Table of Contents |
---|
...
Panel | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||
YALE-MSS-1: System ClassificationYALE-MSS-1.1: Classify the IT System and Meet the Minimum Security Standards
YALE-MSS-1.2: Apply any additional security requirements required by external obligations
YALE-MSS-1.3: Ensure appropriate contracts for all third-party relationships are in place
YALE-MSS-1.4: Designate and protect Critical IT Infrastructure
YALE-MSS-1.5: Plan for data recovery requirements
YALE-MSS-1.6: Plan for meeting and maintaining the security requirements for the IT System
YALE-MSS-1.7: Complete a Security Planning Assessment (SPA)The system owner is responsible for completing the SPA. The ITS Linux team will answer questions pertaining to the SPA, and this document lists what the ITS Linux team guarantees as part of our managed server offering. |
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
titleColor | white | |||||
titleBGColor | #0F4D92 | title | YALE-MSS-11: Security TrainingYALE-MSS-11.1: Require security training for all users of Yale Data and Yale IT Systems
YALE-MSS-11.2: Ensure all third parties complete required training
| |||
Panel | ||||||
|
...
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
YALE-MSS-12: Intrusion DetectionYALE-MSS-12.1: Capture inbound and outbound network flow dataInbound/Outbound traffic flow is captured by appliances managed by the security team. YALE-MSS-12.2: Utilize a network firewall to allow the least amount of access possibleAll the systems are behind firewall.
YALE-MSS-12.3: Implement an Intrusion Detection and Prevention SystemThe ISO team manages the Intrusion Protection System. |
...
Panel | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
YALE-MSS-13: LoggingYALE-MSS-13.1: Ensure logging contains information required for incident response responseSecurity incidents will be reported to the Information Security Team via a ServiceNow incident with all available information.
YALE-MSS-13.2: Log all authentication eventsUsers logging to systems are tracked in audit.log file
YALE-MSS-13.3: Ensure logs are forwarded to a log server in addition to the in-scope systemAll the logs are forwarded to Graylog. Adequate permissions are set for users through Grouper in order to access the logs where they can access the required information. YALE-MSS-13.4: Collect and review all source system activity logsUsers logging to systems are tracked in audit.log file
|
...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
YALE-MSS-14: Security Incident ReportingYALE-MSS-14.1: Report any suspected security incidents to the Information Security Team in a timely manner security incidents to the Information Security Team in a timely mannerSecurity incidents will be reported to the Information Security Team via a ServiceNow incident with all available information. Depending on the severity of the security incident, the team may reach out directly to the security team via phone, Teams, etc.
YALE-MSS-14.2: YALE-MSS-14.2: Identify the system's primary security contactBased on the tagging information available on the respective node in VMWare, we will be contacting the client accordingly. Information for physical systems is identified in the CMDB. |