/
Security Standards/Guidelines/Policies

Security Standards/Guidelines/Policies

Syracuse University IT security standards and procedures are created by the University's Chief Information Security Officer (CISO) in conjunction with the Information Security Council (ISC) and are approved by the University's Chief Information Officer (CIO). The standards and procedures are also subject to vetting and refinement by the Technology Leadership Committee (TLC) and members of the campus technology community.

All of the IT standards listed are based on Syracuse University policies, which are available on the University's Policies Web site.


Information Technology Security Standards and Procedures

For the latest Security Standards and Procedures, please see the Information Technology Security Standards and Procedures page. Note that a valid campus login is required


Information Security Vulnerability Scan Process

Member of the campus IT community who administrate servers, websites, and campus devices are required to participate in the campus vulnerability scan process. See the Information Security Vulnerability Scan Process page for complete details. Note that access is restricted to campus IT community members. 



Comments or questions about these standards and procedures can be submitted to itsecurity@listserv.syr.edu

Related content

Security 101
More like this
Data Classification Definitions
Data Classification Definitions
Read with this
Information Security
Information Security
More like this
Engineering and Computer Science IT Support (CIT)
Engineering and Computer Science IT Support (CIT)
More like this
ITS Contract Review and Approval Process
ITS Contract Review and Approval Process
More like this