Definitions

University funds include:

  • Research funds
  • Start-up funds
  • Grant funds
  • Departmental funds, and
  • Dean’s office (DCI and other) funding.

Computers include

  • Individual workstations (including laptops)
  • Computers and server-computers used to monitor or record experimental data
  • Server-computers used to host applications for multiple users, and
  • Server-computers used to store data for access by multiple people.

 

All computers purchased with University funds belong to the University and must be managed by IT professionals. 

  • All workstations and server-computers must be disclosed to the departmental IT professional (LSP) and logged in the dean’s office database for hardware tracking.
  • Workstations are configured and managed through centralized systems to ensure OS and software patches are in place. 
  • Server-computers must be housed in the University Data Center (which only allows for rack-mounted systems).
  • Server-computers must be configured with appropriate security settings and managed for appropriate patches.
  • Documentation needs to be maintained for server-computers including the configuration settings and administrative management processes.
  • Requirements for server-computers with Highly Sensitive data will include (but not limited to):
    • Server will be located behind the JointVPN firewall
    • Physical security with access only to specific allowed key holders
    • Follow the principle of “least privilege” when granting access permissions
    • Logging of all connections and logins from users
    • Carbon Black / Cylance configured on the machine
    • Yearly (quarterly?) nessus/nmap scan by InfoSec
    • No generic (shared) accounts
    • No root account access
    • The identity of the person responsible for oversight of the server.
    • A functioning backup strategy is in place
  • Requirements for server-computers with less sensitive data include (but not limited to):
    • Firewall configuration to only allow access to UVa IP’s (if possible)
    • Physical security with access to specifically allowed key holders
    • Follow the principle of “least privilege” when granting access permissions
    • Logging of all logins and actions taken
    • Yearly nessus scan by InfoSec
    • No generic (shared) accounts
    • No root account access
    • The identity of the person responsible for oversight of the server.
    • A functioning backup strategy is in place

Surplus

Computers purchased with University funds must be provided to the LSP for disposal (or reassignment) when either:

  • The computer is no longer in service, or
  • The person to whom the computer is assigned is separated from the University.

Exceptions

Business/research may require exceptions to these guidelines such as:

  • a server-computer that must be part of an experiment run in the lab instead of being housed in the data center,
  • a computer that cannot be patched in order for unique software to function,
  • a root level account may be needed occasionally for some apps or maintenance (but not as the default user account),

Exceptions require:

  • Alternative measures to protect the computer (physically and network-wise) must be documented.
  • Approvals must be given by
    • Departmental LSP
    • Department chair (or the department’s Information Security designee), and
    • A&S Director of Computing Services.

24 May 2018