Implementing Financial Assurance for Mitigation Project Success
Implementing a System-Wide Risk Mitigation Policy (288219183)
Transcript of Implementing a System-Wide Risk Mitigation Policy (288219183)
![Page 1: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/1.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 1/94
Policy IT-28 Planne
Name of Unit Enter the name of your school or department
Unit Head Enter the full name of the Dean, Director, or top executive
Type of Unit Academic
Submitted by Typically, the highest ranking IT professional will submit
Secondary contact ptional, but should be someone well!informed about IT!"#
Date of Submission
Are you a Group-leel IT Serice proider!Defned as providing any IT services to more than 1 unit, including academic units, administrative unit
If proidin" IT Serices to more t#an one unit$ please list all units for %#ic
Are any of your unit&s IT serices proided ' mana"ed by a Group-leel IT P
If yes$ %#at proider!
Please note that fnal submission o this documentation should include all
IT Planner, version 1.9.24.13
I yes, please ans!er the ollo!ing !or"sheets only or services that are managed in your una plan or the services they provide.
![Page 2: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/2.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 2/94
cer for your department
, and research centers
IT support is proided
roider!
IT services supported within the unit.
it. #e sure to veriy that your $roup%level IT Provider su&mits
![Page 3: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/3.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 3/94
* Please only include servers, devices that behave like a serve
To re&uest a scan of static I' addresses in your building(s), click here
Hard%are Type Host Name Primary (unction*
"
+
-
.
/
#
0
*1
**
*"
*+
*
*-
*.
*/
*#
*0
"1
"*""
"+
"
"-
".
"/
"#
"0
+1
+*
+"
++
+
+-
+.
+/
+#
+0
1
Item
No)
![Page 4: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/4.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 4/94
*
"
+
-
.
/#
0
-1
-*
-"
-+
-
--
-.
-/
-#-0
.1
.*
."
.+
.
.-
..
./
.#
.0
/1
/*
/"
/+
/
/-
/.
//
/#
/0#1
#*
#"
#+
#
#-
#.
#/
![Page 5: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/5.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 5/94
![Page 6: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/6.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 6/94
Environmental $can of IT Assets%, or devices that store any data that you suspect may be protected b
Secondary (unction Description
Indiiduals %' Priile"ed
Access
![Page 7: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/7.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 7/94
![Page 8: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/8.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 8/94
![Page 9: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/9.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 9/94
privacy laws or policies
*peratin" System *t#er IP Addresses
Serice
+riticality
Primary IP
Address
![Page 10: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/10.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 10/94
![Page 11: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/11.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 11/94
![Page 12: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/12.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 12/94
P#ysical ,ocation irtuali.ed
![Page 13: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/13.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 13/94
![Page 14: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/14.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 14/94
![Page 15: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/15.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 15/94
*t#er /ey +#aracteristics or
+omments
Data 0ncrypted at
1est
![Page 16: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/16.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 16/94
![Page 17: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/17.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 17/94
![Page 18: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/18.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 18/94
These Columns Not e!uired or IT"#$ Co
Does t#e Serer Site#ind a Hard%are
(ire%all!
Do Antiirus Scans
Ta3e Place!
![Page 19: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/19.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 19/94
![Page 20: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/20.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 20/94
![Page 21: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/21.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 21/94
pliance. ecommended or %epartmental Trackin& o IT"'# Controls
Patc# 4ana"ement Procedures Serer Has UPS
![Page 22: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/22.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 22/94
![Page 23: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/23.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 23/94
![Page 24: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/24.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 24/94
Is Serer ac3ed Up! ac3up 4et#od'(re5uency
![Page 25: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/25.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 25/94
![Page 26: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/26.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 26/94
![Page 27: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/27.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 27/94
*6site ac3up ,ocation
*6site ac3up ,o"ical
Security +ontrols
![Page 28: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/28.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 28/94
![Page 29: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/29.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 29/94
![Page 30: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/30.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 30/94
*6site ac3up P#ysical
Security +ontrols
ac3up Testin" (re5uence
and 4et#od
![Page 31: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/31.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 31/94
![Page 32: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/32.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 32/94
![Page 33: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/33.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 33/94
*nsite ac3up ,ocation
*nsite ac3up ,o"ical
Security
![Page 34: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/34.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 34/94
![Page 35: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/35.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 35/94
![Page 36: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/36.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 36/94
*nline ac3up P#ysical
Security
*nsite ac3up Testin"
(re5uency and 4et#od
![Page 37: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/37.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 37/94
![Page 38: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/38.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 38/94
![Page 39: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/39.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 39/94
(re5uency ofac3up'1estoration ,o"s
1eie%ed
Is t#e serer bein" scanned
by a ulnerability scanner!
