Vulnerability Management Policy

 
 
Document Number:
ITS-0020
Revision #:
v2.0
Document Owner:
Information Services
Status:
Approved

General Description

Purpose:

The purpose of this document is to set out the policy and controls to implement and maintain a sound vulnerability management program that covers the assessment and management of technical vulnerabilities within the IT environment, with the objective of proactively mitigating security risks associated with it.

This policy provides a consistent outline throughout the organization of the technology and procedures necessary for implementing a comprehensive, and integrated vulnerability management program to discover, assess, prioritize and remediate technical vulnerabilities affecting Trinity University systems, including but not limited to operating systems, applications, databases, web technologies, cloud resources, desktop software, mobile devices, network devices and hardware, to maintain appropriate levels of security. 

This policy is complemented with the Trinity University Vulnerability and Patch Management Plan, which contains detailed implementation procedures of policy and controls stated in the current document.

Scope:

This vulnerability management policy applies to all systems, people and processes that constitute Trinity University’s (TU) information systems, including staff, executives, faculty, and third parties with access to TU’s information technology assets and called hereinafter as TU Workforce.

This vulnerability management policy applies to all systems, people and processes that constitute Trinity University’s (TU) information systems, including staff, executives, faculty, and third parties with access to TU’s information technology assets and called hereinafter as TU Workforce.
 

Exceptions:

In a few instances, Trinity systems may require to be exempted from the vulnerability management program due to possible technical difficulties or third-party contractual obligations. Any such exceptions to the current policy must be documented and approved via Trinity’s Exceptions Management Process.
 
Policy Content
Performance Evaluation

Consequences of Policy Violation:

Users who violate this policy may be subject to disciplinary action, up to and including termination of employment or contract with Trinity University.

Trinity University cooperates with appropriate law enforcement entities if any user may have violated federal or state law. Instances of failure to adhere to this policy will be brought to the attention of the Chief Information Officer (CIO). The CIO may seek consultation/advice from Human Resources.
 
Terms & Definitions

Terms and Definitions:

Term:

Definition:

Application
Any data entry, update, query, or report program that processes data for the user.

Configuration Adjustment
The act of changing an application’s setup. Common configuration adjustments include disabling services, modifying privileges, and changing firewall rules.
Host
A computer or IT device (e.g., router, switch, gateway, firewall). Host is synonymous with the less formal definition of system.
Operating System
The master control program that runs a computer.
Patch
An additional piece of code developed to address a problem in an existing piece of software.
Remediation
The act of correcting a vulnerability or eliminating a threat. Three possible types of remediation are installing a patch, adjusting configuration settings, and uninstalling a software application.
Remediation Plan
A plan to perform the remediation of one or more threats or vulnerabilities facing an organization’s systems. The plan typically includes options to remove threats and vulnerabilities and priorities for performing the remediation.
Risk
The probability that a particular threat will exploit a particular vulnerability.

System
A set of IT assets, processes, applications, and related resources that are under the same direct management and budgetary control; have the same function or mission objective; have essentially the same security needs; and reside in the same general operating environment. When not used in this formal sense, the term is synonymous with the term "host". The context surrounding this word should make the definition clear or else should specify which definition is being used.
System Administrator
A person who manages the technical aspects of a system.
System Owner
Individual with managerial, operational, technical, and often budgetary responsibility for all aspects of an information technology system.
Threat
Any circumstance or event, deliberate or unintentional, with the potential for causing harm to a system.
Vulnerability
A vulnerability is commonly defined as “an inherent weakness in an information system, security procedures, internal controls, or implementation that could be exploited by a threat source.”
Related Documents

Related Content:

Trinity’s vulnerability management policy is aligned with NIST Special Publication 800-40, creating a patch and vulnerability management program.
  1. NIST Special Publication 800-40 Version 2.0, Creating a Patch and Vulnerability Management Program: https://csrc.nist.gov/publications/detail/sp/800-40/version-20/archive/2005-11-16.
  2. Vulnerability and Patch Management Plan: Link to Vulnerability and Patch Management Plan.
Revision Management

Revision History Log:

Revision #:

Date:

Recorded By:

v2.0
4/27/2022 11:29 AM
Ben Lim
v3
1/27/2022 1:18 PM
Dan Carson
v2.0
8/21/2020 8:02 AM
Holly Warfel
v1.0
1/14/2020 2:46 PM
Courtney Cunningham
 

Vice President Approval:

Name:

Title:

Ben Lim
Chief Information Officer