ROWAN UNIVERSITY POLICY
Title: Information System Configuration Management Policy
Subject: Information Security
Policy No: ISO: 2024:02
Applies: University-Wide
Issuing Authority: Senior Vice President for Information Resources and Technology and Chief Information Officer
Responsible Officer: Information Security Officer
Date Adopted: 06/05/2024
Last Revision: 06/05/2024
Last Review: 06/05/2024
I. PURPOSE
The purpose of this policy is to ensure that Information Technology (IT) resources are inventoried and configured in compliance with IT policies, standards, and procedures.
II. ACCOUNTABILITY
Under the direction of the President, the Chief Information Officer and Information Security Officer shall ensure compliance with this policy. The Vice Presidents, Deans, and other members of management will implement this policy in their respective areas.
III. APPLICABILITY
This policy applies to all Rowan enterprise IT systems and those systems deemed operationally critical to the mission of the University.
IV. DEFINITIONS
Refer to Rowan University Technology Terms and Definitions for terms and definitions that are used in this policy.
V. POLICY
Information system owners must ensure that the configurations of all applicable systems are set up and managed in accordance with the following guiding principles:
- Baseline Configuration
- In order to achieve baseline configuration, system owners shall:
- Develop, document, and maintain under configuration control, a current baseline configuration of information systems, within the University’s configuration management database (CMDB), where appropriate
- Review and update the baseline configuration of the information system on an annual basis or when significant changes to the information system occur, such as installations or upgrades.
- Retain one previous version of baseline configurations of information systems to support rollback.
- In order to achieve baseline configuration, system owners shall:
- Configuration Change Control
- In accordance with the Change Management Policy, system owners shall:
- Determine the types of changes to the information system that are configuration-controlled.
- Review proposed configuration-controlled changes to the information system and approve or disapprove such changes with explicit consideration for impact analyses.
- Document configuration change-decisions associated with the information system.
- Implement approved configuration-controlled changes to the information system.
- Retain records of configuration-controlled changes to the information system.
- Coordinate and provide oversight for configuration change control activities.
- Test and validate changes to the information system before implementing the changes on the operational system, where feasible.
- In accordance with the Change Management Policy, system owners shall:
- Security Impact Analysis
- In accordance with the Change Management Policy, ISO shall:
- Analyze changes to the information system to determine potential security impacts prior to change implementation.
- Provide requirements to configuration changes in order to follow industry best practices, Rowan University standards, etc.
- In accordance with the Change Management Policy, ISO shall:
- Configuration Settings
- For the set of parameters that can be changed in hardware, software, and/or firmware that affect the security posture and/or functionality of the information system, System Owners or their designee shall:
- Establish, document, and implement configuration settings for the information system that reflect the most restrictive mode consistent with operational requirements.
- Identify, document, approve, and submit to change control any deviations from established configuration settings based on operational requirements.
- Work with the system owner to update the baseline configuration as appropriate.
- For the set of parameters that can be changed in hardware, software, and/or firmware that affect the security posture and/or functionality of the information system, System Owners or their designee shall:
- Least Functionality
- In accordance with the principle of least functionality, system owners or their designees shall:
- Configure the information system to provide only operationally necessary capabilities.
- Prohibit or restrict the use of ports, protocols, software, and services that are not required for meeting the business function of the information system.
- As technically and operationally feasible, limit component functionality to a single function per device (e.g. database server, web server, etc.).
- In accordance with the principle of least functionality, system owners or their designees shall:
- Information System Component Inventory
- In order to provide a comprehensive view of the components that need to be managed and secured, System Owner or their designee:
- Inventory and track all information system components in accordance with IRT standards, policies and procedures.
- Review and update the information system component inventory annually.
- As technically and operationally feasible, employ mechanisms to help maintain current inventories of information assets.
- Prevent duplicate accounting of system components using a centralized inventory management system.
- In order to provide a comprehensive view of the components that need to be managed and secured, System Owner or their designee:
- Roles and Responsibilities
- The Information Security Office will work with information system owners to document configuration standards and baselines.
- ISO and system owners will document any deviations from industry standards and requirements that cannot be implemented due to business or other environmental considerations.
- ISO will audit configuration baselines on a regular basis to ensure they are still within acceptable industry standards and Rowan requirements.
- System owners will implement these standards, settings and baseline configurations across all information systems.
VI. POLICY COMPLIANCE
Violations of this policy may subject the violator to the removal of system access or disciplinary actions, up to or including termination of employment or dismissal from a school, subject to applicable collective bargaining agreements and may subject the violator to penalties stipulated in applicable state and federal statutes. Sanctions shall be applied consistently to all violators regardless of job titles or level in the organization per the Acceptable Use Policy. Any exceptions to this policy must be approved by the Information Security Office.
By Direction of the CIO:
Mira Lalovic-Hand,
SVP and Chief Information Officer