
IT SECURITY IMPLEMENTATION PROCESS
Suggested Phases and Tracks for Implementing the Security Guidelines
In Response to the State IT Security Policy
Phase 1: IT Security Policy
- Develop an institutional IT Security Policy and/or enhance the institutional AUP, as needed
Phase 2: Risk Assessment
- Conducted by IT Security Staff
- The risk assessment will identify critical systems for Track I and prioritize activities for Tracks II through V.
Phase 3: Enhance the Institutional IT Security Program
(Note: Track activities can be performed concurrently)
Track I:
- Incorporate IT security in the SDLC, including existing systems and develop and test disaster recovery plans for CRITICAL SYSTEMS
- Implement Access Control guidelines for Critical Systems
Track II:
- Implement additional measures to protect non public information
Track III:
- Enhance network security by implementing the Network Security guidelines
Track IV:
- Enhance physical security by implementing the Physical Security guidelines
Track V:
- User Education / PC laptop guidelines
Phase 4: Complete processes related to IT Information Security Deviation / Risk Acceptance Standard