Risk Assessment Policy
Purpose
This Risk Assessment Policy outlines the risk assessment methodology to be used when assessing IT systems used by the university.
Scope
This policy applies to all university-provided Information Technology Resources (ITRs), as defined in the Appendix.
Policy
Link to ITRs classification
Risk assessments should be performed prior to acquiring ITRs and then on an annual basis. Risk assessments are required for ITRs classified as either Restricted or Sensitive, as defined in the Data Classification Policy [link to policy]. Risk assessments are recommended but not required for ITRs classified as Public.
Assessment
The Chief Information Security Officer will assess all ITRs annually to ensure appropriate protections are in place in the following areas:
Area |
Restricted ITRs |
Sensitive ITRs |
Public ITRs |
ServiceNow entry |
Required |
Required |
Recommended |
ITRs Owner |
Required |
Required |
Required |
Separate accounts for each user |
Required |
Required |
Required |
Security awareness training for users |
Required |
Required |
Recommended |
Vulnerability scanning |
Monthly |
Monthly |
Monthly |
Patching cycle |
Critical patches within 3 days, all others within 30 days |
Critical patches within 7 days, all others within 60 days |
Critical patches within 14 days, all others within 180 days |
Network location |
Internal-facing |
No restriction |
No restriction |
Backup |
Required |
Required |
Optional |
Physical security |
Secure data center |
Secure data center |
No restriction |
Malware protection |
Required |
Required |
Required |
Local firewall |
Required |
Recommended |
Recommended |
Documentation
The Chief Information Security Officer will maintain documentation of risk assessments.
Exceptions
All exceptions to this policy require written approval from the Chief Information Security Officer. All exceptions require annual renewal.
Appendix
Definitions and Terms
Information Technology Resources (ITRs) – This includes, but is not limited to, end-user computing devices, services, networks, email, software, printers, scanners, video distribution systems, telephone systems, fax systems, and other computer hardware and software, whether owned by the university or contracted by the university from a third party.
Revision History
August 2024 – Policy adopted