SP 6-10e
APPROVED: January 28, 2021
EFFECTIVE: January 28, 2021
REFERENCES:
Board Policy (BP) 6-10, Cyber Security Policy
System Procedure (SP) 6-10b, Access and Authentication
System Procedure (SP) 6-10r, Physical Security and Access
System Procedure (SP) 6-10q, Network Device Configuration
System Procedure (SP) 6-10c, Anti-Virus and Anti-Malware Management
System Procedure (SP) 6-10f, Backup and Recovery
System Procedure (SP) 6-10n, Information Security Incident Response
APPROVED:
/ Joe Garcia /
Joseph A. Garcia
Chancellor
This procedure documents Colorado Community College System and its Colleges’ (CCCS) requirements for activities that are monitored to assure security, integrity, and operational effectiveness of Information Systems and Assets. This procedure also establishes the requirements for capturing audit log information and the requirements for regularly monitoring, recording, and reporting audit log information of CCCS Information Systems and Assets.
This procedure applies to Information Assets owned, leased, managed, and maintained by the System Information Technology Department (“System IT”) and/or College’s Information Technology Department (“College IT”) or by third parties on behalf of CCCS.
Audit Log
Audit log is defined as a chronological record of Information System activities including records of system accesses and operations performed in a given period.
The System Chancellor delegates to the System Vice Chancellor for Information Technology responsibility for oversight of compliance with and implementation of this procedure. Further, the System Chancellor delegates to the College Presidents the responsibility to implement and compliance with this procedure at their respective institution.
General Information
Automated active monitoring of CCCS Information Systems and Assets as well as manual monitoring of activities, logs and other measures that are intended to communicate information about performance and security is essential for ensuring that CCCS’s Information Technology environment is effectively operating and adequately protected. CCCS shall review Information System activities on a regular basis using the most effective tools available in order to detect and minimize security violations and threats to CCCS Information Systems and Assets.
Network and Server Logging
Firewalls and Perimeter Devices
User Accounts and Backups
Reporting
CCCS reserves the right to change any provision or requirement of this procedure at any time and the change shall become effective immediately.