Description

The university monitors security controls for information resources on an ongoing basis.

Applicability

  • The intended audience includes the Chief Information Security Officer (CISO), information resource owners and custodians. This Control applies to all information resources with a high or moderate impact level.

Implementation

  • 1

    The CISO, in consultation with information resource owners, shall develop a continuous monitoring strategy and implement a continuous monitoring program that includes:

    • 1.1

      Establishment of the information resource metrics to be monitored;

    • 1.2

      Establishment of a methodology for monitoring and a methodology for assessments supporting such monitoring;

    • 1.3

      Ongoing security control assessments in accordance with the university's continuous monitoring strategy;

    • 1.4

      Ongoing security status monitoring of university defined metrics in accordance with university continuous monitoring strategy;

    • 1.5

      Correlation and analysis of security related information generated by assessments and monitoring;

    • 1.6

      Response actions to address results of the analysis of security-related information; and

    • 1.7

      Reporting the security status of the university and information resources to the Chief Information Officer and President annually.

  • 2

    The CISO, in consultation with information resource owners, shall also ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following:

    • 2.1

      Effectiveness monitoring;

    • 2.2

      Compliance monitoring; and

    • 2.3

      Change monitoring