Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tip
titleGetting Started

In order to secure the information that flows across internal networks and to/from the Internet, colleges and universities need to effectively manage their physical and logical network infrastructure. The protection of networked information assets requires policies, standards, and a sound network control strategy. If you are just getting started in this area of your security program, then the following steps can be very helpful to get underway:

  1. Develop policies and standards that support the:

    1. Establishment of clear authority and accountability for network management.

    2. Risk based segregation of groups of systems, users, and information systems 

    3. Authority to control, actively monitor, and log traffic traversing designated ingress and egress points. 

  2. Identify threats related to the communications environment. (see HEISC Risk Management Framework)

    1. Evaluate threat scenarios and methods of network attack (reconnaissance, exploitation, data exfiltration)

  3. Identify the most critical systems, data, or equipment within the network. (see Asset Management)

  4. Use routing and firewalls to define the network perimeter.

  5. Use a border firewall and/or Intrusion Detection/Prevention devices to limit entry/exit of network traffic.

  6. Define the “demilitarized zone” of the network where the public can access limited network resources, as well as public access points to the network such as open access ports and public WiFi.

  7. Define restricted portions of the network for use by authorized staff and facility personnel; use identity and access management controls for users and systems on the network.

  8. Define highly restricted portions of the network such as within data centers, communications facilities, or other highly restricted areas.

  9. Establish information transfer policies and encryption standards that address varied needs for confidentiality, integrity, and non-repudiation of internal and external data exchanges.

...

Panel
bgColor#ADD8E6

Campus Case Studies On This Page
(lightbulb) Enhancing Application Security with a Web Application Firewall - UC, Irvine (2011)

EDUCAUSE Resources
EDUCAUSE Resources & Resource Center Pages

HEISC Toolkits/Guidelines

Templates/Sample Plans

Security Professionals Conference 2014

Security Professionals Conference 2013

Enterprise IT Leadership Conference 2013

EDUCAUSE Annual Conference 2012

Security Professionals Conference 2012

Southeast Regional Conference 2012

Mid-Atlantic Regional Conference 2012

EDUCAUSE Annual Conference 2011

Security Professionals Conference 2011

EDUCAUSE Annual Conference 2010

Security Professionals Conference Archives 2008-2010

Management and Operations:

Policy and Compliance:

Corporate and Campus Solutions:

Strategic Security:

Technology Concepts:

Advanced Technology:

Initiatives, Collaborations, & Other Resources

  • ECAR Working Groups; Bring together higher education IT leaders to address core technology challenges.

...