Skip to main content

Accessibility menu

Skip to main content Skip to footer

January Policy Distribution and Revised Comment Form

Posted 9:37 a.m. Friday, Jan. 21, 2022

UWSA Logo

The January 2022 institution policy distribution includes for comment four revised policies and four revised procedures. All revisions are part of technical amendments in the Information Security series. 

January Policy Distribution and Revised Comment Form


The January 2022 institution policy distribution includes for comment four revised policies and four revised procedures. All revisions are part of technical amendments in the Information Security series. 

Four (4) revised policies: 

·        SYS 1000, Information Security: General Terms and Definitions

·        SYS 1037, Information Security: IT Disaster Recovery

·        SYS 1041, Information Security: Logging and Monitoring

·        SYS 1042, Information Security: Threat and Vulnerability Management Standard

Four (4) revised procedures: 

·        SYS 1030.A, Information Security: Authentication

·        SYS 1031.A, Information Security: Data Classification Procedure

·        SYS 1039.A, Information Security: Risk Management Procedure

·        SYS 1042.A, Information Security: Threat and Vulnerability Management Standard

Click on the links above to view the drafts and ensure that your feedback is captured for review during the post-comment period.  Comments can include attachments, including word documents and PDFs. Please submit your feedback by Friday, February 4.

Please find summaries of the policies below. 



DRAFT POLICY REVISIONS

SYS 1000, Information Security: General Terms and Definitions

The purpose of this policy is to provide a list of general terms and definitions that are used in the 1000 series of the UW System Administrative policy set. Revisions to the policy include: 

·        Updated policy and procedures links to Related Documents in section 7

·        Added definitions from SYS 1037, SYS 1041, and SYS 1042 to section 5.


DRAFT POLICY REVISIONS

SYS 1037, Information Security: IT Disaster Recovery

This policy establishes the minimum requirements for an Information Technology (IT) Disaster Recovery (DR) Plan for UW System institutions and is designed to assist in executing recovery processes in response to a disaster or significant IT disruption. Revisions to the policy include: 

·        Moved following definitions in section 5 to SYS 1000 and updated standard definition section language:

·        Data Backup

·        Disaster Recovery (DR) Plan

·        Recovery Time Objective (RTO)

·        Recovery Point Objective (RPO)


DRAFT POLICY REVISIONS

SYS 1041, Information Security: Logging and Monitoring

The purpose of this policy is to establish a consistent expectation of security logging and monitoring practices across the UW System to aid in the early identification and forensics of security events.  Revisions to this policy include:

·        Moved following definition from section 5 to SYS 1000:

·        High Impact System

·        Removed definition for IT Asset


DRAFT POLICY REVISIONS

SYS 1042, Information Security: Threat and Vulnerability Management

This policy establishes the minimum requirements for vulnerability management, vulnerability scanning, patch management, threat intelligence and penetration testing of UW System information technology owned or leased IT assets. Revisions to the policy include: 

·        Moved the following definitions from section 5 to SYS 1000:

·        Vulnerability Scanning

·        Vulnerability Management

·        Patch Management

·        Penetration Testing

·        IT Asset Owner


DRAFT PROCEDURE REVISIONS

SYS 1030.A, Information Security: Authentication

This procedure describes the minimum authentication standards that must be met by UW System institutions. Revisions to the procedure include: 

·        In section 5 (Related Documents), updated NIST 800-53v4 reference to NIST 800-53v5


DRAFT PROCEDURE REVISIONS

SYS 1031.A, Information Security: Data Classification Procedure

This procedure outlines a method to classify data according to risk to the UW System and assign responsibilities and roles that are applicable to data governance. Revisions to this procedure include:  

·        In subsection 4.C, updated financial account number language to be consistent with s. 134.98, Wis. Stats.

·        Added link to Information Security Compensating Control Request Form to section 5, Related Documents.


DRAFT PROCEDURE REVISIONS

SYS 1039.A, Information Security: Risk Management Procedure

This Information Security Risk Management (ISRM) procedure establishes the process for the management of information security risks faced by the institutions of the UW System. Revisions to the procedure include: 

·        Updated NIST 800-53v4 reference in section 1 (Policy Purpose) and section 2 (Related Documents) to NIST 800-53v5


DRAFT PROCEDURE REVISIONS

SYS 1042.A, Information Security: Threat and Vulnerability Management Standard

The purpose of this procedure is to establish the minimum requirements for vulnerability management, vulnerability scanning, patch management, threat intelligence and penetration testing of UW System owned or leased information. Revisions to this procedure include: 

·        Updated definition section language to conform with rest of the SYS 1000 series policies


Revised Comment Form

In an effort to solicit more targeted feedback on policies, we have revised the comment form. The current version of the comment form for draft policies includes sections to indicate the nature of proposed revisions (substantive or technical) and to cite specific policy sections. All policies and procedures in this month's distribution use the revised comment form. 

Unfortunately, the IT issue that prevents submitted comments from displaying persists. While submitted comments are not displayed on the form page, our office is receiving all submitted feedback. We continue to work with IT and are hopeful that submitted comments will be displayed on the comment form again soon. 


Permalink