Information Security
Processes
Last modified 3/25/2020
High-level documents that detail a series of actions to achieve the desired end result.
- CIS Safeguard 8.1 - Establish and Maintain an Audit Log Management Process
- CIS Safeguard 8.2 - Collect Audit Logs
- CIS Safeguard 8.3 - Ensure Adequate Audit Log Storage
- CIS Safeguard 10.1 - Deploy and Maintain Anti-Malware Software
- CIS Safeguard 10.2 - Configure Automatic Anti-Malware Signature Updates
- CIS Safeguard 10.3 - Disable Autorun and Autoplay for Removable Media
- Data Usage Form (DUF) Process
- InCommon Certificate Request Processes
- Information Security Document Release Process
- Security Exemption Process
Feedback
To suggest an update to this article, ISU students, faculty, and staff should submit an Update Knowledge/Help Article request and all others should use the Get IT Help form.