{"id":280,"date":"2015-04-02T16:30:58","date_gmt":"2015-04-02T20:30:58","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=280"},"modified":"2015-04-02T16:30:58","modified_gmt":"2015-04-02T20:30:58","slug":"the-time-for-encryption-and-workstation-management-is-now","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2015\/04\/02\/the-time-for-encryption-and-workstation-management-is-now\/","title":{"rendered":"The time for Encryption and Workstation Management is Now"},"content":{"rendered":"<p class=\"p1\">IT Colleagues,<\/p>\n<p class=\"p1\">Protecting the huge variety of information the University collects and manages is everyone&#8217;s responsibility. \u00a0For those of us with IT roles, people whose IT needs we support look to us to provide safe and secure ways to manage information. \u00a0The need is particularly critical when it comes to protecting personal and private information on students, employees, research subjects, and other affiliates. \u00a0No one wants to be responsible, even by accident, for exposing personal information that could cause harm to individuals, impact UVM&#8217;s reputation, and incur significant costs.<\/p>\n<p class=\"p1\">As IT people, it&#8217;s our responsibility to help others work securely, including implementing critical laptop and &#8220;desktop&#8221; protections such as encryption and domain joining. \u00a0Some protections are mandated by policy, and others are best practices. \u00a0ETS can help.<\/p>\n<p class=\"p1\"><b>How We Need to Help<\/b><\/p>\n<p class=\"p1\">One of the most important ways we can help our clientele work securely is to help them secure their computers and other devices. \u00a0The\u00a0<a href=\"http:\/\/www.uvm.edu\/policies\/cit\/infosecurityprocedures.pdf\"><span class=\"s1\">Information Security Procedures<\/span><\/a>\u00a0mandate several precautions that IT personnel generally need to set up for their clients:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\">Encryption of UVM- and personally-owned devices that could carry institutional data<\/li>\n<li class=\"li1\">Use of University storage and email (rather than external, cloud services)<\/li>\n<li class=\"li1\">Malware protection<\/li>\n<li class=\"li1\">Automatic software updates<\/li>\n<li class=\"li1\">Software that is supported with prompt security fixes (especially operating systems)<\/li>\n<li class=\"li1\">Requiring a password for start-up and wake from sleep or screen saver (ten-minute time-out)<\/li>\n<li class=\"li1\">Destruction of data when a device is transferred or recycled<\/li>\n<li class=\"li1\">Protection from theft<\/li>\n<\/ul>\n<p class=\"p1\">In addition, best practices include:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\">Working as a nonprivileged user, without administrative rights (a separate admin account can be set up for use only when needed)<\/li>\n<li class=\"li1\">Workstation management via joining Windows computers to the Campus domain and, for Macintoshes, Casper<\/li>\n<li class=\"li1\">An inventory of all departmentally owned IT equipment<\/li>\n<\/ul>\n<p class=\"p1\"><b>Encryption Works Now<\/b><\/p>\n<p class=\"p1\">Any University-owned laptop computer used to access UVM non-public data or file services\u00a0must have its storage\u00a0system encrypted using a University-approved encryption system, with\u00a0UVM retaining the encryption key. \u00a0That&#8217;s a very good idea for &#8220;desktop&#8221; computers, too, since they also are subject to theft. \u00a0When devices are stolen, encryption gives UVM a safe harbor under privacy protection laws such as Vermont Act 162; without encryption, legally mandated investigation and notification steps are time-consuming and can be expensive.<\/p>\n<p class=\"p1\">PGP Whole Disk Encryption was far from easy and problem-free, and consequently, the number of laptops protected by encryption has been low. \u00a0But with BitLocker for Windows and Casper\/FileValult for OS X, we really must finish the job and get all laptops encrypted. \u00a0<i>Encryption is mandatory<\/i>\u00a0for all laptops and portable devices &#8212; and it&#8217;s a feasible, reasonable precaution for desktops, as well. \u00a0The best way to ensure compliance is to use centrally provided deployment services for each platform\u00a0and ensure encryption is enabled at deployment. \u00a0All new laptops configured by the ETS Client Services Computer Depot will have BitLocker or Casper\/FileVault encryption, and ETS is discussing configuring new desktops for encryption. \u00a0For computers that are already in service, ETS can help, and\u00a0<a href=\"https:\/\/www.uvm.edu\/it\/security\/encryption\/\"><span class=\"s1\">instructions<\/span><\/a>\u00a0are available.<\/p>\n<p class=\"p1\">Encryption works now; let&#8217;s take advantage and use it.<\/p>\n<p class=\"p1\"><b>One-Step Security: Join the Domain\u00a0<\/b><\/p>\n<p class=\"p1\">Managing UVM-owned computers through Active Directory (Windows) and Casper (OS X) is the best way to take care of key usability, support, policy compliance, and security needs &#8212; while preserving user flexibility and local control. \u00a0It works well. \u00a0It encourages consistency. \u00a0It enhances security. \u00a0It ensures legal safe harbor for stolen devices by proving encryption status. \u00a0It keeps an inventory. \u00a0And it&#8217;s free. \u00a0Contact <a href=\"mailto:saa-ad@uvm.edu\"><span class=\"s1\">saa-ad@uvm.edu<\/span><\/a> for more information.<\/p>\n<p class=\"p1\">Providing and enforcing a secure computing environment involves a mix of best practices and actions that are mandated by policy or by law. \u00a0 I recognize that the urgency of putting out today&#8217;s fires can push security to the back burner, but in the long term, letting security slip will have a greater and more painful cost. \u00a0I hope that each of us will do everything we can to give it priority.<\/p>\n<p class=\"p1\">Are there ways that ETS or the Information Security Operations Team could help you provide and promote good security? \u00a0Please let us know.<\/p>\n<p class=\"p1\">Best regards,<\/p>\n<p class=\"p1\">Dean Williams<\/p>\n<p class=\"p3\">Information Security Officer<\/p>\n<p class=\"p3\">Enterprise Technology Services<\/p>\n<p class=\"p4\"><span class=\"s2\"><a href=\"mailto:Dean.Williams@uvm.edu\">Dean.Williams@uvm.edu<\/a><\/span><span class=\"s3\">\u00a0| 802-656-1174\u00a0\u00a0<\/span><\/p>\n<p class=\"p3\">Find information security news, best practices,\u00a0and how to report\u00a0concerns on the UVM Computing Web site:<\/p>\n<p class=\"p4\"><span class=\"s2\"><a href=\"http:\/\/www.uvm.edu\/it\/security\">http:\/\/www.uvm.edu\/it\/security<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Colleagues, Protecting the huge variety of information the University collects and manages is everyone&#8217;s responsibility. \u00a0For those of us with IT roles, people whose IT needs we support look to us to provide safe and secure ways to manage information. \u00a0The need is particularly critical when it comes to protecting personal and private information &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2015\/04\/02\/the-time-for-encryption-and-workstation-management-is-now\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The time for Encryption and Workstation Management is Now&#8221;<\/span><\/a><\/p>\n","protected":false},"author":252,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-280","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Dean","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/djw\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/252"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=280"}],"version-history":[{"count":2,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/280\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/280\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}