![Page 40: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/40.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 40/94
![Page 41: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/41.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 41/94
![Page 42: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/42.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 42/94
Is %eb application bein"
scanned by a %eb scanner!
![Page 43: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/43.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 43/94
![Page 44: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/44.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 44/94
![Page 45: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/45.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 45/94
Item No) ' Type ' Host
*2 3"2 3
+2 3
2 3
-2 3
.2 3
/2 3
#2 3
02 3
*12 3
**2 3*"2 3
*+2 3
*2 3
*-2 3
*.2 3
*/2 3
*#2 3
*02 3
"12 3
"*2 3
""2 3"+2 3
"2 3
"-2 3
".2 3
"/2 3
"#2 3
"02 3
+12 3
+*2 3
+"2 3
++2 3
+2 3
+-2 3
+.2 3
+/2 3
+#2 3
+02 3
12 3
![Page 46: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/46.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 46/94
*2 3
"2 3
+2 3
2 3
-2 3
.2 3
/2 3#2 3
02 3
-12 3
-*2 3
-"2 3
-+2 3
-2 3
--2 3
-.2 3
-/2 3
-#2 3-02 3
.12 3
.*2 3
."2 3
.+2 3
.2 3
.-2 3
..2 3
./2 3
.#2 3
.02 3
/12 3
/*2 3
/"2 3
/+2 3
/2 3
/-2 3
/.2 3
//2 3
/#2 3
/02 3#12 3
#*2 3
#"2 3
#+2 3
#2 3
#-2 3
#.2 3
#/2 3
![Page 47: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/47.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 47/94
##2 3
#02 3
012 3
0*2 3
0"2 3
0+2 3
02 30-2 3
0.2 3
0/2 3
0#2 3
002 3
*112 3
*1*2 3
*1"2 3
*1+2 3
*12 3
*1-2 3*1.2 3
*1/2 3
*1#2 3
*102 3
**12 3
***2 3
**"2 3
**+2 3
**2 3
**-2 3
**.2 3
**/2 3
**#2 3
**02 3
*"12 3
I you insert more ro!s, &e sure to copy ormatti
![Page 48: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/48.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 48/94
Data Analysis
7#at is t#e #i"#est classication ofdata stored on t#is item!4lick for more info
![Page 49: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/49.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 49/94
![Page 50: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/50.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 50/94
g and ormulas
![Page 51: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/51.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 51/94
7#ic# of t#e follo%in" best describes t#e#i"#est classication of data stored on t#isitem!4lick for more info
![Page 52: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/52.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 52/94
![Page 53: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/53.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 53/94
![Page 54: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/54.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 54/94
Item No) ' Type ' Host
*2 3 !
"2 3 !
+2 3 !
2 3 !
-2 3 !
.2 3 !
/2 3 !
#2 3 !02 3 !
*12 3 !
**2 3 !
*"2 3 !
*+2 3 !
*2 3 !
*-2 3 !
*.2 3 !
*/2 3 !
*#2 3 !
*02 3 !
"12 3 !
"*2 3 !
""2 3 !
"+2 3 !
"2 3 !
"-2 3 !
".2 3 !
"/2 3 !
"#2 3 !
"02 3 !
+12 3 !
+*2 3 !
+"2 3 !
++2 3 !
+2 3 !
+-2 3 !
