Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

Service Providers:  OISO

  • Training
  • Service Maintenance
  • Access
  • Service Requests

Audience: Any technical support staff that manages a server,  application, or any I.T. infrastructure on campus.

Definition: Vulnerability Management

  • What is Vulnerability Management?
  • What are the underpinnings of a compliant solution?

Purpose: Business case & Solutions requirements (.docx)

  • The challenges and reasoning that has lead to this solution.
  • Definition of solution requirements

Standards and Compliance: UAlbany Server Standards

  • In order to maintain compliance with UAlbany Server Standards, the system administrator must have a method to continuously acquire, assess, and respond to information that identifies vulnerabilities to facilitate remediation, and thereby minimize the window of opportunity for attackers.

 

 

 




Documentation

Roles & Responsibilities: Security Center - Roles.docx
 


Procedures:

 


Process Workflows (working documents):


Expectations:  Expectations.pdf