XAVIER UNIVERSITY Information Security Policy Effective: 10/1/2015 Last Updated: 9/16/2015 Responsible University Office: Information Security Office Responsible Executive: Associate Provost and Chief Information Officer Scope: This policy applies to all University owned information that is present on or transmitted through University owned systems and networks. University owned information assets can take the form of electronic and hard copy information. A. REASON FOR POLICY This document defines the Information Security policy for Xavier University. Xavier University is committed to protecting the confidentiality, integrity and availability of information assets from all threats including unauthorized access, modification or damage while also providing for the open information sharing requirements of academic freedom. The purpose is to establish the University’s approach to information security and define the appropriate controls that are required to prevent compromises to information assets. This document demonstrates Xavier’s commitment to properly protect both student and University information and creates administrative, technical and physical safeguards to protect sensitive information. Ownership, Review and approval The Associate Provost and Chief Information Officer owns this policy. The Information Security policy is approved as defined by the Policy Development Process at Xavier University. It is reviewed and updated as needed by the Information Security Office. Statement on Academic Freedom Information resources at Xavier help to facilitate the free exchange of ideas among members of the University community and the wider community. As an academic institution, all of us at Xavier place great value on freedom of thought and expression. The University community encompasses a wide array of opinions, views, approaches, and temperaments. Audience The Terms apply to all individuals that have access to Xavier’s information resources, including but not limited to: all faculty, staff, students, alumni, retirees, temporary workers, library patrons, visitors, contractors and vendors using University information resources, whether on‐ or off‐site (hereafter collectively referred to as “Users”). B. POLICY Responsibilities The following defines the information security roles and responsibilities at Xavier. Data Custodians: The Data Custodian is the department head or their designee that is responsible for overseeing the division’s information. Responsibilities include: Authorize access to departmental information based on need to know. Oversee the proper handling of information. Define information assets that are sensitive in nature. Assist users in applying the appropriate security controls to information assets. Recertify user access to information on a periodic basis. Understand information use and the associated risks including improper disclosure. Work with Information Technologies to define controls to protect the confidentiality, integrity and availability of information assets. Ensure that the department operates in compliance with the Information Security Policy. Ensure that information assets are protected in a manner that is commensurate with regulatory mandates. Information Security Office: The Information Security office responsibilities include: Oversee Information Security initiatives at the University. Stay abreast of current threats and information security best practices. Perform vulnerability and risk assessments and provide recommendations. Coordinate third party security assessments. Develop and implement security policies, standards and guidelines. Coordinate incident response activities. Report any identified security deficiencies to the Associate Provost and Chief Information Officer and appropriate Data Custodian. Coordinate security awareness training. Information Technologies: Information Technologies has physical or logical possession of information. Responsibilities include: Provide support of systems. Use physical and logical access controls to protect information from unauthorized access, usage, modification or destruction. Administer access to information assets. Monitor systems for malicious events. Users: Information users are personnel that are granted access to University and/or student information. User responsibilities include: Comply with the University Information Security Policy. Use the appropriate security controls for protecting information based on the associated risk. Reporting any suspicious activity. Reporting any lost, stolen or disclosed sensitive information. Use information only for the intended purpose. Ensure that non-public information is only distributed to authorized persons. Disposing of information in a secure manner. Access only information that they are authorized to access. Information Classification Information classification determines the sensitivity, value and criticality of a given piece of information so that it can be protected appropriately. The classification helps to determine the appropriate controls for safeguarding the information. Xavier University’s information is comprised of three classifications: Public: Public information is defined as information that is generally available to anyone within or outside of the University. Access to this information is unrestricted and may be shared internally or externally without prior approval. Public information includes, but is not limited to, marketing materials, public web site contents, University statistics or any other information that has been approved by management for public release. Internal use. Internal use information is defined as University information that is to be used within Xavier. Internal use information should be shared only with internal users unless approved by the Data Custodian. Access