2015 UW-Madison Cybersecurity Strategic Plan Final Jul-01-2015
2015 UW-Madison Cybersecurity Strategic Plan Final Jul-01-2015
2015 UW-Madison Cybersecurity Strategic Plan Final Jul-01-2015
Cybersecurity Strategy
(2015 – 2019)
A guide for protecting information through effective data
governance and implementing cybersecurity controls in a
risk management framework
Final
July 1, 2015
Data Governance + Cybersecurity Controls = Information Protection
Table of Contents
1
SOURCE: Advisory: University Payroll Theft Scheme, Research and Education Information Security Analysis Center
(REN-ISAC), dated November 12, 2014
university-wide missions of teaching, research and outreach. Likewise, risk tolerant strategies place the
university at risk for cyber-attack, data loss or mismanagement, and increased cost to operate through
additional system administrative and maintenance cost.
This document outlines seven strategic principles, supporting goals to enable those principles, and
eight enabling objectives that, if realized near term, will help sustain the strategy over the next five years.
The elements and objectives shown below and articulated in greater detail later in this document are a
collective work of the Office of Cybersecurity2 and the UW-Madison Information Security Team3 who
enthusiastically support the immediate approval, adoption and implementation.
Elements of UW-Madison Cybersecurity Strategy
Strategy 1: Complete Data Governance and Information Classification Plan
Strategy 2: Establish the UW-Madison Risk Management Framework to materially reduce
cybersecurity risk
Strategy 3: Build a community of experts and improve institutional user competence though
Security Education, Training, and Awareness
Strategy 4: Consolidate Security Operations and institute best practices for UW-Madison Campus
Networks and UW System Common Services
Strategy 5: Improve Cyber Threat Intelligence Analysis, Dissemination and Remediation
Strategy 6: Optimize Services, Establish Security Metrics, , Promote Compliance, Achieve
Continuous Diagnostics and Mitigation
Strategy 7: Establish Collaborative Partnerships to assure teaching and research computing
resources and results are available to fulfill the Wisconsin Idea and return value to the state and
its citizens
Near Term (Enabling) Objectives toward Cybersecurity Strategy Development
Objective 1: Consider retention of previous strategy’s actionable items (“find it,” “delete it,” and
“protect it”).
Objective 2: Enable and support a culture that values information security and works to reduce risk
to a level where the remaining potential consequences are acceptable to management of the local
unit and University leadership.
Objective 3: Establish Restricted Data Environments based on the needs of Faculty, Researchers or
IT project requirement documents.
Objective 4: Centralize data collection and aggregation for analysis of security related events to
promote unified measurement of cybersecurity attributes.
Objective 5: Identify and seek sources of repeatable funding to enable accomplishment of technical
or staffing related strategic goals.
Objective 6: Requirements are imposed upon UW-Madison by other agencies. Identify UW-
Madison compliance (FERPA, HIPAA, PCI-DSS, Red Flags Rule, etc.) and then map the IT security
2 The Office of Cybersecurity is directly aligned under the Chief Information Officer and Vice Provost for Information
Technology. This group was created in 2014 by consolidation of the former Division of Information Technology (DoIT) IT Security
Team and the Office of Computer Information Security and renamed the UW-Madison IT Security Team. The name change to
Office of Cybersecurity is made to better reflect the full scope of the office’s mission.
3 The UW-Madison Information Security Team (MIST) is sponsored by the CIO and was created as a collaborative group
of campus IT staff, management, and others with a common interest in promoting information security at UW Madison. This
group provides communication, guidance and leadership for campus-wide security issues and initiatives along with serving as an
advisory group to the UW-Madison Chief Information Security Officer.
Fear, uncertainty and doubt is not a sound cybersecurity strategy as it can easily be turned against
the organization’s security program and erode confidence in the implementation of controls.
Kees Leune
Chief Information Security Officer, Adelphi University
In remarks before the EDUCAUSE Security Professional’s Conference 2015
As discussed in NIST Special Publication 800-395, within an organization as diverse and complex as
UW-Madison, organizational risk consists of program management risk, investment risk, budgetary risk,
legal liability risk, safety risk, inventory risk, supply chain risk, and security risk. Security risk related to the
operation and senior university leaders, as part of their ongoing risk management responsibilities, should
address use of information systems. Effective security risk management requires that UW-Madison
departments, colleges and organizations operating in highly complex, interconnected environments using
state-of-the-art and legacy information systems must recognize that explicit, well-informed risk-based
decisions help balance the benefits gained from the operation and use of these information systems with
the risk of the same systems being vehicles through which purposeful attacks, environmental disruptions,
or human errors cause mission or business failure. Managing information security risk, like risk
management in general, is not an exact science. While based in the best collective judgments of individuals
and groups, the concepts of risk avoidance, risk management and risk tolerance are not consistently
understood or practiced. As the UW-Madison organization responsible for cybersecurity; and in most of
the information enterprise, day-to-day operations; the Office of Cybersecurity takes a leading and advisory
role in providing both the necessary and sufficient risk response measures to adequately protect the
information systems. Tools and processes that seek to avoid risk increase the cost of operations and may
impact the ability of faculty and researchers to carry out the university wide mission. Likewise, risk-tolerant
strategies place the university at risk for cyber-attack, data loss or mismanagement, and increased cost
through additional system administrative and maintenance.
Optimized risk management is applied to data identified as Personally Identifiable Information (PII)
or Personal Healthcare Information (PHI) that the University requires for daily operations to include
handling research, student information, and academic records. With the widespread teaching and research
involving healthcare and personal health information, we must consider the impact of multiple and
simultaneous incidents involving breach of data regulated by the Health Insurance Portability and
Accountability Act of 1996 (HIPAA) and subsequent legislation. Attention must also be directed toward
restricted data under the Family Educational Rights and Privacy Act (FERPA) and to financial and credit card
or account information with handling regulated under the Purchase Card Industry Data Security Standard
4
SOURCE: Higher Education Research and Development Survey (HERD), FY2013
5 SOURCE: NIST SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View,
Joint Task Force Transformation Initiative, dated March 2011
(PCI-DSS).
The Cybersecurity Strategy outlined in this document supports validation of effective practices,
with automated real-time monitoring for accountability. Eventually, a set of decision metrics for estimating
risk and security controls effectiveness will be developed. The entire UW Community will benefit from
being proactively involved and supportive of continuous improvement offered within this strategy. For
critical processes and systems, independent reviews should be planned and implemented to provide
assurance that the spectrum of security controls are at the desired level of maturity and working as
planned.
