| The University of Texas at Austin
Information Security Office

| |
Securing Departmental Systems

Tools for Securing Your Departmental Systems

The Information Security Office hosts a discussion forum for technical staff to discuss various security issues.

Server Hardening Checklists

The Information Security Office maintains these pages as a resource for campus IT administrators. For recommended practices for securing servers, select your operating system below:

Handheld Hardening Checklists

The hardening checklists are based on the comprehensive checklists produced by the Center for Internet Security (CIS), when possible. The Information Security Office has distilled the CIS lists down to the most critical steps for your systems, with a particular focus on configuration issues that are unique to the computing environment at The University of Texas at Austin.

Secure Web Application Coding Guidelines

The secure Web application coding guidelines contain best practices and design guidelines for application developers on campus. The checklists are intended to be a concise reference document for developers.

If you have any comments or suggestions, please contact the Information Security Office at security@utexas.edu.

Security Checklist for Hosted IT Services

The security checklist for hosted IT services contains information to assist purchasing project sponsors in addressing risk management, contract review, and ongoing Vendor management, with the goal of minimizing risk to university data. See the change log for a list of changes to this document.


Selfscan is a federated network vulnerability scanner that you can use to perform security scans against information systems that you manage. 

Protecting the Privacy of Information and Network Integrity

Approved Encryption Methods

The Information Secure Office has approved several methods of complying with policy for encrypting sensitive data on portable devices. The preferred method of accomplishing this is using WinMagic SecureDoc, the enterprise whole disk encryption product available through ITS.


Last updated January 10, 2011.
Copyright © 2002-15, Information Security Office. All rights reserved.
Privacy | Accessibility | Emergency Preparedness, Safety and Security

Send computing questions to the ITS Help Desk or call (512) 475-9400.


| | | |