+.2 3 !
5ased on the 6actor Analysis of information 7isk (6AI7) model
Data+lassication
![Page 55: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/55.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 55/94
+/2 3 !
+#2 3 !
+02 3 !
12 3 !
*2 3 !
"2 3 !
+2 3 !2 3 !
-2 3 !
.2 3 !
/2 3 !
#2 3 !
02 3 !
-12 3 !
-*2 3 !
-"2 3 !
-+2 3 !
-2 3 !--2 3 !
-.2 3 !
-/2 3 !
-#2 3 !
-02 3 !
.12 3 !
.*2 3 !
."2 3 !
.+2 3 !
.2 3 !
.-2 3 !
..2 3 !
./2 3 !
.#2 3 !
.02 3 !
/12 3 !
/*2 3 !
/"2 3 !
/+2 3 !
/2 3 !
/-2 3 !/.2 3 !
//2 3 !
/#2 3 !
/02 3 !
#12 3 !
#*2 3 !
#"2 3 !
#+2 3 !
![Page 56: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/56.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 56/94
#2 3 !
#-2 3 !
#.2 3 !
#/2 3 !
##2 3 !
#02 3 !
012 3 !0*2 3 !
0"2 3 !
0+2 3 !
02 3 !
0-2 3 !
0.2 3 !
0/2 3 !
0#2 3 !
002 3 !
*112 3 !
*1*2 3 !*1"2 3 !
*1+2 3 !
*12 3 !
*1-2 3 !
*1.2 3 !
*1/2 3 !
*1#2 3 !
*102 3 !
**12 3 !
***2 3 !
**"2 3 !
**+2 3 !
**2 3 !
**-2 3 !
**.2 3 !
**/2 3 !
**#2 3 !
**02 3 !
*"12 3 !
I you insert more ro!s, &e sure to copy ormatting and ormulas
![Page 57: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/57.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 57/94
Type
and 8I$T #11!+1
Pri
![Page 58: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/58.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 58/94
![Page 59: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/59.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 59/94
![Page 60: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/60.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 60/94
1is3 Assessment
ary threat for this service
(ull Description (feel free to use as a 4omment 9eld)T#reat 0ent(re5uency 9T0(:
![Page 61: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/61.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 61/94
![Page 62: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/62.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 62/94
![Page 63: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/63.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 63/94
(re5uency and +apacity
Describe rationalfor t#is ratin"
T#reat+apacity9T+ap:
Describe rational for t#isratin"
![Page 64: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/64.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 64/94
![Page 65: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/65.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 65/94
![Page 66: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/66.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 66/94
+ontrols 1is3 Assess
+ompensatin"+ontrol
Stren"t# 9+S: Describe controls 9clic3 to s ulnerability9uln:
,oss 0ent(re5uency9,0(:
![Page 67: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/67.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 67/94
![Page 68: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/68.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 68/94
![Page 69: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/69.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 69/94
ent
4a"nitudeSeere <;=$===$=== --
:igh ;*,111,111 ;0,000,000
$igni9cant ;*11,111 ;000,000
<oderate ;*1,111 ;00,000
=ow ;*,111 ;0,000
>ery =ow ;1 ;000
Probable ,oss4a"nitude 9Seetable at ri"#t:
![Page 70: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/70.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 70/94
![Page 71: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/71.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 71/94
![Page 72: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/72.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 72/94
Item No) ' Type ' Host
*2 3"2 3
+2 3
2 3
-2 3
.2 3
/2 3
#2 3
02 3
*12 3
**2 3*"2 3
*+2 3
*2 3
*-2 3
*.2 3
*/2 3
*#2 3
*02 3
"12 3
"*2 3
""2 3"+2 3
"2 3
"-2 3
".2 3
"/2 3
"#2 3
"02 3
+12 3
+*2 3
+"2 3
++2 3
+2 3
+-2 3
+.2 3
+/2 3
+#2 3
+02 3
12 3
ulnerability9uln:
,oss 0ent(re5uency 9,0(:
![Page 73: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/73.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 73/94
*2 3
"2 3
+2 3
2 3
-2 3
.2 3
/2 3#2 3
02 3
-12 3
-*2 3
-"2 3
-+2 3
-2 3
--2 3
-.2 3
-/2 3
-#2 3-02 3
.12 3
.*2 3
."2 3
.+2 3
.2 3
.-2 3
..2 3
./2 3
.#2 3
.02 3