Our efforts will provide direction and, through the establishment of cybersecurity measures of
effectiveness, emphasize continued identification of sensitive or restricted information. Efforts will include
a management strategy including processes that prevent inappropriate access to or loss of sensitive or
restricted data. This focus must also include continued diagnostics using the right tools and access to all IT
assets that ensure visibility of vulnerabilities and risk associated with their specific technology. Refining the
processes and procedures to manage our intellectual property and other sensitive data will follow it.
6
From "There's a S.M.A.R.T. way to write management's goals and objectives" by George T. Doran as published in
Management Review (AMA FORUM) 70 (11): 35–36. (1981)
7 Using the Cornell Model for developing policy was discussed and approved at the January 2015 Policy Planning
Final authority to implement changes rests with the UW-Madison Chief Information Officer (CIO)
with endorsement by UWSA CIO if the change applies to the UW System
UW-Madison CISO provides quarterly reports to the community for review, recommended
changes will be reviewed and approved by the UW-Madison CIO until fully implemented
Within the calendar year 2018 and every fourth year afterwards, this plan will be reviewed and
updated to refine and extend the strategic plan for an additional five years.
The Strategy
Elements of UW-Madison Cybersecurity Strategy
The elements below form the strategy to prevent losses of restricted data while ensuring
availability of systems, networks and services, ensure integrity of data and transactions. This strategy
provides includes sub-strategies to refine processes and procedures to manage university-owned or
developed intellectual property and other sensitive information. Each strategy element is further defined
in Appendix A.
Strategy 1: Complete Data Governance and Information Classification Plan
Strategy 2: Establish the UW-Madison Risk Management Framework to materially reduce
cybersecurity risk
Strategy 3: Build a community of experts and improve institutional user competence though
Security Education, Training, and Awareness
Strategy 4: Consolidate Security Operations and institute best practices for UW-Madison Campus
Networks and UW System Common Services
Strategy 5: Improve Cyber Threat Intelligence Analysis, Dissemination and Remediation
Strategy 6: Optimize Services, Establish Security Metrics, Promote Compliance, Achieve
Continuous Diagnostics and Mitigation
Strategy 7: Establish Collaborative Partnerships to share resources and results to fulfill the
Wisconsin Idea and return value to the state and its citizens
Near Term (Enabling) Objectives toward Cybersecurity Strategy Development
The near term operational objectives presented below can be included in the strategies above with
each objective detailed in Appendix A. They are modeled on past successes in projects like implementation
of the PCI Compliance Assistance Team’s approach to campus PCI compliance. The Objectives will be
governed in the same successful ways as the UW-Madison technology and security committees and
forums.
Objective 1: Consider retention of previous strategy’s actionable items (“find it”, “delete it”, and
“protect it”).
Objective 2: Enable, support and nourish a culture that values information security and actively
works to reduce risk to a level acceptable to both management of the local unit and University
leadership.
Objective 3: Establish Restricted Data Environments based on the needs of Faculty, Researchers or
IT project requirement documents.
Objective 4: Centralize data collection and aggregation for analysis of security related events to
promote unified cybersecurity measures.
Objective 5: Identify and stabilize sources of repeatable funding to enable accomplishment of
technical- or staffing-related strategic goals.
Objective 6: Requirements are imposed upon UW-Madison by other agencies. Identify UW-
Madison compliance (FERPA, HIPAA, PCI-DSS, etc.) and then map the IT security components of
each to applicable campus units.
Objective 7: Develop and refine procedures to ensure security operations and risk assessments are
conducted in a sustainable and repeatable manner that ensures standards for timeliness and
measurable response are achieved and maintained.
Objective 8: Develop and implement a marketing and communications plans.
Expanded discussion on the strategy and objectives are contained within Appendix A. The
recommended cybersecurity organization is detailed in Appendix B. Appendices C through G contain
additional information in support of cybersecurity operations to be conducted to meet the strategy,
goals and objectives.
8
SOURCE: FIPS Publication 199, Standards for Security Categorization of Federal Information and Information
Systems, National Institute of Standards and Technology, dated February 2004
classification system is a well-defined process with a known end point. The stewards group should be
formed by December 2015 and the Data Classification System completed by June 2016. Success is
measured by the existence of a charter, meeting schedule, engagement procedures, and documented
deliverables.
2. With initial reports due by December 2015, validate compliance with the required portions of the
restricted data management policy. Success is measured by compliance by all units actively
represented on UW-MIST. All UW-MIST representatives are to advocate for compliance for their unit.
Many units are represented on UW-MIST, which is a forum that can actively encourage compliance
among those units. In addition, success is the identification reduction or documented justification for
“shadow” systems that persists data originated for a source system.
Link to Campus Strategy/Goals:
1. We are committed to being responsible stewards of our human, intellectual, cultural, financial, and
environmental resources.
2. Promote resource stewardship, improve service delivery and efficiency, and ensure administrative
capacity.
Strategy 2: Establish the UW-Madison Risk Management Framework to reduce cybersecurity risk
This strategic element is dependent upon establishment of a UW-Madison Data Governance
Program that establishes definitions of general systems, restricted or sensitive data and an accompanying
definition or description of levels of security that must be applied. A complete UW- Madison Risk
Management Framework (RMF) consists of the component stages depicted in Figure A-1 described in Table
A-1 and serves to educate various levels of management to measure and understand the value of their
assets (data, systems and people). The potential loss of value to technology components and data
resources is balanced against potential threats to those assets in a consistent and repeatable manner with
the goal to determine if and what remediation should be planned and implemented. The RMF provides
benefits to UW-Madison system owners and leadership within the different Colleges and Departments by
serving as both the strategic basis and the operational framework for managing cybersecurity risk across
the campus and provides a source for policy discussions throughout the UW System and System Campuses.
Categorize A data driven process where the security requirements of the system are defined by
System the highest classification of data handled by or stored within the system or
processes.
Select Security Assignment of the administrative, physical and technical controls required to
Controls protect the data are drawn from an agreed security controls framework.
Implement During design and development, the selected controls are incorporated into the
and Verify system design and verified to adequately protect data.
Controls
Assess and Assess the implementation of selected controls and determine the residual risk with
Authorize mitigating factors applied. This stage leads to a formal declaration that the system
operates at a defined level of risk.
Mitigate and Continually assess the operational controls against the evolving vulnerability, threat
Monitor and impact factors. When controls fail or external influencers dictate, determine
and impose mitigating controls and review risk.
Goals:
1. Within 60 days of publication of this document, UW-Madison CISO and CIO will achieve agreement
with UW System on business rules for adapting and applying the National Institute for Standards and
Technology (NIST) approach to Risk Management using the Four Phase Process model9 and employing
other appropriate NIST, ISO 27001 and 27002, or other relevant industry or higher education
community best practices and guidance.
