This site requires JavaScript to be enabled
IE BUMPER
IE BUMPER

Information Resources and Technology

IE BUMPER

Network Security

The Information Security Office works closely with the Network, Data Center and campus IT teams to ensure systems are reliable and security.

 

INCLUDED

Firewall Exceptions

Information Resources & Technology (IRT) manages a series of firewalls on campus. If you are providing network services and need to make changes to the security architecture, please submit a firewall request.

  • The Service Level Agreement to complete these request is five (5) business days of the request. Note the SLA is to support existing systems and new systems must go through a security evaluation before a firewall exception is implemented. A Vendor Assessment is typically the most appropriate step to evaluation the security posture and requirements.

Vendor Assessment

The Information Security Office is involved in approving technology procurement requests as part of the E&IT process. In addition, the Information Security Office can be requested to conduct a vendor review or participate in the procurement process (e.g. requirements generation, RFP, etc.) to ensure proposed vendor solutions and campus processes are in alignment with CSU Information Security Policies.

  • The Service Level Agreement to complete these request is ten (10) business days of the approved request. During this time it is important to make staff and vendor support available to complete the process. This process may exceed the defined SLA depending on vendor availability.

Vulnerability Scanning

Using the Qualys scanner appliance, the Information Security Office helps system administrators maintains the integrity and security of university servers. This tool can scan systems for potential breach points and report on server vulnerabilities.

  • The Service Level Agreement to complete these request is three (3) business days of the request.

Web Application Scanning

Using the Acunetix web scan application, the Information Security Office help web application administrators maintains the integrity and security of university web applications. This tool detects potential breach points by simulating an actual attack. As the tool is very aggressive, it is imperative that you only perform this scan on non-production systems.

  • The Service Level Agreement to complete these request is five (5) business days of the request and on an agreed upon date and time do the potential destructive nature of these scans.

High Risk Workstation Controls

Decrease workstation exposure to data loss and threats (e.g. Virus, Malware) using enhanced procedures and technical controls.

  • The Service Level Agreement to complete these request is ten (10) business days of the approved request. During this time, it is important to make staff available to complete the process.

 

Whitelist Proxy Request

One enhanced protection for workstations and servers is to limit the Internet sites it can communicate with. This process is used to open up the proxy to allow your system to communicate with an Internet site that is required to conduct campus business.

  • The Service Level Agreement to complete these request is two (2) business days of the approved request.

 

IE BUMPER
Version 1.4.2 (release notes)