Cyber security is an ongoing responsibility. UC, UCLA, and SEASnet have established standards and policies to manage risks, detect issues, and mitigate them. The overarching policy that governs this is UC’s Electronic Information Security Policy (IS-3).
Understanding Risk
Identifying risks is a key component of cyber security. We are required to assess and report risk levels of various types of Institutional Information and IT Resources to UC. For more details, refer to UCOP’s site for guidance on classification levels. In summary, both data and devices are classified by Protection Levels and Availability Levels. If you possess data or devices that pose a risk to you or the University, as defined in these classifications, notify us immediately. We will also periodically check in with you. Remember, any device connected to the network can present a risk if exploited by malicious actors to access our systems.
Detecting Problems
Monitoring network activity and device behavior is essential for a proactive security stance. UC deploys a system-wide Threat Detection and Identification toolset, and UCLA/SEASnet utilize local tools to detect potential attacks and vulnerabilities. One of these tools performs regular network scans and provides reports with remediation recommendations. For University-owned devices, Trellix Endpoint Security software is required, offering real-time threat detection and prevention. For more details, visit the Detecting Problems page.
Mitigating Problems
SEASnet receives notifications about vulnerabilities, malware, or unusual network activity through various channels and is responsible for addressing them. When you are notified of a security incident, it is your responsibility to acknowledge, act, and respond within the designated timeframe. Failure to do so may result in loss of network access, exposure to broader risks, or even legal consequences.
—-
When requesting to connect your machine to the network, ensure that it complies with all relevant policies, including:
- University of California’s Minimum Security Standard
- UCLA’s Minimum Security Standard (Policy 401). See Policy 401, Attachment A in particular.
- Institutional Information and IT Resources are logged and reported
If your compromised system contains personal data (such as Social Security numbers, credit card information, or health records), you must follow the procedure outlined in UCLA Policy 420 to comply with California State Law.
For guidance on securing your machine, refer to the SEASnet-provided guidelines. If you have any questions, please contact the SEASnet Help Desk.