2. Within four months of completing Goal #1 for this Strategic Element, the UW-Madison CISO and
Associate CISO will determine and present staffing needs to complete a new assessment for UW-
Madison as the follow up to the original baseline. The presentation will include suggested timelines for
the project and designated resources.
3. Prior to December 2015, a small group (no more than 4 people) of experienced security professionals
from UW Madison and/or UW System, will define and present to groups yet to be determined, the
“Organizational Parameters” for all items in NIST SP 800-5310 Low and Moderate, and a direct mapping
of 800-53 Low to the existing UW-Madison IT Security Baseline. Output will include notation of
differences in the final choices for controls for the campus baseline going forward, vs. the original
campus baseline.
4. Concurrent with Goal #3 above, the Governance, Risk and Compliance team will develop an
9
SOURCE: NIST SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View,
Joint Task Force Transformation Initiative, dated March 2011
10 SOURCE: NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and
implementation plan for conducting assessment and approval (steps 3 and 4 of the RMF) including
training and guidance for system owners and distributed IT and cybersecurity staff. This
implementation plan will include training for executive management, business unit, College or
Department management and functional staff, system owners and distributed IT administrators and
security staff.
Link to Campus Strategy/Goals:
1. Be responsible stewards of our resources by developing a solid understanding of the total cost of
ownership for security tools and processes used to secure the information infrastructure.
Strategy 3: Build a community of experts and improve institutional user competence though Security
Education, Training, and Awareness
It is generally understood that people are one of the weakest links in attempts to secure systems
and networks. The “people factor” - not technology - is key to providing an adequate and appropriate level
of security. If people are the key, but are also a weak link, more and better attention must be paid to
preparing and maintaining this “asset.” A robust and enterprise wide awareness and training program is
paramount to ensuring that people understand their IT security responsibilities, organizational policies, and
how to properly use and protect the IT resources entrusted to them11. An effective IT security awareness
and training program explains proper rules of behavior for the use of IT systems and information as well as
empowers the empowers the audience to align with secure computing habits. The program communicates
IT security policies and procedures that need to be followed. This must precede and support any impacts
due to noncompliance. Through awareness and training, users first should be informed of the expectations.
Accountability can be derived from a fully informed, well-trained and aware community.
Goals:
1. Within one year of publication, the CISO and staff will engage with professors, researchers, business,
and IT professionals to define group specific security awareness programs. These face-to-face
meetings with research groups will include documented and specific objectives and outcomes to
promote security and shared understanding of the community’s needs. Successful completion of
meetings with 90 % of identified groups will demonstrate completion of this goal.
2. Within one year of publication and in conjunction with Professional Technical Education (PTE),
Application Development & Integration (ADI), or other security team members, the CISO and staff will
build and implement a website or section within a website to provide a place for campus community
to visit for security information and initiatives by hosting IT Security Awareness information in multiple
formats, receiving feedback, providing download of materials (posters, etc.), provide resources that
refer to best practices, and post questions.
3. As part of the ongoing security awareness efforts, the CISO and staff will continue to raise security
awareness of phishing and the threat vectors used. We will conduct quarterly phishing campaigns for
identified departments and through the analysis of scripted events, IT Security staff will measure the
number of employees who fail on fake phishing email to obtain the trend. Successful completion of
this goal is measured by conducting phishing campaigns four times per year with steadily decreasing
numbers of staff who respond to the phishing stimulus in a manner contrary to good security practices.
4. To empower managers to drive their employees to greater levels of understanding, the CISO will work
11
SOURCE: NIST SP 800-50 Building an Information Technology Security Awareness and Training Program dated
October 2003.
through MIST to define, identify or develop perpetual training opportunities that include initial training
for new or returning employees, those with significant job task changes, or groups with ongoing and
incremental requirements for improving knowledge or continuous professional education related to
certifications or licenses.
Linkage to Campus Strategy/Goals:
1. Nurture growth of our people through professional development and performance excellence.
2. Create the best possible environment in which our people can carry out their responsibilities to the
university.
Strategy 4: Consolidate Security Operations and institute best practices for UW-Madison Campus
Networks and UW System Common Services
Tools and technical controls are required to achieve compliance on the scale posed at the UW-
Madison. Targeted and continuous surveillance of campus systems and distributed networks will enhance
the overall cybersecurity picture and reduce risk to teaching, research, campus operations and systems
operations. Based on our experience within the current Enterprise Resource Planning (ERP) team devoted
to security operations, we understand that automation of security management functions is required for
the continuity of long-term operations and constant mitigation or reduction of threats. Common tools are
anti-virus/anti-malware/anti-spyware applications, firewalls, cryptographic tools, Virtual Private Networks,
endpoint management, configuration and patch management, data location and sanitization and file
integrity tools among others. Identification and estimation of impact for various risk elements can be
enhanced through situational awareness and the measurement of effective deployed services and reviewed
through appropriate departmental of campus governance groups. A greater understanding of risk factors
at any point in time is achieved through the use of cybersecurity services such as vulnerability management,
security event management, intrusion detection, patch management, forensics and incident response.
The UW-Madison has the responsibility to operate and support UW Common Systems and the
capability to gain visibility to UW System Campus networks. Conducting and provisioning security
operations to all UW campuses can be achieved at a scale that saves considerable cost and resources.
Compliance assistance through site visits can be achieved through collaborative IT service models such as
the Payment Card Industry model already developed on campus.
This strategy is realized through expanding the role and functions of the ERP Security Operations
Team to encompass the broader spectrum of security operating functions and management or oversight
of security operations for major systems and networks across campus. This team will be rebranded as the
Security Operations and will eventually consist of technically skilled operators capable of understanding
the broadest spectrum of security tools and technical security countermeasures.
Goals:
1. Prior to October 2015, the Security Operations Team should research available open source materials
and collaborate with UW-Madison, UW System and members of the Committee on Institutional
Cooperation’s Security Working Group or other higher education collaborative bodies to define criteria
needed to describe a security operation or service. A governance structure should be established to
provide oversight of common solutions.
2. During November and December 2015, the Associate Chief Information Security Officer (A-CISO)
should lead and conduct a survey of UW-Madison and UW System security operations and services
with a focus on those following a common service delivery model and leverage the governing
committees to identify metrics and reports for decision making efforts.
3. In parallel with Goal #2, the survey team will identify industry best practices for enterprise systems and
security operations and services with analysis due in March 2016. The Survey team should then identify
gaps in service offerings and redundancies by March 2017.
4. To best capture the cost of security operations and set a model for future services in this domain, the
A-CISO and Security Operations Team Lead should document and measure costs and effectiveness of
current security operations and services by July 1 2016 and develop a future state cost model and
projections by July 1, 2017. This includes identifying resources for supporting the operation and
identifying processes for ongoing management of the operation (e.g. inputs for feedback).
