General Description
Policy Summary:
Purpose:
Scope:
This policy and supporting procedures encompass all system components that are owned, operated, maintained, and controlled by Trinity University and all other system components, both internally and externally, that interact with these systems.
- Internal system components are those owned, operated, maintained, and controlled by Trinity University and include all network devices (firewalls, routers, switches, load balancers, other network devices), servers (both physical and virtual servers, along with the operating systems and the underlying application(s) that reside on them) and any other system components deemed in scope.
- External system components are those owned, operated, maintained, and controlled by any entity other than Trinity University, but for which such external resources may impact the confidentiality, integrity, and availability (CIA) and overall security of the description of "Internal system components".
- Trinity University will follow due-diligence best practices by obtaining all relevant information ensuring that other organizations (external to TU) systems components are safe and secure, although Trinity University does not have the ability to provision, harden, secure, or deploy it.
Exceptions:
Policy Content
- Management Commitment: Responsibilities include providing overall direction, guidance, leadership, and support for the entire information systems environment, while also assisting other applicable personnel in their day-to-day operations. The CIO is to report to other members of senior management on a regular basis regarding all aspects of the organization’s information systems.
- Internal Employees and Users: Responsibilities include adhering to the organization’s information security policies, procedures, practices, and not undertaking any measure to alter such standards on any Trinity University system components. Additionally, end users are to report instances of non-compliance to this policy to senior authorities, specifically those by other users. End users, while undertaking day-to-day operations, may also notice issues that could impede the safety and security of Trinity University system components and are to also report such instances immediately to senior authorities.
- Vendors, Contractors, Workforce: Responsibilities for such individuals and organizations are much like those stated for end users: adhering to the organization’s information security policies, procedures, practices, and not undertaking any measure to alter such standards on any such system components.
- System / Network Administrators: Responsible for the technical implementation and management of the Information Security Policy. They are responsible for certain aspects of system security, such as adding and deleting user accounts, as authorized by the asset owner, as well as normal operations of the system in keeping with job requirements. System and network administrators measure to ensure system and data integrity include: controlling system access and maintaining current authorization levels for all users; restricting access to sensitive data and maintaining a rigorous authentication practice; documenting system/network administration procedures, parameters, and maintenance activities; creating and maintaining a disaster recovery plan with contingency strategies for dealing with occurrences such as natural disasters, power outages, server failure, virus attacks, and other emergency situations; testing software updates, security controls, and disaster recovery procedures.
In keeping with this responsibility, Trinity University has also developed the following policies that relate to virtual private network (VPN) access, bandwidth, disruptive network devices, guest access, TUNetwork services, and devices connected to the TUNetwork.
- Network service connections must be approved prior to any connection being made.
- Any exceptions to the established process must be approved by the Chief Information Officer (CIO) or designee. This includes the advance review and approval of all design and engineering specifications involving or affecting university networks by Information Technology Services to confirm compliance with applicable University policies and industry standards.
- The purchase of any computer related device with University funds that will require a network connection must be approved first by the Chief Information Officer (CIO) or designee.
- Personal wireless access points or any other unapproved network device are NOT permitted on the Trinity University network as they can interfere with the wireless network. If found, these devices will be removed and confiscated without notice.
- Information Technology Services retains the right to disconnect and/or block any device from the network without notice if it is determined by ITS that the device is causing bandwidth or any other problems on the Trinity network or if the device has known security vulnerabilities that have not been corrected by maintenance, service releases, and/or security patches. The University deploys software agents to monitor or inventory University-owned devices as well as to perform vulnerability scans on any device connecting to the network.
- ITS ensures that all computers and other devices capable of running antivirus and/or anti-malware software have Trinity-licensed antivirus software installed. ITS ensures that the most recent security patches are installed on each system as soon as practical to adhere to security standards. Where machines cannot be patched, other actions are taken to secure the machine appropriately.
- Connecting devices to the network by means of unauthorized access to University equipment / cabling rooms is prohibited.
- Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Trinity University.
- Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Trinity University or the end user does not have an active license is strictly prohibited.
- Accessing Trinity University data, servers, or user accounts for any purpose other than conducting Trinity University business, is prohibited.
- Exporting software, technical information, encryption software or technology, in violation of national, international, or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question.
- Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.).
- Revealing your account password to others or allowing use of your account by others.
- Using a Trinity University computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the users.
- Making statements about warranty, expressly or implied, unless it is a part of normal job duties.
- Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, packet spoofing, denial of service, and forged routing information for malicious purposes.
- Port scanning or security scanning is expressly prohibited unless prior authorization has been granted by the Information Technology Services Department.
- Executing any form of network monitoring which will intercept data not intended for the employee's host unless this activity is a part of the employee's normal job/duty.
- Circumventing user authentication or security of any host, network, or account.
- Introducing honeypots, honeynets, or similar technology on the Trinity University network.
- Interfering with or denying service to any user other than the employee's host (for example, denial of service attack).
- Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's terminal session, via any means, locally or via the Internet / Intranet / Extranet.
