1. Overview
The use of networked devices has become a part of everyday life within the University of Arizona, and the sharing of sensitive data has become commonplace. Securing these devices is necessary to ensure the confidentiality, integrity, and availability of university resources. As users of these devices, it is important for each one of us to understand and contribute to the overall security of the University of Arizona network. For clarification regarding any of these standards, please contact your network manager, system administrator or other technical support.
2. Purpose
The following minimum standards were developed to assist university affiliates to secure, manage, and maintain university-networked devices. Departments and
…show more content…
Physical security
Mission-critical systems and regulatory-protected data must be located in a locked location accessible only to authorized personnel.
4.10. Services and Protocols
Services or protocols which are not necessary to the operation of a device should be disabled or removed. Assistance identifying services running on a device may be obtained by contacting SIRT.
5. Exceptions
Exceptions to these standards will be granted by the ISAB after preliminary review by SIRT.
6. Recourse for Non-Compliance
Compromised network devices will be disconnected from the network. Action may be taken to restrict or remove network access of vulnerable devices if such action is determined to be in the best interests of the university. For assistance in resolving compromises or vulnerabilities, contact SIRT, your network manager, system administrator or other technical