5. Following substantial completion of goals 1 through 4 and prior to July 2017, the A-CISO and CISO
supported by the Cybersecurity Team will determine efficiencies and identify tool sets to automate
available services for UW-Madison and UW System and develop budget requirements for July 2018
(Fiscal Year-18).
Link to Campus Strategy/Goals:
1. Be responsible stewards of our resources by developing a solid understanding of the total cost of
ownership of the controls used to protect our environment and the gaps associated with security
programs.
2. Provide and support robust and secure IT research and scholarship infrastructure.
Strategy 5: Improve Cyber Threat Intelligence Analysis, Dissemination, and Remediation
Cyber threat intelligence is critical to understand the current threat landscape, shrink the time
between compromise and recovery, and assist in the development of proactive tactics to combat future
cyber-attacks. The threat intelligence itself should include inbound data feeds from a variety of sources
(e.g. government, private, higher education, open source) and when reviewed by an IT security analyst
should provide actionable alerts to our population. In addition, the UW-Madison Cybersecurity team can
develop outbound intelligence to share with other entities with the proper data sharing agreements in
place.
The keys of a successful cyber threat intelligence program include the generation of actionable
alerts targeted for the owners of the risk. Threat analysts provide actionable intelligence to the proper
staff at central campus IT and distribute alerts to the individual network managers across campus along
with collecting feedback on the remediation or mitigation of risk resulting from the alerts or identification
of any needed assistance. Development of alerts rely on the expansion of the current sophisticated
monitoring infrastructure; close collaboration with campus partners and the availability of trained IT
security analysts.
Creating and maintaining accurate configuration management data is also a key component of the
cyber threat intelligence initiative. Ensuring the information from Federal and State Information Sharing
and Analysis Centers and other intelligence sources is relevant to the diverse UW-Madison information
architectures is important to achieving this strategic element.
Goals:
1. The Monitoring and Incident Response Cybersecurity team will implement an alerts dashboard, visible
to MIST Members, IT staff and leadership of campus IT installations and systems that display intrusion
detection events and information on severity and quantity of these events by July 1, 2017. MIST
Members or other divisional IT staff will be responsible for monitoring the dashboard for information
specific to their College or Department’s information enterprise.
2. The Monitoring and Incident Response Cybersecurity team will increase the number of external data
feeds used to detect suspicious activity beyond existing sources to include direct feeds from at least
one Federal Government source by July 1, 2016.
3. The Monitoring and Incident Response Cybersecurity team will implement or improve a system to
collect and periodically confirm security contact information by network assignment by July 1, 2016.
4. The Monitoring and Incident Response Cybersecurity team will implement or improve a notification
and tracking system for alerting and metric collection by July 1, 2018.
5. The Monitoring and Incident Response Cybersecurity team will identify and collaborate with a
campus partner on the implementation of a new security control that will act on collected network
intelligence, e.g. “network block list”, etc. by September 1, 2016.
Link to Campus Strategy/Goals:
1. Be responsible stewards of our resources through developing a solid understanding of the total cost of
ownership of the controls used to protect our environment and the gaps associated with security
programs.
Strategy 6: Establish Security Metrics, Optimize Services, Promote Compliance, Achieve Continuous
Diagnostics and Mitigation
Security metrics are developed to communicate security posture – including risks to operations
and maintenance of acceptable levels of system availability, data integrity and confidentiality of sensitive
or restricted information. This includes measuring security control status at frequencies sufficient to
deliver actionable information to stakeholders and per organizational risk tolerances. By collecting and
communicating security metrics, cyber security professionals can (1) validate security controls are working
as designed and address inadequate controls; (2) identify emerging threats and trends; (3) ensure
successful compliance with required policies, regulatory requirements and standards; and (4) ensure that
repeatable funding is being properly allocated to successful security programs.
Campus IT managers and security staff must work closely with the Office of Cybersecurity to assess
their network’s ability to produce and report cybersecurity metrics which reflect the status and trends
associated with key security functions to include firewall access, threat signature detection, evidence of
data loss, status of end point security tools, failed authentication or access controls, detection of malware,
and presence of false indicators. Wherever possible, centralized monitoring and collection of data should
be pursued. Issues related to efficient management of cybersecurity data elements and communicating
data values must be addressed with the return of value to the UW-Madison enterprise in mind.
Risk tolerance is determined through a consistently repeatable Risk Management Framework
(RMF) with the components as described in Strategy 2. Continuous Diagnostics and Mitigation (CDM) is
a strategy that deploys tools and services that know the state of the Information Technology (IT) enterprise
and strengthens the cybersecurity posture of networks in support of risk mitigation. CDM is an integral
part of a Risk Management Framework that supports the Systems Development Life Cycle. The following
identifies the workflow of a mature CDM model.
Figure A-2 overlays the concepts of mature RMF and CDM models. The benefits of combining these
models include understanding the organization cyber assets, the value of those assets, and the level of
security the organization is willing to accept. This is known as the organization security posture. These
models also identify risk as the organizational drivers evolve. Drivers include changes to business
processes, legal/regulatory requirements, technology, financial resources and cyber threats.
Figure A-2: Risk Management Framework and Continuous Diagnostics and Monitoring Overlay
Goals:
1. Identify and create a budget model for each service managed by each Cybersecurity Domain Team
that aligns with the existing budget revenue and expense models to be completed by July 1, 2015.
2. Map each existing campus IT Policy to an existing people, process, technology (PPT) that assists with
compliance by August 15, 2015. Each policy may not specifically map to a PPT or be evenly applicable
across all departments and units.
3. By May 31, 2015 establish a process for the Cybersecurity Service Leads and corresponding Domain
Lead (described in Appendix E) to determine Total Cost of Ownership for each service that currently
has measurable attributes to include existing tools demonstrating some form of measurement
capability.
4. By September 15, 2015, the Cybersecurity Service Leads should identify the type of metrics to be
collected and maintained to ensure success of Goal #1 and #2.
5. By December 2015, A-CISO and CISO establish the framework for CDM using existing tools while
determining requirements and acquisition strategy for a tool or suite of tools that meet technology
requirements across campus which can be validated through existing governance teams.
Link to Campus Strategy/Goals:
1. Be responsible stewards of our resources by developing a solid understanding of the total cost of
ownership of the controls used to protect our environment and the gaps associated with security
programs.
