This is an example “Guidebook” to follow in order to enroll a computer in a specific tier in the CU Boulder Secure Computing Framework. The system in question must meet the criteria listed below.
Created by: Nathan Campbell, Matthew Hynes-Grace, Alan Fasick
Tier Number
Thirteen
Tier Title
Research IT Managed Individual Server
Tier Description
Individual computing resource for research (small scale computational resource)
System Requirements/Constraints
CPU/memory needs to be dedicated to computation without risk of interruption. Commercial or custom software may be "frozen" with inability to update. Especially true for timeseries of research data where reproducibility is critical.
Examples:
Single node GPU, visualization, or custom application servers.
System Details
Type:
System Host Name: If Batch, please enter hostnames or IPs in a comma separated list
Secure Computing Tier:
Location:
Business Purpose:
Tier Thirteen Minimum Requirements
This Tier requires the following requirements are met by the system. If this system cannot meet these requirements, please review the other tiers for a more relevant tier. [Link to Tier Info]
R2
Provide role-based access control for both OS and service/application access
R3
Log authentication and authorization events for server and service(s) provided.
R6
Apply OS and application security updated in compliance with vulnerability management standard
R8
Stateful firewall operational at all times whose ruleset is audited and updated on a semi-annual basis
R10
Custom-developed applications must be maintained and periodically assessed for vulnerabilities
Exceptions and Compensating Controls
Does this system or set of systems following an industry-appropriate security framework for additional protective measures:
Yes
No
Which of the following frameworks are being implemented:
NIST CSF
NIST 800-53
ISO 27001
SANS Top-5
NIST 800-82
NERC CIP
IEC 62443
HIPPA Compliance
PCI Compliance
FERPA Compliance
NIST SP 800-171
Other: PLEASE LIST
Once Submitted your request is complete. You do not need to fill out the rest of this form.
Please continue to fill out the rest of the form.
R1. Can this system run current and supported software?
Yes
No
This system meets R1 Security Standards.
Can one of the following compensating controls be put in place? * = Required
Firewalled network (inbound & outbound least privilege);
Disabling of unused components
Updates are made as the system can permit
Increased network monitoring
System uses least privilege role-based access control
Scheduled Network Vulnerability Scanning
Other Controls: TEXT Box
R4. Is this system enrolled in the campus EDR solution?
Yes
No
This system meets R4 Security Standards.
Can one of the following compensating controls be put in place? * = Required
Firewalled network (inbound & outbound least privilege); *
Disabling of unused components *
Updates are made as the system can permit
Increased network monitoring
System uses least privilege role-based access control
Scheduled Network Vulnerability Scanning
Alternate Endpoint Protection: Please list product name
Other Controls: TEXT Box
R5. Is this system enrolled in campus vulnerability scanning solution or an approved equivalent?
Yes
No
This system meets R5 Security Standards.
Can one of the following compensating controls be put in place? * = Required
Firewalled network (inbound & outbound least privilege);
Disabling of unused components
Updates are made as the system can permit
Increased network monitoring
System uses least privilege role-based access control
Scheduled Network Vulnerability Scanning
Alternate Endpoint Protection: Please list product name
Other Controls: TEXT Box
R7. Is this system using encrypted backups with a minimum of 30 days being maintained on a rolling basis?
Yes
No
This system meets R7 Security Standards.
Can one of the following compensating controls be put in place: * = Required
Physically-secure data center such as CCDC, SPSC, or equivalent (restricted card access, CCTV, review personnel who have access)
Drive destruction on disposal
Other Controls: TEXT Box
EXAMPLE Multi-Decision - R10. Does this system have custom-developed applications? (this question is not required for this Tier but is listed for demonstration purposes.
Yes
No
Is this software maintained and periodically assessed for vulnerabilities?
Yes
No
This system meets R10 Security Standards.
Can one of the following compensating controls be put in place: * = Required
Firewalled network (inbound & outbound least privilege);
Uninstall or disable unused components
Update as much as service permits
Increased network monitoring
System uses least privilege role-based access control
Network vulnerability scanning (scheduled)
Alternate Endpoint Protection: Please list product name
Other Controls: TEXT Box
This system meets R10 Security Standards.
Additional System information
Is there any additional information that should be on file with OIT about this tier enrollment.