Responsible Office: Office of Cybersecurity
Last Review: 03/27/2020
Next Review: 03/27/2022
Contact: Chris Madeksho
This Standard applies to the security of UTHSC IT Resources in the form of electronic communications, stored data, and electronic communications resources used to transmit, store, and process such data.
- UTHSC will protect the confidentiality, integrity, and availability of UTHSC IT Resources including data residing within these UTHSC IT Resources and the communications among these UTHSC IT Resources and with systems external to the UTHSC.
- User functionality (including user interface services) shall be separated from information system management functionality in its systems.
- Unauthorized and unintended information transfer via shared system resources shall be prevented.
- UTHSC shall take preventive measures to protect against or limit the effects of denial-of-service attacks.
- UTHSC shall implement boundary protection. This protection shall address the external boundary as well as key internal boundaries, which shall be identified in the system security plan.
- Publicly accessible UTHSC IT Resources are to be located on separate sub-networks from internal networks.
- There will be no public access to the UTHSC internal network.
- Interfaces, interconnects, and their protection mechanisms to external networks shall be managed, monitored, and documented.
- The number of external network connections shall be limited.
- By default, the principle to deny traffic shall be implemented.
- UTHSC shall terminate network connections at the end of the session or after a period of inactivity for remote sessions.
- The integrity and confidentiality of UTHSC data and information with a classification ranking of 3 in any area during transmission shall be protected with encryption that meet the standards defined for use in NIST publication FIPS 140-2 or any superseding document, according to date of implementation.
- UTHSC shall provide Domain Name System (DNS) services that:
- Use encryption of all DNS services, when supported.
- Process name/address resolution requests from internal clients only with internal DNS servers.
- Process name/address resolution information requests from external clients only with external DNS servers.
- Provide fault-tolerant name/address resolution service for all information systems.
- Provide mechanisms to protect the authenticity of communications sessions.
- Failure to comply with these standards may result in a loss of access or other disciplinary actions, up to and including termination
- UTSA IT Policy [IT0135] System and Information Integrity
- GP-002-Data & System Classification
- Human Resources Policy 0525
- National Institute of Standards and Technology (NIST) publication FIPS 140-2