Strategy 7: Establish Collaborative Partnerships to assure teaching and research computing resources and
results are available to fulfill the Wisconsin Idea and return value to the state and its citizens
Protecting the availability of teaching resources, learning management systems and research
networks while assuring important data is available for instruction and research data maintains referential
integrity is an important element of the UW-Madison mission. Establishing relationships with Principal
Investigators, Institutional Review Boards, key IT leaders in the Colleges and Departments, faculty and
researchers will support provision of RMF and security life cycle support to classroom and field instructors,
research teams and laboratory managers. Collegial interaction will result in greater efficiency and
significant risk mitigation or reduction of vulnerabilities inherent to university and higher education
programs12,13. Protection of the individual laboratory networks and research data helps protect important
grants. We seek partnership with the Wisconsin Institute for Discovery (WID) and their Software Assurance
Market Place (SWAMP), the Wisconsin Security Research Consortium (WSRC), Computer Sciences
Department’s Wisconsin Advanced Internet Laboratory (WAIL), and Institutional Review Boards (IRBs)
across campus.
Goals:
1. With collaboration and assistance from the CIOs and Security Staff for the colleges and departments
across campus, by December 2015 the CISO will work toward developing a standard model to assess
and display operational status and cybersecurity posture. This will enhance the understanding of each
system or networks availability and status of vulnerability management leading toward full evaluation
of risk.
2. In coordination with the Associate Vice Chancellor for Research and Chief Research Computing and the
Assistant Vice Provost for Advanced Computing Infrastructure, prior to September 2015 establish a
cybersecurity governance arrangement that addresses the needs of Research Computing
environments, special projects and laboratories required to meet Federal guidelines such as the
Federal Information Systems Management Act requirements for NIST 800-53r4 or standards required
by private or other public grants.
Link to Campus Strategy/Goals:
1. Be responsible stewards of our resources by developing a solid understanding of the total cost of
ownership of the controls used to protect our environment and the gaps associated with security
programs
12
Kallberg, Jan; Thuraisingham, Bhavani, "Towards cyber operations - The new role of academic cyber
security research and education," Intelligence and Security Informatics (ISI), 2012 IEEE International Conference
on , vol., no., pp.132,134, 11-14 June 2012 doi: 10.1109/ISI.2012.6284146
13
Simson L. Garfinkel. 2012. The cybersecurity risk. Commun. ACM 55, 6 (June 2012), 29-32.
DOI=10.1145/2184319.2184330 http://doi.acm.org/10.1145/2184319.2184330
14 Data Steward is the main role toward ensuring the integrity of UW Madison’s data. The Data Steward manages
the critical data elements of our institution. There are two types of Data Custodians: Business Custodians and Technical
Custodians. Business Data Custodians are university officials having direct operational-level responsibility for the
management of one or more types of data. They are charged with providing authorization for access to institutional data.
15 As described in the UW Madison Campus Wide PCI Compliance Project Charter, updated in August 2010
Develop a secured environment similar to that currently used for securing credit card information or
the Controlled Computing Infrastructure (CCI) virtual networked environment.
Objective 4: Centralize data collection and aggregation for analysis of security related events to promote
unified measurement of cybersecurity attributes
In order to achieve this objective, the IT Security team will need to collect and centrally manage
operational data to support effective security monitoring, incident response and the development of
security metrics. The key elements to achieve this objective include:
Implementation of a robust event logging infrastructure that units can send operational events
Implementation of an enhanced network security monitoring system for increased network visibility
Collaboration with MIST to identify options for a centralized configuration management database
Implementation of enhanced vulnerability scanning process to identify systems at risk
Development of a formalized cyber security operations center
Objective 5: Identify and stabilize sources of sustainable funding to enable accomplishment of technical or
staffing related strategic goals
To achieve this objective the CISO and A-CISO will partner with DoIT Finance to correct anomalies
the current budget model caused by the 2014 re-alignment to a single IT Security team under the CISO and
aligning services under a traditional IT Security model. With a goal to control cost, the budget will be
designed around the five IT Security domains with funding or revenue, labor and equipment, contract or
licensing costs clearly identified for each domain. The budget should accurately forecast funding from
UWSA for UW Common Systems support and its alignment to the IT Security domains. The CISO and A–
CISO will then work with the CIO, DoIT COO and other leaders on campus to define and document on-time
and repeatable funding models. In addition the CISO and A-CISO will explore methods to increase funding
through grants and scholarships provided by various granting bodies.
Objective 6: Requirements are imposed upon UW-Madison by other agencies. Identify UW-Madison
compliance (FERPA, HIPAA, PCI-DSS, etc.) and then map the IT security components of each to applicable
campus units.
To achieve this objective the IT Security Team in conjunction with MIST will (1) Identify
requirements that may be imposed on all or parts of the UW-Madison and UW-System cyber infrastructure.
(2) Work with the UW-Madison data governance team to identify which requirements apply to specific
data classifications. (3) Identify which university departments may leverage these data types. (4) Apply the
RMF framework to the department to determine level of compliance against the standard as determined
by the Executive Data Governance team.
Objective 7: Develop and refine procedures to ensure security operations and risk assessments are
conducted in a sustainable and repeatable manner that ensures standards for timeliness and measurable
response are achieved and maintained.
To achieve this objective, the IT Security Team will lead development efforts and work with MIST
and Academic Technologies to develop training routines and processes to standardize assessments through
technology and development approaches. Assessments must incorporate special security requirements
mandated based on information type or aligned security guidance and be tailored to allow completion in a
reasonable timeframe with the least intrusion or interference with teaching, research and university
administrative and business processes.
Objective 8: Develop and implement marketing and communications plans.
To achieve this objective, the CISO and A-CISO will work with DoIT Communications and UW-
Communications as well as partnering with the School of Business to develop marketing and
communications materials to promote the deliverables of the strategic goals and objectives. A plan will be
developed with appropriate marketing materials for each of the eight strategic elements. Materials include
but not limited to: brochures, reports, presentations, web presence, social presence and marketing
handouts (pens, tablets, thumb drives etc.). This plan will include team-branding efforts and may include
biographies of team members with formal headshots and team identity logo wear.
technologies.
6. We value consensus and shared responsibility as we approach Governance, Risk Management
and Compliance as a collaborative cybersecurity commitment
The UW-Madison IT Security Team (MIST) and the UW- Technology and Information Security
Council (UW-TISC) form a community that is a rich resource in developing the components of GRC.
Major issues and strategies will be brought to these groups, as appropriate, to gain the feedback and
concurrence necessary to press forward.
7. We value transparency in our approaches and in the application of cybersecurity controls,
processes and policies
We provide our communities with information to become aware of cyber security risks by
thoughtfully monitoring, measuring and reporting the success of compliance with policies, processes
and controls
8. We will strive to live the Wisconsin Idea and the state motto as we continuously evaluate and
improve cybersecurity capabilities to keep the University moving “Forward!”
Cybersecurity is a journey, not a destination. The Office of Cybersecurity will continually seek
strategies and programs that serve to evolve our cybersecurity posture to achieve success in defending
the data against unauthorized access, inadvertent release, or other actions detrimental to the progress
of education and research that benefit the State of Wisconsin.
