Description
An important component of an information security program is security awareness and role-based training on the relevant internal and external threats.
Scope
This policy applies to everyone who accesses University data or information resources.
Security Requirements
NIST 800-171 references the following security requirements within the Awareness & Training family:
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems. [3.2.1]
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities. Personnel responsible for information-security related duties and responsibilities are required to complete specific KnowBe4 training. The KnowBe4 "Training Campaign" section contains all of the training campaigns that are required from personnel (e.g., Students, Staff and Faculty) [3.2.2]
Provide security awareness training on recognizing and reporting potential indicators of insider threat. [3.2.3]
Other compliance requirements:
FERPA - Lehigh employees needing access to student data need to validate their understanding of requirements under FERPA prior to obtaining access to student records.
HIPAA - Lehigh employees needing access to health records will complete annual training related to the protection of PHI (protected health information) and requirements under HIPAA
Red Flags Rule - The Board of Trustees established the Lehigh Identity Theft program under the direction of the Vice President of Finance and Administration to comply with the Red Flags Rule. Applicable Lehigh employees need to validate their understanding of the Lehigh Identity Theft program and requirements under the Red Flags Rule annually.
Data Use Agreements (DUA) - The University may choose to enter into agreements that require us to maintain security and privacy controls on their data, including training. Compliance with DUA is the responsibility of the unit entering the agreement.
Implementation
Lehigh personnel with access to sensitive information resources will:
Complete security awareness training prior to, or at least within 30 days of being granted access to any University information resources. This shall be part of the new employee orientation training session.
Annually acknowledge they have read, understand, and will comply with university requirements regarding computer security policies and procedures.
Complete the university security awareness training on an annual basis.
Security awareness training shall address the recognition and reporting of indicators for insider threats.
The Chief Information Security Officer (CISO) shall communicate new security program information, security bulletin information, and security items of interest to the community.
It is the responsibility of the CISO, or designee, to ensure role-based security training is completed by information technology staff with assigned security roles and responsibilities:
Before authorizing access to information resources or performing assigned duties;
When required by information resource changes; and
Annually, thereafter.
Stem leaders are responsible to ensure that personnel are adequately trained to carry out their assigned information security-related duties and responsibilities.
Security Training should be updated annually to remain relevant and at minimum include information on:
Two factor authentication
Social engineering
Sensitive Data lifecycle: identify, store, transfer, archive, and destruction
Common causes for unintentional data exposure and how to avoid them
Common indicators of a security incident and how they should respond
Related
The Awareness and Training Standard is created under the Information Security Policy.
NIST 800-171/800-53 Rev 5.
Family Educational Rights and Privacy Act (FERPA)
Health Insurance Portability and Accountability Act (HIPAA)
Fair and Accurate Credit Transactions Act of 2003 (FACT Act) Red Flags Rule
CIS Controls v7.1
Definitions
Revision History
Date | Version | Description | Approval |
---|---|---|---|
| 1.0 | Original Document | Draft |
| 1.1 | Revisions based on CGRC Initial Feedback | Draft |
1.2 | CISO Approval | Approved |