- Home »
- Security of Networks and Networked Data
Security of Networks and Networked Data
The University of North Carolina at Greensboro
- (Approved by the Chancellor, July 19, 2004, May 2010)
The University of North Carolina at Greensboro's (hereinafter "University") computing and telecommunication networks, computing equipment, and computing resources are owned by the University and are provided to support the academic and administrative functions of the University. The purpose of this policy is to support a high standard of network security. Adherence to the policy will help protect the integrity of the campus network and networked data. Enforcement actions will mitigate risks and losses associated with security threats to the network and networked data.
Federal and state law, and University policies and procedures govern the use of this equipment and technologies. Additional rules and regulations may be adopted by divisions/departments to meet specific administrative or academic needs. Any adopted requirements must be in compliance with applicable federal and state laws, and this policy.
This policy applies to all faculty, staff, students, and other authorized individuals who connect network communications devices to the University data network. It is fundamental to all information security efforts at the University.
The intent of this policy is not to change the ownership of computing and telecommunication networks, computing equipment, or computing resources.
Network Operation And Transport
The following restrictions apply:
- Only a single network communications device should be attached per Ethernet jack. If additional jacks are required, a cabling request must be submitted to Information Technology Services (ITS).
- Physical access to infrastructure network switching equipment is not permitted without specific authorization of ITS.
- Attached cables must be certified by ITS and shall not exceed 20 feet in length.
- Ethernet hubs/repeaters must not be attached.
- Ethernet switches/bridges must not be attached.
- Hardware firewall/network address translation devices must not be attached.
- Wireless enabled devices must not be attached.
- Network layer 3 (logical layer) routing devices must not be attached.
- All attached devices must have an identified owner and user.
UNCG has been granted Internet address spaces. ITS will exclusively provide allocation and administration of these address spaces in accordance with ITS procedures, standards, and protocols.
- All network attached devices require registration in the ITS network registration system.
- Name resolution to/from the Internet will only be provided for devices specifically identified as servers. Servers with administrative applications are subject to the Enterprise Systems Policy
- ITS will manage additional domain name space (for example, e-mail.uncg.edu, uncg.info) in support of the University mission.
- Individuals, academic colleges/departments, or administrative departments at UNCG may not create and support an Internet domain name space without prior approval of ITS.
Quality Of Service
ITS has the authority to implement Network Quality of Service technology to control the cost of providing Internet service, ensure equal communications access for all clients, and provide differential service for enterprise applications, which may include denial of transport.
Computer workstation users are expected to adhere to the following:
- Ensure that operating system and application software is kept up to date with manufacturer patches.
- Take all necessary precautions to avoid workstation compromise. Employees and departments are responsible for making use of the recommended security software from the ITS division as set forth in the Computing Supported Products (Standards for Computer and Related Technology) and for configuring the software according to ITS standards.
- Where possible, physically secure the workstation.
- Do not allow others to use a workstation when logged in with your authentication credentials.
- Ensure that data is retained and backed up if necessary.
- Store data that is classified as Restricted in the Data Classification Policy on ITS network storage facilities.
- Employ mobile device startup password protections.
- Follow ITS protocol for equipment disposal practices to ensure protection of data and licensed software.
- Take reasonable precautions to avoid actions that could deteriorate the performance of the University network or networked resources (devices connected to the UNCG network)
Application server administrators are expected to adhere to the following:
- Ensure that operating system and application software is kept up to date with manufacturer patches.
- Take all necessary precautions to avoid server compromise. Employees and respective departments are responsible for making use of the recommended security software from the ITS division as set forth in the Computing Supported Products (Standards for Computer and Related Technology) and for configuring the software according to ITS standards.
- Physically secure the server.
- Ensure that data is backed up and retained according to the Computer Systems Backup Procedure.
- Maintain system activity logs for auditing purposes.
- Equipment disposal practices must follow ITS protocols to ensure protection of data and licensed software.
- Adhere to the Enterprise Systems Policy.
Network connected devices with applications directly involving human safety must be operated on a physically or logically isolated network. Examples are physical security and environmental control devices.
The wireless communications spectrum is managed as part of the campus network. See Wireless Communications Policy.
Passwords are an important aspect of computer security. Passwords represent the front line of protection for all user accounts. A poorly chosen password may compromise UNCG’s entire network.
- System or user-level passwords must be changed on the currently recommended standard periodic basis.
- Passwords must be kept secure, and sharing of accounts is prohibited. Authorized users are responsible for the security of all assigned account and equipment activity and should follow security procedures determined by ITS standards.
- User accounts that have system-level privileges through some form of group membership, or other implementation, must have a unique password from other accounts held by that user.
- Passwords must not be inserted into e-mail messages or any other form of electronic communication.
- All manufacturer default passwords must be changed before network connection.
- The use of ITS enterprise authentication services is required.
Application Developer Requirements
Application developers with applications containing passwords, shared secrets, or key phrases contained within should adhere to the following guidelines:
- Support authentication through ITS enterprise authentication services.
- Support authentication of individual users and not groups.
- Must not store passwords in clear text or any form that is reversible.
