NetworkSecurityPolicy UPC
NetworkSecurityPolicy UPC
3. Appendix A – Definitions.........................................................................................18
The participation and support of every student, faculty, employee and affiliate who deals with
information and/or information systems is necessary to achieve effective security. It is the
responsibility of every computer user to know these guidelines, and to conduct their activities
accordingly.
The purpose of this policy is to delineate acceptable use of HU technology resources. These rules
are in place to protect the user of these resources and the University. Inappropriate use exposes
HU to risks including virus attacks, compromise of network systems and services, and legal
issues.
1.2 Scope
This policy applies to all Howard University networks, both the perimeter and the infrastructure,
and the parties with which we do businesses.
1.3 Maintenance
This Policy will be reviewed by the University’s Information Security Office annually or as
deemed appropriate based on changes in technology or regulatory requirements.
1.4 Enforcement
Violations of this Policy may result in suspension or loss of the violator’s use privileges, with
respect to University-owned Information Systems. Additional administrative sanctions may
apply; up to and including termination of employment or contractor status with the University, or
expulsion of student workers. Civil, criminal and equitable remedies may also apply.
1.5 Exceptions
Exceptions to this Policy must be approved by the Information Security Office, under the
guidance of the University’s Provost, or Chief Operations Officer. All exceptions will be
formally documented. Policy exceptions will be reviewed on a periodic basis for
appropriateness.
Concurrently, academic, administrative and support units are responsible for the efficient,
effective and secure operation of their local networks. This policy is designed to help protect the
University’s central and distributed telecommunications and computing environment from
accidental, or intentional damage, and from alteration or theft of data while preserving
appropriate access and use.
This policy is established under the provisions of Howard University’s Information Security
Policy Program.
The following rules define the ETS’s policy regarding access to the University network:
2. User-IDs must each uniquely identify a single user. Each computer user-ID must
uniquely identify only one user, so as to ensure individual accountability in
system logs. Shared or group user-IDs are not permitted.
3. Use of service accounts for local log-ins by any individual is prohibited. This
rule is designed to prevent unauthorized changes to production data by
accounts that allow groups of users to employ the same password. In cases
where users require authorities inherent in service accounts, the user’s
manager must obtain approval from ETS. Those privileges may be assigned to
individual users on as-needed basis and must be revoked when they are no longer
necessary.
6. All log-in banners must include security notice. Every log-in screen for multi-
user computers must include a special notice. This notice must state: (1) the
system may only be accessed by authorized users, (2) users who log-in
represent that they are authorized to do so, (3) unauthorized system usage or
abuse is subject to penalties, and (4) system usage will be monitored and logged.
8. Users must log off before leaving sensitive systems unattended. If the
computer system to which users are connected or which they are currently using
contains sensitive information, and especially if they have special access rights,
such as domain admin or system administrator privileges, users must not leave
their computer, workstation, or terminal unattended without first logging-out,
locking the workstation, or invoking a password-protected screen saver.
10. All network access attempts (success or failure) must be logged and
retained for auditing.
11. Server
This policy applies to all servers that Howard University ETS is responsible to
manage. This explicitly includes any system for which Howard University ETS
has an obligation to administer. This also includes all server systems setup for
internal use by HU regardless of whether ETS retains administrative obligation or
not.
Policy
11.2 Each device must meet the following minimum standards prior to, and after
connecting to the data network or support infrastructure:
• Services and applications that will not be used must be disabled where
practical.
• The most recent security patches must be installed on the system as soon as
practical, the only exception being when immediate application would
interfere with business requirements.
• Trust relationships between systems are a security risk, and their use should
be avoided. Do not use a trust relationship when some other method of
communication is available.
• Do not use root account when a non-privileged account can performed the
task.
The internal system addresses, configurations, and related system design information
systems and users outside the ETS internal network cannot access this information.
All connections between Howard University’s internal networks and the Internet (or any
other publicly-accessible computer network) must be protected by a router, firewall, or
related access controls approved by ETS.
Public Internet servers must be placed on subnets separate from internal ETS networks.
Routers or firewalls must be employed to restrict traffic from the public servers to
internal networks.
Howard University ETS is entrusted with the responsibility to provide professional management
of the university’s servers as outlined in this policy. Inherent in this responsibility is an
obligation to provide appropriate protection against malware threats, such as viruses and spyware
applications. Effective implementation of this policy will limit the exposure and effect of
common malware threats to the systems they cover.
This policy applies to all servers that Howard University ETS is responsible to manage. This
explicitly includes any system for which ETS has an obligation to administer. This also includes
all server systems setup for internal use by Howard University, regardless of whether ETS
retains administrative obligation or not.
