The Information Security Program will verify that information safeguards are designed and implemented to control the risks identified in the risk assessments. The Information Security Program will create a comprehensive IT security framework based on NIST 800-53. The ISAT will implement reasonable safeguards and monitoring and cover each area with access to protected data. Such safeguards and monitoring will include the following:
Employee Management and Training
The ISAT will, working with other responsible offices and units, identify those individuals and roles with access to covered data and advise them of their responsibilities to protect customer information and systems from compromise.
Comprehensive policies, procedures, and recommendations for protecting covered data will be implemented. Training for all individuals with authorized access to covered data will include physical handling and disposal of non-electronic information and procedures for processing and storing electronic information.
Information Systems
The ISAT should maintain inventories of all computer systems accessing or controlling covered data. Information systems include network and software systems and information processing, storage, transmission, retrieval, and disposal.
Network and software systems will be reasonably designed to limit the risk of unauthorized access to covered data. This may include preparing role-based access through system IDs and passwords, regularly expiring and updating passwords, maintaining appropriate screening programs to detect criminal hackers and viruses, and implementing security patches within a defined period.
Managing System Failures
The College will maintain effective systems to prevent, detect, and respond to attacks, intrusions, and other system failures.
Such systems may include maintaining and implementing current anti-virus software, critical patches, appropriate filtering or firewall technologies, intrusion detection systems that monitor and detect attacks and intrusions, and vulnerability scanning, alerting those with access to covered data of potential security threats; shredding paper documents; backing up data regularly and storing back up information off-site, as well as other reasonable measures to protect the integrity and safety of information systems.
Monitoring and Testing
Monitoring systems will be implemented to regularly test and monitor information security safeguards’ effectiveness.
Monitoring will be conducted to ensure that safeguards are being followed and to detect security gaps quickly. The level of monitoring will be appropriate based on the potential impact and probability of the risks identified, as well as the sensitivity of the information provided. Monitoring may include sampling, system checks, reports of access to systems, reviews of logs, audits, and any other reasonable measures adequate to verify that information security controls, systems, and procedures are working.