/
Information Security Management
Information Security Management
Overview
This page provides guidelines, procedures, and standards for managing information security within the College of the Environment. It outlines best practices for protecting sensitive data, managing system vulnerabilities, and responding to security incidents.
Key Policies and Guidelines
1. Incident Response
2. Account and Access Management
3. Data Management
4. System Management
5. Endpoint Protection
GDL-3000.07F: Secure Endpoints: Deployment and Configuration Guidelines
GDL-3000.07G: Endpoint Malware and Threat Protection Guidelines
6. Change and Release Management
Standards and Procedures
Authentication and Network Services
Security Notifications
Computing and Device Use
Reporting Security Incidents
If you encounter a security incident or suspect a breach, please refer to the Cybersecurity Incident Response Guidelines for detailed steps on reporting. Early reporting is crucial to protecting our network and sensitive data.
For Assistance
For any security-related questions or issues, please contact:
Beth | Director of Information Security
Email: beth@wwu.edu
, multiple selections available,
Related content
Print Management
Print Management
Read with this
IT Operations
IT Operations
More like this
Software Management
Software Management
More like this
Data Management
Data Management
More like this
Leica Application Suite X Industry (LAS X)
Leica Application Suite X Industry (LAS X)
More like this
Active Directory Guide for CENV
Active Directory Guide for CENV
More like this