Chief Information
Security Officer
(CISO)
Associate CISO
PCI-DSS SFS
Penetration Incident
Testing Response
HIPAA
ISIS / ImageNow
End Point Forensics and
Security Investigations
Select Agent
Learn@UW
IT Security Data
Baseline Discovery
Authorizations
1. Shared Governance
Shared Governance is written into Wisconsin state statutes. The faculty and administration work
together to govern the institution.
The Faculty Senate is the legislative body of the faculty. The Chancellor is chair of the Faculty Senate.
The University Committee is the faculty’s executive committee.
Among other specialized entities, Legal Services and Risk Management advise at this level.
2. CIO/VP IT and advisors
The Information Technology Committee (ITC) is the official shared governance committee for IT.
The ITC is advisory to the CIO.
The CIO has an official advisory group that represents the IT community. This is the Madison
Technical Advisory Group (MTAG).
The CIO advises upward to university leadership.
Among other specialized entities, the Identity Management Leadership Group (IMLG) advises at
this level. IMLG is particularly relevant to information security.
3. CISO/ACISO and advisors.
The UW-Madison Information Security Team (UW-MIST) is the official advisory group for the Chief
Information Security Officer (CISO) and Associate Chief Information Security Officer (ACISO). Most
schools, colleges and divisions have an official representative on UW-MIST, along with a number of
other IT leaders who are interested in advising on IT security matters.
The Policy Planning Team (PPT) is an advisory group for IT policy principles and procedures, and
overall IT policy planning. The PPT is advisory to the Office of the CIO through the CISO.
The CISO/ACISO advise upward to the CIO.
Among other specialized entities, a number of DoIT advisory groups are at this level. For example,
the Network Advisory Group (NAG) advises the Director of Network Engineering. NAG is particularly
relevant to information security.
4. Other groups and teams
UW-MIST may have one or more sub-teams operating at any given time. These are sometimes
working on security-related IT policy. The IT Security staff have representatives on all security-
related teams.
There is sometimes a “Policy Stakeholder Team” (PST) working on IT policy that is partially (or
entirely) unrelated to IT security.
Regardless of the subject matter, each such team is advisory to the group or executives that
chartered it.
Among other specialized entities, some DoIT service teams have user groups or advisory groups. All
services require some attention to information security.
1. The Information Technology Management Council (ITMC) consists of the CIO of each UW system
campuses, (including the CIO of UW System Administration.) The “CIO Council” meets monthly. There
is also a semi-annual ITMC conference. The CIO council is advisory to UW System leadership and each
other.
2. In a broader sense, the ITMC also includes the subordinates of the CIO’s in a number of specialized
areas. These subgroups of the ITMC are called teams, councils, or “breakouts” (a term from the ITMC
conference, where the groups meet as “breakout sessions”.)
The information security group is called the UW Technical Information Security Council (UW TISC.)
UW TISC consists of the CISO, SO, or other security representative from each institution. Additional
people from some institutions also attend the council’s meeting at the ITMC conferences. UW TISC
is advisory to the CIO council and each other.
Neither the CIO council nor UW TISC can directly implement their recommendations. Each CIO (or
CISO) needs to take the recommendation back to their own campus and consult with their campus
leadership and/or advisory groups.
1. UW-Madison, as an institution, is responsible for compliance with the PCI contract. The Vice Chancellor
for Finance and Administration (VCFA) is responsible for this, and has delegated the responsibility as
outlined below.
2. The VCFA has delegated oversight and management to Business Services (which reports to the VCFA.)
The individual schools, colleges and divisions that actually process payment cards are responsible
for compliance on their end. The Dean or Director is ultimately responsible for their division’s
compliance.
UW-Madison Data Governance, when implemented, will have a role in PCI administration. This role
is TBD.
3. PCI CAT does detailed coordination.
PCI CAT has representatives from Business Services, IT Security, Purchasing, Legal Services and
more.
PCI CAT is advised by UW Madison IT Security.
4. Each school, college or division has a Division Business Representative (DBR), responsible for compliance
within its division.
The DBR’s report up to the Dean or Director of their Division.
PCI CAT has a “dotted line” relationship to the DBR’s to assure that their division remains in
compliance.
5. Each site that processes payment cards is called a Merchant Area.
Each Merchant Area has a Site Manager.
The Site Manager does not necessarily report up to the DBR, but both the DBR and the Site Manager
ultimately report up to the same Dean or Director.
The Site Manager works with DoIT Repair and Desktop Support (RADS) that provides a mandatory
service that configures and maintains the devices and other IT infrastructure at the site that must
comply with PCI-DSS.
UW-Madison is a “hybrid entity” under HIPAA. Only certain units at UW-Madison are considered
part of the Health Care Component (HCC). Other units and individuals are part of the HCC if they provide
certain support services to the HCC. In addition, some units are Business Associates of other covered
entities.
1. UW-Madison, as an institution, is responsible for compliance with the HIPAA. The Provost is responsible
for this, and has delegated the responsibility as outlined below.
2. There will be a HIPAA Privacy and Security Executive Board, consisting of the Provost, the Deans and
Directors of the units of Health Care Component (HCC), the Vice Chancellor for Legal Affairs, and the
Director of the Institute for Clinical and Translational Research. The UW-Madison HIPAA Privacy Officer
and the HIPAA Security Officer are both ex officio members.
3. There will be a HIPAA Privacy and Security Operations Committee consisting of the Privacy Coordinator
and Security Coordinator(s) of each unit of the HCC, the Chief Knowledge Officer of the School of
Medicine and Public Health, the Associate Director of the Institute for Clinical and Translational
Research, and a representative from Legal Services. The committee is co-chaired by the HIPAA Privacy
Officer and the HIPAA Security Officer. UW Madison IT Security advises the Operations Committee.
4. Each unit of the HCC has a Privacy Coordinator and one or more Security Coordinators (and/or Sub-
coordinators). These coordinators report up to their Dean or Director (who is on the Executive Board.)
UW-Madison IT Security also advises the individual security coordinators.
5. In addition, the position of Director of Compliance has recently been created. The position includes
oversight of HIPAA, details TBD.
The HIPAA Privacy Coordinator reports to the Provost. The HIPAA Security Coordinator reports to
the CISO, the Vice Provost for Information Technology, and ultimately to the Provost. The Privacy Officer
and Security Officer share responsibility for certain portions of HIPAA compliance, and are advisory to each
other in that capacity. Beyond that, the HIPAA Privacy Officer has overall responsibility for HIPAA
compliance, while the HIPAA Security Officer focuses more narrowly on the Security Rule.
