BP 8115 Cloud and Infrastructure Services
Statement of purpose
小黄猫传媒鈥檚 Information Security Policies support the following goals:
- Promote a 鈥渟ecurity is everyone鈥檚 responsibility鈥 philosophy to assist 小黄猫传媒 in meeting its business and legal commitments.
- Ensure that 小黄猫传媒 complies with all applicable laws and regulations.
- Ensure the integrity, reliability, availability, and superior performance of IT resources.
- Ensure that users are protected from data breach and cybercrime.
- Ensure that use of IT resources is consistent with the principles and values that govern the use of other college facilities and services.
- Prevent unauthorized disclosure of controlled sensitive data.
- Prevent disruption of the learning experience.
- Ensure the college is protected from financial, legal, regulatory, and reputational harm.
- Ensure that IT systems are used for their intended purposes.
- Establish processes for addressing policy violations and sanctions for violators.
The advent of Cloud computing has created new and largely unsolved challenges for information security. As custodian of 小黄猫传媒鈥檚 critical data, 小黄猫传媒 is legally liable for the protection of that data wherever it is stored. However, when data is stored in a Cloud system outside of 小黄猫传媒鈥檚 span of control 鈥 we cannot see, administer, restore, or protect that data.
The best that 小黄猫传媒 can do is to ensure that any Cloud vendor we engage with has the appropriate information security controls (at least equivalent to 小黄猫传媒鈥檚) and that we have contractual indemnity and cyber insurance coverage.
This policy seeks to ensure that the appropriate due diligence and controls are in place any time we enter into a relationship with a Cloud vendor.
Scope statement
This policy applies to all third party Cloud relationships that 小黄猫传媒 enters into, regardless of whether such relationships are through the central IT department or directly by faculty and staff. Impacted personnel are all staff, faculty, and students, as well as vendors, affiliates, and any other external party that could pose data or operational risk to the college.
Cloud relationships include SaaS, IaaS and other Cloud-based product offerings 鈥 as well as Cloud storage services such as DropBox.
Policy summary
小黄猫传媒 (小黄猫传媒) shall not use Cloud services for controlled sensitive data unless a contractual agreement exists between 小黄猫传媒 and the service provider that has been reviewed and approved by 小黄猫传媒鈥檚 Risk Manager, Purchasing Manager, and CISO, thus protecting the security and confidentiality of data for which 小黄猫传媒 is custodian.
This policy shall be subject to and superseded by applicable regulations and laws.
Policy
Cloud services
小黄猫传媒 staff, faculty, and students who enter into an agreement for a Cloud service shall:
- Ensure that contracts obligate the vendor to follow 小黄猫传媒 security standards (or better).
- Evaluate the data ownership and ensure the data belongs to 小黄猫传媒 or the student.
- Ensure there is a Non-disclosure Agreement (NDA) in place.
- Ensure that relevant training for the vendor product is provided or is otherwise available.
小黄猫传媒 staff, faculty, and students accessing and utilizing Cloud services shall:
- Follow cloud vendor advisory for configuration and management of Cloud instances on client-side.
- Follow information security industry best practices for managing Cloud instances.
Shared hosting environment
- All entity or customer data hosted on shared hosting environments shall be managed and protected in accordance with industry best practices.
- If entities are allowed to run their own applications, these application processes shall run using the unique ID of the entity. (For example: no entity on the system may use a shared web server user ID).
- All CGI scripts used by an entity shall be created and run as the entity鈥檚 unique user ID.
- The user ID of application processes shall not be a privileged user (root/admin).
- Each entity shall have read, write, or execute permissions only for files and directories it owns or for necessary system files (restricted via file system permissions, access control lists, etc.). Also, an entity鈥檚 files may not be shared by a group.
- Entity鈥檚 users shall not have write access to shared system binaries.
- To ensure that each entity cannot monopolize server resources to exploit vulnerabilities (error, race and restart conditions resulting in, for example, buffer overflows), restrictions shall be in place for the use of system resources such as disk space, bandwidth, memory and CPU.
- Logs shall be available for review by the owning entity and the log locations must be clearly communicated to the owning entity.
- Viewing of log entries shall be restricted to the owning entity.
- In the event of a compromise, a timely forensics investigation of related servers shall be conducted according to the Incident Response Plan and Procedures.
