1) Administration and Operation
- 1.01 IT Operational Policy – Development, Approval and Implementation
- 1.02 Security Incident Response
2) Network
- 2.01 Firewall – Border Control
- 2.02 Secure Transit
- 2.03 Vulnerability Scanning
- 2.03.01 Computer Scanning Policy
- 2.04 Network Switch Access
3) Physical Security
- 3.01 Server Physical Access
- 3.02 Power Backup (UPS/Generator) Requirements
- 3.03 Access to Network Devices
- 3.04 Access to Workstations, Mobile Devices and Printers
4) Data Access
- 4.01 Data Classification
- 4.01.01 Procedures for Protected Data
- 4.02 Data Ownership
- 4.03 Data Locations
- 4.04 Define Data Trustee, Steward, Custodian, and User
- 4.05 Backup and Retention
5) Individual Responsibilities
6) Access Control
- 6.01 Password Policy
- 6.02 Electronic Identity Authentication
- 6.03 Account Management
- 6.03.01 Account Creation (Procedure)
- 6.04 Account and Access Termination
- 6.05 Authentication
- 6.06 Authorization
- 6.07 Student Account Access By Non-Owner
- 6.08 Contributed Services
7) Workstation
- 7.01 System Security
- 7.02 Workstation Data Security
- 7.03 Workstation Physical Security
- 7.04 Data Recoverability
8) Server
- 8.01 Operating System Security
- 8.02 Administrative Access
- 8.03 System Recovery
9) Application
- 9.01 Web
- 9.02 Policy on Implementing Applications on Servers