An endpoint is defined as any laptop, desktop, or mobile device.
1. Determine the risk level by reviewing the data, server and application risk classification examples and selecting the highest applicable risk designation across all. For example, a endpoint storing Low Risk data but accessing a High Risk application should be designated as High Risk.
2. Follow the minimum security standards in the table below to safeguard your endpoints.
| STANDARDS | FREE OF CHARGE | RECURRING TASK | WHAT TO DO | LOW | MEDIUM | HIGH |
| PATCHING |
✓ |
✓ |
Apply security patches within seven days of publish. Use a supported OS version. |
✓ |
✓ |
✓ |
| WHOLE DISK ENCRYPTION |
✓ |
Enable FileVault2 for Mac through Self Service, BitLocker for Windows. Install MDM on mobile devices. |
✓ |
✓ |
✓ |
|
| MALWARE PROTECTION |
✓ |
Install antivirus (Cortex by Palo Alto recommended). |
✓ |
✓ |
✓ |
|
| BACKUPS |
✓ |
Backup user data at least daily. NSave CrashPlan PROe is recommended for all University Endpoints. |
✓ |
✓ |
✓ |
|
| CONFIGURATION MANAGEMENT |
✓ |
Install Casper Suite or SCCM. | Recommended | Recommended |
✓ |
|
| REGULATED DATA SECURITY CONTROLS |
✓ |
Implement PCI DSS, HIPAA, or export controls as applicable. |
✓ |
|||
| FIREWALL |
✓ |
Enable local firewall in default deny mode and permit minimum necessary services. |
✓ |
✓ |
✓ |
| STANDARDS | FREE OF CHARGE | RECURRING TASK | WHAT TO DO | LOW | MEDIUM | HIGH |
| PATCHING |
|
✓ |
Apply security patches within seven days of publish. Use a supported OS version. |
✓ |
✓ |
✓ |
| INVENTORY |
✓ |
Review and update IS-HAM records quarterly. |
✓ |
✓ |
✓ |
|
| FIREWALL |
✓ |
Enable host-based and network firewall in default deny mode and permit minimum necessary services. |
✓ |
✓ |
✓ |
|
| CREDENTIALS & ACCESS CONTROL |
|
✓ |
Integration with UNK's Authentication Services is recommended. Review existing accounts and privileges quarterly. Enforce password complexity for any unmanaged/local accounts. |
✓ |
✓ |
✓ |
| TWO-FACTOR AUTHENTICATION |
✓ |
Require Duo two-factor authentication for all interactive user and administrator logins. | Recommended |
✓ |
||
| CENTRALIZED LOGGING |
|
Forward logs to a remote log server. University IT Splunk service recommended. |
✓ |
|||
| VULNERABILITY MANAGEMENT |
✓ |
✓ |
Enable local firewall in default deny mode and permit minimum necessary services. |
✓ |
✓ |
✓ |
| MALWARE PROTECTION |
✓ |
✓ |
Monthly security scan. |
|
✓ |
✓ |
| PHYSICAL PROTECTION |
✓ |
|
Place system hardware in a data center. |
|
✓ |
✓ |
| SECURITY, PRIVACY & LEGAL REVIEW |
✓ |
|
Request a Security, Privacy, and Legal review and implement recommendations before deployment. |
|
|
✓ |
| REGULATED DATA SECURITY CONTROLS |
|
|
Implement PCI DSS, HIPAA, or export controls as applicable. |
|
|
✓ |
| MONITORING |
✓ |
|
Monitor system for uptime. |
|
✓ |
✓ |
| STANDARDS | FREE OF CHARGE | RECURRING TASK | WHAT TO DO | LOW | MEDIUM | HIGH |
| PATCHING |
|
✓ |
Based on National Vulnerability Database (NVD) ratings, apply high severity security patches within seven days of publish, medium severity within 14 days, and low severity within 28 days. Use a supported version of the application. |
✓ |
✓ |
✓ |
| INVENTORY |
✓ |
Maintain a list of applications and data classifications. Review and update records quarterly. |
✓ |
✓ |
✓ |
|
| FIREWALL |
|
✓ |
Permit minimum necessary services in network firewall. Review and verify firewall rules annually. |
✓ |
✓ |
✓ |
| CREDENTIALS & ACCESS CONTROL |
|
✓ |
