Search

Third Party System Guidelines

Information Protection Guides


Securing Third Party (Contractor) Systems on Campus

In order to keep campus network assets safe, third party systems are to undergo a security assessment to ensure they are resilient to internal and external attacks and any identified vulnerabilities dealt with. 

All systems are to be checked by the IT Security Officer before the system goes “live”.

The following checklist provides guidance to contractors and departments on how to properly secure a system.


Policy and Governance

 

Operating System and Basic Applications

 

Physical Security and Contingency Planning

 

Network Placement