to this data may be limited to specific departments and cannot be distributed outside of Xavier. Internal use information is less sensitive than Confidential information, but if exposed could have an adverse impact to the University. Internal use information includes, but is not limited to strategic plans or other non-public information as dictated by the Data Custodian. All information not otherwise classified will be assumed to be internal use. Users may not disclose internal use information to anyone who is not an authorized user without prior consent of the Data Custodian. Confidential. Confidential information is defined as personal or University information that may be considered potentially damaging if released and is only accessible to authorized users. Confidential information includes, but is not limited to, medical/health information, legally privileged information, contractual information, payment card information, personally identifiable information, protected health information and protected student information. Users may only share confidential information with people that have a definite need to know. Sensitive HIPAA and FERPA information is considered confidential and should only be shared on an as needed basis. Protection of Non-Public Information All University systems that store, process or transmit non-public student and University information must be protected with a complex password. Access to information resources is granted based on a user’s need to know based on the theory of least privilege. Hard copy non-public information must be secured when not in use. Electronic non-public information must be encrypted while in transit over unsecured networks. Users must avoid saving sensitive information to laptops and other portable media unless it is encrypted with industry standard encryption. Non-public information must be saved to University file servers and databases and should be encrypted, where appropriate. If remote access is needed, the University provided Virtual Private Network must be used. Confidential information must not be sent outside of Xavier’s network via unencrypted email. Confidential information must only be stored on secured drives and must not be stored on a collaborative drive such as the Q drive. Due to the open nature of Xavier’s campus and the inability to physically secure all work areas, Confidential information must not be left out in the open in work areas. To the extent possible, users of sensitive information must not leave sensitive information unsecured when unattended. As Xavier’s system of record, Banner holds a large amount of sensitive information. When possible, users should leave sensitive information in Banner, and avoid exporting sensitive information unless similar controls can be applied. Remote access Xavier provides remote access to the University network as a service through a Virtual Private Network. Remote users are to be held to the same security standard as users that are on campus. If working in a public place, users must remain vigilant about “shoulder surfing” and avoid displaying sensitive University information when others are nearby. Encryption In an effort to maintain confidentiality, Confidential and Internal Use information must be encrypted while in transit across insecure communication networks. Confidential information should be encrypted using industry standard encryption or password protected when at rest wherever possible. Security Incident Reporting and Response Information security incidents have the ability to cause a negative impact to the University’s reputation and finances. All users must remain vigilant against violations of this policy. Users are encouraged to report violations as an Information Security incident. Incidents can be reported to the Associate Provost and Chief Information Officer or the Information Security Office. Users that wish to anonymously report a security incident can do so by calling EthicsPoint at 855-481-6238. In the event of an Information Security incident, Xavier should follow the documented Information Technologies Incident Response Plan. In order to protect the University during an Information Security incident, Information Technologies reserves the right to take actions up to and including making systems inaccessible at the discretion of the Director, Technology Infrastructure. All security incidents will be handled confidentially. Any significant Information Security incidents will be reviewed by the Information Technology Leadership team and Legal Counsel, as needed. Examples of security incidents include, but are not limited to: Unauthorized use of a system or account Physical theft or loss of a system, electronic or hard copy information Noncompliance with University policies Execution of malicious code Unauthorized attempts to gain access to a system or information Unauthorized system changes Denial of service Unauthorized theft, loss or exposure of information Information Retention and Destruction Some information assets may need to be retained to support regulatory requirements. The document retention policy should be referenced to determine the length of time documents need to be retained. Retained non-public information must be stored in a secure manner. Information that is no longer needed must be destroyed in a secure manner. Hard copies should be shredded. Hard disks must be securely wiped, degaussed or destroyed when no longer needed. Physical security Information assets are necessarily associated with the physical devices on which they reside. Information is stored on systems and transmitted on the University's physical network infrastructure. In order to secure University data, thought must be given to the security of the University's physical Information Technology (IT) resources to ensure that they are protected from standard risks. Users are responsible for preventing others from obtaining physical access to their technology resources and to ensure that both electronic and paper files in their care are safeguarded, especially if they contain sensitive data about individual students, employees, or others. Specific recommendations to maintain physical security include the following: Log off or lock the workstation when leaving one’s desk. Back up data regularly. Destroy drives, CDs, and other electronic media when they are no longer usable. Lock flash drives, CDs, and other electronic media in a desk or in a fire‐resistant cabinet. Secure small portable devices (such as laptops and tablets), which can be easily lost or stolen. All faculty and staff must stolen technology resources to Desk. Access to areas with physically restricted. immediately report lost or Xavier Police and the Help sensitive information should be Security Areas At a minimum, Xavier will maintain standard security controls, such as locks on exterior doors, security cameras and/or an alarm system, to secure the University's assets. In addition to this, the University must provide security in layers within both public and private (restricted / secure) areas. Access controls are necessary to restrict entry to the University’s secure area premises to only approved persons. Access will be granted based on job function. Certain physical precautions must be taken to ensure the integrity of Xavier's data. Computer screens should be positioned where sensitive information on the screens cannot be seen by outsiders. Confidential information should not be displayed on a computer screen where the screen can be viewed by those not authorized to view the information. Network ports that are not in use in public areas must be disabled. Entry Security It is the University’s policy to provide a safe environment as well as to secure its information assets. Monitoring those who enter and exit the premises is a good security practice in general, but is particularly true for minimizing risk to University systems and data. The guidelines below are intended to be specific to the University's information technology assets and must conform to the University's overall security policy. Identification (ID) badges are useful to identify authorized persons on the University’s premises. Xavier has established the following guidelines for the use of ID badges. Non-employees/Visitors: Visitors to secure areas such as a data center must be escorted at all times. It is the responsibility of the associated employee to escort visitors and ensure their departure from a secured area. Initial badge generation will be done only at the direction of Human Resources for new hires or users changing jobs. Users must show photo identification for identity verification. The University must maintain a sign-in log (or similar device) in the lobby or entry into a secure area. Visitor logs must be stored for at least three months unless otherwise restricted by law. Mobile Device Use In the spirit of productivity, Xavier recognizes that some users will use personally owned devices to conduct University business. Personally owned devices are outside of the control of the University and therefore confidential information must not be stored on personally owned IT resources. Users should take special precautions to protect information that is stored on portable devices. Encryption should be used where appropriate. Portable devices that house sensitive University information (including email) must be PIN or password protected. Users should be mindful of all applications that are run on personally owned devices that also house University information. Users should only use wireless devices to conduct University business on trusted wireless networks. All devices, where possible, must enable automatic lockout if University information is stored on the device. In the event that an employee separates from the University, Information Technologies reserves the right to perform a remote wipe of University email from the personally owned device. Users must take adequate precautions regarding physical security of the device. Device operating systems and applications should be kept current. Mobile device tracking software is recommended in the event of a lost device. Mobile devices that house nonpublic University information should not be “rooted” or “jailbroken”. All mobile devices that house sensitive University information must be securely wiped before being traded in. It should be noted that in the event of litigation, personally owned devices may be subject to discovery and/or a legal hold if they contain University email and documents. Cloud Computing While cloud computing providers provide value through increased expertise, efficiency and lowered costs, they may introduce some additional risks the University should be aware of. Before implementing cloud based solutions, users must ensure that the relationship is managed, monitored and reviewed. The review should ensure that the cloud provider has the financial and operational ability to fulfill the specified contractual obligations. The provider must be able to demonstrate how sensitive University information will be secured. University management must perform a due diligence review of the cloud provider before entering into a contract. The Information Security Office and Office of General Counsel must be involved in the review, as needed. The Xavier Technology Committee makes the final determination on cloud computing decisions. When evaluating a cloud service provider, the University should review considerations such as the following: Service availability and reliability Service agreement and Service Level Agreement Regulatory