Applicability: The minimum security standards found here apply to IaaS managed services — virtual servers that are designed to be ephemeral — and containerized solutions.
Standards | What to do |
Low Risk
|
Moderate Risk
|
High Risk
|
---|---|---|---|---|
Platform Selection | Review the ISO's Local and Cloud Services Decision Matrix | |||
Operational Practices | Review the guidance from Vendors and 3rd Party controls and compliance | |||
System Architecture | Review the guidance from and Risks of Cloud Services | |||
Account Management | Ensure that you are adhering to these standards related to the creation of cloud accounts and leverage centrally managed cloud options as much as possible. | |||
Patching and Application Lifecycle |
Additional Elaboration:
|
|||
Vulnerability Management |
Leverage the UTISO Managed Vulnerability Scanning Service (with Nessus Agents) to ensure that all critical vulnerabilities are remediated within seven days of discovery, and moderate/important vulnerabilities within 30 days. Systems should also log data to the Managed Splunk Service with analysts regularly reviewing these logs. For high risk services, UTISO can make additional security monitoring agents available. Please contact us directly about this option (security@utexas.edu). Additional Elaboration:
|
|||
Inventory and Asset Classification |
Maintain an inventory of deployed resources as well as the risk classification and service owner of those resource in ISORA. Additional Elaboration:
|
|||
Container Registries | As more applications move to container-based microservices, those container images need to be stored in a common set of repositories (as much as possible) to help ensure that a container registry security strategy can be carried out. This involves scanning the container images for vulnerabilities, auditing image lifespan and outdated packages, etc. If containers are leveraging the centrally managed registries on campus the ISO will be positioned to scan those for security deficiencies and system admins will be able to more easily assess package gaps, etc. Please consult with ITS as to which container registry is right for your use case (help@its.utexas.edu). |
|||
Firewall | Use the native tools and design patterns of your platform to ensure that only the minimum necessary network communication is permitted through virtual network devices such as VPCs, load balancers, and the like. This includes access to managed services such as hosted database platforms. | |||
Credential and Key Management |
|
|||
Two-Step Authentication | Enforce two-factor authentication for all interactive user and administrator logins. UT provided Duo two-factor authentication is recommended, but other two-factor options may be acceptable. | |||
Logging and Alerting |
Additional Elaboration:
|
|||
Intrusion Detection |
In most situations involving lower risk university data robust system logging paired with system management insights can be all that is needed. In situations where higher risk Confidential university data is in scope specific network security monitoring may be required. Please consult with the Information Security Office if your implementation is handling Confidential and you are needing to tie into our intrusion detection services for cloud implementations. Reach us at (security@utexas.edu). |
|||
Backups |
|
|||
Encryption |
|
|||
Data Centers | Prefer US based data center locations. | |||
Privileged Access Workstation (PAW) |
Cloud administration consoles should only be accessed through a PAW when logging in with an administrative account. Administrative accounts are defined as:
|
|||
Security, Privacy, and Legal Review | Prior to implementation, ensure that your assets are accounted for in ISORA's inventory and that risk management details are provided | |||
Regulated Data Security Controls |
|
Credit where credit is due: Thanks to Stanford's ISO for the content!
This set of standards supplement the UT Austin Information Resources Use and Security Policy and provides additional details related to the minimum security expectations of care required for the university's various types of data.
UT Austin requires individuals granted access to or use of the university's information resources to be aware of and abide by the university's information security policies and requirements.
These standards will evolve over time as technologies and use cases change. All changes will be captured in the respective change log.
Please feel free to contact the UT Information Security Office (security@utexas.edu) with any questions.