University of Minnesota  Appendix

Systems and Device Management Standard

Sidebar

Expand all

Sidebar

Table of Contents

TOC placeholder

Governing Policy

Questions?

Please use the contact section in the governing policy.

Objective

University systems and devices must be deployed and maintained to an appropriate level, based on the data stored on or accessed through them. Some systems and devices must meet legal, regulatory, or contractual agreements related to their configuration and management.

Security Controls

Management by an IT Service

The following table identifies where management by an IT service (includes University IT or an approved vendor) is required.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.A.01Multi-user system (e.g., server, container, virtual system component)Required
Effective July 2019
Required
Effective July 2019
Recommended
SDM.A.02Single-user system (e.g., workstation, laptop)1RequiredRecommendedOptional

1Some mobile devices and IoT devices may require management by an IT Service (e.g., devices in the health care components).

Configuration

The following table defines the baseline security controls for configuring a system or device.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.B.01Implement one primary function per server, container, or virtual system component to prevent different security levels co-existing on the same serverRequired Effective July 2019RecommendedRecommended
SDM.B.02Use industry-accepted system hardening standards (e.g., CIS, NIST)Required
Effective July 2019
Required
Effective July 2019
Recommended
SDM.B.03Remove vendor or open source community software when the vendor or open source community no longer develops security patchesRequiredRequiredRecommended
SDM.B.04Enable only necessary services, protocols, daemons, etc. for the function or management of the systemRequired
Effective July 2019
Required
Effective July 2019
Recommended
SDM.B.05Implement additional security features for any required services, protocols, or daemons that are considered insecure (e.g., ftp, telnet, pop3, imap, snmp v1 & 2)Required
Effective July 2019
Required
Effective July 2019
Recommended
SDM.B.06Remove unnecessary functionality (e.g., applications, scripts, drivers, features, subsystems, file systems)Required Effective
July 2019
RecommendedRecommended
SDM.B.07Enable loggingRequiredRequiredRecommended
SDM.B.08Use industry standard strong encryption for workstations, laptops, mobile devices, and removable mediaRequiredRequired
Effective July 2019
Recommended
SDM.B.09For single-user systems: Enable automatic updates, or use a University-provided service for managing the security patchesRequiredRequiredRequired
SDM.B.10Apply and periodically review configuration hardening settings (suggest: annual)Required
Effective July 2019
Required
Effective July 2019
Recommended

Firewall

Built-in Firewall

The following table defines the baseline security controls for systems or devices with a built-in firewall.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.C.01Enable in default deny mode (deny all traffic) and permit the minimum necessary servicesRequiredRequiredRequired
SDM.C.02Document the firewall rules including purpose, justification and approvals for use of all services, protocols, and ports allowed. For insecure protocols include the additional security features implemented for the protocolRequired
Effective July 2019
Required
Effective July 2019
Recommended
SDM.C.03For multi-user systems: Review firewall rules, usage, remove rules without current justification (suggest: annual)1RequiredRecommendedOptional
SDM.C.03For single-user systems: Review firewall rules, usage, remove rules without current justification (suggest: annual)1Required
Effective July 2019
RecommendedOptional
SDM.C.04For multi-user systems (e.g., servers): Enable firewall loggingRequired
Effective July 2019
Required
Effective July 2019
Recommended

1 PCI DSS requires a review of firewall rules every 6 months for all systems that store, process or transmit cardholder data, or support the credit card processing environment.

Systems to locate behind a Network Firewall

The following table defines IT Resources that need to be located behind a University approved network firewall.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.D.01Systems where a network firewall is needed for legal, regulatory, or contractual complianceRequired
Effective July 2019
Required
Effective July 2019
Required
Effective July 2019
SDM.D.02Systems in a data centerRequired
Effective July 2019
Required
Effective July 2019
Recommended
SDM.D.03Multi-user systems (e.g., servers for file storage, application hosting, data processing)Required
Effective July 2019
Required
Effective July 2019
Recommended

Backup and Recovery for Software/Applications and System Configurations

Backup copies of data, software/applications, and system configurations must be created on a regular basis, physically secured and backup processes tested periodically to protect against the loss of University data and to maintain business continuity.

