Rule R4-004G: IT Resource and Information System Security and Vulnerability Management
Revision 1. Effective date: September 12, 2023
View PDF
- Purpose and Scope
- Definitions
- Rule
- Policies/ Rules, Procedures, Guidelines, Forms and other Related Resources
- References
- Contacts
- History
-
-
Purpose
The purpose of this rule is to outline the University’s process, owned by the Information Security Office, for the identification, assessing, notification, managing, and remediating of cybersecurity Vulnerabilities across Information Systems and IT Resources.
-
Scope
The scope of this rule is all University administrative units, including colleges, divisions, departments, and centers, and all members of the University community, including students, staff, faculty, other permanent or temporary employees, contractors, research collaborators, vendors, and third-party agents.
This rule supports section G, titled IT Resource and Information System Security and Vulnerability Management, of the University of Utah Information Security Policy 4-004.
-
-
The definitions provided in Policy 4-004 apply for this rule. In addition, the terms below apply for the limited purposes of this rule:
-
Mobile Code – Software transferred between IT Resources and executed on a local system without explicit installation or execution by the recipient. Examples include, but are not limited to, scripts (e.g., JavaScript, VBScript), Java applets, and macros embedded in Microsoft Office documents.
-
-
-
Workstation and Server Security
-
Users and/ IT Technicians shall install and use security tools as required by the Information Security Office and may not install other software that conflicts with, impedes, obstructs, or disables those tools.
-
-
-
To assess and apply appropriate security Patches that impact IT Resources and Information Systems, IT Technicians shall monitor vendor and third-party sources for updated Vulnerability information and implement Patches and/or mitigating Controls in accordance with the Vulnerability classification listed in this rule. See supporting Procedures in this Rule for more information about Vulnerability Management.
-
IT Technicians shall use automated assessment tools to identify Vulnerabilities or configuration issues on all IT Resources and Information Systems connected to the University’s network.
-
IT Technicians shall subscribe to reputable sources to receive notifications for Patches, security updates, and warning bulletins about hoaxes, scams, fraud, and malicious software.
-
The University uses the National Vulnerability Database (NVD) Common Vulnerability Scoring System (CVSS) for Vulnerability classification. The following are the CVSS severity rankings and the University’s mitigation time frames:
-
Critical: Must be remediated within 72 hours of discovery.
-
High: Must be remediated within 15 days of discovery.
-
Medium: Must be remediated within 30 days of discovery.
-
Low: Must be remediated within 60 days of discovery.
-
None: Must be remediated within 90 days of discovery.
-
-
In a situation where a Patch cannot be installed due to incompatibility with an IT Resource or Information System, testing requirements, or other pertinent Patching limitations, an exception to policy shall be filed by the User or IT Technician as described in Policy 4-004 within the same required time frame for remediation.
-
-
-
IT Technicians shall consider a Patch or update to repair a security-related Control released by a vendor to be a Vulnerability notification and shall undertake appropriate risk mitigation.
-
All Patch and update procedures shall be conducted in accordance with the Procedure P4-004E.
-
IT Technicians shall install Patches on a non-production or test system to verify that the security patch will not adversely impact system functionality.
-
IT Technicians shall inventory software assets to ensure that known Vulnerabilities can be readily identified and remediated.
-
IT Technicians shall use Security Baselines to configure IT Resources and Information Systems in accordance with University procedures prior to release into the production environments.
-
IT Technicians shall mitigate Risk from Vulnerabilities that are exploitable and/or exploited before they can be removed from the environment.
-
IT Technicians shall verify that remediation activities have been performed and are functioning as expected.
-
IT Technicians shall have all operating system and Application patches installed before deploying new IT Resources and Information Systems.
-
New IT Resources and Information Systems may not be deployed with end- of-life or end-of-support operating systems or Applications.
-
-
Operating System Access Controls
To provide a secure log-on procedure and prevent Unauthorized Access to IT Resources and Information Systems, IT Technicians shall implement the following Controls:
-
limit the number of unsuccessful log-on attempts;
-
record unsuccessful log-on attempts;
-
auto-lock and/or auto-logoff sessions due to inactivity; and
-
issue alarms when security requirements are breached.
-
-
To protect against Mobile Code performing unauthorized actions, IT Technicians shall implement the following Controls:
-
manage the use of Mobile Code where it is prohibited;
-
manage the receipt of Mobile Code where it is prohibited;
-
control the resources available to Mobile Code access; and
-
employ encryption controls to uniquely authenticate Mobile Code.
Sections IV- VII are for user information and are not subject to the approval of the Academic Senate or the Board of Trustees. The Institutional Policy Committee, the Policy Owner, or the Policy Officer may update these sections at any time.
-
-
-
Policies/ Rules, Procedures, Guidelines, Forms, and other Related Resources
-
Policies/ Rules.
-
Policy 4-004: University of Utah Information Security Policy
-
-
Procedures, Guidelines, and Forms.
-
Other Related Resources. [ reserved ]
-
-
-
45 C.F.R. 164: Health Insurance Portability and Accountability Act (HIPAA): Security and Privacy
-
Family Educational Rights and Privacy Act of 1974 ("FERPA", 20 U.S.C. § 1232g)
-
Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541)
-
ISO 27002:2013, Information Technology - Security Techniques - Code of Practice for Information Security Controls
-
NIST 800 Series, Federal Information Security Standards
-
Policy 3-070: Payment Card Acceptance
-
Policy 4-001: University Institutional Data Management
-
Policy 4-003: World Wide Web Resources Policy
-
Policy 5-111: Disciplinary Actions and Dismissal of Staff Employees
-
Policy 6-400: Student Rights and Responsibilities
-
Policy 6-316: Code of Faculty Rights and Responsibilities
-
Pub. 111-5, Division A, Title XIII, Subtitle D: Health Information Technology for Economic and Clinical Health Act (HITECH Act)
-
Omnibus HIPAA Rule: 45 CFR Parts 160 and 164 - Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
-
Utah Board of Higher Education Policy R345: Information Technology Resource Security
-
-
The designated contact officials for this Regulation are:
-
Policy Owner(s) (primary contact person for questions and advice): Chief Information Security Officer
-
Policy Officer(s): Chief Information Officer
See Rule 1-001 for information about the roles and authority of policy owners and policy officers.
-
-
Revision History
-
Current version. Revision 1.
-
Approved by President Randall as an Interim Rule on September 12, 2023 with effective date of September 12, 2023. Rule finalized with no changes after Board of Trustees approval of Policy 4-004 revisions on November 14, 2023.
-
Editorial Revisions
-
-
Previous versions.
-
Revision 0. Effective date April 4, 2016.
-
-
Renumbering
-
Not applicable.
-
-