compliance Support for incident forensics Authentication and authorization Encryption requirements Intrusion detection/prevention technology Backup and Disaster Recovery capability Responsibility for breach notification and follow-up Logging and log review for user and administrative sessions Incident response capabilities Vulnerability management practices An SSAE 16 or similar third party audit report The University’s right to audit the cloud provider Contractual language showing clear ownership of the information Isolating Xavier data from that of other clients Choice of law and The use of a private cloud User privacy and data jurisdiction mining The University must take HIPAA and FERPA into consideration when evaluating a cloud provider. Federal and state laws may affect the cloud computing relationship, as the cloud provider may reside in another state or country. Preference should be given to cloud service providers that house data in the United States due to complications with international laws. Consideration should be made to contractually exclude the ability to mine any data for the benefit of the vendor or vendor’s agents (advertisers, etc.) Before entering into any contract for cloud services, the data elements to be housed in the cloud should be reviewed by the Data Custodian, Office of General Counsel and the Information Security Office. When contracting for cloud based services, the University must consider an exit strategy in case the relationship terminates. This would include a strategy to retrieve the information from the vendor. Confidential information may only be stored in University provided cloud storage and may not be stored in personal cloud storage. Internal use information is allowed to be stored in the cloud. By nature, public information may be stored in the cloud. Users must ensure that they only share non-public information with users that have a need to know. All data at rest and in transit between a cloud provider and the end user must be encrypted using industry standard algorithms. A confidentiality agreement must be in place with any cloud service provider. Wireless Networking Policy Xavier provides wireless network access, with varying security profiles and access restrictions, for different campus constituents. Xavier reserves the right to extend or restrict wireless network access on campus. Users are responsible for any actions that are performed on their wireless device. By connecting to the wireless network, you are responsible for the security of that device and must abide by University policies. Operating a wireless device that interferes with wireless network service is prohibited. Rogue wireless access points, and other wireless devices that broadcast networks, create interference and connectivity problems for users on Xavier’s wireless networks. Information Technologies will periodically scan for rogue wireless devices, and will remove them from the network. Wireless access points may be installed only by the Information Technologies department. Virus and Malware Protection Xavier provides anti-malware software for Windows based workstations, laptops and servers. All University-provided Windows based user workstations and servers must have current antivirus/anti-malware software installed. The anti-malware software must be configured to receive automatic signature updates and perform automatic scheduled malware scans. Patches, updates, and antivirus signature file updates must be installed in a timely manner. Software must be set to automatically install updates whenever practical. The antivirus solution must be capable of detecting and removing all known threats. Antivirus software must generate audit logs sufficient to Incident Response. Users must malware software from Xavier software is recommended for Mac are not required to run anti-malware software. be able and configured to recreate events in support of not disable or uninstall antiowned systems. Anti-malware devices. Unix based systems Software Development Life Cycle The goal of the system development life cycle process is to define steps to guide Xavier’s System Administrators and application developers when creating and/or altering Xavier’s information systems and the models and methodologies that are used to develop these systems. Due to the growing use of networking, intruders now use the external facing application layer as a means to penetrate an organization’s infrastructure. Therefore, it is necessary to address security at all the various layers of the system as a whole. Xavier operates under an internally defined SDLC model, as defined by the Director of Application Services. It is important that security be a consideration throughout all stages of the SDLC(Systems Development Life Cycle) from requirements through operations and maintenance of the application. Also, any outsourced software development must be required to also follow Xavier’s SDLC policies and guidelines. Vendor Management The vendor management policy is designed to properly manage any risk that Xavier faces as a result of outsourcing technology and other services which are provided by outside Vendors. The objective of this Policy is to establish guidelines for the following: Identifying the importance of the function of the Vendor to the University and the inherent risk of the service. Properly performing due diligence in Vendor selection. Properly documenting the Vendor relationship. Establishing procedures to monitor vendors. To fulfill our objectives of executing good management of Vendors, the Policy establishes the following: 1. Xavier must complete a Vendor Assessment which assigns a risk classification to each vendor. 