SECTION 1. Policy Statement
- Objective
This policy provides guidance and structure for the University to establish a risk-based Information Technology Security Program Strategy for the University. - Risk Management Policy
Each of the University’s campuses and institutes must maintain a formal, documented IT Risk Management program that ensures the implementation of appropriate and effective controls for the University’s Resources based on risk.
The Central IT Department must communicate the requirements and processes for risk management to the campus or institute community annually to engage campus communities and individuals in the shared responsibility of Risk Management. In all cases within this policy where the Central IT Department is required to create processes to implement IT security controls, training and guidance must also be provided to the campus or institute community related to the control itself and the associated process.
Risk Management is a lifecycle approach and not a single point of time evaluation. It is the responsibility of the campus or institute CIO/DTL to ensure IT risk is managed and mitigated.- All Risk Management programs will follow the CIS Risk Assessment Method (RAM) unless there is a contractual and/or governmental requirement to use another methodology and address physical, as well as Data and System risks associated with IT Resources. Where appropriate, additional risk management methodologies can augment CIS RAM.
- All Risk Assessments will be catalogued in a central repository.
- The Data Owner(s) or Data Steward(s) must be consulted as a part of the Risk Assessment and must provide input to the impact portion of the assessment.
- The Data Flows must be mapped as a part of the Risk Assessment process to determine the risks associated with the transmission, processing, and storage of the Data.
- The Data Custodian(s) must be consulted as a part of the Risk Assessment and must provide input to the Safeguard Maturity determination.
- All campus and institute Risk Management programs must include:
- Risk assessments must be conducted on a regular interval and when changes to the system occur.
- Systems that store, process, or transmit Data categorized as Private (Level 2) or Restricted (Level 3) for confidentiality and integrity should occur more frequently than for systems that store, process, or transmit Data categorized as Public (Level 0) or Internal Use Only (Level 1).
- Risk Assessment intervals must comply with regulatory or contractual requirements.
- Risk Assessments must be conducted on systems that store, process, or transmit Data categorized as Public (Level 0) or Internal Use Only (Level 1) only when changes to the system occur.
- A process for Risk Assessment as a part of the procurement review process.
- A process for Risk Assessment as a part of the configuration and change management processes.
- Risk assessments must be conducted on a regular interval and when changes to the system occur.
- The Risk Management program will include the following:
- A process to document, track, and ensure that the Risk Assessments are updated per sections 3.a.i through 3.a.iii above or when significant changes are made to Systems or their operational environment, that pose new Threats and Vulnerabilities.
- A process to document and disseminate Risk Assessment results to appropriate management and System and Data Custodians.
- A process to track risk mitigation for each risk found, including providing documentation on acceptance of risk by the campus or institute leadership.
- The Central IT Department will create a process to report all risk management efforts to the Enterprise Risk Officer for the University of Tennessee System on an annual basis.
- Exceptions
The University’s Chief Information Officer is authorized to grant exceptions to the University’s Information Technology Policies. Campus or institute CIOs/DTLs are authorized to grant exceptions to campus or institute processes and procedures.
SECTION 2. Reason for the Policy
This policy establishes the requirements for information technology Risk Management for the University of Tennessee in support of System-wide Policy: IT0001 – General Statement on Information Technology Policy. All Users must familiarize themselves with System-wide Policy: IT0001.
SECTION 3. Scope and Application
This policy applies to all Users of IT Resources owned, operated, or provided by the University of Tennessee, including its campuses, institutes, and administration (University and/or campuses).
SECTION 4. Procedures
Each campus/institute will adopt procedures related to this policy.
SECTION 5. Definitions
See IT0001 – General Statement on Information Technology Policy for definitions of terms.
SECTION 6. Penalties/Disciplinary Action for Non-Compliance
Any violation of this policy may subject the User to discipline as a violation of one or more provisions of the general standard of conduct in the student handbook or to discipline under the Code of Conduct (HR0580 – Code of Conduct) in the Human Resources Policy and Procedures.
The University may temporarily or permanently remove access to its information technology Resources if an individual violates this policy.
SECTION 7. Responsible Official & Additional Contacts
Subject Matter |
Office Name |
Telephone Number |
Email/Web Address |
Policy Clarification and Interpretation |
System Chief Information Officer and System Chief Information Security Officer |
(865) 974-4810 or (865) 974-0637 |
Policy Training |
System Chief Information Security Officer |
(865) 974-0637 |
[Text Wrapping
Break]
SECTION 8. Policy History
SECTION 9. Related Policies/Guidance Documents
- University Policies
- IT0001 – General Statement on Information Technology Policy
- IT0002 – Acceptable Use of Information Technology Resources
- IT0003 – Information Technology Security Program Strategy
- IT0004 – Information Technology Risk Management
- IT0005 – Data and Computer System Categorization
- IT0014 – Security Awareness Training Management
- IT0017 – Information Technology Incident Response Management
- IT0102 – Information Technology Asset Management
- IT0311 – Information Technology Data Access, Management, and Recovery
- IT0506 – Information Technology Account and Credential Management
- IT1318 – Information Technology Network Monitoring and Defense and Penetration
- IT1516 – Information Technology Service Provider Management Application Software Security Management
- IT4912 – Information Technology Secure Configuration Management
- IT7810 – Information Technology Vulnerability Management, Audit Log Management, and Malware Defense
- Center for Internet Security Critical Security Controls Navigator
https://www.cisecurity.org/controls/cis-controls-navigator