The following table defines baseline security controls for backup and recovery of software/applications and system configurations.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.E.01For multi-user systems: Back up software and system configurations where needed for continuityRequiredRecommendedOptional
SDM.E.01For single-user systems: Back up software and system configurations where needed for continuityRequired
Effective July 2019
RecommendedOptional
SDM.E.02For multi-user systems: Periodically review a backup and recovery plan and procedures including frequency, extent of backups, monitoring for successful completion of backups, physical storage, access to backups, and backup testing (suggest: annual)RequiredRecommendedOptional
SDM.E.02For single-user systems: Periodically review a backup and recovery plan and procedures including frequency, extent of backups, monitoring for successful completion of backups, physical storage, access to backups, and backup testing (suggest: annual)Required
Effective July 2019
RecommendedOptional
SDM.E.03For multi-user system: Test for a successful backup and restoration following documented procedures (suggest: annual)RequiredRecommendedOptional
SDM.E.03For single-user system: Test for a successful backup and restoration following documented procedures (suggest: annual)Required Effective July 2019RecommendedOptional

Virus/Malware Protection

To protect University information and IT resources from viruses or other malicious code, anti-virus/malware software must be used to assist in preventing and detecting infections. Infections must be eradicated or quarantined. Virus/malware is a threat to the University network and not limited to a single system.

The following table defines the baseline security controls for virus/malware protection.

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.F.01Actively run anti-virus software on all systems commonly affected by malicious software (e.g., Windows, Mac)RequiredRequiredRequired
SDM.F.02Use current supported versions and definitions for anti-virus and virus filtering software (suggest: definitions updated within 1-7 days of release) Required Required Required
SDM.F.03For multi-user systems: Enable anti-virus audit logsRequiredRecommendedRecommended
SDM.F.03For single-user systems: Enable anti-virus audit logsRequired
Effective July 2019
Required
Effective July 2019
Recommended
SDM.F.04For systems not using anti-virus/malware software, evaluate the evolving virus/malware threats to assess whether system continues to not require anti-virus/malware software (suggest: annual)Required
Effective July 2019
Required
Effective July 2019
Recommended

Physical Security

Systems to locate in a Protected Facility

The following table defines IT Resources that need to be located in a University approved protected facility (e.g., a data center, telecommunications room/closet).

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.G.01Multi-user systems (e.g., servers for file storage, application hosting, data processing)RequiredRequiredRecommended

For Devices

The following table defines baseline security controls for physical security of devices (e.g., laptop, tablet, mobile device, card swipe, point of sale terminal, medical device).

ControlSecurity Level
IDDescriptionHighMediumLow
SDM.H.01Secure devices and other equipment when unattended (e.g., secure cabinet, safe, continuously locked facility)1Required
Effective July 2019
RecommendedOptional
SDM.H.02Secure devices and removable media when traveling (e.g., keep in your possession or locked in a secure location)Required
Effective July 2019
Required
Effective July 2019
Recommended
SDM.H.03Position device display or monitor to limit viewing dataRequiredRecommendedRecommended
SDM.H.04Use tamper resistant label on devicesOptional 2OptionalOptional
SDM.H.05Maintain a log that tracks placement or assignment of devicesRequired
Effective July 2019
RecommendedRecommended
SDM.H.06Maintain a log of who has access to the secure storage location (e.g., locked closet)Required
Effective July 2019
Required
Effective July 2019
Recommended
SDM.H.07Review and assess the physical security controls for devices (suggest: annual)Optional 2OptionalOptional

1 PCI DSS requires an anchoring device for card swipe devices not in storage.

2 PCI DSS requires this for all systems that store, process or transmit cardholder data, or support the credit card processing environment.

Resources Covered

This applies to IT resources owned or contracted by the University. This also applies to personally owned devices accessing, or authorized to store, University data designated as private-highly restricted or private-restricted.

Individuals Covered

This applies to University community members who use or manage University IT resources.

Related Information

Published Date

November 2014

Last Reviewed

April 2019