Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) The purpose of this Policy is to establish a consistent and timely approach to identifying and mitigating vulnerabilities in IT Resources. (2) This Policy applies to all Macquarie University (the University) Staff and Third-Parties involved in Security Vulnerability management activities. (3) University Staff involved in Security Vulnerability management activities should monitor internal and external resources (e.g., Security Vulnerability scanning solutions, vendors’ newsletters/articles, vendor Security Vulnerability notifications, threat intelligence reports, findings from assurance testing, post incident reviews, ad-hoc notifications) for up-to-date intelligence regarding Security Vulnerabilities and Patches. (4) IT Resources that have reached their End-of-Life support by vendors should (where practicable): (5) If Security Vulnerability management activities are outsourced, a Service Level Agreement (SLA) should be in place to require the Third-Party to undertake Security Vulnerability management activities in accordance with this Policy. (6) An automated method of asset discovery should be used at least fortnightly to support the detection of IT Resources for subsequent Security Vulnerability scanning activities. (7) A Vulnerability Scanner, with an up-to-date Security Vulnerability database, should be used for Security Vulnerability scanning activities in accordance with the requirements set out in the ‘Security Vulnerability Scanning Schedule’ section of this Policy. (8) A Security Vulnerability scan should be performed if there is any significant change to the IT Resource. The scan should encompass the scope of the change. (9) Patches, where released by a vendor, should be deployed according to the Patching Schedule section of this Policy. (10) Emergency Patching (e.g., out-of-band vendor Patch releases) should be conducted according to the Security Vulnerability’s risk rating, per the ‘Security Vulnerability Risk Rating Assessment’ section of this Policy. (11) IT Resources that are unable to be patched should have mitigative controls applied (e.g., additional monitoring and alerting), to mitigate risks to an acceptable level. (12) A rollback and contingency plan, including backup and restore procedures, should be developed for Patches to critical IT Resources. (13) Patches should be tested prior to implementation into the production environment In situations where Patches cannot be tested prior to deployment the Change Advisory Board will determine whether the Patch should be implemented. (14) An automated mechanism should be used to confirm and record that Patches have been successfully installed. (15) Exemption from this Policy must be sought from the Chief Information Security Officer (CISO). (16) Breaches of this Policy by Staff will be managed in accordance with the applicable provisions of the Staff Code of Conduct and other relevant policy instruments. (17) The table below outlines the Security Vulnerability scanning schedule that applies to all IT Resources: (18) The table below outlines the Patch application timeframe that apply to all IT Resources. Patches should be assessed for critically, in the context of the University, before being implemented. (19) A risk assessment must be conducted on vulnerabilities as they are published or advised by software and infrastructure vendors. (20) The risk rating of a particular vulnerability is calculated by assessing the risk factors in Table 1 below. (21) The following Risk Rating calculation is used to determine the risk that a vulnerability poses to the University: (23) The following definitions apply for the purpose of this Policy:Vulnerability Management Policy
Section 1 - Purpose
Scope
Section 2 - Policy
Asset Discovery
Security Vulnerability Scanning
Patch Management
Compliance and Exemptions
Section 3 - Procedures
Security Vulnerability Scanning Schedule
IT Resource Category
Examples
Security Vulnerability Scanning Frequency
Patching Schedule
IT Resource Category
Examples
Patch Application Timeframe
Vulnerability Risk Assessment
Table 1: Risk Factors
Risk factor
Risk rating = 1
Risk rating = 2
Risk rating = 5
Table 2: Risk Rating – severity and notification and response requirements
Top of Page
Risk Rating
Severity
Description
Notification
Response
Section 4 - Guidelines
Top of PageSection 5 - Definitions