UVic Information Security Standards
Information security
These security standards enable the university to manage electronic information resources in accordance with university policies and are designed to ensure the confidentiality, integrity, and availability of university information.
Compliance with these standards does not imply a completely secure system. These standards are only a component of ensuring system security. The standards will be revised and updated regularly.
These security standards apply to all members of the UVic community responsible for managing UVic electronic information resources. The requisite skills and knowledge level are required to maintain compliance to the standards; University Systems offers services to manage electronic information resources in a secure and reliable manner: University Systems Service Catalogue.
The standards are based on the IM7800 data classification of the information at risk.
- Determine the highest applicable data classification level by reviewing the University Information Security Classification Procedures in policy IM7800. See Appendix A for Information Classification Examples.
- Follow the security standards in the table below to safeguard your systems. Where possible, we recommend implementing stronger security controls than the current standard.
Where did the UVic Information Security Standards come from?
University Systems engaged students in the Master of Engineering in Telecommunications & Information Security (MTIS) as part of their capstone project to provide guidance on developing information security standards and IT governance for UVic. The students’ recommendations included both standards to adopt as well good examples from other higher education institutions (e.g. Stanford University’s ).
An initial draft of UVic Security Standards were developed by Curtis Les, our Senior Technical and Information Security Analyst, in February 2019. These were based on the above research as well as the latest standards from accredited organizations including the , , and . Where possible, links to supporting UVic resources were included in the draft standards.
The draft standards were then reviewed by members of the University Systems Cybersecurity Working Group. The draft standards were revised after careful consideration of this feedback. For some standards, a current and future standard was developed as gap areas between a desired standard and current capabilities were identified.
The draft standards were circulated with members of the UVic IT community for additional feedback and revision. We reviewed and incorporated this feedback and published the standards in December 2019. If you’d like to provide additonal feedback, please contact Information Security Standards.
How are the Information Security Standards kept current?
The UVic Information Security Standards follow a regular review and update process to reflect the nature of rapid changes and improvements to best practices in information security.
Proposals for changes and additions to the Standards are open at all times. To make a proposal, please email infosecstandards@uvic.ca. Proposed changes should include rationale.
- Review and updates to the Standards are completed at minimum once per year.
- All proposals are recorded by the Information Security Office.
- Proposals are circulated with subject matter experts for feedback.
- The UVic Chief Information Security Officer approves all changes to the Information Security Standards.
- Updated standards are published to uvic.ca/securitystandards.
- An Informed message advising of updated security standards is posted.
Data classifications legend
Data Classifications defined in Information Security Policy (IM7800):
Public | Internal | Confidential | Highly Confidential |
Definition:Information that has been approved for distribution to the public by the information owner or Administrative Authority or through some other valid authority such as legislation or policy. |
Definition:Information that is intended for use within the University or within a specific workgroup, Unit or group of individuals with a legitimate need-to-know. Internal Information is not approved for general circulation outside the workgroup or Unit. |
Definition:Information Resource is considered to be highly sensitive business or Personal Information, or a critical system. It is intended for a very specific use and may not be disclosed except to those who have explicit authorization to review such information, even within a workgroup or Unit. |
Definition:Information Resource is so sensitive or critical that it is entitled to extraordinary protections, as defined in IM7800 9.00. |
An endpoint is defined as any laptop, desktop or mobile device primarily used by a single individual at a time. Endpoints also include network printers, VOIP telephones and multi user computers in lab environments.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
A server is defined as a host that provides a network-accessible service.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|
||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
||||||
|
|
An application is defined as software or service running on a UVic hosted server that is remotely accessible.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|
||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
A cloud service is defined as any Infrastructure, Platform or Software 'as a Service' or similar Internet based service. If information is stored or used in a cloud service, this standard applies.
Other standards may also apply to cloud services, for example, Server or Application standards could apply to servers, containers, or applications running on a cloud platform.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
||||||
|
|
The network is defined as all campus voice and data networking infrastructure.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|||||
|
|
|
||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
Operational Technology includes programmable systems or devices with an embedded operating system that interact with or manage the physical environment, including scientific equipment and Internet of Things devices. Examples include industrial control systems, building management systems, fire control systems, physical access controls, microscopes, medical scanners, conference room systems, video streaming devices, and security cameras.
Security Standards
Category |
Current Standard |
Future Standard |
DataClassification |
|||
|
|
|||||
|
|
|
||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
|||||
|
|
An Excel version of these standards: uvicsecuritystandards.xlsx.