Asset Management Policy

Purpose

To provide ƽÌØÎå²»ÖÐ College with guidance in identifying and gaining an understanding of the components of the institution that make up its information security system and thereby enable ƽÌØÎå²»ÖÐ College to manage cybersecurity risk to systems, assets, data, and capabilities.

Policy

In order for ƽÌØÎå²»ÖÐ College leadership to make informed, business-driven decisions regarding computing assets, they must first know what assets exist, and the status of those assets. This information provides ƽÌØÎå²»ÖÐ College visibility into license utilization, software support costs, unauthorized devices, vulnerabilities, threats, and compliance posture. IT assets include items such as servers, desktops, laptops, and network devices, as well as software, applications, programs and logical processes. ƽÌØÎå²»ÖÐ College data, students, faculty, staff, devices, systems, and facilities that enable the organization to achieve educational, business, and operational purposes are identified and managed. The management of these assets is consistent with their relative importance to ƽÌØÎå²»ÖÐ College educational, business, and operational objectives as well as ƽÌØÎå²»ÖÐ College’s overall risk strategy.

Summary

  • All devices purchased with ƽÌØÎå²»ÖÐ College funding will be inventoried.
  • The inventory is kept up to date either through manual inspection or automated tools
  • Unauthorized hardware detected by automated mechanisms will have its network access disabled and Information Technology Services (ITS) will be notified of its existence.
  • All software will be inventoried.
  • Automated tools will be used to detect unauthorized software and if unauthorized software is discovered, ITS will be notified.
  • ITS will protect ƽÌØÎå²»ÖÐ College assets both through the use of encryption, user education and infrastructure design.
  • Any external system connections will need to be documented by ƽÌØÎå²»ÖÐ College ITS in order to ensure they are secure.

Asset Management Policy Details [pdf]