Page tree
Skip to end of metadata
Go to start of metadata

Last review date: April 2020, version 1.0.2

Purpose

The purpose of the Bethel University Vulnerability Management Policy is to establish the rules for the review, evaluation, application, and verification of system updates in order to mitigate vulnerabilities in the IT environment and the risks associated with them.

Audience

The Bethel University Vulnerability Management Policy applies to individuals who are responsible for Information Resource management.

Policy

Endpoint Protection (Anti-Virus & Malware)

  • All Bethel University owned and/or managed Information Resources must use the Bethel University IT management approved endpoint protection software and configuration.
  • All non-Bethel University owned workstations and laptops must use Bethel University IT management approved endpoint protection software and configuration, prior to any connection to a Bethel University Information Resource.
  • The endpoint protection software must not be altered, bypassed, or disabled.
  • Each email gateway must utilize Bethel University IT management approved email virus protection software and must adhere to the Bethel University rules for the setup and use of this software, which includes, but is not limited to, scanning of all inbound and outbound emails.
  • Controls to prevent or detect the use of known or suspected malicious websites must be implemented. 
  • All files received over networks or from any external storage device must be scanned for malware before use. 
  • Every virus that is not automatically cleaned by the virus protection software constitutes a security incident and must be reported to Bethel University IT Support.

Logging & Alerting

  • Documented baseline configurations for Information Resources must include log settings to record actions that may affect, or are relevant to, information security. 
  • Event logs must be produced based on the Bethel University Logging Standard and sent to a central log management solution. 
  • A review of log files must be conducted regularly. 
  • All exceptions and anomalies identified during the log file reviews must be documented and reviewed. 
  • Bethel University will use file integrity monitoring or change detection software on logs and critical files to alert personnel to unauthorized modification.
  • Log files must be protected from tampering or unauthorized access. 
  • All servers and network equipment must retrieve time information from a single reference time source on a regular basis so that timestamps in logs are consistent.
  • All log files must be maintained for at least one year. 

Patch Management

  • The Bethel University IT team maintains overall responsibility for patch management implementation, operations, and procedures.
  • All Information Resources must be scanned on a regular basis to identify missing updates.
  • All missing software updates must be evaluated according to the risk they pose to Bethel University.
  • Missing software updates that pose an unacceptable risk to Bethel University Information Resources must be implemented within a time period that is commensurate with the risk as determined by the Bethel University Patch and Vulnerability Standard.
  • Software updates and configuration changes applied to Information Resources must be tested prior to widespread implementation, and must be implemented in accordance with the Bethel University Change Control Policy
  • Verification of successful software update deployment will be conducted within a reasonable time period, as defined in the Bethel University Patch and Vulnerability Standard.

Penetration Testing

  • Penetration testing of the internal network, external network, and hosted applications must be conducted at least annually or after any significant changes to the environment. 
  • Any exploitable vulnerabilities found during a penetration test will be corrected and re-tested to verify the vulnerability was corrected. 

Vulnerability Scanning

  • Vulnerability scans of the internal and external network must be conducted at least quarterly or after any significant change to the network. 
  • Failed vulnerability scan results rated at Critical or High will be remediated and re-scanned until all Critical and High risks are resolved; unless an exception is made or the vulnerability is determined to be isolated, non-essential or a false-flag alert.
  • Any evidence of a compromised or exploited Information Resource found during vulnerability scanning must be reported to the Bethel University Information Security Officer and IT support.
  • Upon identification of new vulnerability issues, configuration standards will be updated accordingly.

References

  • ISO 27002: 12, 18
  • NIST CSF: PR.IP, PR.PT, DE.AE, DE.CM, RS.MI
  • Bethel UniversityIncident Management Policy

Waivers

Waivers from certain policy provisions may be sought following the Bethel University Waiver Process.

Enforcement

Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties.  

Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of contract(s), and related civil or criminal penalties.

Version History

Version 

Modified Date

Approved Date

Author

Reason/Comments

1.0.0

October 2016


FRSecure

Document Origination

1.0.1

February 2018


Andrew Luchsinger

Bethel Modifications

1.0.2

April 2020

June 2020

InfoSec Committee

Committee Review