Printable Version in PDF Format ()
Table of Contents
History [top]
- Business Practice Number: BP.02.003
- Version: 3
- Drafted By: Carlos Miranda
- Approved By: James August
- Approval Date: 08/31/2010
- Latest Revision Date: 11/15/2023
Purpose [top]
To assure the confidentiality, integrity, and availability of 海角社区 Channel Islands information assets by regularly assessing the University鈥檚 network and information systems for vulnerabilities and insecure configuration.
Background [top]
The University is required by 海角社区 system-wide policy to protect its information assets. An industry best practice in information security is regular assessment of the computing environment for security vulnerabilities and insecure configurations. ITS will scan the University network, including non-University-owned hardware connected to the network, on a regular basis.聽 Scanning for vulnerabilities and insecure configurations will occur only on University-owned hardware.
Business Practice [top]
Accountability [top]
The Associate Vice President for Information Technology Services (CIO).
Applicability [top]
General scanning: all hardware connected to the University network, whether University-owned or not.聽
Vulnerability and secure configuration scanning: all University-owned hardware.聽聽
All users of networked information resources at 海角社区 Channel Islands, the Security Incident Response Team, and ITS system administrators.
Definition(s) [top]
SCAP:聽 Security Content Automation Protocol, pronounced 鈥淪 Cap鈥, is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance).
MECP:聽 Microsoft鈥檚 Endpoint Configuration Manager, is a systems management software product developed by Microsoft for managing large groups of computers running Windows OS, Windows Server, MacOS (OS X), Linux or UNIX, and mobile operating systems.聽 MECP provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory.
Text [top]
General
In order to ensure the confidentiality, integrity, and availability of the University鈥檚 information assets, ITS will implement the following procedures.
Address space scans
海角社区 Channel Islands ITS operates one or more address space scanning appliances. ITS will regularly scan the entirety of the University鈥檚 address space to create and maintain an inventory of connected devices. These scans are non-invasive and will not affect properly configured systems.
For purposes of this business practice, 鈥淯niversity鈥檚 address space鈥 includes:
- All internal Internet Protocol (IP) addresses, including those address spaces allocated to University auxiliaries and departments, those addresses allocated to University wireless networks, and
- All externally-facing Demilitarized Zone (DMZ) IP addresses are assigned to the 海角社区 Channel Islands campus.
These scans will retain the following information about devices discovered for use by ITS personnel in the performance of their duties:
- The date and time of the device鈥檚 discovery,
- The IP address of the connected device,
- The Media Access Control (MAC) address of the connected device, along with the mapping of the MAC address to the device鈥檚 manufacturer,
- A list of open Transmission Control Protocol (TCP) and Universal Datagram Protocol (UDP) ports on the device, and
- The scanning device鈥檚 best guess as to the device鈥檚 operating system.
System vulnerability scans
Certain systems operated by ITS contain information or provide services critical to the University鈥檚 operation. These systems will be periodically scanned for software vulnerabilities. 海角社区 Channel Islands ITS operates one or more vulnerability-scanning appliances for this purpose.
Vulnerability scanning is a more intrusive process than address space scanning and will only be applied to a University-owned system with notice given to the administrator.
Automated regular vulnerability scans will not be applied to non-University-owned systems connected to the University network
OS Configuration scans
Operating system configuration has the potential for securing a system from unauthorized access when applied appropriately or allowing unauthorized access to the systems they run on when applied improperly.聽 As a result, secure configurations must be applied appropriately to all University-owned hardware, re-assessed on a regular basis, and properly change managed.聽
海角社区 Channel Islands utilizes the secure NIST-approved configuration Security Content Automation Protocol (SCAP) templates for all of the operating systems for their University-owned hardware.聽 These templates are downloaded, reviewed, and modified as necessary to securely accommodate the University鈥檚 business practices without impeding those practices.聽聽
海角社区 Channel Islands utilizes Microsoft鈥檚 Endpoint Configuration Manager, MCEP, to distribute new or updated configurations, add or remove software as prescribed, and build hardware and software inventories.
OS Configuration Change Management
Change management of approved secure server or workstation configuration template values located in SCCM shall be administered using the existing CI change management process, BP.00.002 鈥 ITS Change Control.
Incident vulnerability scans
In the event of a threatened, suspected, or actual security event or incident, 海角社区 Channel Islands ITS may employ a vulnerability scan against any device connected to the University network. A reasonable effort commensurate with the severity of the ongoing incident will be made to contact the owner or administrator of the system being scanned.
Reviewing scan results
海角社区 Channel Islands ITS will review the results of address space scanning. This information will be used to assess demographic information about the University鈥檚 computing environment, such as the types and kinds of devices being operated on the University network. This information will also be used to note changes to the computing environment. The information may also be used in response to an incident for containment or forensic purposes.
海角社区 Channel Islands ITS Security Incident Response Team (SIRT) will review the results of system vulnerability scans monthly. The information will be used to assess and mitigate security risks on the scanned systems.
Exhibit(s) [top]
- 听(, 1.1MB)
- BP.00.002 鈥 ITS Change Control
Assessment History [top]
Description | Frequency | Role Assigned | Date |
---|---|---|---|
Business Practice Assessment | Annual | Director, Infrastructure Technology | 08/14/2017 |
Annual Review of business practice | Annual | Chief Information Security Officer | 11/15/2023 |