WORKSTATION MANAGEMENT STANDARD PROCEDURES



Similar documents
Network Security Policy

IT Security Standard: Computing Devices

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Virginia Commonwealth University School of Medicine Information Security Standard

Information Security Operational Procedures Banner Student Information System Security Policy

GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS

Information Security Operational Procedures

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Continuity Planning and Disaster Recovery

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Policy: Information Technology Refresh Policy

INCIDENT RESPONSE CHECKLIST

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

Montclair State University. HIPAA Security Policy

Information Resources Security Guidelines

California State University, Sacramento INFORMATION SECURITY PROGRAM

Title of the Policy: Surveillance Policy

Virginia Commonwealth University School of Medicine Information Security Standard

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

PRIVACY AND INFORMATION SECURITY INCIDENT REPORTING

Information Security Program Management Standard

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

Introduction and Purpose... 2 Scope... 2 Auxiliary units Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants...

Accounting and Administrative Manual Section 100: Accounting and Finance

ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION

INVOLUNTARY MEDICAL WITHDRAWAL

Cybersecurity Health Check At A Glance

IT Security Procedure

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Information Security Policy

Office of Inspector General

Standard: Patching and Malicious Code Management

Encrypting with BitLocker for disk volumes under Windows 7

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

Retention & Destruction

External Supplier Control Requirements

15 Organisation/ICT/02/01/15 Back- up

FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY

CHIS, Inc. Privacy General Guidelines

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

Hardware and Asset Management Program

M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General

Enterprise K12 Network Security Policy

Access Control Regulations

"Charting the Course... MOC B Server Virtualization with Windows Hyper-V and System Center. Course Summary

DHHS Information Technology (IT) Access Control Standard

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

Austin Peay State University

Information Security Framework. Revision Date: 10/01/2013. Information Security Framework

ManageEngine Desktop Central Training

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Network Security Policy

Information Technology Solutions

Network & Information Security Policy

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

Data Management Policies. Sage ERP Online

GUIDELINES FOR RESPONSIBLE USE OF IDENTITY MANAGEMENT SYSTEMS

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Top Ten Technology Risks Facing Colleges and Universities

Utica College. Information Security Plan

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

Department of Veterans Affairs

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!

Additional services are also available according to your specific plan configuration.

UCLA Policy 401 Minimum Security Standards for Network Devices

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

IT Security Incident Management Policies and Practices

REMOTE ACCESS POLICY OCIO TABLE OF CONTENTS

University of Liverpool

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Designing and Coding Secure Systems

State Of Florida's Real Estate Law

Copyright Compliance and Peer to Peer File Sharing Policy

"Charting the Course... MOC D Administering Windows Server Course Summary

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

July 6, Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263

How To Protect Mental Health Information In Upb

2. Scope This policy addresses all web sites hosted by the central web hosting service.

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Transcription:

OFFICE OF THE VICE PRESIDENT FOR INFORMATION TECHNOLOGY POST OFFICE BOX 8122 STATESBORO, GEORGIA 30460-8122 TELEPHONE (912) 478-1294 FAX (912) 478-7720 WORKSTATION MANAGEMENT STANDARD PROCEDURES I. Authorization These standards and procedures are developed in accordance with the Workstation Management Policy. Authority of enforcement of these standards and procedures is delegated by the Chief Information Officer to the Chief Security Officer (CSO) and the ITS Director of Technical Services. II. Authorized Equipment It is important to know and control what equipment is attached to the University network. Some equipment can be harmful to the operation of this resource causing potential disruptions to critical services, instruction or research. a. Only equipment and systems that are approved by the CIO or his/her designee will be allowed to connect to the University network. III. Authentication Ensuring the authentic use of computing resources is an essential element of the University s security plan and is necessary for compliance with University System of Georgia Computer Use Policy. a. All workstations must employ, according to the University IT Security Standard, a mechanism to authenticate the person who is using the computer. b. User credentials shall be authenticated against authorized sources and mechanisms. IV. Communication Good communication is the foundation of excellent service. Notifying people about planned events or recent service calls is essential professional courtesy and an operational requirement. a. Users of laboratory, classroom and community-use workstations affected by workstation management tasks should be appropriately notified at least one business day prior to the planned service activities. Ideally, planned changes should be communicated 10 business days in advance of the activity. b. When accessing a computer workstation assigned to the personal use of an individual: i. Notification must be provided in advance of any service to the individual user. ii. Where individual machines are involved, reboots must be negotiated with the user. c. If any service is in response to an urgent order by the CIO or his/her designee, or is in response to an eminent security threat, the service may be performed without notification. However, the affected person(s) must be notified about the service as