Policy
Howard University ETS operations staff will adhere to this policy to determine which servers
will have anti-virus and/or anti-spyware applications installed on them and to deploy such
applications as appropriate.
12.1. ANTI-VIRUS
All servers MUST have an anti-virus application installed that offers real-time
scanning protection to files and applications running on the target system if they meet
one or more of the following conditions:
All servers SHOULD have an anti-virus application installed that offers real-time
scanning protection to files and applications running on the target system if they meet
one or more of the following conditions:
If the target system is a mail server it MUST have either an external or internal anti-virus
scanning application that scans all mail destined to and from the mail server. Local anti-
virus scanning applications MAY be disabled during backups if an external anti-virus
application still scans inbound emails while the backup is being performed.
12.3 ANTI-SPYWARE
All servers MUST have an anti-spyware application installed that offers real-time
protection to the target system if they meet one or more of the following conditions:
An exception to the above standards will generally be granted with minimal resistance
and documentation if one of the following notable conditions applies to this system:
12.5 Enforcement:
The responsibility for implementing this policy belongs to all operational staff at
Howard University. Responsibility for ensuring that new and existing systems remain in
compliance with this policy resides with the Howard University ETS Information
Security Officer. Any employee, student, faculty, guest, or contractors found to have
violated this policy may be subject to disciplinary action, up to and including termination
of employment.
This policy describes a required minimal security configuration for all routers and switches
connecting to a production network or used in a production capacity at or on behalf of Howard
University ETS.
All routers and switches connected to Howard University IT production networks are affected.
Routers and switches within internal, secured labs are not affected. Routers and switches within
DMZ areas fall under the Internet DMZ Equipment Policy.
Policy
13.1. All routers within Howard University IT Enterprise must meet the
following configuration standards:
No local user accounts are configured on routers. Routers must use TACACS+ for
all user authentications.
The enable password on the router must be kept in a secure encrypted form. The
router must have the enable password set to the current production router
password from the router’s support organization
13.2. All routers within Howard University IT Enterprise must disallow the
following:
• IP directed broadcast
Incoming packets at the router sourced with invalid addresses such as RFC1918 address
Before dial-up users reach a log-in banner, all inbound dial- up lines connected to
Howard University IT internal networks and/or computer systems must pass
through an additional access control point, such as a firewall, which has been
approved by ETS. Unless ETS has first approved the action in writing, Howard
University staff must not enable any trusted host relationships between computers
connected to the Howard University internal network.
13.5 Telnet may never be used across any network to manage a router, unless there is
a secure tunnel protecting the entire communication path. SSH is the preferred
management protocol.
14. FIREWALL
The firewall policy dictates how the firewall should handle application traffic such as web, email,
or telnet. The policy describes how the firewall is to be managed and updated.
Firewall configuration rules and permissible service rules established by IT Security and
Disaster Recovery have been reached after evaluation. These rules must not be changed
without first obtaining the permission of ETS Information Security Management.
• The University must monitor incident response team reports and security
websites for information about current attacks and vulnerabilities.
• The firewall policy should be updated as necessary.
• A formal process must be used for managing the addition and deletion of
firewall rules.
• The University must ensure that administrators receive regular training in
order to stay current with threats and vulnerabilities.
Devices that are Internet facing and outside the University’s firewall are considered part of the
"de-militarized zone" (DMZ) and are subject to this policy. These devices (network and host) are
particularly vulnerable to attack from the Internet since they reside outside the university’s
firewalls.
• Ownership responsibility
• Secure configuration requirements
• Operational requirements
• Change control requirement
All equipment or devices deployed in a DMZ owned and/or operated by Howard University
(including hosts, routers, switches, etc.) and/or registered in any Domain Name System (DNS)
domain owned by Howard University must follow this policy.
This policy also covers any host device outsourced or hosted at external/third-party service
providers, if that equipment resides in the "howard.edu" domain or appears to be owned by
Howard University.
All new equipment that falls under the scope of this policy must be configured according to the
referenced configuration documents, unless a waiver is obtained from ETS. All existing and
future equipment deployed on Howard University's un-trusted networks must comply with this
policy.
Policy
Equipment and applications within the scope of this policy must be administered by support
groups approved by Information Security for DMZ systems, application, and/or network
management.
To verify compliance with this policy, Information Security team will periodically audit DMZ
equipment per the Audit Policy.
All new installations and changes to the configuration of existing equipment and applications
must follow the following policies/procedures:
• New installations must be done via the DMZ Equipment Deployment Process.
• Configuration changes must follow the University Change Management (CM)
Procedures.
• ETS must be invited to perform system/application audits prior to the
deployment of new services.
• ETS must be engaged, either directly or via CM, to approve all new
deployments and configuration changes.