- The public sections of the University’s Web site are available to any user through remote access.
- Remote access connections, whether originating from University-owned or personal equipment, should be given the same security consideration as an on-site connection.
- Faculty, staff, or students are the only ones permitted to remotely access University network resources and only through ITS-supported remote access technology.
- All remote access will be encrypted, and authenticated using ITS enterprise authentication services.
- Approaches to network traffic that threaten security are strictly prohibited.
Encryption technology protects information content during network transport.
- Some data must be encrypted in conformity with the Wireless Communications Policy and the Data Classification Policy.
- ITS-supported algorithms should be selected when using encryption technology.
- Cryptographic key lengths must be of sufficient length as to prevent successful intrusion in a short time period.
- The use of proprietary encryption algorithms is not allowed for any application housing data classified as Restricted as defined by the Data Classification Policy.
- Export of encryption technologies is subject to federal law.
Visitors or non-University community members may require temporary access to computer or network resources. Non-affiliate network access is subject to the following restrictions:
- Non-affiliate network access is subject to all University policies including the Acceptable Use of Computing and Electronic Resources Policy.
- Only Deans and Department Heads can sponsor non-affiliate network access.
- Faculty, staff, and students must not use non-affiliate access procedures to gain any form of temporary computer or network access.
- Faculty and staff must not share their account information with non-affiliates.
The perimeter of UNCG’s network infrastructure is defined as the electronic border between the UNCG campus network, and the first Internet Service Provider (ISP) networking device supplying wide area network (WAN) connectivity.
- ITS maintains perimeter security for the purposes of general infrastructure protection.
- Only authorized ITS employees may modify perimeter security measures.
- All application servers must be specifically identified to ITS.
Application Service Providers
Requirements of the Sponsoring Department
- If the application is hosted on the campus, it is subject to the Enterprise Systems Policy
- Individuals, academic colleges/departments, or administrative units must contact ITS and lodge an Application Service Provider (ASP) request.
- If the application under consideration is to be hosted outside the campus, and the data manipulated is classified as Restricted as defined by the Data Classification Policy, an ITS security review must be completed.
Requirements of the Application Service Provider
- Application service providers must adhere to ITS ASP security standards.
- ITS may request that security measures be implemented in addition to the general ITS ASP security standards.
- ASP’s that do not meet the requirements may not be used for UNCG enterprise applications.
Extranet (External Network) Connections
All new extranet connectivity will go through an ITS security review to ensure that all access matches the business requirements in the best possible way, and that the principle of least access is followed.
Memorandum of Understanding
All new connection requests between third parties and UNCG require that the third party and UNCG representatives agree to and sign an Extranet Memorandum of Understanding. The Vice Chancellor/Chief Information Officer or his/her designee must sign this agreement, together with the Provost/Vice Chancellor of the requesting department, as well as a representative from the third party who is legally empowered to sign on behalf of the third party. The agreement must be reviewed by the Office of the University Counsel prior to signature by University officials in accordance with the UNCG Policy on Contract Review and Approval. The signed document is to be kept on file with ITS.
Point of Contact
The requesting UNCG department must designate a person to be the Point of Contact (POC) for the extranet connection. The POC acts on behalf of the department, and is responsible for those portions of this policy and the Extranet Memorandum of Understanding that pertain to it. In the event that the POC changes, ITS and the extranet organization must be informed promptly.
Departments within UNCG that wish to establish connectivity to a third party are to file a new site request with ITS. The sponsoring organization must provide ITS with full and complete information as to the nature of the proposed access.
All connectivity established must be based on the least-access principle, in accordance with the approved business requirements and the security review. In no case will UNCG rely upon the third party to protect UNCG’s network or resources.
All changes in access must be accompanied by a valid business justification, and are subject to security review. Individual departments are responsible for notifying ITS when there is a material change in their originally provided information so that security and connectivity evolve accordingly.
When access is no longer required, UNCG departments must notify ITS, which will then terminate the access.
Compliance With Laws And Regulations Relating To Networked Data
UNCG complies with federal and state laws and regulations relating to the security of networked data. UNCG designates compliance officers for laws/regulations, as appropriate, and ITS cooperates with the designated compliance officers.
EnforcementITS will enforce the Security of Networks and Networked Data Policy and establish standards, procedures, and protocols in support of the policy.
Alleged violations of this policy are subject to the due process provided in existing University policies.
Any violation of this policy by a University student is subject to the Student Code of Conduct in the student handbook. For employees, any violation of this policy is “misconduct” under EPA policies (faculty and EPA non-faculty) and “unacceptable personal conduct” under SPA policies, including any appeal rights stated therein. Employees and students are required to cooperate with ITS in investigations of any alleged violations of the policy. Violations of law may also be referred for criminal or civil prosecution.
ITS has the authority to disconnect network service or modify/enhance network security without notification in the event of law violation, systems compromise involving Restricted data, or negative network communications impact affecting service for other users.
The Chancellor has approved the Security of Networks and Networked Data Policy and ITS will periodically review the policy as appropriate.
Links to Related University Policies
Comments or questions? Email the Policy Administrator.