 of 8
5 6.6.6 Network firewall administration logs (showing administrative activities) and event logs (showing traffic activity) are to be written to alternative storage (not on the same device) and reviewed regularly. 6.7 Network Services & Security Team will execute approved changes to the firewall rule sets on behalf of the University. 7 Wired network 7.1 Only university owned equipment may be connected to the wired University Network. This includes network services supplied to all campuses and University buildings. 7.2 Personal laptops are not eligible for wired network connections. The University does provide wireless networks, which are for mobile computing connectivity including; laptops, mobile phones and smart devices. Where Laptops or mobile devices require physical network connection this must be formally requested and then logged and supported by IS 7.3 Use of network addresses other than those provided by Information Services are prohibited. 7.4 Access to networking equipment in data centres and communications rooms is limited to Information Services staff and authorised personnel only. 7.5 Only one device may be connected to any physical wired network port. No hubs, switches, wireless access points or routing devices may be connected, directly or indirectly, without prior agreement from Information Services. 7.6 Network Services & Security Team has the right to limit network capacity or disable network connections that are affecting available network bandwidth to the detriment of the University. Where possible and depending on the severity of the incident this will be done in negotiation with School or Schools affected; 7.7 No individual may connect a device to the campus wired network that provides unauthorised users access to the network or provides unauthorised IP addresses for users. 7.8 Non IS supported servers configured to provide services for campus users are allowed in exceptional circumstances subject to the following conditions: A server registration form that has been completed and approved by Network Services & Security Team The service is established in support of authorised business and commercial activity The service is established only for legitimate and authorised support of teaching, research or student services. *Note authorisation is required in the first instance from the Dean of School, and dependant on the required resources, may require authorisation from the Dean and Director of Information Services. Information Services (IT), Edinburgh Napier University Page 5 of 8
6 7.8.4 The established service must follow the policies and procedures required by the University The service will be subject to internal and external auditing A responsible owner and their line manager must sign off as Data Controllers and comply with the Data Protection Act for all data stored. *Note: The responsible owner and authorising managers must be aware of their personal and corporate liabilities should their service result in the loss of data The server owner is responsible for the backups, restores and patching of the server and applications The service will be managed effectively to ensure no excessive loading adversely affects the University s wired network bandwidth The service will be subject to periodic network security evaluation which will include penetration testing by Network Services & Security Team The server authorisation will be reviewed on an annual basis by the Information Security Board. 8 Wireless Network 8.1 The University has established an ubiquitous wireless network across the campuses and locations which is for the use of staff and students and authorised representatives only, to connect University owned IT and user owned devices communications devices and equipment 8.2 The wireless network security standards are as follows: Access Layer: users will connect to the WLAN via access points, which will provide the g/n connection standard for the client devices Service Set Identifier (SSID2): The SSID for the main wireless network for Edinburgh Napier staff and students is Eduroam The SSID for guest access to the Internet only, will be conference and will be broadcast so as to make it easily available to authorised visitors. Access will be granted via the IS Support Desk. This will change when we implement The Cloud The Eduroam network will utilise AES (Advanced Encryption Standard) level of encryption. This encryption standard is mandatory to enable the n network to be supported The conference service has no encryption For authentication: The authentication protocol used is Protected EAP (PEAP). PEAP is an 802.1X authentication type for wireless networks The Eduroam service supports only WPA2 (Wi-Fi Protected Access) which is the preferred security standard Unauthorised devices connected to the wireless network will be blocked without warning Staff or students are prohibited from connecting additional wireless network hotspots to the University network. Information Services (IT), Edinburgh Napier University Page 6 of 8
7 9 Third Party Access Control to the Network 9.1 Third party access to the network will be based on appropriate authorisation and compliance with Information Security Policies. 9.2 The Customer Services IT Support Desk is responsible for ensuring all third party access to the network is recorded. 9.3 Access to the internet may be provided for University staff, students or University employed contractors via the IS support desk. Connection to the University Wi-Fi infrastructure may be approved where the appropriate request is made in writing to establish a named account or the appropriate selfregistration process is undertaken. 10 External Network Connections 10.1 Information Services is responsible for implementing all connections to external networks that connect to the primary University and JANET supported Network, ensuring systems conform to the necessary legislative and JANET compliance Information Services is responsible for ensuring all connections to external networks and systems are documented and approved by Information Security Board before they commence operation. 11 Maintenance, contracts, backup and recovery 11.1 Information Services will ensure that maintenance contracts are maintained and regularly reviewed for all essential network equipment The Information Services IT Support Desk is responsible for ensuring that a log of all faults on the network is maintained Information Services will ensure a log of current network and switch configurations. Changes will be maintained and stored securely and backups of switch configurations taken regularly. The Network Services & Security Team will: Document procedures for the backup process and ensure that it is communicated to all relevant staff Document procedures for the storage of backup tapes or media will be produced and communicated to all relevant staff Ensure all backup media will be stored securely and a copy will be stored off-site Document procedures for the safe and secure disposal of backup media will be produced and communicated to all relevant staff Users are responsible for ensuring that they backup their own data to the network server using mapped drives or SharePoint Network patches and any fixes will only be applied by the Network Services & Security Team following a suitable change control procedure. Information Services (IT), Edinburgh Napier University Page 7 of 8
8 12 Protection and Malicious attack 12.1 The Network Services & Security Team will ensure that; Measures are in place to detect and protect the network from viruses and other malicious software They have suitable monitoring of network traffic, network access and intrusion detection in place The network will be monitored for potential security breaches. All monitoring will comply with current legislation The Information Security Board reserves the right to access, modify or delete all data stored on or transmitted across the University s network. This includes data stored in personal network folders, mailboxes etc. Data of a personal nature should be stored in a folder marked or called Personal. This does not preclude access or removal of such a folder on the authority of the Information Security Board or a ULT member Information Services reserves the right to disconnect or block any device connected either by physical or wireless means to the network. 13 Enforcement 13.1 Any employee, student or user, found to have violated this policy may be subject to disciplinary or legal action. Disciplinary action may include expulsion for students and the termination of employment for members of staff. Deviation from this policy is permitted only if a valid business case has been provided and subsequently reviewed and approved by the Information Security Board and/or Legal Counsel. Information Services (IT), Edinburgh Napier University Page 8 of 8
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.
PR11 - Log Review Procedure Document Reference PR11 - Log Review Procedure Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 12 January 2010 - Initial release. 1.1 14 September
Information Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Wi- Fi settings for Windows XP
Wi- Fi settings for Windows XP On the TU/e there are four Wlan network names or SSID's available. TUE-WPA2 2 The TUE-WPA2 network has WPA2 encryption. This network can be used by both TU/e students and
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Data Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
Eduroam wireless network Windows Vista
Eduroam wireless network Windows Vista university for the creative arts How to configure laptop computers to connect to the eduroam wireless network Contents Contents Introduction Prerequisites Instructions
Network Security & Connection Policy
Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services Document Control Information Status and reason for development Revised to reflect
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Canterbury College Eduroam Wi-Fi Guide
Canterbury College Eduroam Wi-Fi Guide Version 2.2 (Sept 2014) DG11 Phone: 01227 811144 Email: [email protected] Web: ITservicedesk.cant-col.ac.uk Table of Contents I. Overview... 2
