Best practices for securing information systems at IU

On this page:


Overview

Following are recommendations from the University Information Security Office (UISO) for following best practices to secure information systems at Indiana University.

Policies, procedures, standards, and guidelines

  • Have a unit representative engaged in the Cyber Risk Mitigation Responsibilities (IT-28) process (aka "continuous engagement"), and ensure that representative briefs other local UITS support people in your unit on the current state of relevant systems, desired state, and gaps between states.
    • Use centralized IU services when possible.
    • Continually assess and mitigate risk.
  • Adopt a framework (for example, NIST CSF, Trusted CI) for prioritizing and applying IT standards.
  • Get familiar with other IU IT policies, procedures, standards, and guidelines. Adopt appropriate procedures and standards for implementing security controls. Note that IT-12 is being revised and may soon articulate standards-based controls.

Vulnerability scanning and mitigation

  • Implement automated vulnerability scanning (for example, Qualys); for more, see How to use Qualys and About vulnerability scanners.
  • Install OS updates promptly.
  • Prioritize vulnerability mitigation:
    • Mitigate higher-risk vulnerabilities before lower-risk vulnerabilities.
    • Consider the CIS Controls when first prioritizing the implementation of security controls.
  • Document vulnerability mitigations and accepted risk.

Encryption

Firewalls

  • Use an available enterprise-level firewall between your systems and the internet.
  • Implement a web app firewall (WAF), if applicable.

Authentication

Incident response

  • Publish administrator contact and support information in One.IU for each system to facilitate incident response.
  • Encourage staff members to quickly report security incidents.

Limit access and function

  • Consider using single-service servers.
  • Implement role-based access controls (RBAC).

Training and awareness

This is document bpss in the Knowledge Base.
Last modified on 2024-04-15 17:04:35.