Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Governance: University-Owned Device Standard, Secure Server Standard, Information Security Policy, Sensitive Data Policy

Security Control

Level 3High

Level 2Moderate

Level 1Low

Maintain inventory of computers that identifies criticality of device or data being stored on it.

Note

Sensitive Data must NEVER be stored on a computer.

(error)

(tick)

(tick)

Maintain inventory of systems being used and managed by WVU that identifies classification of data stored within.

(tick)

(tick)

(tick)

Maintain inventory of servers being used and managed by WVU that identifies purpose of server and classification of data stored on server.

(tick)

(tick)

(tick)

Develop, document, and periodically update system security plans.

(tick)

...

Governance: Vendor Security and Compliance/Technology Procurement Standard (pending development), Risk Assessment Standard

Internal

Security Control

SensitiveHigh

ConfidentialModerate

Low

Public

Adhere to WVU IT Purchase process

(tick)

(tick)

(tick)

(tick)

Require security assessment prior to purchase

(tick)

Assess vendor security compliance every three years, at minimum

(tick)

(tick)

Risk Assessment

Governance: Information Security Policy, Compliance Exception Management Standard, Risk Assessment Standard, PHI Privacy Policy, PHI Protection Standard

Internal(tick)

Security Control

SensitiveHigh

ConfidentialModerate

Low

Public

Annual risk assessment conducted

(tick)

Risk assessment conducted every 3 years

(tick)

Document architectural layout of the environment

(tick)

Develop post-assessment plans to reduce risks to acceptable levels

(tick)

(tick)

(tick)

(tick)

Prioritize remediation/mitigation of risks identified based on severity

(tick)

(tick)

(tick)

(tick)

Authorize acceptance of unmitigated risks

(tick)

(tick)

(tick)

(tick)

Identity Management & Access Control

Governance: Identity & Access Management Policy, Identity & Authentication Management Standard, Access Management Standard, Remote Access Standard, Sensitive Data Protection Standard, University-Owned Device Standard, Data Center Policy, Data Center Security Standard, Secure Server Standard, Physical Access Management Standard, Password Standard

Internal(tick) (tick) (tick) (tick)

Security Control

SensitiveHigh

ConfidentialModerate

Low

Public

Authentication is required to access systems

(tick)

(tick)

(tick)

(tick)

Enterprise Directory Services (SSO) is required for authentication

(tick)

(tick)

Two-Factor authentication (2FA) is required for users to access systems

Note

Use of campus VPN can be leveraged to ensure 2FA.

(tick)

(tick)

Two-Factor authentication (2FA) is required for privileged access to systems

Note

Use of campus VPN can be leveraged to ensure 2FA.

(tick)

(tick)

(tick)

(tick)

Two-Factor authentication (2FA) is required for all remote access solutions

Note

Use of campus VPN can be leveraged to ensure 2FA.

(tick)

(tick)

(tick)

(tick)

All passwords must meet Password Standard

(tick)

(tick)

(tick)

(tick)

Manage passwords for privileged Service Accounts in password vault

(tick)

(tick)

(tick)

(tick)

Manage passwords for privileged Shared Application Accounts in privileged access management tool

(tick)

(tick)

(tick)

Manage passwords for Shared Application Accounts with non-privileged access in password vault

(tick)

(tick)

(tick)

Use of restrictive VPN that requires use of a University Devices to conduct privileged access

(tick)

(tick)

(tick)

(tick)

Two-Factor authentication (2FA) required for non-local maintenance solutions. Individuals must actively accept remote sessions.

(tick)

(tick)

(tick)

(tick)

Access granted on principle of Least Privilege

(tick)

(tick)

(tick)

(tick)

Review accounts annually and remove individuals who no longer require access

(tick)

(tick)

(tick)

Implement host-based firewalls to block all inbound traffic not required for use of computer and/or server

(tick)

(tick)

(tick)

(tick)

Computer must use session lock after 15 min of inactivity

(tick)

(tick)

Physically secure servers within a University Data Center

Physically secure servers within Secure Server Room

(tick)

(tick)

(tick)

(tick)

Backup media must be secured from unauthorized physical access

(tick)

(tick)

(tick)

(tick)

Printer securely configured in a restricted-access location with authorized person available to receive printout immediately, or printer is password-protected

(tick)

Awareness & Training

Governance: Information Security Policy

Security Control

SensitiveHigh

ConfidentialModerate

Internal

PublicLow

Users must receive training to perform their duties

(tick)

(tick)

Privileged users receive training to understand their roles and responsibilities

(tick)

(tick)

Data Security

Governance: Data Center Security Standard, Secure Server Standard, University-Owned Device Standard, Data Destruction & Media Sanitization Standard

Internal

Security Control

SensitiveHigh

ConfidentialModerate

Low

Public

Server housed in University Data Center whole-disk encrypted

Server housed in server rooms whole-disk encrypted

(tick)

(tick)

Server not in server room/device whole-disk encrypted

Note

Servers storing Sensitive Data must be in housed with a secured server room.

(error)

(tick)

(tick)

(tick)

Development and testing environments of systems storing data are separate from production environment

(tick)

Information Protection Processes and Procedures

Governance: Information Security Policy, Password Standard, Secure Server Standard, Data Center Security Policy

Security Control

SensitiveHigh

ConfidentialModerate

Internal

PublicLow

Follow established SDLC processes

(tick)

Follow established configuration change control processes

(tick)

Develop a business continuity plan/disaster recovery plan

Business continuity plan/disaster recovery plan tested annually

Data backed up outside of a University Data Center

(tick)

Device sanitized appropriately before transfer or reuse

(tick)

(tick)

(tick)

(tick)

Security Continuous Monitoring

Governance: University-Owned Device Standard, Secure Server Standard

Internal

Security Control

SensitiveHigh

ConfidentialModerate

Low

Public

Anti-virus installed and running Real-Time scanning

(tick)

(tick)

(tick)

(tick)

Send logs to Security Event Management (SIEM) system (Splunk)

(tick)

Automate alerting on logging failures

(tick)

Vulnerability Management

Governance: Vulnerability Management Standard

Level 2(tick) (tick)

Security Control

Level 4High

Level 3Moderate

Low

Level 1

Authenticated vulnerability scans required monthly

(tick)

Critical Patches implemented within 30 days

(tick)

(tick)

(tick)

Prioritize remediation/mitigation based on severity, risk, and likelihood

(tick)

(tick)

(tick)

(tick)

Implement alternative security controls for vulnerabilities that cannot be remediated

(tick)

(tick)

(tick)