Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Overview

Service Providers:  OISO

  • Training
  • Service Maintenance
  • Access
  • Service Requests

Audience: Any technical support staff that manages a server,  application, or any I.T. infrastructure on campus.

Definition: Vulnerability Management

  • What is Vulnerability Management?
  • What are the underpinnings of a compliant solution?

Purpose: Business case & Solutions requirements (.docx)

  • The challenges and reasoning that has lead to this solution.
  • Definition of solution requirements

Standards and Compliance: UAlbany Server Standards

  • In order to maintain compliance with UAlbany Server Standards, the system administrator must have a method to continuously acquire, assess, and respond to information that identifies vulnerabilities to facilitate remediation, and thereby minimize the window of opportunity for attackers.

 

 

 

Documentation

Roles & Responsibilities: Security Center - Roles.docx

 

Procedures:

 

Process Workflows (working documents):


Expectations:  Expectations.pdf

  • No labels