- Purpose and Scope
- Definitions
- Rule
- Policies/ Rules, Procedures, Guidelines, Forms and other Related Resources
- References
- Contacts
- History
-
-
Purpose.
The purpose of this Log Management and Monitoring Rule is to protect the University’s Information Systems by establishing requirements for the configuration and review of Information System activities through Log management and monitoring.
-
Scope.
The scope of this rule is all University administrative units, including colleges, divisions, departments, and centers, and all members of the University community, including students, staff, faculty, other permanent or temporary employees, contractors, research collaborators, vendors, and third-party agents.
This rule supports section J, titled Log Management and Monitoring, of the University of Utah Information Security Policy 4-004.
-
-
The definitions provided in Policy 4-004 apply for this rule. In addition, the terms below apply for the limited purpose of this rule.
-
Least Privilege – The principle of granting Users the minimum access and authorization needed to perform their job functions.
-
-
-
-
To detect unauthorized activity and assist in future investigations for Information Systems, Logs must capture the following information:
-
User ID;
-
User login and logoff date and time with IP address;
-
successful and unsuccessful login attempts;
-
file system, application, and operating system configuration changes;
-
system utility use;
-
activation and deactivation of security mechanisms such as logging, anti- malware, and/or management agents; and
-
actions taken by Users logged in as an administrator.
-
-
When required, IT Technicians shall implement additional logging Controls as identified by contractual obligation or applicable regulatory body.
-
-
-
IT Technicians shall periodically review on a continuous basis, either manually or by automation and in accordance with published procedures, Logs for Information Systems that create, store, process, or transmit University Information Assets.
-
-
Protection of Log Information
-
Logs must be protected from tampering. Access must be based on the principle of Least Privilege. IT Technicians are accountable for the integrity of Logs for the Information Systems they are responsible for.
-
Read/write access to the Log files shall be limited to authorized personnel.
-
IT Technicians shall monitor read/write access of the Log files by authorized personnel.
-
-
-
IT Technicians shall take appropriate action on Information System and Server hardware faults and implement the following Controls:
-
enable fault logging;
-
enable automatic alerts for critical system fault Logs; and
-
regularly review fault Logs and correlation with fault resolutions.
-
-
-
-
IT Technicians shall ensure Information Systems are synchronized to the authoritative University time source.
Sections IV- VII are for user information and are not subject to the approval of the Academic Senate or the Board of Trustees. The Institutional Policy Committee, the Policy Owner, or the Policy Officer may update these sections at any time.
-
-
-
Policies/ Rules, Procedures, Guidelines, Forms and other Related Resources
-
Policies/ Rules.
-
Policy 4-004: University of Utah Information Security Policy
-
-
Procedures, Guidelines, and Forms. [ reserved ]
-
Other Related Resources. [ reserved ]
-
-
-
45 C.F.R. 164: Health Insurance Portability and Accountability Act (HIPAA): Security and Privacy
-
Family Educational Rights and Privacy Act of 1974 ("FERPA", 20 U.S.C. § 1232g)
-
Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541)
-
ISO 27002:2013, Information Technology - Security Techniques - Code of Practice for Information Security Controls
-
NIST 800 Series, Federal Information Security Standards
-
Policy 3-070: Payment Card Acceptance
-
Policy 4-001: University Institutional Data Management
-
Policy 4-003: World Wide Web Resources Policy
-
Policy 5-111: Disciplinary Actions and Dismissal of Staff Employees
-
Policy 6-400: Student Rights and Responsibilities
-
Policy 6-316: Code of Faculty Rights and Responsibilities
-
Pub. 111-5, Division A, Title XIII, Subtitle D: Health Information Technology for Economic and Clinical Health Act (HITECH Act)
-
Omnibus HIPAA Rule: 45 CFR Parts 160 and 164 - Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
-
Utah Board of Higher Education Policy R345: Information Technology Resource Security
-
-
The designated contact officials for this Regulation are:
-
Policy Owner(s) (primary contact person for questions and advice): Chief Information Security Officer
-
Policy Officer(s): Chief Information Officer
See Rule 1-001 for information about the roles and authority of policy owners and policy officers.
-
-
Revision History.
-
Current version. Revision 1.
-
Approved by President Randall as an Interim Rule on September 12, 2023 with effective date of September 12, 2023. Rule finalized with no changes after Board of Trustees approval of Policy 4-004 revisions on November 14, 2023.
-
Editorial Revisions
-
-
Previous versions.
-
Revision 0. Effective Date. April 6, 2016
-
-
Renumbering
-
Not applicable
-
-