Requirement |
General Staff/Faculty Actions | Unit IT & Leadership Actions |
1. Annual completion of cybersecurity awareness training for all employees |
|
|
2. Timely escalation of cybersecurity incident response in alignment with UC standards |
|
|
3. Identification, tracking and vulnerability management of all computing devices connected to university networks |
|
|
4. UC-approved Endpoint Detection & Response (EDR) software deployed on all compatible university computing devices |
|
|
5. Multi-factor authentication (MFA) enforced for all university email |
|
|
6. Data Loss Prevention (DLP) implemented for all health email systems |
|
|
UCI is also including improvement of other cybersecurity metrics that get reported to the UC Regents into this effort, including endpoint encryption and IS-12 compliance with backups.
-
-
- Endpoint Encryption Requirements (ref: UC IS-3 Section 10.1 and UC Minimum Security Standard 4.4)
- Portable computing devices: must at least encrypt P3/P4 data at rest, always recommend full disk encryption
- Servers (physically secured): must encrypt P4 data at rest in all forms (files, database, etc)
- Backup Requirements (ref: UC IS-12 Sections 4.2 and 7.3.1, and UC Minimum Security Standard 4.8)
- IT Resources classified at Recovery Level 4 or 5 must have a tested backup or recovery system in the last 12 months
- Endpoint Encryption Requirements (ref: UC IS-3 Section 10.1 and UC Minimum Security Standard 4.4)
-
More implementation details will be shared with Unit Information Security Leads (UISL) as the year progresses, and they will provide status updates on behalf of their Units. UISLs are provided a Calendar of Changes and Due Dates related to this initiative.
UCI Campus Unit Prep Guide provides an overview for Unit Heads.
OIT will broadly communicate any required changes to using their services, branded as ZotDefend.
Additionally, Procurement needs assurance from the Unit’s Technical UISL or IT Department that the computing devices will be configured to meet the related requirements when purchased and are configured appropriately before getting reimbursed.