Service provider risk assessment
- There shall be a documented process for engaging service providers that includes proper due diligence prior to engagement.
- If controlled sensitive data is shared with service providers, then contractually the following shall be required:
- Initial risk assessment of the service provider prior to engaging, the level of detail dependent upon the risk of the relationship. This risk assessment may include NDA/confidentiality sign-offs, access controls, and background investigation reviews, as well as review of service provider formal risk assessment reports (Request for 鈥淎ffiliate鈥 Access to 小黄猫传媒 Resources)
- Ensure that the service provider鈥檚 security posture falls within 小黄猫传媒 risk appetite and can demonstrably follow security best practices. Supporting documentation shall be provided by the vendor upon request.
- An agreement that includes acknowledgement that the service provider is responsible for the security and privacy of 小黄猫传媒 confidential (customer) data in the possession of the provider.
- Procedures in place for identifying security vulnerabilities.
- Management approval for all service provider contracts.
- Allowance for monitoring of compliance of security control requirements and identified reporting requirements for possible breaches and non-compliance situations.
- Maintain a list of service providers, along with contact information.
- Implement a monitoring program that assesses the service provider鈥檚 security posture on at least an annual basis and that provides overall risk assessment of the service provider relationship.
Exemptions
None.
Exceptions
Exceptions to this policy must be pre-approved in writing by the Chief Information Security Officer (CISO) / Risk Manager, Purchasing Manager.
Policy violation
- Violation of this policy may result in disciplinary action in accordance with 小黄猫传媒 People, Strategy, Equity and Culture (PSEC) and/or Student Conduct guidelines.
- 小黄猫传媒 reserves the right to report security violations or compromises to the appropriate authorities. This may include reporting violations of Federal, State, and local laws and regulations governing computer and network use, or required accreditation reporting.
- Anyone who violates this policy may be held liable for damages to 小黄猫传媒 assets, including but not limited to the loss of information, computer software and hardware, lost revenue due to disruption of normal business activities or system down time, and fines and judgments imposed as a direct result of the violation.
- 小黄猫传媒 reserves the right to deactivate any User鈥檚 access rights (whether or not the User is suspected of any violation of this policy) when necessary to preserve the integrity of IT Resources.
Complaint procedures
Report non-security-related violations (such as receipt of inappropriate content, other People, Strategy, Equity and Culture (PSEC) policy violations, general college policy violations, or regulatory compliance violations) to a supervisor, PSEC, or EthicsPoint.
Report information security and general technical policy violations to the IT Service Desk at 971-722-4400 or servicedesk@pcc.edu, or contact the CIO or CISO.
Governing standards, policies, and guidelines
- US Dept of Education: Guidance Letter 鈥 Protecting Student Information
- US Dept of Education: Family Educational Rights and Privacy Act (FERPA)
- US Dept of Homeland Security: Federal Information Security Management Act (FISMA)
- Gramm-Leach-Bliley Act (GLBA)
- FTC Red Flags Rule
- Health Insurance Portability and Accountability Act (HIPAA)
- International Organization for Standardization (ISO)
- National Institute Standards and Technology (NIST)
- Payment Card Industry Data Security Standard (PCI DSS)
- Sarbanes-Oxley (SOX) for Colleges and Universities
Definitions
- Bandwidth
The amount of traffic that a computer network can support.- Technically, the bit rate of available or consumed information capacity expressed typically in metric multiples of bits per second.
- Variously, bandwidth may be characterized as network bandwidth, data bandwidth, or digital bandwidth. Bandwidth determines the performance of the network. Just as a highway can become gridlocked with too many cars, insufficient bandwidth to support data (especially during peak times like Fall Enrollment) can gridlock the network.
- Buffer
Part of a computer鈥檚 operating system designed to temporarily store data in order to increase the efficiency of data processing.- A data buffer (or just buffer) is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another. Typically, the data is stored in a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an output device (such as speakers).
- Buffers are typically used when there is a difference between the rate at which data is received and the rate at which it can be processed, or in the case that these rates are variable. For example, in a printer spooler or in online video streaming.
- Central Processing Unit (CPU)
The 鈥渂rains鈥 of a computer.- CPU is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control, and input/output (I/O) operations specified by the instructions.
- Cloud Computing
A general term for the delivery of hosted computing services over the internet.- Cloud computing enables companies to consume a compute resource, such as a virtual machine (VM), storage, or an application, as a utility service.
