Uploaded by Justin Tran

SDC Vulnerability Management

advertisement
CPP SDC Vulnerability
Management Process
Updated:
4/11/2022
CPP SDC Vulnerability Management
1.
TABLE OF CONTENTS
1.
TABLE OF CONTENTS
1
2.
SUMMARY
2
3. SCOPE OF VULNERABILITY MANAGEMENT
3
4. REASON FOR VULNERABILITY MANAGEMENT
4
5. INDIRECT VULNERABILITY MANAGEMENT
5
5.1 VPN Access
5
5.2 Proper Access Control
5
5.3 Network Segmentation
5
5.4 Security Operations Center
5
Page 1
CPP SDC Vulnerability Management
2.
SUMMARY
The Vulnerability Management process used by the Student Data Center (SDC) is in alignment with Cal
Poly Pomona and deems that any resources that are able to interact with critical school infrastructure
must have regular vulnerability scans conducted. However, within fully segmented networks within the
SDC that are fully separated out from the rest of the SDC vulnerability scanning is not required.
Page 2
CPP SDC Vulnerability Management
3. SCOPE OF VULNERABILITY MANAGEMENT
Within the SDC many different networks exist with varying levels of security. For the purpose of
vulnerability scanning only the “Main” and “HP Management” networks are in scope. These are able to
interact with school systems and could pose a possible threat to the overall security of the campus.
Page 3
CPP SDC Vulnerability Management
4. REASON FOR VULNERABILITY MANAGEMENT
The Vulnerability Management is designed to ensure that the SDC does not increase the attack surface
of the campus by providing threat actors an enhanced scope to attack. Another reason that vulnerability
management is in place is to help SDC staff respond to possible new vulnerabilities and patch them.
Page 4
CPP SDC Vulnerability Management
5. INDIRECT VULNERABILITY MANAGEMENT
The SDC employs multiple different ways to indirectly manage risks to infrastructure. These include, but
are not limited to:
5.1 VPN Access
In order to interact with critical resources within the SDC a VPN connection is required. This makes it so
only authorized users are able to access systems that are the backbone for the SDC.
5.2 Proper Access Control
The SDC implements Proper Access Control based on Privilege Separation and Principle of Least
Privilege. This ensures that only users that are intended to access these critical services can and those
not permitted have limited access.
5.3 Network Segmentation
As seen in the Change Control Process document, the SDC heavily segments the internal network to
stop any security threats exiting the network that they initially started on.
5.4 Security Operations Center
The SDC has an internal Security Operations Center (SOC) that detects any anomalous traffic and
includes the ability to detect and respond to any threats. This is in compliance with the school and any
security event that is critical will be escalated to school authorities.
Page 5
Download