Sub-Section
3.3.02.05 Monitoring Use of Information Technology Systems
New Statement
UnitedHealth Group owned workstations will continuously be monitored for unauthorized applications. Any unauthorized or unapproved application will be alerted to the Computer Incident Response Team for immediate remediation.
Explanation
• Appsense will audit all UHG owned workstations and virtual machines for any applications being run for the first time. Reports will be made available and sent to teams that continuously audit endpoint applications.
Description
New sub-section
5.1.0.2.01 – Application Services
Future Statement
Unknown services run within UnitedHealth Group workstations will be evaluated using the Information Risk Management risk
…show more content…
New or unknown workstation applications require a risk review and to meet the minimum UnitedHealth Group acceptable risk.
Explanation
• Some endpoint applications will not have a thorough risk review and may be approved without comprehensive verification.
• Modify?
Subsection
5.1.06.01 –Restricted Use of System Audit Tools
Current Statement
Unauthorized usage of network diagnostic, monitoring and system audit tools may cause security exposures or system availability issues if not utilized in a controlled, scheduled manner. Possession, distribution or use of network or system diagnostic, monitoring and system audit tools is limited to designated and authorized employees or contractors in accordance with their job responsibilities, per 09.2.01 Non-Essential Services.
Approval can only be granted by the Information Risk Management Organization. This includes anything which can replicate the functions of such tools. Unauthorized possession, use or distribution of such tools is prohibited
Question
• Can help desk approve temporary desktop applications? Would they do a risk review?
• Temporary