The responsibility for the security of the equipment deployed by external service providers
must be clarified in the contract with the service provider and security contacts, and
escalation procedures documented. Contracting departments are responsible for third party
compliance with this policy.
• All networks on the Howard University campus are installed and maintained
by Enterprise Technology Services.
• To assure the integrity and availability of network services, no other network
communications (with the exception of commercial cellular telephony
networks) shall be permitted on University facilities.
• No networking equipment (routers, managed switches, DHCP servers, DNS
servers, WINS servers, VPN servers, remote access dial-in servers/RADIUS,
wireless access points, hardware firewalls – shall be permitted without a
written exception from ETS (ETS Infrastructure group).
• All devices connected to HU networks shall be registered with ETS when
initially attached to the network. This applies to printers, computing systems,
laboratory equipment, and communications devices that use TCP/IP network
protocols. The registrant must be a current faculty, staff, student, or affiliate
account user with a valid and active Network ID. Information on how to
register a network device can be obtained by contacting the ETS Help Desk.
Unregistered devices are subject to disconnection from the HU Network,
without notice, whether or not they are disrupting network service.
• Currently devices connected to the HU Guest (HU-Visitors) wireless network
are unregistered. As wireless registration services become available, all
university-purchased or owned hosts shall be registered in a similar manner to
wired network registration. HU users accessing the Howard IT resources via
wireless networking may assure the privacy of the network communications
by using the HU VPN software.
• All email protocol traffic shall utilize the centralized mail gateways
(smtp.howard.edu). Inbound mail traffic with destination addresses for servers
other than those operated by ETS shall utilize a DNS MX record to relay that
traffic through the centralized mail gateways. All outbound traffic shall
utilize the SMTP gateway.
• The use SSL or TLS based communication standards for email client to email
server communication is preferred such that the authentication session is the
protected transaction.
• All hosts on HU networks shall utilize the Howard DNS systems. All hosts
connected to HU networks receive a howard.edu domain name extension. No
host connected to Howard networks shall be addressable by any DNS name
other than that provided by Howard.
• No host with a howard.edu domain name (and an IP address within the
Howard network spaces) will use an IP address outside the University's
registered name space without a written exemption from Enterprise
Technology Services.
• All hosts on Howard networks shall either obtain and use a static IP address or
use the Howard DHCP service to obtain an assigned IP address. Users shall
not use a self-assigned IP address, or operate a DHCP server. The use of
bootstrap (BOOTP) shall be governed in the same manner as DCHP.
Banned Protocols:
VPN
Approved employees and authorized third parties (customers, vendors, etc.) may utilize the
benefit of VPN, which is a “user managed” service. This means that the user is responsible for
selecting an Internet Service Provider (ISP), coordinating installation, installing any required
software, and paying associated fees. Further details may be found in the Remote Access Policy.
Organization Title/Subject Document Number
ETS Network Security Policy
Author Approved by Date Version Page 16
Christopher Cole Tilmon Smith April 10, 2014 2.0
• It is the responsibility of employees with VPN privileges to ensure that
unauthorized users are not allowed access to internal networks.
• When actively connected to the enterprise network, the VPN will force all
traffic to and from the PC over the VPN tunnel: all other traffic will be
dropped.
• Dual (split) tunneling is NOT permitted; only one network connection is
allowed.
• VPN gateways will be set up and managed by ETS.
• All computers connected to the internal networks via VPN or any other
technology must use the most up-to-date anti-virus software that is the
enterprise standard, this includes personal computer.
• VPN users will be automatically disconnected from the network after thirty
minutes of inactivity. The user must then logon again to reconnect to the
network. Pings or other artificial network processes are not to be used to keep
the connection open.
• Users of computers that are not owned by the University must configure the
equipment to comply with VPN and Network policies.
• By using VPN technology with personal equipment, users must understand
that their machines are a de facto extension of the network, and as such are
subject to the same rules and regulations that apply to the University’s owned
equipment, i.e., their machines must be configured to comply with ETS’s
Security Policies.
Malware: Software designed to infiltrate or damage a computer system without the owner's
informed consent. It is a blend of the words "malicious" and "software". The expression is a
general term used by computer professionals to mean a variety of forms of hostile, intrusive,
or annoying software or program code.
Anti-virus Software: Consists of computer programs that attempt to identify, thwart and
eliminate computer viruses and other malicious software (malware).
Production Network: The "production network" is the network used in the daily business of
Howard University ETS. Any network connected to the corporate backbone, either directly
or indirectly, which lacks an intervening firewall device. Any network whose impairment
would result in direct loss of functionality to Howard University employees or affiliates, or
impact their ability to do work.
Lab Network: A "lab network" is defined as any network used for the purposes of testing,
demonstrations, training, research, etc. Any network that is stand-alone or firewalled off from
the production network(s) and whose impairment will not cause direct loss to Howard
University nor affect the production network.
