Checklist for Service Owners and System Administrators

IS Checklist for Service Owners (Printable .pdf format)

Access Control

  1. If not using the centrally managed authentication system, are you following a formal user password management protocol and adhering to the standards for password management?
  2. Are you ensuring that special accounts with elevated privileges (e.g., root, super user, system admin) adhere to the same rigorous password standards plus the additional security measure of regular and frequent audits?
  3. Do you have a formal process for the authorization of user access?
  4. Is access granted to sensitive systems or data based on a need-to-know basis?
  5. Is access to systems terminated when an employee leaves or moves to another department?
  6. Are the access rights of all student workers and/or third party users removed upon termination of employment, contract or agreement?
  7. Do you have a formal process for reviewing user access rights at regular intervals?
  8. Are you requiring unique user IDs?
  9. If the business need requires the use of shared user IDs, is there a process in place and followed to change the password frequently and at a minimum whenever a member of the group leaves or changes jobs?
  10. Have you removed or disabled unnecessary vendor-supplied default accounts?
  11. For required vendor accounts, have you changed the default password following the installation of systems or software?

Resources for Access Control:

Communications Security

  1. Before placing a system on the University network, do you ensure that it has been registered with ITS and has adequate security protocols installed and maintained to prohibit unauthorized access?
  2. Before allowing an outside vendor or other third party to connect a system to the University network, do you obtain prior review and approval from ITS?
  3. When transferring sensitive university information, have you ensured that agreements are in place between the University and the external party to appropriately protect the data?
  4. Before transferring sensitive University information, do you check the restrictions on how the data is to be handled which may be governed by: the guideline for data handling, a Data Security Plan, constraints placed by the Data Owner or the Data Security Officer, legal, regulatory or contractual restrictions and/or export control regulations?

Resources for Communications Security:

Data Management

  1. Have you identified the data classification level for information stored or transmitted to/from the system or application using the data classification standard?
  2. Have you ensured that the data is being handled appropriately according to its classification as outlined in the guideline for data handling?
  3. Have you obtained review and approval from the University CIO prior to securing a contract with a cloud service provider?
  4. When considering the transfer or surplus of hardware and/or media, have you ensured that data has been properly removed by destroying, purging or clearing based on the guideline for hardware and media disposal?

Resources for Data Management:

Operations Security

  1. Have you implemented and do you follow a formal change management process?
  2. Have you implemented capacity management planning?
  3. Do you keep production, test, and development environments separate?
  4. Have you implemented controls to detect, prevent and recover from malware?
  5. Have you ensured that backup copies of information, software and system images are created and do you test them periodically?
  6. Do you maintain event logs and review them as appropriate?
  7. Do you maintain logs of privileged account holders’ activity and review as appropriate?
  8. Do you review the vulnerability management scans for your system or application and determine the appropriate measures needed to address the related risks?

Resources for Operations Security:

Physical and Environmental Security

  1. Are all servers kept in a secure area using appropriate entry controls to ensure only authorized personnel are allowed access?
  2. Do you periodically review the access lists and remove access for those individuals who no longer need it?

Resources for Physical and Environmental Security:

System Acquisition, Development and Maintenence

  1. If using production data containing sensitive or confidential information for testing purposes, have you applied equivalent access controls and other securities to the test system as exist in the production environment?
  2. When considering the development of a new system or an enhancement to an existing information system, are you considering the information security requirements and discussing with ITS as appropriate?
  3. When considering the acquisition of a new system, are you carefully reviewing the security requirements and data protection language in the contract and discussing with ITS prior to purchase?
  4. When considering the acquisition of an application that involves credit/debit card payment transactions, have you included the University Controller’s eCommerce Office for assurance of compliance with PCI-DSS and the University’s Payment (Credit/Debit) Card Processing Standard?

Resources for System Acquisition, Development and Maintenance:

Vendors and External Parties

  1. When providing vendors and other external parties with the ability to access University information, do you document each party’s rules for acceptable use and responsibility for implementing and managing access control?
  2. Do you obtain the vendor’s or external party’s documented commitment to employ industry best practices for the protection of sensitive University information?
  3. Have you stipulated the details for handling data upon termination of the contract or agreement?

Resources for Vendors and External Parties: