Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Governance: University-Owned Device Standard, Secure Server Standard, Information Security Policy, Sensitive Data Policy

Security Control

SensitiveLevel 4

ConfidentialLevel 3

InternalLevel 2

PublicLevel 1

Maintain inventory of computers that identifies criticality of device or data being stored on it.

Note

Sensitive Data must NEVER be stored on a computer.

(error)

(tick)

(tick)

(tick)

Maintain inventory of systems being used and managed by WVU that identifies classification of data stored within.

(tick)

(tick)

(tick)

(tick)

Maintain inventory of servers being used and managed by WVU that identifies purpose of server and classification of data stored on server.

(tick)

(tick)

(tick)

(tick)

Develop, document, and periodically update system security plans.

(tick)

Business Environment

Governance: Vendor Security and Compliance/Technology Procurement Standard (pending development), Risk Assessment Standard

...

Governance: Vulnerability Management Standard

Public

Security Control

Sensitive

Confidential

Internal

Level 4

Level 3

Level 2

Level 1

Authenticated vulnerability scans required monthly

(tick)

Critical Patches implemented within 30 days

(tick)

(tick)

(tick)

(tick)

Prioritize remediation/mitigation based on severity, risk, and likelihood

(tick)

(tick)

(tick)

(tick)

Implement alternative security controls for vulnerabilities that cannot be remediated

(tick)

(tick)

(tick)

(tick)