System Offices Cybersecurity Procedures and Standards

Cybersecurity Procedures and Standards guide the IT organization and The Texas A&M University System Offices in execution of cybersecurity administration.  They are specific to System Offices and supplement A&M System policies and regulations.

 

29.01.99.S0.01 Web Accessibility and Usability Procedures PDF
Acceptable Use PDF
Account Management PDF
Administrator and Special Access PDF
Authorized Software PDF
Backup and Recovery PDF
Change Management PDF
Data Breach Reporting PDF
Data Classification and Data Protection PDF
Disaster Recovery PDF
Employee Instant Messaging PDF
Encryption of Confidential and Sensitive Information PDF
Exclusions from Required Risk Mitigation Measures PDF
Incident Management PDF
Information Security Risk Assessment Reviews PDF
Internet and Intranet Usage PDF
Intrusion Detection PDF
Malicious Code PDF
Network Configuration PDF
Notification of Unauthorized Access, Use, or Disclosure of Sensitive Personal Information PDF
Password Authentication PDF
Physical Access PDF
Portable Devices PDF
Privacy PDF
Security Awareness and Training PDF
Security Monitoring PDF
Security Surveillance PDF
Server Hardening PDF
System Development and Acquisition PDF
Use of Peer-To-Peer File Sharing Software PDF
Vendor Access PDF
Web Accessibility and Usability PDF
Wireless Access PDF