Security
The University collects and maintains a wide variety of sensitive data, from personally identifiable information, student, financial and HR info, to valuable research findings. Security’s role is to help teams developing or supporting such systems understand potential security risks and develop plans to mitigate any exposure.
Security evaluates the implications of implementing new applications within the AITS infrastructure. Representatives determine the classification of data stored or processed by the application. For cloud-based products, they review controls of the third-party hosted environment. Additionally, they provide advice on implementation including authentication, encryption options, and access control.
Close collaborators
- Dv
- Pm
- Qa
- An
- I
- Db
- C
Activities
- Determine data classification of data processed/stored by the application
- Consult on needed access controls
- Define needed authentication requirements
Key Products
- Completed security checklist
- Security recommendations for RFP drafts