BUSINESS SERVICES COMMITTEE (BSC) Meeting Notes

advertisement
BUSINESS SERVICES COMMITTEE (BSC)
Meeting Notes
11/04/11, 1:30 pm to 3:00 pm
FAC 228D
Attendees: Tim Tashjian, Steve Kraal, Fred Friedrich, Mary Knight, Kathy Foster, Renee Wallace, Michael
Bos, Shelby Stanfield, Brad Englert, Kristi Fisher
Guests: John Poulos Julienne VanDerZiel, Cam Beasley, Dana Cook
Absent: Bob Harkins, Kedra Ishop, John McCall, Debra Kress
Laptop Encryption Status and Personally Identifiable Data Breach Plan – Cam Beasley
Cam Beasley presented the University encryption statistics and the newly developed plan for a potential
data breach. At any given time, there are approximately 120,000 computing devices on campus.
Individual campus networks users are limited to five devices accessing the campus network at any one
given time. This access is controlled by EID login. Of the 120,000 devices on campus, 15,000 are
University owned laptops. At this point in time, approximately 22% of laptops are encrypted with
SecureDoc, approximately 27% are encrypted with a device-native software (like FileVault or BitLocker),
and the remaining 51% have unknown encryption status. Encryption and breach statistics are in the
handouts for the meeting.
In the past, two major breaches have occurred. These breaches were in UTDirect and at the McCombs
School. These were major data breaches that affected large groups of people where data was the
primary focus of the theft. Loss of devices occurs mostly when devices are stolen from faculty homes,
left on airplanes, or other mishaps. Loss of most student devices occurs from an opportunistic theft
when a device is left unattended.
The biggest security problem with campus devices is related to individual user failure to download
software security patches. Proper software maintenance is essential to protecting machines. When
software is not updated properly, malicious actors are able to penetrate machines throw software
holes—particularly holes in un-patched browsers. Securing software globally is difficult because there
are so many different devices on campus. Applications are the biggest target on campus.
The committee inquired as to the capacity of the ISO to identify the location of breaches when they
occur. Cam replied that it is possible to identify the locations of the breach. Breaches usually occur with
individual devices in everyday use mode that have gone unprotected with the browser being the most
vulnerable entry point. Mal-actors follow key strokes (key logging) on a user’s machine, steal
passwords, and access the system without the individual user being aware of the activity.
All kinds of data is stolen—personal, research, and institutional data. For each individual breach event,
it costs the University about four hours of job loss per event. The researcher can lose all of his or her
data before detection occurs. A plan to address breaches is in the handouts for the meeting. Cam’s
team is willing to meet with any group of users on campus to help assess security and discuss breach
prevention.
Decision Matrix on When to Involve the Information Security Office in Application Development Projects
– Cam Beasley
Cam Beasley presented the decision matrix for when to engage the information security office when
developing applications on campus. The ISO has teams prepped for both Reactive and Proactive teams
for dealing with application breach events. The reactive group responds to events. The proactive group
helps plan, monitor, completes systems checks, and tests new applications/changes in applications.
Developers should involve Cam and the ISO office as early as possible in the application development
process. The decision matrix for involvement is in the meeting notes.
When dealing with applications, all items related to law, policy, or contract are protected. The
committee inquired as to whether or not standard contract verbiage exists for application contracts.
The response was that yes, contract verbiage does exists. Contact the ISO for the contract language.
Trainee Funding Approach – Julienne VanDerZiel
Julienne VanDerZiel presented the new approach to funding ITS trainees. The change in funding was an
executive decision made to foster cost sharing to support he trainee program. The program will no
longer be totally centrally funded. ITS will pay for six trainees, departments will pay fully or pay into a
cooperative system to support training. Details of the funding options are included in the meeting
handouts. The funding system can be thought of as an insurance system where investment in a pool
yields shared trainees that can support multiple units. The trainee pool can hold 11 members at any
given time.
The committee inquired as to a possible hybrid model where there is some combination of individual
department funding and cooperative funding. AITL considered a hybrid model but was not able to
devise such a system.
The committee also wondered how prioritization will be set for trainee access. The education advisory
group will consider and define a process in the near future.
The next step in the process will be for the education advisory group to survey the community to
determine the demand for the pool so that trainees can be planned accordingly.
The Business Services Committee unanimously approved moving forward with the proposed funding
approach.
Julienne will bring the results back to the committee next month.
Administrative Systems Master Plan Updates/Recommendations – WG#1 representatives
ASMP Workgroup 1 presented their progress to the committee.
The committee had some questions related to the definitions of the words “strategic/mission focused”
on the vertical axis of the Administrative Systems Classification grid. They would like a deeper
understanding of these terms so that they can properly classify systems at the University and make
decisions about the portfolio. The working group will work on these definitions and on fleshing out the
grids.
The committee inquired about the point at which it is appropriate to discuss funding options/a funding
strategy. The group responded that final plan will include a funding strategy and a broad set of funding
options.
Future Agenda Items
1. MyEdu – Shelby Stanfield
2. Trainee Funding Approach—Julienne VanDerZiel
3. iModules – John McCall (schedule for after first of calendar year 2012)
Download