|Responsible Office: Office of Cybersecurity||Last Review: 01/25/2023 Next Review: 01/25/2025|
|Contact: Chris Madeksho||Phone: 901.448.1579 Email: email@example.com|
To ensure that proactive security measures are taken to prevent and detect malicious software and that awareness is raised for recognizing and immediately reporting suspected occurrences of malicious software. This standard is also designed to meet compliance requirements for data regulated by federal or state law. This includes, but is not limited to, security requirements and safeguards for the Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), or Gramm-Leach-Bliley Act (GLBA).
This Practice applies equally to all UTHSC IT Resources and to all members of the UTHSC community, contractors, and others who process, store, transmit, or have access to these UTHSC IT Resources.
Endpoint – A device that exists at the end of a network connection, i.e. a desktop, laptop, or mobile phone.
EDR – Endpoint Detection and Response software
IT Resource – Any data, device, or other component of the information environment that supports information-related activities. Assets generally include hardware (e.g. endpoint devices), software (e.g. mission critical applications and support systems) and information.
Malware – Any software intentionally designed to cause damage. Types of malware include viruses, worms, Trojan horses, ransomware, spyware, adware, and rouge software.
Virus – A type of computer program that can replicate and spread after an initial execution.
Customer Technology Services (CTS) is responsible that endpoints are enrolled in the approved endpoint management software per CS-001 Device Life Cycle Security. Office of Cybersecurity is responsible for the deployment of UTHSC’s approved EDR to those endpoints enrolled in the approved management software.
End User (UTHSC Campus Community) is responsible for recognizing and immediately reporting suspected occurrences of malicious software.
- All UTHSC IT Resources must have installed the approved EDR software.
- Malicious software protection controls:
- Must not be disabled or bypassed without formal documented exception per GP- 001.02-Security Exceptions and Exemptions to ITS Standards and Practices.
- Must not be altered in a manner that will reduce the effectiveness of the controls.
- Must not be altered to reduce the frequency of automatic updates.
- The Office of Cybersecurity shall ensure that:
- EDR software protection controls are installed on every UTHSC endpoint.
- Updates from the EDR are received in the console and pushed out to the endpoints as part of a scheduled maintenance cycle.
- All software is scanned for malicious components using up-to-date protection controls before being loaded on any computing device.
- If the EDR software detects malware, it remediates the incident and notify the Office of Cybersecurity based on established security controls and policies.
- The end user shall have the responsibility to:
- Use reasonable precautions to prevent malicious software to a computing device when importing data through physical (USB devices, memory cards) or electronic means (email, downloading from the Internet).
- Ensure that all portable computing devices or personal computers in their custody are running industry recognized malicious software protection controls.
- Immediately report any suspected or actual incidence of malicious software infection as a security incident per IR-001-Security Incident Response.
- GP-001.02-Security Exceptions and Exemptions to ITS Standards and Practices
- CS-001 Device Life Cycle Security
- IR-001-Security Incident Response