Network Management Standard
Date of Current Revision or Creation:泭December 1, 2020
The purpose of an Information Technology Standard is to specify requirements for compliance with 圖朸厙 Information Technology policies, other University policies, as well as applicable laws and regulations. Standards may include business principles, best practices, technical standards, migration and implementation strategies, that direct the design, deployment and management of information technology.
Purpose
The purpose of this compliance standard is to establish the principal regulation and requirements for provisioning and managing network infrastructure and equipment used in support of administrative, academic, and research functions of 圖朸厙. ITS is responsible for managing the University network infrastructure.
Definitions
Intranet is an organization's information system that shares data or operations with its employees.
Extranet is a private network that permits data exchange between businesses or organizations without the benefit of the Internet.
ITS is the acronym for the official name of Information Technology Services.
User includes anyone who accesses and uses the 圖朸厙 information technology resources
Standards Statement
1. Protecting the Network from the Internet
The University network must be protected from malicious Internet traffic. ITS will minimally restrict traffic at the connection points between the University and the Internet. Restrictions will be based on current guidance from authoritative sources, such as the SANS/FBI Top 20 Internet threats list, and from a historical knowledge of common avenues of attack.
Network architecture decisions are made after careful evaluation of network performance, business rules and requirements, and the protective value of the institutional assets involved. Actions are taken in the best interest of the overall security and performance of the network.
2. Network Segregation
The University network employs methods to manage and improve security through logical and physical segregation. Groups of users and information systems are segregated on the network.
Controls are applied to the network based on system security, timing, operational impact and funding limitations.
Accesses to network resources are segmented into user and system domains and access is authorized on a necessity basis only. Users are granted access after a business reason is determined. Anonymous access is not permitted to the network. Security controls are placed on many shared access segments to mitigate the spread of malicious traffic.
3. Cabling Security
ITS is responsible for the installation or coordination of network cabling at 圖朸厙. All communication cabling activities are required to meet code for the locality involved. ITS uses industry standards according to a quality of service criteria. Cabling is best viewed as a component of the building infrastructure. Its design and management must be considered in context with the long-term requirements of the campus.
Users are prohibited from altering or otherwise extending the campus network. All network connectivity is coordinated through ITS. Only authorized personnel have access to campus wiring closets.
4. Service Agreements
In-house or third-party network service agreements must include detailed requirements for security compliance, service levels, and management requirements. Users are required to follow the Acceptable Usage Standard when using network and other technology resources.
Procedures, Guidelines & Other Related Information
- Federal and State Law
- University Policy 3501 - IT Access Control
- University Policy 3502 - Information Infrastructure, Architecture, and On-going Operational
- University Policy 3505 - Information Technology Security
History
Date |
Responsible Party |
Action |
December 2006 |
ITAC/CIO |
Created |
October 2008 |
ITAC/CIO |
Reaffirmed |
October 2010 |
ITAC/CIO |
Reaffirmed |
October 2011 |
ITAC/CIO |
Reaffirmed |
March 2014 |
IT Policy Office |
Minor rewording for clarity Numbering revision and departmental name change |
December 2017 | ITS Policy Office | Reviewed: no changes |
December 2020 | ITS Policy Office | Reviewed: no changes |