Other Governance Arrangements
Not included in this document are other data domains that have their own governance
arrangements. These are important areas of cybersecurity governance, but the list is too long and too
detailed for an overview in this strategic plan. These are:
Human Resource System (HRS) – UW System level, governed through the UW Service Center.
Shared Financial System (SFS) – UW System level, which has its own governance arrangements.
Integrated Student Information System (ISIS) – UW-Madison-specific, governed through ISIS
Central.
Info Access – UW-Madison-specific, governed as a DoIT service.
Various research areas, including for example:
o The Institutional Review Boards (IRB’s) for human subject research.
o More generally, governance of security requirements to accompany grants from different
funding agencies, (each agency has its own requirements.)
Acronym or
Long Title
Abbreviation
SETA Security Education, Training & Awareness
SFS Shared Financial System
SWAMP Software Assurance Marketplace
TISC Technology and Information Security Council
UW-Madison University of Wisconsin-Madison
UWSA University of Wisconsin Systems Administration
VCFA Vice Chancellor for Finance and Administration
VP IT Vice Provost for Information Technology
WAIL Wisconsin Advanced Internet Laboratory
WID Wisconsin Institute for Discovery
WSRC Wisconsin Security Research Corporation
Terms and Definitions
The terms and definitions shown below are provided to clarify specific characteristics of
cybersecurity articulated within this document. Reference to source documents are provided as
necessary to ensure complete understanding.
Application - A software program hosted by an information system.
Availability - Ensuring timely and reliable access to and use of information. (44 U.S.C., Sec.
3542)
Confidentiality - Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary information. (44 U.S.C., Sec. 3542)
Cybersecurity - The ability to protect or defend the use of cyberspace from cyber attacks (CNSS
4009). Derived from the term “cybernetics” which is the scientific study of communication and control
processes in biological, mechanical, and electronic systems and originated from Greek kubernan
meaning to steer or control (OED).
Data Governance – defined by the implementation of the UW-Madison data management
framework, (in progress). For more information contact [email protected]. For the current
presentation on the topic, see:
https://www.cio.wisc.edu/wp-content/uploads/2014/12/DataGovernanceFramework.pptx.
Information Category – As defined in National Institute of Standards and Technology Special
Publication 800-60 (NIST SP 800-60 rev 1), Guide for Mapping Types of Information and Information
Systems to Security Categories; Information is categorized according to its information type. An
information type is a specific category of information (e.g., privacy, medical, proprietary, financial,
investigative, contractor sensitive, security management) defined by an organization or, in some
instances, by a specific law, Executive Order, directive, policy, or regulation. UW-Madison information
categories are represented on Page 6 of the Introduction to this document.
Information Classification – in the context of information security, is the classification of data
based on its level of sensitivity and the impact to the University should that data be disclosed, altered
or destroyed without authorization. The classification of data helps determine what baseline security
controls are appropriate for ing that data.
Information System - A discrete set of information resources organized for the collection,
processing, maintenance, use, sharing, dissemination, or disposition of information. (See 44 U.S.C., Sec.
3502; OMB Circular A-130, Appendix III)
Information Security - The protection of information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide
confidentiality, integrity, and availability. (44 U.S.C., Sec. 3542)
Integrity - Guarding against improper information modification or destruction, and includes
ensuring information non-repudiation and authenticity. (44 U.S.C., Sec. 3542)
Risk Management - The process of managing risks to organizational operations (including
mission, functions, image, reputation), organizational assets, individuals, other organizations, and the
Nation, resulting from the operation of an information system, and includes: (i) the conduct of a risk
assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques
and procedures for the continuous monitoring of the security state of the information system. (FIPS
200, Adapted)
Security Category – “The characterization of information or an information system based on
an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such
information or information system would have on organizational operations, organizational assets, or
individuals.” (FIPS 199, Appendix A, p.8)
Security Controls – The management, operational, and technical controls (i.e., safeguards or
countermeasures) prescribed for an information system to protect the confidentiality, integrity, and
availability of the system and its information. (FIPS 199)
Table G-2: Offices, Teams or Named Staff that are Responsible, Accountable, Consulted & Informed
Accountable
Responsible
Consulted
Informed
Task or Area
Accountable
Responsible
Consulted
Informed
Task or Area
Strategy #1, Task 2, Develop guidelines on types of information and information 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
systems to include in each category
Strategy #1, Task 3, Categorize all information systems (based on information 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
contained and other parameters)
Strategy #1, Task 4, Develop minimum security requirements for each category of 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
information and information system
Strategy #1, Task 5, Train Data Stewards on all relevant aspects of data 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
management and retrieval
Strategy #1, Task 6, Train IT System Administrators and Technicians on all relevant 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
aspects of data management and retrieval
Strategy #1, Task 7, Develop procedures for capturing, classifying, labeling, 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
retrieving and managing data [this task may need to be subdivided]
Strategy #1, Task 8, Create commonly understood definitions of what secure 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
environments and acceptable risks mean for institutional data
Strategy #2, Goal 1 Agreement with UW System on Risk Management Framework 3, 4, 5, 15 3 1, 14 1a, 10, 14, 16
Strategy #2, Goal 2 Determine and present staffing needs for baseline 3, 4, 5 3 19, 1a 1, 17, 19
assessments
Strategy #2, Goal 3 Select “organization parameters” for NIST SP 800-53 3, 5, 15 3 18
moderate controls
Strategy #2, Goal 4, Develop an implementation plan for assessment and approval 4, 5 2, 3 4, 5, 11, 18, 22 1, 17
(steps 3 and 4 of the RMF)
Strategy #3, Goal 1, Define security education training and awareness programs 3, 9 3 6 1a, 10
including learning objectives for faculty, research staff, instructional staff,
administrative staff, IT staff and students
Strategy #3, Goal 2, Develop web-based facilities to support security education, 3, 9 3 6 1a, 10
training and awareness programs
Strategy #3, Goal 3, Raise awareness of phishing and the threat vectors used, 3, 9 3 6 1a, 10
including quarterly phishing campaigns
Accountable
Responsible
Consulted
Informed
Task or Area
Accountable
Responsible
Consulted
Informed
Task or Area
Strategy #5, Task 1, Develop outbound intelligence to share with other entities 4, 7 3, 7 5, 9, 10, 15, 16 1, 1a, 14, 17
Strategy #6, Goal 1, Identify a budget model for each service 3, 4 3 18, 20 1, 1a, 17
Strategy #6, Goal 2, Map existing IT policy to existing people, processes and 3, 4 3 18, 20 1, 1a, 17
technologies that assist with compliance
Strategy #6, Goal 3, Determine a process to determine Total Cost of Ownership of 3, 4 3 18, 20 1, 1a, 17
measurable security services
Strategy #6, Goal 4, Identity metrics to be collected and maintained to ensure 3, 4 3 18, 20 1, 1a, 17
success of Goals 1 and 2
Strategy #6, Goal 5, Establish the framework for CDM using existing tools that 3, 4 3 18, 20 1, 1a, 17
meet technology requirements across campus
Strategy #7, Goal 1, Establish cybersecurity governance to address the needs of 3, 4, 5 3 1a, 10 1, 17, 21, 22
research computing environments
Strategy #7, Goal … [should there be a corresponding goal for instructional 3, 4, 5 3 1a, 10 1, 17, 21, 22
computing environments?]
