Security Standards/Guidelines/Policies

Syracuse University IT security standards and procedures are created by the University's Chief Information Security Officer (CISO) in conjunction with the Information Security Council (ISC) and are approved by the University's Chief Information Officer (CIO). The standards and procedures are also subject to vetting and refinement by the Technology Leadership Committee (TLC) and members of the campus technology community.

All of the IT standards listed are based on Syracuse University policies, which are available on the University's Policies Web site.


Information Technology Security Standards and Procedures

For the latest Security Standards and Procedures, please see the Information Technology Security Standards and Procedures page. Note that a valid campus login is required. 


Information Security Vulnerability Scan Process

Member of the campus IT community who administrate servers, websites, and campus devices are required to participate in the campus vulnerability scan process. See the Information Security Vulnerability Scan Process page for complete details. Note that access is restricted to campus IT community members. 



Comments or questions about these standards and procedures can be submitted to itsecurity@listserv.syr.edu.Â