DMZ (de-militarized zone): Any un-trusted network connected to, but separated from,
Howard University's IT network by a firewall, used for external (Internet/partner, etc.) access
from within Howard University, or to provide information to external parties. Only DMZ
networks connecting to the Internet fall under the scope of this policy.
Un-Trusted Network: Any network firewalled off from the University network to avoid
impairment of production resources from irregular network traffic (lab networks),
Cable Modem: Cable companies such as AT&T Broadband provide Internet access over
Cable TV coaxial cable. A cable modem accepts this coaxial cable and can receive data from
the Internet at over 1.5 Mbps. Cable is currently available only in certain communities.
DLCI: Data Link Connection Identifier (DLCI) is a unique number assigned to a Permanent
Virtual Circuit (PVC) end point in a frame relay network. DLCI identifies a particular PVC
endpoint within a user's access channel in a frame relay network, and has local significance
only to that channel.
Dial-in Modem: A peripheral device that connects computers to each other for sending
communications via the telephone lines. The modem modulates the digital data of computers
into analog signals to send over the telephone lines, then demodulates back into digital
signals to be read by the computer on the other end; thus the name "modem" for
modulator/demodulator.
Dual Homing: Having concurrent connectivity to more than one network from a computer or
network device. Examples include: Being logged into the Corporate network via a local
Ethernet connection, and dialing into AOL or other Internet service provider (ISP). Being on
a HU provided Remote Access home network, and connecting to another network, such as a
spouse's remote access. Configuring an ISDN router to dial into Howard University and an
ISP, depending on packet destination.
DSL: Digital Subscriber Line (DSL) is a form of high-speed Internet access competing with
cable modems. DSL works over standard phone lines and supports data speeds of over 2
Mbps downstream (to the user) and slower speeds upstream (to the Internet).
Frame Relay: A method of communication that incrementally can go from the speed of an
ISDN to the speed of a T1 line. Frame Relay has a flat-rate billing charge instead of a per
time usage. Frame Relay connects via the telephone company's network.
ISDN: There are two flavors of Integrated Services Digital Network or ISDN: BRI and PRI.
BRI is used for home office/remote access. BRI has two "Bearer" channels at 64kbit
(aggregate 128kb) and 1 D channel for signaling info.
TLS: transport layer security, an encryption method for communication between a mail client
and a mail server, or between mail servers.
TCP/IP: transmission control protocol and internet protocol, which define how
communications are currently implemented in the Howard network infrastructure.
IP address: Internet protocol address, an essential networking element which permits traffic
to be routed to a specific host.
Cloud services: Software and/or systems that are hosted in off-campus data centers that rely
on network communications to permit access for users in the Howard network environment.
DLCI: Data Link Connection Identifier (DLCI) is a unique number assigned to a Permanent
Virtual Circuit (PVC) end point in a frame relay network. DLCI identifies a particular PVC
endpoint within a user's access channel in a frame relay network, and has local significance
only to that channel.
Dial-in Modem: A peripheral device that connects computers to each other for sending
communications via the telephone lines. The modem modulates the digital data of computers
into analog signals to send over the telephone lines, then demodulates back into digital
signals to be read by the computer on the other end; thus the name "modem" for
modulator/demodulator.
DSL: Digital Subscriber Line (DSL) is a form of high-speed Internet access competing with
cable modems. DSL works over standard phone lines and supports data speeds of over 2
Mbps downstream (to the user) and slower speeds upstream (to the Internet).
Electronic data interchange (EDI): is a method for transferring data between different
computer systems or computer networks Frame Relay A method of communication that
incrementally can go from the speed of an ISDN to the speed of a T1 line. Frame Relay has a
flat-rate billing charge instead of a per time usage. Frame Relay connects via the telephone
company's network.
ISDN: There are two flavors of Integrated Services Digital Network or ISDN: BRI and PRI.
BRI is used for home office/remote access. BRI has two "Bearer" channels at 64kbit
(aggregate 128kb) and 1 D channel for signaling info.
Remote Access: Any access to a Howard University IT network through a non-IT controlled
network, device, or medium.
Organization Title/Subject Document Number
ETS Network Security Policy
Author Approved by Date Version Page 20
Christopher Cole Tilmon Smith April 10, 2014 2.0
Split-tunneling: Simultaneous direct access to a non-Howard University network (such as the
Internet, or a home network) from a remote device (PC, PDA, WAP phone, etc.) while
connected into Howard University’s IT network via a VPN tunnel.
VPN: Virtual Private Network (VPN) is a method for accessing a remote network via
"tunneling" through the Internet.
L2TP: Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual
private networks (VPNs) or as part of the delivery of services by ISPs.