Strategy #7, Task 1, Establish relationships with key researchers 3, 4, 5 3 1a, 10 1, 17, 21, 22
Strategy #7, Task 2, Provide security life cycle support to Principal Investigators 3, 4, 5 3 1a, 10 1, 17, 21, 22
Strategy #7, Task 3, Protect individual research networks and associated research 3, 4, 5 3 1a, 10 1, 17, 21, 22
data
Strategy #7, Task 4(a), Partner with WID SWAMP, WSRC, and WAIL 3, 4, 5 3 1a, External Entities 1, 17
Strategy #7, Task 4(b), Partner with IRB’s 3, 4, 5 3 1a, IRBs 1, 17, 21, 22
Objective #1, Task 1, Contact all campus units to identify data owners, stewards, 4, 5 2, 3 8, 9, 10, 12 1, 1a, 17, 22
custodians, etc
Accountable
Responsible
Consulted
Informed
Task or Area
Objective #1, Task 2, Move all restricted data to secure locations 4, 5 2, 3 8, 9, 10, 12 1, 1a, 17, 22
Objective #1, Task 3, Incorporate VCA restricted data project a model for campus 4, 5 2, 3 8, 9, 10, 12 1, 1a, 17, 22
wide implementation
Objective #1, Task 4, Obtain an inventory of all assets of all units that handle 4, 5 2, 3 8, 9, 10, 12 1, 1a, 17, 22
restricted data
Objective #2, Task 1, Assure all endpoints comply with the published IT Security 5 3, 4 6, 7, 10, 18 1, 17
Baseline configuration
Objective #2, Task 2, Assure all endpoints are behind registered network firewall, 5 3, 4 6, 7, 10, 18 1, 17
and manage exceptions
Objective #2, Task 3(a), Assure all endpoints are regularly patched 5 3, 4 6, 7, 10, 18 1, 17
Objectiive #2, Task 3(b), Assure all windows devices run CSI and centrally report 5 3, 4 6, 7, 10, 18 1, 17
the results
Objective #2, Task 4, Assure all endpoints install and run AV and centrally report 5 3, 4 6, 7, 10, 18 1, 17
the results
Objective #2, Task 5, Assure all endpoints run Identity Finder and centrally report 5 3, 4 6, 7, 10, 18 1, 17
the results
Objective #3, Task 1, Apply lessons learned in PCI environment to other 4, 5, 6, 7 2, 3 10 1, 17
environments that house or manipulate sensitive data elements
Objective #3, Task 2(a), Identify, classify, and secure restricted data 4, 5, 6, 7 2, 3 10 1, 17
Objective #3, Task 2(b), Eliminate restricted data identified in 2(a) that has 4, 5, 6, 7 2, 3 10 1, 17
outlived its usefulness or cannot be stored securely
Objective #3, Task 3, Develop a secure environment similar to the existing PCI 4, 5, 6, 7 2, 3 10 1, 17
environment
Accountable
Responsible
Consulted
Informed
Task or Area
Objective #4, Task 2, Implement an enhanced network security monitoring system 7 3 4, 5, 6, 8, 9, 10 1, 17, 18
Objective #4, Task 3, Identify options for a centralized configuration management 7 3 4, 5, 6, 8, 9, 10 1, 17, 18
database
Objective #4, Task 4, Implement an enhanced vulnerability scanning process 7 3 4, 5, 6, 8, 9, 10 1, 17, 18
Objective #5, Task 1, Correct budget discrepancies in the current budget model 4 3 20, TBD 1, 17
Objective #5, Task 2, Design the budget around the five IT security domains 4 3 20, TBD 1, 17
Objective #5, Task 3, Identify one-time and repeatable funding models 4 3 20, TBD 1, 17
Objective #5, Task 4, Explore methods to increase funding through grants and 4 3 20, TBD 1, 17
scholarships
Objective #6, Task 1, Identify requirements that may be imposed on all or parts of 2, 3, 4, 5 2, 3, 15 TBD 1, 14, 17
UW-Madison and UW System [this task may need to be subdivided]
Objective #6, Task 2, Identify which requirements from Task 1 apply to specific 2, 3 2, 3 TBD 1, 14, 17
data classifications
Objective #6, Task 3, Identify which university departments leverage the data 2, 3 2, 3 10 1, 14, 17
types idenfied in Task 2 [this task may need to be subdivided]
Objective #6, Task 4, Apply the RMF framework to the departments identified in 2, 3, 5 2, 3 10 1, 14, 17
Task 3
Objective #7, Task 1, Develop training routines and processes that standardize 5, 9 3 4, 6, 7, 8, 10 1, 17
assessments, while retaining necessary flexibility [this task is broad and
complex and may need to be subdivided]
Accountable
Responsible
Consulted
Informed
Task or Area
Objective #8, Task 2, Develop marketing and communications plan for each 9 3 4, 5, 6, 7, 8 1, 1a, 17
strategic element [this task may need to be subdivided for some strategic
elements]
Draft for CIO Staff Review: COB April 13 //ACTION COMPLETE// 3, 4 3 2 CIO Staff
CIO Staff Review: April 15 – 21 //ACTION COMPLETE// CIO Staff 3 1a 1
DoIT Director Review: April 15 – 21 (“Walk around tour”) //ACTION COMPLETE// 3, 18 3 17 1, 1a
Campus CIO Review: Week of April 20 //ACTION COMPLETE// 3 3 1a 1
Draft for UW-MIST Review: April 22 //ACTION COMPLETE// 3, 4 3 11 1a
UW-MIST Review: April 23 – 29. Comments addressed by May 5 with discussion 10, 11 3 TBD 1, 1a
and agreement during May MIST meeting (May 7) //ACTION COMPLETE//
Final Draft for ITC: Brief at May 15th ITC //ACTION COMPLETE// 3 3 1, 2 1a
Final Version for CIO: No later than 29 May 3 3 1 1a
Socialize with MTAG: Targeting June 16th meeting 3, 1 3 1, 2 1a
Socialize with TISC: Announce during Lockdown (July 15) and TISC Summer 3, 15 3 1, 14 14, 15, 16, 1a
Meeting (July 16) with review based on responses