Servers on the university’s network that require inbound access from the Internet must be approved and registered with the Information Security Office.
The server owner is responsible for the following:
Patch Management: Create a consistently configured environment that is secure against known vulnerabilities in operating system and application software. The server owner must know which security issues and software updates are relevant to their environment, and who is the person responsible for keeping up to date on newly released patches and security issues that affect the systems and applications deployed in their environment.
Anti-Virus and Spyware Management: Download the latest virus removal tools from a university-approved licensed anti-virus and spyware software product. The IT Service Desk can assist you with installing a university approved Anti-Virus and Anti-Spyware product.
Safeguarding Integrity of Information: Create a system and method for secure data transmission, data storage and data retrieval over the network. All data containing high-risk, restricted or confidential information must be encrypted.
Third party or guest servers may be hosted on the university’s network only in agreement with the Director of Systems and Network Management, and must be registered with the Information Security Office. The person registering the site is responsible for ensuring that the server content and management complies with this guideline and university policies.
Generally accepted ports allowed in the firewall rules when registering a server include:
22 (SSH/Secure Shell)
All other requests for ports that are required for inbound access from the Internet (affecting the perimeter firewall rules) must be documented with a legitimate business or academic purpose and approved by both the Information Security Office and Network Security Administrator. Any questions regarding the registering of a server can be sent to email@example.com.