Desktop and Laptop Security
|
|
Objective
In accordance with the Information Security and Acceptable Use Policy, all OCC-owned
desktop and laptop computers must comply with the following procedure.
Additional notes on applicability:
Scope
This procedure applies to all desktop and laptop computers owned or managed by OCC.
Operating System
Operating system software must be a licensed and supported version of Microsoft Windows,
Apple Mac OS X, Linux, or other UNIX variants. For Microsoft Windows, Windows 10 Enterprise
is recommended and Windows 7 Enterprise may be used only for application compatibility;
other versions and editions of Microsoft Windows are not recommended. For Apple OS
X, Apple typically supports the current version and one previous version. For Linux
and UNIX, any commercially or community supported version is acceptable.
Naming Conventions
The standard naming convention for employees should include the campus identifier
followed by the employee ID. For example, a computer belonging to Jane X Smith located
at the Auburn Hills Campus would be assigned the name “AH-JXSMITH”.
The standard naming convention for student use PCs should include the campus identifier
followed building, room, and unique sequential identifier. For example, a computer
located at Auburn Hills building C, room 209 would be assigned the name “AHC209-01,
02, etc.”
DNS Registration
All computers must be registered with the OCC Domain Name Service (DNS) network addressing
system in order to properly communicate on the OCC wired network. It is recommended
that a static address reservation be used to promote consistent records. For systems
that connect solely to a segmented network managed by local school or department personnel,
registration is recommended but not required.
Domain Membership
Participation in the Microsoft Windows Active Directory domain (oaklandcc.edu) allows
convenient access to shared resources, ease of authentication, and automated policy
settings. When feasible, computers should be joined to the domain. If a computer cannot
be joined to the domain, the following security controls must be applied manually:
Workstation Configuration
All workstations must be configured with a:
Patching
All applications must be at least at version n-1. Security patches must be installed
in a timely manner, depending on the likelihood and impact of vulnerability exploitation,
at least within 14 days of release.
Remote Access
Remote access to a desktop or laptop computer must only be achieved through an encrypted
service sanctioned by IT. For example, Citrix Access is permissible, while freeware
such as RealVNC downloaded from the Internet is considered unsafe. SSH is permissible,
while telnet is considered unsafe because it is natively clear text. VPN clients only
on OCC issued equipment to access OCC internal devices.
Locally Installed Applications
All installed applications must be at least at version n-1. Security patches must
be installed in a timely manner, depending on the likelihood and impact of vulnerability
exploitation, at least within 7 days of release.
Software Agents
Computers must run the following security agents where compatible:
Backups
If data is stored locally on the workstation or laptop, copying data with value to
OCC to network storage is recommended as frequently as necessary to sustain job responsibilities.
Data Restrictions
Full-disk encryption is required for all laptops, regardless of age or operating system
where employees responsibilities include handling of confidential, FERPA, HIPPA, PII
data, or has financial approval authority for purchasing or payments
No unlicensed applications nor unauthorized Copyrighted content (software, music, video, pictures, etc.) shall be loaded on the system. Pursuant to the Digital Millennium Copyright Act (DMCA) the device will not be used to stream illegally obtained content to or from the device.
Data Removal
Users are required to remove College Data from any device before giving it to a third-party
for maintenance, re-use, or trade-in. Devices may also be subject to remote wiping
by authorized College personnel in the event owner’s affiliation with OCC ends, the
device is lost or stolen, or at the direction of IT to contain an incident. Users
are responsible for the data from their business area, users are required to remove
all business data from their device before device is surrendered for replacement or
re-use. Warehouse staff will follow their written procedures to remove all OCC data
from devices before salvage.
Software-Based Firewall
Laptops must be configured to enable software-based firewall functionality when connected
to nonOCC networks. AD group policy will control firewall configurations on attached
Windows devices.
Physical Security
Desktop and laptop computers may use cable locks to deter physical theft. When traveling,
laptops should not be left unattended in public areas and should be stored in a manner
that prevents observation by potential thieves, such as inside the trunk of a car
or within a hotel safe.
Logical Security
All OCC laptops where device tracking is available in the Operating System must enable
that feature.
Exemptions
In the event that compliance with this desktop and laptop procedure cannot be met,
please contact itsecurity@oaklandcc.edu to submit an exemption request which will
be approved or denied by IT. Denied exemption requests may be appealed to the CIO
for final decision.
Change Log