/12 3
/*2 3
/"2 3
/+2 3
/2 3
/-2 3
/.2 3
//2 3
/#2 3
/02 3#12 3
#*2 3
#"2 3
#+2 3
#2 3
#-2 3
#.2 3
#/2 3
![Page 74: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/74.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 74/94
##2 3
#02 3
012 3
0*2 3
0"2 3
0+2 3
02 30-2 3
0.2 3
0/2 3
0#2 3
002 3
*112 3
*1*2 3
*1"2 3
*1+2 3
*12 3
*1-2 3*1.2 3
*1/2 3
*1#2 3
*102 3
**12 3
***2 3
**"2 3
**+2 3
**2 3
**-2 3
**.2 3
**/2 3
**#2 3
**02 3
*"12 3
I you insert more ro!s, &e sure to copy ormatting and ormulas
![Page 75: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/75.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 75/94
Transition 'lanning
Are you plannin" to moe t#isserice to a UITS Serice as partof your IT-28 plan!
If No$ please proide briefe>planation
![Page 76: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/76.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 76/94
![Page 77: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/77.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 77/94
![Page 78: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/78.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 78/94
7#ere do you plan to moe 9or#ae already moed: t#is item!
If Group-,eel proider$please identify %#ic# "roup
0stimated4oe Date
![Page 79: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/79.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 79/94
![Page 80: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/80.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 80/94
![Page 81: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/81.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 81/94
1esource
4o!locationIntelligent Infrastructure
4:E
?ebserve
?4<$
4ollaborative $torage
7esearch $torage
7esearch 4omputing
Database Admin $ervices
$ystem Admin $ervices
Enterprise 'rint $ervicesEnterprise $44<
@roup!=evel $olution
ther
![Page 82: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/82.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 82/94
![Page 83: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/83.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 83/94
![Page 84: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/84.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 84/94
Denition
$hare'oint, 5ox
8ot yet available8ot yet available
Any IT service that is provided to multiple units by a single IT group
'hysically re!locate servers to racks in the data center:osted server >< service (II and II!5asic)
4onsolidated :osting Environment (<icrosoft platform ! II$, 28et, 4oldfusion)
4entral web platform (=A<')
4ascase $erver solution for 4<$
76$, $DA
5ig 7ed II, uarry, <ason, 7esearch Database 4omplex, B$EDE
4omprehensive, virtualiCed hosting solutions
4omprehensive, virtualiCed hosting solutions
![Page 85: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/85.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 85/94
![Page 86: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/86.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 86/94
![Page 87: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/87.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 87/94
Denition of Terms
Hard%are Types Denition
$erver Any computer device, physical or virtu
Desktoplaptop
8etwork :? =ist only network hardware that stores
'rinter <ulti!function printercopier that, beca4amera
(unctions Denition
6ile $haring The computing device is con9gured to
'rint $haring The computing device is con9gured to
?eb $erver The computing device is serving :T<=
?eb 4ontent <gmt The computing device runs software d
Email $erver The computing device receives, stores,
Database $erver The computing device runs server!side
'atch>irus <gmt The computing device is used to distri
4ustom App (Describe) Any custom!built applications that coll>ended App (Describe) Any vended applications that collect p
Test or Dev $erver 8on!production server used for testing
Types of Data
$tudent grades
:7 records
4redit card numbers
Electronic protected health information
6inancial data
Donor info
6ederal grantcontract data
1is3 Analysis
4a"nitudeSeere <;=$===$===
:igh ;*,111,111
$igni9cant ;*11,111
<oderate ;*1,111
=ow ;*,111
Any computing device, physical or virt
