Vulnerability Management Policy
Vulnerability Management Policy
Vulnerability Management Policy
Responsible University Officer Chief Information Officer Responsible Office Information Technology Services
Policy may face termination of their business relationships with the University. Violation of this policy resulting in the unauthorized disclosure of Protected Health Information or Personal Identifying Information (see the definition of Sensitive Information below) may also carry the risk of civil or criminal penalties. Definitions Administrator (System or Application): Generally, a University staff member who manages and maintains computer devices for the University and is authorized to have access beyond that of an end user. Critical Asset: Any system that serves or supports a Mission-Critical function or that stores or processes Sensitive Information. Mission-Critical Resource: Includes any resource that is critical to the mission of the University and any device that is running a mission-critical service for the University or a device that is considered mission critical based on the dependency of users or other processes. Mission-critical services must be available. Typical mission-critical services have a maximum downtime of three consecutive hours or less. Mission-critical resources for Information Security purposes include information assets, software, hardware, and facilities. The payroll system, for example, is a Mission-Critical Resource. Sensitive Information: Sensitive Information includes all data, in its original and duplicate form, which contains: Personal Identifying Information, as defined by the North Carolina Identity Theft Protection Act of 2005. This includes employer tax ID numbers, drivers' license numbers, passport numbers, SSNs, state identification card numbers, credit/debit card numbers, banking account numbers, PIN codes, digital signatures, biometric data, fingerprints, passwords, and any other numbers or information that can be used to access a person's financial resources, Protected Health Information as defined by HIPAA, Student education records, as defined by the Family Educational Rights and Privacy Act (FERPA), Customer record information, as defined by the Gramm Leach Bliley Act (GLBA), Card holder data, as defined by the Payment Card Industry (PCI) Data
Page 2
Responsible University Officer Chief Information Officer Responsible Office Information Technology Services
Security Standard, Confidential personnel information, as defined by the State Personnel Act, and Information that is deemed to be confidential in accordance with the North Carolina Public Records Act.
Sensitive data also includes any other information that is protected by University policy or federal or state law from unauthorized access. Sensitive Information must be restricted to those with a legitimate business need for access. Examples of sensitive information may include, but are not limited to, social security numbers, system access passwords, some types of research data (such as research data that is personally identifiable or proprietary), public safety information, information concerning select agents, information security records, and information file encryption keys. Reason for Policy Many colleges and universities have experienced data breaches that have had significant consequences for these institutions and for their students, employees, alumni, and patients. In many cases, an effective vulnerability management program could have identified and remediated the underlying vulnerabilities, which allowed the breach to occur. Detection of Vulnerabilities and Remediation University departments must develop and adhere to procedures for vulnerability management, including the regular scanning of systems storing or processing Sensitive Information and Mission Critical systems. In particular, systems storing the Universitys Sensitive Information or systems considered to be Mission Critical for UNC-Chapel Hill must be fully scanned for vulnerabilities at least monthly and preferably weekly, using scanning software approved by the Information Security Office (445-9393 or [email protected]). The Information Security Office (ISO) makes a number of shared vulnerability assessment tools available to customers for scanning desktops and servers, web applications, and databases. To ensure that scans are comprehensive and accurate, scans should be performed by Users logged in with Administrator-level access on the respective computer device.
061010v1Vulnerability Management Policy Policy Version: Page 3
Responsible University Officer Chief Information Officer Responsible Office Information Technology Services
Vulnerability management procedures should also address remediating detected vulnerabilities, including timely patch management and testing change management procedures. It is recommended that changes be documented in writing for future reference. Any detected vulnerabilities must be remediated in accordance with the specific timeframes described below. For purposes of remediation and mitigation, the severity rating assigned by the vulnerability scanning tool used by ISO will serve as the basis for classifying a vulnerability unless specifically indicated as an exception by the ISO. The following classifications describe the severity levels that can be assigned to a vulnerability. Vulnerability classifications for desktops and servers: Critical denotes a vulnerability through which an intruder can easily gain control at the administrator level of any affected host. This class of vulnerabilities poses the highest risk for a system-wide compromise of the UNC Chapel Hill network. High denotes a vulnerability through which an intruder could gain access to the host at the administrator level or could possibly access Sensitive Information stored on the host. While this class of vulnerabilities is extremely serious, the risk of a breach or compromise is not as urgent as with a critical vulnerability. Medium denotes a vulnerability that may allow an intruder to gain access to specific information stored on the host, including security settings. While not immediately associated with a compromise of an affected host, these vulnerabilities allow intruders to gain access to information that may be used to compromise the host in the future. Low denotes vulnerabilities that do not pose an immediate threat to the host or the UNC-Chapel Hill network. These vulnerabilities refer mostly to weaknesses in a device that allow an intruder access to information that may be used in the future to compromise the host. These vulnerabilities may often be mitigated through firewall and intrusion prevention systems that limit access by intruders from outside the University network. Departments may opt to mitigate these vulnerabilities based on their
Page 4
Responsible University Officer Chief Information Officer Responsible Office Information Technology Services
network architecture or set up a timeframe for remediation based on the information stored on the device. Any identified vulnerabilities, either related to missing patches or improper configuration, must be remediated within the timeframes specified below based on the degree of associated severity. For vulnerability remediation, System Administrators should perform appropriate testing and follow existing changemanagement procedures to ensure proper patch installation for affected systems. Remediation and Mitigation Table Vulnerability Level After detection, remediation required within less than 1 week 2 weeks 1 month At the discretion of the department Critical Assets Exception Approval Non-Critical Assets Exception Approval
Related Documents Information Security Policy and related Procedures and Standards Password Policy for System and Application Administrators General User Password Policy Contacts Subject Policy Questions Report a Violation Request Information Security Consulting Contact Telephone The Universitys 919-445-9393 Information Security Office FAX/E-Mail 919-445-9488
History
Page 5
Responsible University Officer Chief Information Officer Responsible Office Information Technology Services
6/30/10
Page 6