Description

Information security configuration management is the process of establishing, documenting, and maintaining the security controls that are in place to protect an organization's information and systems. This Standard will define the scope and frequency of identification and remediation and is included in the NIST Configuration Management control group.

Scope

All Lehigh systems attached to Lehigh University networks or containing University data should adhere to the defined security configurations. Basic and specific secure configurations will be maintained by LTS. System owners are responsible to ensure their systems are configured in appropriately. Technical personnel are responsible for understanding the configuration standards and applying them, and informing the System owner of any configuration gaps.

Security Requirements

NIST 800-171 compliance requires Lehigh to perform the following:

NIST 800-53

PCI compliance requires Lehigh to perform the following:

HIPAA compliance requires Lehigh to perform the following:

Implementation

Basic Configuration Standards

Basic configuration standards are broad guidelines that apply to all systems/technologies that are used by the University.

Specific Configuration Standards

Specific configuration standards are applied in specific situations (e.g. a secure research environment) or for specific categories of devices (e.g. network switches, windows systems). Specific Configurations Standards which are university-wide will be developed and maintained by LTS by the individuals or teams with the technical expertise required.

Related

NIST 800-53 Rev 5.1.1 https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final

NIST 800-171 Rev. 2 - https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final

Definitions

System Owner - Responsible for an information system, including security. They may delegate technical responsibility to a Technical Owner

Technical Personnel - Responsible for the operation, patching, maintenance and configuration of the information system.

Revision History

Date

Version

Description

Approval

1.0

Original Document

Draft

1.0.1

Revisions

Draft

1.1

Approved - CISO

Approved

1.1.1

Edits

Approved