- 小黄猫传媒鈥檚 Google 鈥淕-Suite鈥 environment (that supports gmail, Google Drive, etc.) is a Cloud service. The students鈥 PantherHub is another example of Cloud technology.
- Common Gateway Interface (CGI)
A standard protocol for web servers to interface with executable programs running on a server that generate web pages dynamically. - Controlled Sensitive Data (CSD)
A general categorization that is used in 小黄猫传媒鈥檚 Information Technology (IT) policies (primarily the Information Security Policy and the Acceptable Use Policy) to represent all confidential and private information governed by those policies.- CSD includes: PII, PHI, HIPAA, FERPA, regulated, private, personal, or sensitive information for which 小黄猫传媒 is liable if publicly disclosed.
- Cybercrime
Criminal activity or a crime that involves the Internet, a computer system, or computer technology. - Data Breach
Generally, an incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so.- Note: Although 鈥渂reach鈥 is a commonly used term in the information security community, legally, the term 鈥渂reach鈥 tends to only be used when a security event reaches the threshold of regulatory reporting. 小黄猫传媒 legal council recommends using the terms 鈥渋ncident鈥 or 鈥渃ompromise鈥 until it can be determined whether an event satisfies the legal definition of a breach.
- Enterprise Computing
The sum of computer systems, applications, and infrastructure designed to support large, complex organizations or business functions.- Usually seen as a collection of big business software solutions to common problems, such as resource management and streamlining processes, running on an enterprise network and using specialized technologies like high performance servers.
- Today, enterprise computing can be supported using Cloud services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS), etc.
- Hard Disk
A data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid, rapidly rotating disks (platters) coated with magnetic material. - Hardware
The collection of physical components that constitute a computer system (a desktop computer, a server in a datacenter, a network switch, a printer, etc.) - IT Resource
(At 小黄猫传媒) All Information Technology (IT) resources that are the property of 小黄猫传媒 and include, but are not limited to, all network-related systems; business applications; network and application accounts; administrative, academic and library computing facilities; college-wide data, video and voice networks; electronic mail; video and web conferencing systems; access to the Internet; voicemail, fax machines and photocopiers; classroom audio/video; computer equipment; software and operating systems; storage media; Intranet, VPN, and FTP.- IT Resources include resources administered by IT, as well as those administered by individual departments, college laboratories, and other college-based entities.
- Memory
The computer hardware component used to store data for immediate use by the CPU (as opposed to data that is persistently stored on the computer hard disk). - Service Provider
(In IT) A company that provides its subscribers access to the Internet. - Software
A set of instructions that tells a computer what to do.- Computer software is generally constructed as programs (applications) written in a specific language designed to run on computer hardware. Most common softwares are applications for business and personal use. More specialized computer software runs the operating systems of computers, operates machinery, creates artificial intelligence in robots, controls scientific instruments, etc.
- System
(In Information Technology [IT]) A computer system consists of hardware components that work with software components to achieve a defined outcome.- The main software component that runs on a system is an operating system that manages and provides services to other programs that can be run in the computer. Computer systems may also include peripheral devices such as printers, A/V equipment, operating machinery, etc.
- System Binary
A package of program code that can be understood and executed by a computer鈥檚 operating system. - Third Party
(In Information Technology [IT]) A vendor. Can be applied to any vendor (鈥渢hird party provider鈥), but mostly used regarding 鈥渧endor software鈥 to distinguish it from software developed 鈥渋n house.鈥 - Third Party Services
Any service provided to 小黄猫传媒 by an external party or vendor. Today, this is particularly relevant with respect to Cloud-based 鈥淪oftware as a Service鈥 (SaaS) providers.- Includes, but is not limited to, personal ISPs, free email providers (Gmail, Yahoo, etc.), Cloud-based collaboration and data storage providers (e.g. DropBox), social media sites (e.g. FaceBook, LinkedIn), etc. The security of third party providers cannot be reasonably evaluated and guaranteed by 小黄猫传媒.
- User
Any person who makes any use of any 小黄猫传媒 IT resource from any location (whether authorized or not).
Responsible executive
Chief Information Officer
Responsible officer
Chief Information Security Officer (CISO), Risk Manager, Purchasing Manager
Responsible office
IT Information Security, Office of Risk Management, Procurement Department
Last revision date
09-09-2024