- Academic Affairs/Provost
- Academic Calendars
- Class Schedule
- Colleges & Majors
- Faculty Senate
- Hornet Bookstore
- University Library
News & Events
- Campus Calendar
- Capital Public Radio
- Sac State Leader
- Sac State Magazine
- Ticket Office
- University Experts Guide
Safety & Wellness
- Campus Safety
- ENS (Emergency Notification System)
- Environmental Health & Safety
- NoonTime/AfterWork Wellness
- Police Department
- Sexual Violence Awareness Resources
- The WELL
Information Resources and Technology
The Information Security Office works closely with the Network, Data Center and campus IT teams to ensure systems are reliable and security.
Information Resources & Technology (IRT) manages a series of firewalls on campus. If you are providing network services and need to make changes to the security architecture, please submit a firewall request.
- The Service Level Agreement to complete these request is five (5) business days of the request. Note the SLA is to support existing systems and new systems must go through a security evaluation before a firewall exception is implemented. A Vendor Assessment is typically the most appropriate step to evaluation the security posture and requirements.
The Information Security Office is involved in approving technology procurement requests as part of the E&IT process. In addition, the Information Security Office can be requested to conduct a vendor review or participate in the procurement process (e.g. requirements generation, RFP, etc.) to ensure proposed vendor solutions and campus processes are in alignment with CSU Information Security Policies.
- The Service Level Agreement to complete these request is ten (10) business days of the approved request. During this time it is important to make staff and vendor support available to complete the process. This process may exceed the defined SLA depending on vendor availability.
Using the Qualys scanner appliance, the Information Security Office helps system administrators maintains the integrity and security of university servers. This tool can scan systems for potential breach points and report on server vulnerabilities.
The Service Level Agreement to complete these request is three (3) business days of the request.
Using the Acunetix web scan application, the Information Security Office help web application administrators maintains the integrity and security of university web applications. This tool detects potential breach points by simulating an actual attack. As the tool is very aggressive, it is imperative that you only perform this scan on non-production systems.
The Service Level Agreement to complete these request is five (5) business days of the request and on an agreed upon date and time do the potential destructive nature of these scans.
Decrease workstation exposure to data loss and threats (e.g. Virus, Malware) using enhanced procedures and technical controls.
- The Service Level Agreement to complete these request is ten (10) business days of the approved request. During this time, it is important to make staff available to complete the process.
One enhanced protection for workstations and servers is to limit the Internet sites it can communicate with. This process is used to open up the proxy to allow your system to communicate with an Internet site that is required to conduct campus business.
- The Service Level Agreement to complete these request is two (2) business days of the approved request.