- Providing information about, or lists of, Trinity University employees to parties outside Trinity University without review and approval of the Information Technology Services Department.
- ITS Core Infrastructure does not recommend the use of TU VPN Server to access Internet resources that are external to Trinity University.
- VPN access is provided to employees with demonstrated need for remote access resources internal to the TUNetwork.
- VPN gateway/concentrators will be set up and managed by ITS. VPN access is available using University owned and approved laptops installed with a VPN client distributed by ITS. All requests for this service must be made by completing the VPN Access Request Form and approved by ITS. This form is available via the University ITS Technology Support Services team.
- By using the VPN technology, employees must understand that University laptops are a de facto extension of the TUNetwork, and as such are subject to the same rules and regulations that apply to University computers on campus.
- Users of this service are responsible for procurement and cost associated with acquiring basic Internet connectivity, and any associated service issue.
- VPN access is controlled using an ID and password issued by the University for authentication.
- All VPN services are to be used solely for the approved business and/or academic support purpose. All users are subject to auditing of VPN usage.
- Disk encryption software will be installed on the laptop to safeguard information stored on the laptop.
- Current VPN software is available for Windows, Mac OS and Linux operating systems.
- All computers connected to the TUNetwork via VPN must use the University approved virus software and are subject to scanning before establishing a connection.
- Users with remote access privileges to TUNetwork must not use non-Trinity University email accounts (e.g., Gmail, Hotmail, Yahoo, AOL), or other external resources to conduct TU business, thereby ensuring that official business is never confused with personal business.
- University computer labs must be used in a manner consistent with the policies of Trinity University
- All persons using the lab are responsible for backing up their own data and protecting their own information.
- Printing from lab machines can be sent to a print station. A Trinity University Tiger Card or guest print card will need to be purchased to be able to print.
- Food, beverages, tobacco use, weapons, firearms, or animals, except service animals, are prohibited in the computing labs.
- Audio output or sound playing devices are permitted only with the use of headphones.
- Use of two-way communication devices are prohibited in the labs. Ringers and alarms on these devices should be turned off or set to vibrate while in the labs.
- Children are permitted in labs only if accompanied by Trinity University faculty, staff or students.
- ITS lab equipment may not be used for personal business purposes or in any for-profit venture.
- Disabling computers by disconnecting cables, removing hardware, applying software locks or locking workstations will be considered vandalism and treated as such under the University policy.
- ITS employees, including ITS student workers, are responsible for maintaining order in the labs. Anyone violating these policies, or disturbing others in any way, will be asked to leave.
- Persons with special needs requiring special access to computer laboratory equipment may contact the Coordinator of Disability Services (dss@trinity.edu / 210- 999-7411).
- Controls and processes are in place to detect and identify unauthorized wireless access points.
- Processes are in place and defined for detecting and identifying all wireless access points on a quarterly basis.
- An inventory of authorized wireless access points is maintained.
- Secure Deployment: All WLAN devices and supporting resources, such as wireless access points, and other network devices, are to be positioned in a manner for ensuring only authorized access and modification. Additionally, they are to be secured with approved fixtures and other necessary apparatuses for mitigating any unnecessary movement. Additionally, the WLAN platform itself is to be logically | physically segregated from the corporate | internal wired network, which can be achieved by utilizing firewalls and other access control methods.
- Asset Inventory: Once all WLAN devices are safely secured, a complete asset inventory is to be taken, documenting all necessary information, such as physical location, and corresponding unique identifiers (i.e., hostnames, serial numbers, etc.).
- Configuration of Wireless Access Points: The following measures are to be undertaken regarding WLAN platforms:
- Change default administrator settings, such as username and password, along with implementing strong, unique administrative passwords (i.e., alphanumeric, case sensitive, etc.) for all wireless access points.
- Change any default IP addresses also.
- For all remaining services and protocols, implement the concept of "least privileges".
- Implement MAC Address filtering on wireless access points.
- Protect all sensitive wireless access points information, such as administrator passwords, SSID password, keys, etc. with approved security measures, such as encryption.
- Enable logging features and ensure that all logs and audit trails are sent to a remote logging server and retained as necessary (i.e., regulatory compliance laws, etc.). Information captured should include, but not limited to, the following: MAC addresses, user logon information (i.e., time, username, etc.), user logoff information
- Enable usage parameters, such as time-out sessions.
- Ensure appropriate network security protocols are in place for helping ensure the overall safety and security of all WLAN platforms. Specifically, for internal, corporate WLAN's, use appropriate layered defense mechanisms, such as firewalls, intrusion detection systems, etc.
- End-User Security: Access to Trinity University WLAN environments requires the use of anti-virus on all laptops, desktops, and other workstations. Additionally, because information often sent via wireless can be deemed sensitive and confidential, all users are to abide by Trinity University wireless security general guidelines, responsibilities, and acceptable user as defined below.
- Spoofing: More specifically – MAC spoofing – can occur whereby MAC addresses are obtained by unauthorized parties and used (in conjunction with other software tools) for gaining access to a network.