soon as possible thereafter. V. Performing Technical Services The maintenance of the University s computer resources often requires the services of authorized technicians. a. Personal Equipment Under no circumstances will the University be held liable for damage to hardware or software, or loss of data on privately owned equipment. The owners of such equipment shall sign an acknowledgment and hold harmless agreement on a form approved by the Office of Legal Affairs prior to any such assistance being provided. Reference the Registration of Privately Owned Equipment Standard for more information. b. Automatic Updates It is important that computer workstations have the latest approved security patches and bug fixes applied in a timely manner. Automatic updates provide an efficient and non-invasive means of ensuring that computers have these necessary updates. i. All computer workstations will employ an approved mechanism to acquire and automatically install updates. This includes the Operating System updates and Antivirus updates. c. Remote Access and Assistance The ability to provide remote assistance to persons is efficient and effective. Technology allows a person to share a view of their desktop and transfer control to a remote technician to resolve problems, provide training, and install software and numerous other tasks that would otherwise be performed in person. i. Only technicians authorized by the CSO or his designee(s) will be allowed to provide remote access and assistance. ii. Only applications approved by the CSO are to be used for remotely accessing or assisting users. iii. Remote access and assistance can only be conducted with the explicit permission of the user to which the computer workstation is assigned. iv. There is to be no monitoring or collection of data concerning computer use, data files, cookies or other personal data without explicit permission of the workstation computer owner or unless otherwise directed by the CSO. d. Wake on LAN Capability The ability to start a computer remotely allows for effective and efficient management of computer resources. i. Authorized technicians may utilize wake on LAN capability to provide services as long as the policy guidelines for communication are followed and authorized mechanisms are used.

VI. Workstation naming A consistently applied naming convention is essential to asset management. a. Computers will follow the institutional computer naming convention as established by the CIO or his/her designee. Reference the IT Security Standards for more information. VII. Security Secured workstations help maintain an environment that protects users and data that is used in the work environment. a. Computers must be configured according to the Workstations Non-Lab Environments, Personal and Transient Workstations section in the University s IT Security Standards. b. Computers must be configured according to the university Workstation policy settings template, at a minimum. For more information see the University s IT Security Standards. VIII. Workstation Management Software Workstation management software can greatly improve the efficiency, effectiveness and timeliness of technical services. It can significantly decrease the response time to counter-act malware or virus attacks and preserve the availability of computing resources. a. Every University owned computer workstation shall utilize workstation management software. b. Only approved workstation management software is to be used to manage workstations. c. Reference the IT Security Standards for authorized software IX. Campus Standard Configurations Providing consistent configurations for all computers on campus ensures the portability of knowledge, policy and technical resources throughout the institution. It also serves to extend the essential and required elements to every computer owned by the institution. a. ITS will maintain a list of standard software. b. ITS will provide base-line configurations of standard software for installation on faculty, staff and student use computers. c. Additional software packages may be installed on computers provided the software is properly licensed. d. Departments will maintain documentation on any additions or modifications deployed to workstations and the licenses to use such software. X. Asset Management/Inventory Knowing the presence of both hardware and software assets is essential for the university to maintain compliance with USG policies and State regulations.

a. The University will utilize information about installed applications inventoried from computers to manage software and hardware assets. b. Each workstation will be configured and enabled with the ability for hardware and installed software inventory on each system. c. Annually, an inventory of all computer devices on the network and the applications installed on them will be provided to the Chief Security Officer, the University Auditor and Property Control. Reports derived from the approved workstation management software will suffice as a physical inventory audit if the workstation information has been updated in the past 90 days. d. Technicians that use manual and/or automated processes for asset management and inventory must respect the privacy of data, files, cookies and any information in addition to system configuration hardware and software installed. XI. Workstation Backup It is essential that every user have the means to backup and restore university owned data files and information stored on a computer workstation assigned to their use. There are several means and techniques available depending on the nature and volume of this data. Examples of appropriate backup methods include, but are not limited to: a. Campus Network Storage b. DVD/CD c. Encrypted USB flash drives Every computer workstation will have a means of copying and restoring data in the event of accidental or catastrophic loss. XII. Related Documents University IT policies are available at: http://www.georgiasouthern.edu/policies/ USG Security Policies are available at: http://www.usg.edu/infosec/policy_management/policies/ XIII. Definitions Workstations include: laptops, desktops, PDAs and other computers and devices accessing the Georgia Southern University network. Workforce members include: employees, volunteers, trainees, and other persons under the direct control of Georgia Southern University. CIO is the Chief Information Officer. This person is responsible for the information technology and computer systems that support the University. CSO is the Chief Security Officer. This person is responsible for oversight of all the security constructs and computer use policies of the University. LAN is the campus local area network. It includes any device that has or uses a Georgia Southern IP address.

XIV. XV. Revision History Original: October 15, 2009 Revisied: March 8, 2011. Updated Section X.c. and delegate to Technical Services Director. Approval President s Cabinet on October 15, 2009