IT-Security-Policy
IT-Security-Policy
Scope
This Policy applies to all IT-related systems, hardware, services, facilities, and processes
owned or otherwise made available by the University of Huddersfield or on its behalf,
whether utilising the University’s network and servers or those provided through cloud-
based environments. This policy includes, for the avoidance of doubt any personally
owned devices that are used in connection with University activities (together, IT
Systems). This policy applies to all users and administrators of IT Systems, inclusive of
University staff, students, affiliates, and third-party providers.
1. Introduction
1.1. The threats we face
The University is facing increasing security threats from a wide range of sources.
Systems and networks may be the target of a variety of attacks, including computer-
based fraud, data theft, surveillance or vandalism. Such threats to IT security are
generally expected to become more widespread, more ambitious and increasingly
sophisticated.
This Policy contains terms relating to the classification of data. There are three
classifications: sensitive, confidential, and general. Direction on which types of
information fall into the different categories is set out in the IT Security Procedure
Manual (see below).
IT Security Policy v7
This Policy should be read in conjunction with the following University documents:
• Data Protection Policy
• Computing Regulations
• Research Integrity and Ethics Policy
• Retention and Disposal Schedule
• Using your own device Policy
• Guidance on Managing Emails
2. Compliance
The University’s Regulations Governing the Use of Computing Facilities set out the
responsibilities of anyone using University IT Systems and are included in the Student
Handbook of Regulations. This Policy supports and expands the provisions in the
University’s Regulations Governing the Use of Computing Facilities.
3. Information Handling
3.1. Classification of information
An inventory will be maintained of all the University’s major corporate IT assets and
the ownership of each asset will be clearly stated. Within the inventory, the
information processed by each IT asset will be classified according to sensitivity.
2
IT Security Policy v7
anti-virus product before use or transfer to University systems and network drives.
3
IT Security Policy v7
offline, air-gapped, immutable backup technologies provide the strongest safeguards.
Access to data backups and supporting infrastructure must be restricted to those
persons who are authorised to perform systems administration or management
functions. All system managers must ensure that safeguards are in place to protect
the integrity of information during the recovery and restoration of datafiles, especially
where such files may replace files that are more recent.
3.7. Archiving
The archiving of information must take place with due consideration for legal,
regulatory and business issues, with liaison as needed between IT staff, records
managers and data owners, and in keeping with the University’s Retention and
Disposal Schedule. Storage media used for the archiving of information must be
appropriate to its expected longevity. The format in which the data is stored must
also be carefully considered, especially where proprietary formats are involved.
4
IT Security Policy v7
email where modern methods described above are not possible and must be
encrypted or protected by a password.
Information received electronically must be treated with care due to its inherent
information security risks. Files received from external persons should be scanned
for possible viruses or other malicious code.
5
IT Security Policy v7
when being used from off-campus. This validates the account holder and reduces the
risks relating to weak, shared or compromised passwords.
Public Wi-Fi connections, such as those in hotels and coffee shops, may not be
secure and should be avoided. It is trivial for someone to set up a fake Wi-Fi access
point with a trusted name to encourage connections which they can then use to view
your internet traffic or gain access to your device. Verify the Wi-Fi network with the
venue before connecting. If you are unsure of the security of any wired or wireless
network, then you should not use it.
4.3. Travelling
Portable computing or storage devices are vulnerable to theft, loss or unauthorised
access when travelling and information stored on them should be kept to a minimum.
Approved mobile device management software must be installed and activated on
University owned mobile and portable devices at all times. All devices, including
portable storage, must be provided with an appropriate form of access protection
including authentication and encryption to prevent unauthorised access to their
contents. In addition to passwords, more modern means of authentication such as
Touch-ID or Face ID are also acceptable forms of access protection.
Equipment and media should not be left unattended in public places and portable
devices should be carried as hand luggage. To reduce the opportunities for
unauthorised access, automatic shutdown features should be enabled. Passwords or
other similar security tokens for access to the University’s systems should never be
stored on or with the mobile devices they are protecting or in their carrying cases.
Screens on which sensitive or confidential information is processed or viewed should
be fitted with a privacy filter or be sited in such a way that they cannot be viewed by
unauthorised persons
Export and import controls apply when travelling to certain countries which restrict the
use of encrypted devices. Advice should be taken from IT Support before any travel
arrangements are made.