T#reat 0ent (re5uency?(ow oten does the threat)knock at your door)
ery Hi"# 9H:3 G *11 timesyr
Hi"# 9H:3 5etween *1 and *11 timesyr
4oderate 94:3 5etween * and * timesyr
,o% 9,:3 5etween 2* and * timesyr
ery ,o% 9,:3 H2* times per year (less than once in *1 years)
![Page 88: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/88.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 88/94
>ery =ow ;1
1esource Denition
4o!location
Intelligent Infrastructure
4:E?ebserve
?4<$
4ollaborative $torage $hare'oint, 5ox
7esearch $torage
7esearch 4omputing
Database Admin $ervices
$ystem Admin $ervices
Enterprise 'rint $ervices 8ot yet available
Enterprise $44< 8ot yet available
@roup!=evel $olution Any IT service that is provided to multi
ther
'hysically re!locate servers to racks in
:osted server >< service (II and II!5asi
4onsolidated :osting Environment (<i4entral web platform (=A<')
4ascase $erver solution for 4<$
76$, $DA
5ig 7ed II, uarry, <ason, 7esearch Da
4omprehensive, virtualiCed hosting sol
4omprehensive, virtualiCed hosting sol
![Page 89: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/89.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 89/94
al, running a server operati
data, such as an ID$ or pro
use it stores data, poses so
share 9les with one or mor
share access to one or mor
9les andor actively listeni
signed for end user to ma
and forwards electronic m
database systems, such a
ute manage security patc
ct personal data via a webrsonal data via a web form
and development
Denition or 4ore Info ,
--
;0,000,000
;000,000
;00,000
;0,000
al, running a desktop oper
4lick for more info
4lick for more info
4lick for more info
T#reat +apacity? I the
ery Hi"# 9H:3 'robable
Hi"# 9H:3 'robable impact
4oderate 94:3 'robable i
,o% 9,:3 'robable impact
ery ,o% 9,:3 'robable i
![Page 90: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/90.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 90/94
;000
ple units by a single IT grou
the data center
c)
rosoft platform ! II$, 28et,
tabase 4omplex, B$EDE
utions
utions
![Page 91: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/91.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 91/94
g system
y server
e risk2 <ost printers probably dont need to be inventoried
other computing devices
printers, either physically attached or across the network
g on ports #1, +, #1#1, or other common web server ports
age and update web content
il and acts as a host for end users to access their Inboxes
<$ $=, racle, etc2
hes andor anti!virus software pattern 9les
form, or that provide mission!critical services to your unit, or that provide mission!critical services to your unit
in3
ting system AND hosting resources that other computers can access across the net
hreat happens, how bad is it likely to be+ontrol Sdoin& to
impact of threat is in the top " when compared to other threats
of threat is in the top *. when compared to other threats
pact of threat is of average capacity
f threat is in the bottom *. when compared to other threats
pact of threat is in the bottom " when compared to other threats
'our estimate o magnitude may eel li"e a !ild guess, &ut try tothin" a&out the !orst%case scenario. I a mission%critical system!as do!n or several !ee"s !hile you re&uilt it (due to any reason),!hat !ould it cost your unit in terms o lost productivity* +osttuition* +ost revenue* +ost grant opportunities* +oss o trust andreputation* In an academic unit, sliding do!n several positions innational ran"in s has a tan i&le cost in terms o enrollment and the
![Page 92: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/92.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 92/94
p
attraction o top talent.
oldfusion)
![Page 93: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/93.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 93/94
ork (e2g2, Facting like a serverF)
ren"t#? +hat are yourotect this asset
3
![Page 94: Implementing a System-Wide Risk Mitigation Policy (288219183)](https://reader033.fdocuments.net/reader033/viewer/2022051509/577ca7c21a28abea748c8b14/html5/thumbnails/94.jpg)
8/20/2019 Implementing a System-Wide Risk Mitigation Policy (288219183)
http://slidepdf.com/reader/full/implementing-a-system-wide-risk-mitigation-policy-288219183 94/94