Administration & Finance
Information Technology Services
Nish Malik / Associate Vice President and Chief Information Officer, Information Technology Services / (415) 405-4105 / firstname.lastname@example.org
Wednesday, July 18, 2012
Friday, October 16, 2020
CSU Information Security Policy and Standards
ISO Domain 12: Operations Security Policy
Information Security Responsible Use Policy
High Risk/Critical Workstation Standard (ISO Domain 12: Operations Security Standard)
The Network Policy defines the campus requirements to protect SF State University’s network infrastructure from unauthorized use, eavesdropping, and targeted attacks that could result in loss of information, damage critical applications, or impact University operations.
Purpose & Scope
All users (faculty, staff and students) using the university network must follow University-defined processes and use University-managed network devices and wireless access points. All changes to the campus network services are made by Information Technology Services (ITS).
- SF State network users must comply with the CSU Responsible Use Policy
- Devices on the SF State network must comply with endpoint/mobile device standards
- The SF State network may require users to have a current affiliation and authenticate
- The SF State network may require the installation of network access control software
- Authenticated secure remote access is available to faculty and staff. Oher users may be provisioned with an approved business justification.
- All wired and wireless, remote access, and network security services are centrally managed by ITS
- Network equipment that is not centrally managed by ITS will be disabled to be compliant with CSU Common Network Initiative (CNI) standards
- The SF State network must provide protection controls to address the requirements identified in the High Risk and Critical Workstations standard. Requirements include the following:
a) Network traffic is limited to the minimum necessary to perform business functions by use of isolated network segment with traffic restricted to authorized inbound and outbound ports and destinations. This requirement may be satisfied in combination with a virtual desktop environment for other work functions (web browsing, etc.) in order to address productivity.
b) Intrusion detection and prevention technologies which address hostile sites, malware, etc.
c) Software defined networking, user based and/or application-defined routing or similar use of technology to control connectivity.
Responsibility for implementing this Policy will rest with ITS and departments across campus. Submit any apparent violation of Network Policy to the appropriate administrative authority (vice president, dean, director, department, or program chair) or to email@example.com.
Noncompliance with applicable policies and/or practices may result in suspension of network access privileges. In addition, disciplinary action may be applicable under other University policies, guidelines, implementing procedures, or collective bargaining agreements.