6
IT Security Policy v7
All activities undertaken by third party suppliers must be agreed in advance.
6. Operations
6.1. Building access control
Areas and offices where sensitive or confidential information is processed will be
given an appropriate level of physical security and access control. Line managers will
provide information on the potential security risks and the measures used to control
them to staff with authorisation to enter such areas. Line managers must continue to
ensure access is appropriate to staff duties and remove access when it is no longer
required. Physical access control activity will be logged.
All employees of the University have a responsibility to safeguard access to locations
where sensitive or confidential information is stored and processed and must not
permit unauthorised persons to enter such areas, including being vigilant to the
activity of ‘tailgating’: an unauthorised person following closely behind an authorised
person to gain entry to a restricted area of a building.
7
IT Security Policy v7
security weaknesses in the University’s IT Systems. They must also ensure that
mechanisms are put in place to monitor and learn from those incidents. Procedures
must be established for the reporting of software malfunctions and faults in the
University’s IT Systems. Faults and malfunctions must be logged and monitored, and
timely corrective action taken.
IT systems hosted and maintained by the University will be periodically tested for
known vulnerabilities and weaknesses caused by misconfigured security controls.
Applications hosted and maintained by third party providers, such as cloud Software
as a Service (SaaS) systems, must be tested by the vendor at least annually. Proof
of testing must be provided by the vendor prior to University data being uploaded or
entered into the application.
All University owned IT Systems must have the approved corporate antivirus / anti--
malware product installed and configured to University standards. IT system users
must never disable or attempt to make changes to the anti-virus / anti-malware
protection in place as this can put University systems and information at risk.
8
IT Security Policy v7
Viruses, malware or other hacking tools must not be intentionally installed on
University computers for any purpose. Such software is designed to propagate,
cause disruption, provide unauthorised remote access, and/or transfer sensitive
information outside of the organisation. For testing and teaching needs, installation
must be undertaken within dedicated environments that are fully segregated from
University networks and systems.
7. User Management
7.1. User identification
System owners must ensure that procedures for the registration and deregistration of
users and for managing access to all information systems are established to ensure
that all users’ access rights match their authorisations. These procedures must be
implemented only by suitably trained and authorised staff. All users must have a
unique identifier (user ID) for their personal and sole use for access to all of the
University’s information services, which should authenticate against the institutional
directory where practicable. System owners’ procedures must include mechanisms to
identify and disable unused user accounts in a timely manner.
7.2. ID security
Actions undertaken on IT systems are recorded and are tied to the user ID used. The
user ID must not be used by anyone else and associated passwords must not be
shared with any other person for any reason. Password management procedures
must be put into place to assist both staff and students in complying with best practice
guidelines. Account holders must immediately change their password if they believe
it may be known to others or has become compromised. University technical teams
will take steps to secure a user account which they believe has been compromised.
The password requirements as set out in section 3.1 of the IT Security Procedure
Manual must be adhered to for all forms of passwords including user accounts,
document protection, and system access.
Devices used by staff and students to generate or receive MFA codes must not be
shared with others. Private email accounts used by staff and students to provide a
means to reset University passwords must not be shared by or accessible by others.
9
IT Security Policy v7
7.3. Access control standards
System owners must establish appropriate access control standards for all
information systems which minimise information security risks yet allow the
University’s business activities to be carried out without undue hindrance. Access to
all systems must be authorised by the manager responsible for the system and a
record must be maintained of such authorisations, including the appropriate access
rights or privileges granted.
Procedures must be established for all information systems to ensure that users’
access rights are adjusted appropriately, and in a timely manner, whenever there is a
change in business need, staff change their role, or staff or students leave the
organisation. Users’ access rights must be reviewed at regular intervals and adjusted
or removed as appropriate.
System administration accounts that do not authenticate against the institutional
directory must have their password(s) changed if known to persons that no longer
need to access the system.
8. System Planning
8.1. Authorisation
New IT Systems relating to teaching, research or the administration of the University,
or enhancements to existing systems, must be authorised by the Strategic Projects,
Processes and Infrastructure Board (SPPIB). The business requirements of all
authorised systems must specify appropriate security controls. The implementation of
new or upgraded software or hardware must be carefully planned and managed, to
ensure that the information security risks associated with such changes are mitigated
using a combination of procedural and technical controls.
