Threat and Vulnerability Management Policy
Threat and Vulnerability Management Policy
1.2 This policy applies to all staff 1 employed by the University and authorised
users 2 that have access to information and information technology provided
by or through Bournemouth University (BU).
1.3 This policy sets out BU’s intent and commitment to preserve the
confidentiality, integrity and availability of the information it holds on behalf of
its students, staff and community of stakeholders.
1.4 This policy aims to ensure BU’s regulatory compliance, operational resilience,
reputation and ability to sustain revenue.
1.5 This policy covers the topics related to Threats and Vulnerability Management
which includes;
a) Systems and Software Vulnerability Management
b) Malware Awareness
c) Malware Protection Software
d) Security Event Logging
e) System/Network Monitoring
f) Intrusion Detection
2. KEY RESPONSIBILITIES
1
This includes individuals working on a voluntary, honorary, placement or casual basis (PTHP), visiting faculty,
emeritus, contractors, board members, visitors or those employed through an agency.
2 This includes all registered students (UG, PG, full and part-time) and alumni
Policy 1
directly accountable to the Chief Information Officer (CIO) and BU Board for
findings in non-compliance to this policy
2.3 Business and System owners, including academic staff, are responsible for
implementing the administrative and technical controls that support and
enforce this policy.
2.4 All those outlined in 1.1 are responsible for complying by adopting the process
and procedures that ensure the implementation of this policy.
3.1 In addition to this document and the supporting set of strategic policy
documents there are several BU policies which complement this policy, as
follows:
o Data Protection Policy for Staff and BU Representatives
o BU Acceptable Use Policy
Policy
Policy 2
f) network equipment (e.g. routers, switches, wireless access points and
firewalls)
g) VoIP telephony software and conferencing equipment
h) office equipment (e.g. network printers, photocopiers, facsimile
machines, scanners and multifunction devices (MFDs))
i) specialist systems (e.g. information systems that support or enable the
organisation’s physical infrastructure such as embedded systems and
control systems (includes CCTV and Network based Locking Systems)
4.3 The system and software vulnerability management process will be:
a) documented
b) approved by the Director of IT
c) supported by an individual or team with defined roles and
responsibilities for vulnerability management
d) assigned an owner
e) applied on a continuous basis (e.g. monthly)
4.4 The system and software vulnerability management process will be used by
system owners in collaboration with the business owners and to help:
a) determine the importance of business applications, information
systems and networks (e.g. based on the information handled, the
business processes supported and the environments in which they are
used) to help identify the extent of vulnerabilities and
timescales/priorities for remediating vulnerabilities
b) assess system and software vulnerabilities as soon as they become
publicly known (e.g. tracking CERT advisories and subscribing to
vulnerability notification services)
c) identify and obtain patches (including patch bundles, critical updates
and service packs) when they are available to remediate discovered
vulnerabilities (e.g. by working with software vendors, or downloading
from approved vendor websites)
d) decide when to deploy patches and analyse the results of testing the
patches
e) record patches that have been applied
4.5 The system and software vulnerability management process will be supported
by performing vulnerability scans of business applications, information
systems and network devices to help:
a) identify system and software vulnerabilities that are present in business
applications, information systems and network devices
b) determine the extent to which business applications, information
systems and network devices are exposed to threats
c) prioritise the remediation of vulnerabilities (e.g. using the vendor’s
patch release schedule)
Policy 3
d) provide a high-level view of vulnerabilities across the organisation’s
technical infrastructure (e.g. to make comparisons and identify trends)
5. MALWARE AWARENESS
Policy 4
a) prevalence of malware and associated risks (e.g. unauthorised access
to critical business applications, corruption of critical business
information or leakage of sensitive information)
b) ways in which malware can install itself on computing devices
c) common symptoms of malware infection (e.g. poor system
performance, unexpected application behaviour, sudden termination of
an application)
5.4 The risk of malware infection will be reduced by warning users not to attempt
to:
a) install software from untrusted sources
b) open untrusted attachments
c) click on suspicious or unknown hyperlinks within emails or documents
d) manually resolve malware problems
Policy 5
b) update mechanisms for malware protection software (including
automatic updates)
c) the processes required to review the effectiveness of malware
protection software
d) steps required to reduce the risk of malware being downloaded
6.2 Malware protection software will be installed on systems that are exposed to
malware (e.g. those that are connected to networks or the Internet, support
the use of portable storage devices or are accessed by multiple external
suppliers)
6.3 Malware protection software will protect against all forms of malware (e.g.
computer viruses, worms, trojan horses, spyware, rootkits, botnet software,
keystroke loggers, adware and malicious mobile code).
Policy 6
6.8 The risk of downloading malware will be reduced by:
a) configuring web browsers so that users are asked if they wish to install
mobile code
b) allowing only trusted mobile code to be downloaded (i.e. signed with a
trusted digital certificate)
7.1 Reliable security event logs will be established (e.g. to store messages about
system crashes, unsuccessful login of authorised users, and unsuccessful
changes to access privileges), which are supported by documented
standards/procedures.
7.3 Security event log management will include setting policy, defining roles and
responsibilities, ensuring the availability of relevant resources, and guidance
on the frequency and content of reports.
Policy 7
a) enable event logging (using a standard format, such as syslog, MITRE
Common Event Expression, or equivalent)
b) generate appropriate event types (e.g. service creation, system
crashes, object deletion and failed login attempts)
c) incorporate relevant event attributes in event entries (e.g. IP address,
username, time and date, protocol used, port accessed, method of
connection, name of device and object name)
d) use a consistent, trusted date and time source (e.g. using the Network
Time Protocol (NTP) supported by global positioning system (GPS),
atomic clocks or time-server on the Internet) to ensure event logs use
accurate timestamps
7.8 Security-related event logs will be analysed regularly (e.g. using automated
security information and event management (SIEM) tools or equivalent) to
help identify anomalies, and include:
a) processing of key security-related events (e.g. using techniques such
as normalisation, aggregation and correlation)
b) interpreting key security-related events (e.g. identification of unusual
activity)
c) responding to key security-related events (e.g. passing the relevant
event log details to an information security incident management team)
Policy 8
c) stored securely for possible forensic analysis at a later date
d) retained according to retention standards/procedures
Policy 9
f) the creation of back doors that provide unauthorised privileged access
to business applications, information systems and networks at a later
time.
8.5 The owners of business applications, information systems and networks will
review the results of monitoring activities.
9. INTRUSION DETECTION
Policy 10
9.5 Intrusion detection methods will be supported by specialist software, such as
host intrusion detection systems (HIDS) and network intrusion detection
systems (NIDS).
9.6 Network intrusion detection sensors (i.e. specialist hardware used to identify
unauthorised activity in network traffic) will be protected against attack (e.g. by
preventing the transmission of any outbound network traffic, or by using a
network tap to hide the presence of the sensor).
9.11 There will be a documented method (e.g. an escalation process) for reporting
serious attacks (e.g. to the information security incident management team
and/or Serious / Major Incident Management team).
General
Policy 11
10.1 The Information Security policy and this sub policy is written in accordance
with the Information Security Forum (ISF) Standards of Good Practice
(SOGP).
10.2 Please refer to the Data Protection policy for further information
Policy 12