Review existing accounts and privileges quarterly. Integrate with Shibboleth. Follow the Authentication Services Policy. |
✓ |
✓ |
✓ |
| TWO-FACTOR AUTHENTICATION |
✓ |
Require Duo two-factor authentication for all interactive user and administrator logins. |
✓ |
✓ |
||
| CENTRALIZED LOGGING |
|
Forward logs to a remote log server. University IT Splunk service recommended. |
✓ |
✓ |
||
| WEBSITE SSL |
✓ |
Obtain and use a TLS certificate on all websites. Sites that accept credentials or credit card information use an “extended validation” certificate. If UNK hosted, request and obtain from UNK Security Dept. |
✓ |
✓ |
||
| VULNERABILITY MANAGEMENT |
✓ |
✓ |
Monthly Qualys application scan. Remediate severity 5 vulnerabilities within seven days, severity 4 vulnerabilities within 14 days, and severity 3 vulnerabilities within 28 days of discovery. |
|
✓ |
✓ |
| PHYSICAL PROTECTION |
|
|
Place system hardware in a data center. |
|
✓ |
✓ |
| SECURE SOFTWARE DEVELOPMENT |
|
Include security as a design requirement. Review all code and correct identified security flaws before deployment. Use of static code analysis tools recommended. |
|
|
✓ |
|
| SECURITY APP SCAN |
✓ |
|
Security Dept should run an initial IBM app scan on the application on a staging server. Applies to both new vendor obtained and new custom developed apps. |
|
✓ |
✓ |
| DEVELOPER TRAINING |
✓ |
✓ |
Attend two days of Information Security Academy training annually. |
|
✓ |
✓ |
| BACKUPS |
|
|
Backup application data nightly. Encrypt backup data in transit and at rest. |
|
✓ |
✓ |
| DEDICATED ADMIN WORKSTATION |
|
|
Access administrative accounts only via a certified Personal Bastion Host (PBH) or the Full Tunnel VPN profile. |
|
✓ |
✓ |
| SECURITY, PRIVACY & LEGAL REVIEW |
✓ |
|
Request a Security, Privacy, and Legal review and implement recommendations before deployment. |
|
|
✓ |
| REGULATED DATA SECURITY CONTROLS |
|
|
Implement PCI DSS, HIPAA, or export controls as applicable. |
|
|
✓ |
Computing Equipment
Any UNK-provided desktop or portable device or system, or any non-UNK desktop or portable device or system used to access UNK-provided data or services.
Masked number
NIST-Approved Encryption
The National Institute of Standards and Technology (NIST), develops and promotes cryptographic standards that enable U.S. Government agencies and others to select cryptographic security functionality for protecting their data. Encryption which meets NIST-approved standards is suitable for use to protect UNK data if the encryption keys are properly managed. In particular, secret cryptographic keys must not be stored or transmitted along with the data they protect. Cryptographic keys have the same data classification as the most sensitive data they protect.
Payment Card Industry Data Security Standards
Protected Health Information (PHI)
All individually identifiable information that relates to the health or health care of an individual and is protected under federal or state law. For questions about whether information is considered to be PHI, contact the University Privacy Officer.
Qualified Machine.
A computing device located in a secure UNK facility and with access control protections that meet the Payment Card Industry Data Security Standards.
Student Records Information
Data maintained by UNK and under jurisdiction of the Family Educational Rights and Privacy Act (FERPA) tenets. Student Records include UNK-held student academic transcripts and other related academic records (official and unofficial), and UNK-held records related to:

