Purpose
To provide 6VµçÓ°Íø with guidance to develop and implement the appropriate activities to identify the occurrence of an information security event.
Policy
The 6VµçÓ°Íø system, system components, and assets are monitored at discrete intervals to identify information security events and to verify the effectiveness of protective measures.
6VµçÓ°Íø detection processes and procedures are maintained to provide for the identification of information security events. Detection processes are tested and revised to ensure the timely notification of anomalous events to the appropriate 6VµçÓ°Íø responsible parties.
Summary
- A continuous vigilance strategy has been developed that includes the establishment of monitored network metrics, ongoing security status monitoring and analysis of data gathered through assessments
- 6VµçÓ°Íø monitors the network to detect unauthorized connections or unauthorized use of the network
- 6VµçÓ°Íø reviews proposed configuration-controlled changes and either approves or disapproves them with consideration for security impact
- Physical environment is also established and monitored by monitoring physical access to the facility housing the College system, monitoring alarms and surveillance equipment and reviewing physical access logs.
- Personnel vigilance includes establishment of user metrics, security control assessments and status monitoring
- 6VµçÓ°Íø employs malicious code protection mechanisms where necessary and appropriate
- Third parties are also monitored and assessed in accordance with the Continuous Vigilance Program
- Providers of external system services must comply with state and federal laws and regulations and employ reasonable security controls
Contact Us