2. All Vendors must be assigned to a Xavier point of contact. In those cases where the services are used by more than one department, the primary responsibility for the Vendor will be assigned to the department that uses the service most. 3. All Vendors must go through a process of Due Diligence. 4. All contracts or agreements with Vendors must be previously approved by authorized personnel. 5. Obtain authorization of any exception to the Policy from Information Technologies. Security Awareness & Training A security awareness program should be implemented that will detail Xavier’s Information Security program to all users covered by the policy, as well as the importance of information security. The training program should cover, among other topics, the appropriate handling of confidential data. Employees must sign off on the receipt of, and in agreement to, the user-oriented policies upon hire and annually. Security awareness training should be performed upon hire and periodically thereafter. Audit Log & Monitoring The logging of certain events is an important component of good network management practices. Logs contained on application servers, network devices, and critical systems may all contain different data, but all contain valuable information that the University should record. Logging on network-level devices should be enabled to the appropriate level, based on resource constraints. No passwords must be contained in logs. Security related logs should be reviewed at an appropriate frequency. A member of Information Technologies should review logs on critical and high-security devices on a regular basis. Logs must be retained in accordance with the University's Retention Policy. The University must secure audit trails such that they cannot be altered. Audit trails must be retained for an adequate period to allow for reconstruction of events in support of Incident Response and forensics. Removable Media Removable media covers any USB drive, flash drive, memory stick or other removable data storage media that could be connected to Xavier systems. If provided by Xavier, any confidential University data stored on these devices must be encrypted using industry standard encryption. Confidential Xavier data is never to be stored on personal removable media. Vulnerability Management A vulnerability management process should be part of the University’s effort to control information security risks. This process will allow Xavier to obtain a continuous overview of vulnerabilities in the IT environment and the risks associated with them. Only by identifying and mitigating vulnerabilities in the IT environment can the University prevent attackers from penetrating their environment. Roles and responsibilities must be defined within the IT organization between the Information Security Office and other internal teams in order to assume adequate vulnerability management processes are being followed. External and internal vulnerability assessments should be performed annually, and after any significant infrastructure or application upgrade or modification. Penetration testing should be performed at both the network and application layers. Security Configuration Hardening Standards A comprehensive security configuration hardening standard is necessary for the security of systems and network devices throughout the IT infrastructure. A detailed baseline configuration standard should be used by Xavier, leveraging industry best practice such as NIST, CIS, etc. All systems and network devices should be configured using these best practices in order to guarantee a more secure, hardened, and robust system for the IT environment. Security configurations standards should be developed, documented, and audited against. Clean Desk Policy Due to open nature of Xavier’s campus and the inability to physically secure all buildings, Xavier emphasizes the importance of a work area that is secure. Employees should ensure that all confidential information in hardcopy or electronic form is secure in their work area at the end of the day and when they are expected to be gone for an extended period. Any confidential information should be removed from the desk and locked in a drawer when the desk is unoccupied and at the end of the work day. File cabinets containing confidential information should be kept closed and locked when not in use or when not attended. Keys used for access to confidential information must not be left at an unattended desk. Passwords may not be left on sticky notes posted on or under a computer, nor may they be left written down in an accessible location. Printouts containing confidential information should be immediately removed from the printer. Enforcement It is the responsibility of all users to comply with the Information Security Policy. Any user in violation of the Information Security Policy may be subject to disciplinary actions. Exceptions to Policy Exceptions to this policy are strongly discouraged and should be temporary in nature. Policy exceptions must be approved in writing by the Associate Provost and Chief Information Officer. If for some reason a business process cannot comply with the Information Security Policy, the designated Data Custodian should work with the Information Security Office to address compensating controls and residual risk. F. HISTORY Version 2015 Review/Approval New document Name Jim Miller Date 1/27/2015 Other applicable policies and/or resources: This document is part of the University’s cohesive set of security policies. Other policies may apply to the topics covered in this document and, as such, the applicable policies should be reviewed as necessary. Please refer to the other Xavier security policies below for further information: • Acceptable Use Policy • Technology Services Website – Accounts & Password • User Account Policy • Web Privacy Policy • Information Technologies Change Management Policy