ComputerSecurity_Procedures docx

advertisement
University of Virginia School of Architecture
Computer Technologies Security: Guidelines and Procedures
Version 1.0 – July 30, 2003
The following is a list of policies and procedures which have been deemed necessary
for the best possible technology security for the School of Architecture and the
various students, faculty, and staff which make up the Community. Where possible,
source documents, including federal and/or state legal precedents, have been cited
and/or linked.
Security Awareness:
Risk Assessment- Assessment of outside risk and the School of Architecture’s ability
to respond to threats should occur at least once per calendar year. This assessment
should include, but not necessarily be limited to, ITC’s Self-Assessment Checklist.
Ref: COV ITRM Guideline: http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
ITC Self-Assement Checklist: http://www.itc.virginia.edu/security/checklist/checklist_intro.html
User Awareness/Training- Users should be made aware through an orientation
process of existing risks and what they can do to prevent them. Users should be
briefed on the availability of software and other in-place security measures and how
to interact with and what to expect from those security systems and procedures.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Staff Technical Training- Staff should be trained and/or certified and up-to-date in
appropriate system administration and related skills. All of the School’s staff who
make use of computing technologies, regardless of department, should have a basic
level of training. Technical staff will be certified and/or trained to a higher degree.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Technical Communications (Both to Staff and to Users)- Technologies and/or services
should be implemented to communicate technical information and notifications
regarding the status of security events and safeguards to all members of the
Community.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Authentication and Authorization:
Authentication of Users- Authentication via “Best Practice” technology should be
required of all users in the community. Authentication should be required at User
logon to client computers and any other Point of Access to data and/or services
provided by the School of Architecture.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Password Protection of Account Access- Password-protected logon to both network
services and individual client computers should be required at all times. Passwords
should comply with current best possible security practices. All passwords and
accounts will be unique and personal to a human individual, not generic or shared,
as in group accounts. All accounts will be received through either ITC of the
Computer Technologies Office of the School of Architecture.
Passwords and other sensitive account information should never be given out,
written down, distributed, or in any other way disseminated to any parties, either
within or outside of the Community.
Access to Wired and Wireless Networks- Access to the School’s networks via either a
physical Ethernet connection or a wireless connection should be limited to those
users which have submitted their computer’s MAC address to ITC and to the School
of Architecture.
Data Security:
Password Protected Screen Savers- Screen savers should be enabled on client
computers which activate after a maximum of ten (10) minutes of user inactivity.
The subsequent deactivation of these screen savers should be password protected.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Controlled Network Authorization- Access to the School of Architecture’s network
from computers outside the network should be protected via firewall, IPSec, TCP
wrapper, VPN, and/or associated security technologies.
Sensitive Data Authorization and Access- Sensitive data should have a higher level of
authorization in order to access it. That is, in addition to password control and/or
authentication for access to the file system, additional (further) password and
authentication should be implemented to protect sensitive data. Current examples
of this technology are password protection of individual Excel spreadsheets or
“grant tables” in a database context.
Access to sensitive data will be given only to those with direct need for such access.
Computer (Machine) Security:
Up-to-date Antivirus and System Security Software- Individual computers on the
School’s networks should be updated with the most current version of antivirus
and/or security software, which should include, but not be limited to, virus
definitions, operating system updates, and the like.
Systems Interoperability Security:
Transmission of Data- Unencrypted Telnet, FTP, or R-Utilities should not be used.
Secure alternatives, such as SSH or SFTP should be used instead. E-mail of sensitive
information as clear text should never be performed, as this method is insecure. In
those cases where e-mail is required, such electronic transmissions must be
encrypted via a standard technology such as PGP.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Transmission of Data- Internal- Data transferred across the School’s network should
use the best possible practice for security.
Physical Security:
Controlled Access to Important Systems- Servers, routers, and other hardware which
is critical to the School’s operation of its networks should be physically secured in
spaces to which access can be controlled through the use of keys or keypads. When
third parties need access to these systems or hardware (such as for maintenance),
they should be accompanied by an authorized member of the technical staff.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Documentation of System Configurations for Critical Hardware- In order to make
possible tampering easier to recognize and correct, the physical setup of critical
hardware should be documented. That is, cable connections, drive locations, and
other physical characteristics of the setup of servers, routers, network equipment,
etc. should be recorded and/or catalogued.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Theft Prevention Measures for Public Hardware- Computers, scanners, printers, and
other pieces of computing hardware which are in public spaces should be secured
physically through the use of security cables, padlocks, and the like.
Staff/Faculty Access to Personal Computers- Faculty and staff should follow the best
possible security practices to prevent unauthorized access to computers which they
use at their desks. This includes, but should not be limited to, password protected
screen savers, locking offices when unoccupied, and limiting or preventing access to
faculty/staff computers by students serving as teaching and/or research assistants.
Monitor Visibility- On computers in which especially sensitive information (such as
Social Security Numbers), is stored and/or displayed, the monitors and/or displays
of those computers should be physically arranged in such a way that the screen of
the monitor or display cannot be seen by anyone other than those persons which
are authorized to view the sensitive information.
Ref: HIPAA http://www.hhs.gov/ocr/hipaa
Threat Detection:
Intrusion Detection Mechanisms- Detection of attempts to illicitly gain access to the
School’s networks should occur on both sides of the School’s firewall. Best possible
practices include, but should not be limited to, external threat detection by ITC, and
internal detection of threats through the use of virus detection software, audit
tracking, audit logs, and Web service logs.
Ref: COV ITRM Guideline http://www.vita.virginia.gov/docs/psg/ITSecurityPolicy90-1R3.doc
Termination-Related Security:
Account Access for Users Who Leave the Community- When students graduate from
the School of Architecture, and in cases in which faculty or staff resign, retire, are
terminated, or in any other way leave the Community, account access to the School’s
network, physical hardware, and all other computing technology for that person
should be terminated.
In the case of students, a grace period of 60 should days should be extended past
graduation to ensure removal of data and other electronic materials from the
School’s networks and hardware. All faculty and staff should lose access privileges
immediately upon leaving the Community, unless arranged for separately and on an
individual basis.
Personal Data on School-Owned Hardware- Any and all personal or academic data
which is kept on office and/or portable computers should be removed by its owner
prior to leaving the Community. Data which is sensitive or proprietary to the School
shall not be taken with the employee upon termination, retirement, or resignation.
The School of Architecture will, upon repossession of the hardware, reformat,
delete, or otherwise make inaccessible all data and/or software which belonged to
the User. The School is not responsible for copying, backing up, or in any other way
safeguarding the data on the computer after its repossession.
Download