- Denial of Services (DoS): A concept whereby an attacker deliberately floods a network – in this case, a WLAN platform – with requests and other network related activities, resulting in the loss of use for intended users, and possibly even the platform “crashing”.
- Eavesdropping and Tampering: Intercepting, capturing and/or modifying data and information being sent or received over the WLAN platform
- Changing administrator wireless access points passwords every ninety (90) days.
- Changing end-user wireless access points passwords every ninety (90) days.
- Updating of firmware and related patches and security updates as necessary.
- Reviewing all log files on a regular basis and reporting issues, concerns, constraints immediately.
- Reviewing access rights on a regular basis, both administrator access rights, along with end-user access rights.
- When making any configuration changes to the WLAN platforms, it is to be conducted by authorized personnel only, and fully documented in accordance with Trinity University change management policies and procedures.
- Actively scanning on a regular basis for Rogue AP's and immediately disabling such platforms.
- When disposing of wireless access points devices, remove configuration settings relating to network security, passwords, keys, etc.
An important component of security is training all Trinity University employees and other applicable users of relevant security measures and precautions pertaining to use of technology and industry best practices
All faculty, students and staff who will be required to attend cyber security awareness training on an annual basis.
- The Core Infrastructure Team tests and approves all network connections and changes to firewall and router configurations, before moving to the production environment.
- Any changes to such processes and procedures must be reviewed and approved by authorized personnel at Trinity University for ensuring such changes still meet the needs of the organization along with any other sensitive and confidential information being stored, processed, and/or transmitted
Performance Evaluation
Consequences of Policy Violation:
Non-standard software on University-owned devices will be removed as part of a normal repair process if necessary to restore system functionality. In the event of computer or network performance issues associated with a computer enabled with administrator level access, ITS will only restore the computer to the standard configuration for all University computers. The occurrence of repeated instances of OS integrity problems may result in the removal of administrator level access in order to prevent continued challenges in supporting the computer.
Anyone who changes a MAC address, IP address, or netid with the intention of disguising or forging his or her identity may be in violation of University policy.
Any behavior in violation of this policy is cause for disciplinary action. Violations will be adjudicated, as appropriate, by the CIO, the Office of the Dean of Students, the Office of Housing and Residential Life, and/or the Office of Human Resources. Sanctions because of violations of this policy may result in, but are not limited to, any or all the following:
- Attending a class or meeting on network use issues, as well as successful completion of a follow up quiz.
- Loss of University computing, email and/ or voice mail privileges.
- Disconnection from the residential hall internet network.
- University judicial sanctions as prescribed by the student Code of Conduct.
- Reassignment or removal from university housing and/or suspension or expulsion from the University.
- Prosecution under applicable civil or criminal law.
- Employees may be subject to disciplinary action, .
- Violation of policies in regard to the computers in the computer labs may result in loss of computer lab privileges and other disciplinary action as described in the various handbooks issued by the University to students, faculty, and staff.
Terms & Definitions
Terms and Definitions:
Term: |
Definition: |
---|---|
Administrator access | This level allows the user to have complete and unrestricted access to the computer. This includes the ability to install any hardware or software, edit the registry, manage the default access accounts and change file level permissions. Manipulating these may cause serious stability issues with the computer system. |
General access | This level allows most administrative powers with some restrictions. Installation of software or hardware that makes changes to the underlying operating system will require the assistance of ITS. General Access Level will generally assure the highest level of stability for a computer. |
Host | A computer or IT device (e.g., router, switch, gateway, firewall). Host is synonymous with the less formal definition of system. |
Information and Technology Resources | The full set of information technology devices (telephones, personal computers, printers, servers, networking devices, etc.) involved in the processing, storage, accessing, and transmission of information owned by, controlled by, or contracted to Trinity University. Connection of these devices can be permanent, via cable, or temporary, through telephone or other communications links. The transmission medium can be physical (e.g., fiber optic cable) or wireless (e.g.. satellite, wi-fi, WimAX). |
Operating System | The master control program that runs a computer. |
System | A set of IT assets, processes, applications, and related resources that are under the same direct management and budgetary control; have the same function or mission objective; have essentially the same security needs; and reside in the same general operating environment. When not used in this formal sense, the term is synonymous with the term "host". The context surrounding this word should make the definition clear or else should specify which definition is being used. |
System Administrator | A person who manages the technical aspects of a system. |
System Owner | Individual with managerial, operational, technical, and often budgetary responsibility for all aspects of an information technology system. |
Virtual Private Network (VPN) | A method for accessing a remote network that uses encryption and tunneling to connect users securely over a public network, usually the Internet. |
Revision Management
Revision History Log:
Revision #: |
Date: |
Recorded By: |
---|---|---|
v4.0 | 4/27/2022 11:29 AM | Ben Lim |
v3.0 | 3/16/2022 10:43 AM | Dan Carson |
v2.0 | 8/21/2020 8:02 AM | Holly Warfel |
v1.0 | 8/14/2019 5:16 PM | Courtney Cunningham |
Vice President Approval:
Name: |
Title: |
---|---|
Ben Lim | Chief Information Officer |