Purpose
This document is to establish a process for assessing information systems for risks to systems and data; documenting and communicating those risks to university leadership to make decisions regarding the treatment or acceptance of those risks. The security and privacy of Protected Data will be a primary focus of risk assessments.
It specifies the details of the information systems standards as referred to by policies:
- 8000 Information Technology Resource Use
- 8020 Enterprise Servers and Storage
- 8030 Desktop, Laptop, and Tablet PC Computing Standards
- 8050 Software Patch Management
- 8060 Information Privacy and Data Security
Scope
To ensure the security of its data and systems, Boise State requires thorough risk assessments from all third-party service providers and cloud-based services it contracts with. These assessments are not only mandated by some regulations but are also crucial whenever new systems are implemented or significant changes occur that could impact security controls. This proactive approach helps Boise State identify and mitigate potential risks before they become security incidents.
Standards
Leveraging the NIST Risk Management Framework, Boise State University prioritizes four key areas to address the most common vulnerabilities identified through risk assessments:
- Configuration Management: By implementing pre-hardened system profiles from the outset, the university minimizes the risk of unnecessary services and configurations being deployed.
- Log Monitoring: Regular log review is a core security practice. Boise State emphasizes the importance of auditing logs to proactively detect and address potential system and security issues.
- Access Management: A recurring theme in risk assessments is account lifecycle management. The university highlights the importance of routinely reviewing accounts and access privileges to ensure appropriate control.
- Patch Management: Regular application and system patching is a cornerstone of the university’s information security program. This proactive approach helps mitigate financial, reputational, and regulatory risks associated with unpatched vulnerabilities.
Risk Assessment Steps
Step 1: Categorize
Categorize the information system and the information and data processed, stored, and transmitted by that system based on likelihood and impact to individuals and the university if the information is subject to a breach or unauthorized disclosure.
All information systems that create, process, store, or transmit Restricted or Confidential data must be assessed for risk to the university that results from threats to the integrity, availability and confidentiality of the data.
The following criteria should be used for categorization:
Likelihood Ranking Criteria:
Impact Ranking Criteria:
Risk Score:
Step 2: Select
Select an initial set of baseline security controls based on the data classification levels described in Information Privacy and Data Security (Policy 8060).
Step 3: Assess
Assess the extent to which security controls are correctly implemented, operating as intended, and producing the desired outcome.
The core elements of a risk assessment include:
- Scope of assessment
- Current state of security control implementation
- Documentation of identified threats, vulnerabilities, and risks associated with the system
- Mitigation recommendations to reduce risks and threat potential to the system.
Risk assessments for systems or applications that create, store, process, or transmit Restricted or Confidential data are required to be conducted by OIT staff under the following circumstances:
- After a major architectural change to the service, and
- Soon after a serious security incident is reported
- When required by regulation or law.
Step 4: Implement
Implement the appropriate risk-reducing controls as identified by the risk assessment process.
This plan requires the assessed area to review all security control recommendations and either: a) agree to mitigate as stated; or b) propose alternative or revision to specific control recommendation(s).
Components of risk treatment plans include:
- Description of security mitigation recommendation
- Primary staff responsibility for each recommendation
- Estimated financial costs, time and staffing resources to carry out identified mitigation recommendations, including estimated start and completion dates
- Metrics to evaluate progress and success
- Exception requirements if security controls cannot be implemented
Step 5: Evaluate
Evaluate that an identified but unmitigated risk is acceptable. Risks are quantitatively and qualitatively expressed as Severe, High, Medium, Low and Very Low.
In general, Boise State departments and individuals may not unilaterally accept information security and compliance risks that result in the greater university’s vulnerability to cyber risks. Specifically:
- Residual high and severe risks identified in risk assessments but not mitigated in an established timeframe may only be accepted on behalf of the university by department leadership with the acknowledgement of the Chief Information Security Officer.
- Approval authority may be delegated if documented in writing, but ultimate responsibility for risk acceptance on behalf of the university cannot be delegated.
Step 6: Monitor and Follow-Up
CISO will follow-up with departments on an ongoing basis to ensure and track progress of open risk treatment plans.
References
- NIST Risk Management Framework
- Information Technology Guidelines
- Information Technology Standards
- Software and Accessibility Review Board
Non-Compliance and Exceptions
A Request for IT Security Policy/Standards Exception, along with a plan for risk assessment and management, can be submitted via Help Desk Self Service. Non-compliance with these standards may result in revocation of access, notification of supervisors, and reporting to the Office of Internal Audit and Institutional Compliance.
Updates
Created: November 2024
Last Update: November 2024
Next Review: February 2025