10
IT Security Policy v7
8.2. Secure configuration and system hardening
System owners must ensure that all components of the solution are, and remain
configured in a consistently secure manner, including changing all default and publicly
known system credentials and application passwords; removal/disablement of all
unnecessary accounts, software and services; use of vendor secure configuration
guidelines; and undertaking other best practise system hardening techniques.
Local firewall software prevents unauthorised network traffic into and out of network
connected computers. All University owned IT Systems must have the approved
corporate local firewall software product installed and configured to University
standards. IT system users must never disable or attempt to make changes to the
local firewall protection in place as this can put University systems and information at
risk.
8.5. Testing
System owners, in consultation with Computing and Library Services, must ensure
that prior to acceptance, all new or upgraded systems or hardware are tested to
ensure compliance with this Policy, access control standards and requirements for
ongoing information security management. For new applications hosted and
maintained by third party providers, such as cloud Software as a Service (SaaS)
systems proof of security testing must be provided by the vendor prior to University
data being uploaded or entered into the application.
System owners should liaise with Computing and Library Services to discuss options
for ongoing security testing. Testing technologies and processes will be employed in
a prioritised approach that takes in to account the business criticality of the system
and the types of data processed and stored within the system.
9. IT Systems Management
9.1. Staffing
IT Systems must be managed by suitably trained and qualified staff to oversee their
day to day running and to preserve security and integrity in collaboration with
11
IT Security Policy v7
individual system owners. All systems management staff must have relevant training
in IT security issues.
System owners must ensure that all access to systems containing sensitive or
confidential information is logged to identify potential misuse of systems or
information. They must also ensure that password management procedures are put
into place to ensure the implementation of security procedures and to assist users in
complying with best practice guidelines. Default vendor passwords and account
credentials must be removed on all new IT equipment and systems prior to
deployment.
Remote access to the network must be subject to robust authentication as well as
appropriate levels of security. Virtual Private Network (VPN), wireless, and other
connections to the network are only permitted for authorised users. VPN connections
must not be configured on University computers or across the University network
unless approved. Unauthorised VPN client or VPN server software including browser
add-ins must not be installed on University owned or network connected computers.
University technical teams will take steps to remove VPN software or block VPN
connections.
Access to operating system commands must be restricted to those persons who are
authorised to perform systems administration or management functions. Use of such
commands should be logged and monitored.
12
IT Security Policy v7
9.4. Change management
Changes to operational procedures, software or hardware must be controlled to
ensure continuing compliance with the requirements of this Policy and have
management approval. System owners should employ appropriate mechanisms for
the planning, communication and testing of such changes that safeguard the security
of systems.
Development and testing facilities for business-critical systems will be separated from
operational facilities. Where possible development systems should utilise artificial or
pseudonymised data and not personal data relating to individuals, or have security
controls which are equivalent to the live system.
Acceptance criteria for new information systems, upgrades and new versions will be
established and suitable tests of the system carried out prior to migration to
operational status. Tests involving live data or periods of parallel running may only be
permitted where adequate controls for the security of the data are in place.
Procedures will be established to control the development or implementation of all
operational software, which must be approved by the Strategic Projects, Processes
and Infrastructure Board (SPPIB) before introduction and a Privacy Impact
Assessment must be completed and approved by the Records Management Service
for any new system that will involve the processing of personal data. All systems
developed for or procured within the University must follow a formalised development
process. The implementation, use or modification of all software on the University’s
business systems must be controlled. All software must be checked before
implementation to protect against malicious code.
Moves, changes and other reconfigurations of users’ network access points will only
be carried out by staff authorised by Computing and Library Services according to
procedures laid down by them.
All changes must be properly tested and authorised before moving to the live
environment.
13
IT Security Policy v7
9.6. Logging
System owners must ensure that where possible security event logs, operational audit
logs and error logs are created, properly reviewed and managed by qualified staff.
System clocks must be regularly synchronised between the University’s various
processing platforms to ensure consistency across log sources.
The logs created by critical servers and security systems will be exported to a
Security Information and Event Management (SIEM) system for secure storage,
correlation, and to provide real-time analysis.
System owners must ensure that all system components including hardware,
operating systems, and applications that they are responsible for remain within
vendor support and that these are regularly patched with software security updates in
order to reduce the opportunity for the exploit of known vulnerabilities. Out of support
software will never receive security patches for any newly discovered vulnerabilities
regardless of severity.
Operating systems (OS) which are no longer supported by the OS vendor must not be
connected to University networks or used to create, store, process, or share
University information. University technical teams will take steps to remove
computing devices running out of support OS software from the network.
Systems owners hold a responsibility for being aware of newly released security
patches, key system lifecycle dates (including end of support / end of life); to obtain
written confirmation of vendor support; and to remove or upgrade all software
components before vendor support comes to an end.
University owned IT systems must be enrolled into the approved device management
platform for that operating system where one exists.
Staff and affiliates may be required to register their personal devices when used for
accessing University systems in order to collect the minimum information needed to
meet the University’s cyber security certification requirements.
System owners should assess at least annually: the ongoing business justification for
the system(s) they are responsible for; and the features, technologies, and
architecture of those systems.
Where a system is no longer required system owners should liaise with Computing
and Library Services in all instances to agree a decommissioning plan. This ensures
14
IT Security Policy v7
that all elements of the system provisions including servers, storage, firewall rules and
DNS entries are removed as necessary.
Where is a system is still required attention should be given to the continuing lifecycle
of all elements of the system and the functionality they provide. This ensures that
interactive elements of the system, particularly internet facing user logons and search
queries, can be removed if no longer needing, reducing common attack surfaces.
The external presentation of systems to the Internet must be removed as soon as this
is no longer needed.
Acknowledgement
This document draws on copyright information contained in the UCISA Information
Security Toolkit (ISBN 0-9550973-0-4) Edition 2.0, August 2005 and the UCISA
Information Security Management Toolkit, Edition 1.0, March 2015.
15
IT Security Policy v7
POLICY SIGN-OFF AND OWNERSHIP DETAILS
REVISION HISTORY
16
IT Security Policy v7
Inclusion of removable media in
disposal section
Privacy filter explicitly mentioned
in travelling section
PIAs now checked by Records
Management instead of DP
officer
V3.0 Feb 2020 Updated links Information Security Manager
Reference to Touch-ID and
Face-ID in travelling section
Replaced reference to ITSG with
SPPIB
V4.0 Mar 2021 Adjustments to text. Information Security Manager
Addition of user types and
cloud-based environments to
scope.
Addition of email auto-
forwarding controls and USB
storage avoidance to 3.2.
Addition of MFA to 4.2.
Addition of supplier controls to
5.1
Addition of Software to 6.4.
Explicit reference to recording
actions by user IDs 7.2.
Addition of 6.6 – Security
Testing
Addition of new 9.3 – Privileged
Access Accounts
Addition of network design and
firewall usage to 9.5.
Addition of log export to SIEM to
9.6.
Addition of 9.7 to include
systems patching requirement.
V5.0 Mar 2022 Minor adjustments to text. Information Security Manager
Change to use of OneDrive
Client on staff owned computers
4.2
Addition of Wi-Fi guidance 4.2
Addition of new starter password
distribution guidance 7.4
Addition of 9.8 – University
Device Management
17
IT Security Policy v7
V6.0 Mar 2023 Minor adjustments to text. Information Security Manager
System owner processes for
account management 6.2
Addition of Secure Configuration
and System Hardening 8.2
Reinforcement of system
owner responsibilities in 9.7
Include BYOD registration
statement to 9.8
V7.0 Apr 2024 Addition of reference to Cloud Information Security Manager
system to 3.9
Addition of generative artificial
intelligence (AI) guidance 3.12
Clarify usage restrictions for
supplier RAAs 5.1
Addition of employee
responsibilities for physical
security 6.1
Addition of 6.7 - Protection from
Computer Viruses and Malware
Update to password and MFA
requirements 7.2
System owner requirement to
review and change system
passwords 7.3
Addition of requirement for local
firewall on University computer
systems 8.2
Addition of VPN statement 9.2
Reinforce operating system
element of 9.7. including steps
to remove these from network.
Addition of system
decommissioning 9.9
18
IT Security Policy v7