Asset Management policy template - IT Security Office

advertisement
Duke University departmental policy template: Asset Management
Version 1.0
Authority:
Duke University Chief Information Officer
Duke University Chief Information Security Officer
1. Definitions
Term
Application
Definition
Any software that runs on a computer or other networked device and is used by
end users or other applications or devices, including but not limited to databases,
web applications, client/server applications.
Operating System A program that manages a networked device’s hardware resources.
Any information classified as either Sensitive or Restricted by the Duke standard.
Protected Data
As defined in the Duke University Data Classification Standard.
Sensitive and
Restricted Data
2. Purpose
The purpose of this policy template is to assist Duke University organizations (departments, schools,
institutes, etc.) in creating an internal policy regarding the management of university-owned IT systems.
Filling in this template will enable departmental staff to accurately document their policy and procedures.
Once completed, departments will have a written policy and a document to record the location of their
written procedures. Compliance with this policy does not exempt a department from meeting
University, federal, or state regulations or other required standards.
IT asset management includes activities and business practices relating to the management of software,
hardware, and workstation warranty maintenance for the university. This includes the following:




Management of physical components from acquisition through disposal (including desktops,
laptops, servers, LAN and WLAN electronics, wireless, voice, and communications equipment)
Configuration and change management, including patching and maintenance
Software license management
Standardization of images and contractual compliance
3. Scope
This policy applies to all systems (as defined above) administered or serviced by university staff or by
third parties via contractual agreements with university departments or other organizational groups.
4. Departmental Policy
Acquisition
4.1 List of approved hardware vendors:
4.2 List of approved software vendors:
4.3 Purchase approval process:
4.4 Receiving, configuration, standard image installation process:
4.5 Asset identification process (tagging, database entry):
Disposal
All campus machines with hard drives are required to go through Duke Surplus whose policy is to clean
or destroy hard drives. More information regarding disk wiping can be found at:
http://www.security.duke.edu/media-control-and-disposal.
4.6 Document the tools and processes used to overwrite all data from all hard drives before the disposal
of old equipment:
Configuration and Change Management
4.7 The departmental change request process is (describe below):
4.8 Departmental maintenance windows are:
Scheduled daily
Scheduled monthly
Scheduled as needed
Other (describe below):
4.9 The departmental change management communication process is (describe below):
4.10 The process for making emergency changes is (describe below):
4.11 The process for planning and testing potential changes is (describe below):
4.12 The departmental change committee members are:
4.13 The change approval process is (describe below):
4.14 The documentation process for change management is (describe below):
4.15 Change management documentation is located here:
Patching and Maintenance
4.16 The operating systems of all departmental systems are patched:
Within 2 weeks on systems with Sensitive data, and within 4 weeks on systems with Restricted or
Public data.
Alternative schedule (describe below):
4.17 When it is not possible to install operating system patches, our departmental procedure for
mitigation is:
4.18 By policy, departmental workstations and laptops only use operating systems that are currently
supported by the vendor.
Yes
No
4.19 The departmental process for excepting and mitigating machines from the requirement to run
current operating systems is (describe below):
4.20 All departmental applications are patched:
Within 2 weeks on systems with Sensitive data, and within 4 weeks on systems with Restricted or
Public data.
Alternative schedule (describe below):
4.21 The departmental process for excepting and mitigating devices from the requirement to run current
patch levels on all applications is (describe below):
4.22 The departmental process for testing patches is (describe below):
4.23 New devices must be patched to current patch level (operating system and applications) PRIOR to
the device being connected to the production network.
Yes
No
4.24 The departmental process for mandatory or emergency patches is (describe below):
4.25 By policy, all personal machines used to access Duke resources are required to be at current patch
level.
Yes
No
4.26 The centralized patch management process for our department is (describe below):
4.27 The communications plan for the patching process is (describe below):
4.28 Documentation for any other maintenance or patching processes not included above is located here:
Software License Management
4.29 Software license inventory is located here:
4.30 Software license usage is reviewed every ___ days by ___________________________________
Standardization of Images and Contractual Compliance
4.31 Which systems receive standard images?
Servers
Workstations
Other (describe):
4.32 Who creates and tests standard images?
4.33 What benchmarks are used to test standard images?
Physical Security
Requirements






Systems should be located in physically secure locations, whenever possible. A secure location
would minimally be defined as one that is not routinely accessible to the public, particularly if
authorized personnel are not always available to monitor security.
Secure locations must have physical access controls (card key, door locks, video camera etc.)
that track and prevent unauthorized entry, particularly during periods outside of normal work
hours, or when authorized personnel are not present to monitor security.
Access control systems must be maintained in good working order and records of maintenance,
modification and repair activities should be available.
Wherever technically feasible, access logs that track incoming and outgoing activities should be
reviewed on a periodic basis.
Systems located in public areas require special consideration. Every effort should be made to
limit the amount of Sensitive data that is stored on such systems. Auto logoff, screen savers,
proximity badge, and other device- specific hardware/software measures should be employed to
enhance security.
Maintenance records for physical security devices in OIT and DHTS-managed data centers are
maintained and available from OIT and DHTS.
Physical access control measures
4.34 Building level (door locks, card key, controlled elevator access, etc.):
4.35 Room level (door locks, card key, etc.):
4.36 Device level (if any additional):
4.37 Physical security device maintenance records that are available in addition to OIT or DHTS data
center records:
4.38 Procedures for emergency facility access to support restoration of lost data in a disaster recovery
exercise:
5. Enforcement
It is the responsibility of departmental IT staff to ensure that the controls described in this document are
implemented. IT administrators understand that appropriate asset management procedures are a critical
part of Duke’s overall information security strategy.
Campus departments undergo periodic internal and external audits. These audits typically include an
analysis of the processes and controls used by departments to secure and manage servers. The Office of
Internal Audits carries out internal audits. The initiation of an internal audit is based on a risk analysis,
also performed by the Office of Internal Audits. A requirement for an external audit may be
recommended as a result of the internal audit, or be requested independently by a department's
management. The department is responsible for remediation of any findings of non-compliance with this
standard within the time frame agreed to with the auditors.
Review Frequency: Annually
Updated: 2/13
In Compliance with:
Duke University Data Classification Standard
Duke University Acceptable Use Policy
Duke University Log Standard
References:
University IT Security Office website: http://www.security.duke.edu
Download