CSU Information Security Policies and Standards
ISO Domain 5: Information Security Policy
The policy describes the responsibility for overseeing a documented annual review and communicating any changes or additions to appropriate CSU stakeholders.
ISO Domain 5: Information Security Policy Link
ISO Domain 6: Organization of Information Security Policy
This policy states that each campus must develop, implement, and document the organizational structure that supports the campus' Information Security Program.
ISO Domain 6: Organization of Information Security Policy Link
ISO Domain 6: Organization of Information Security Standard
This standard defines the functions, relationships, responsibilities, and authorities of individuals or committees that support the campus Information Security Program.
ISO Domain 6: Organization of Information Security Standard Link
ISO Domain 7: Human Resource Security Policy
This policy provides direction and support for managing personnel information security and information security training and awareness programs.
ISO Domain 7: Human Resource Security Policy Link
ISO Domain 7: Human Resource Security Standard
This standard defines the measures required to ensure that employees, contractors, and third-party users are aware of, and comply with, the security policies and procedures required by the organization.
ISO Domain 7: Human Resource Security Standard Link
ISO Domain 8: Asset Management Policy
This policy defines how CSU campuses should identify, classify, and protect information and physical assets to prevent unauthorized access, use, modification, or disclosure.
ISO Domain 8: Asset Management Policy Link
ISO Domain 8: Asset Management Standard
This standard provides detailed instructions for the identification, classification, and management of information assets and supports a consistent approach across the CSU system.
ISO Domain 8: Asset Management Standard Link
ISO Domain 9: Access Control Policy
This policy defines the guidelines for controlling access to information systems and data, ensuring that access is granted only to authorized individuals.
ISO Domain 9: Access Control Policy Link
ISO Domain 9: Access Control Standard
This standard establishes procedures for the management of access control across systems and applications within the CSU environment, including authentication, authorization, and monitoring access.
ISO Domain 9: Access Control Standard Link
ISO Domain 10: Cryptography Policy
This policy outlines the requirements for using cryptographic techniques to protect the confidentiality, integrity, and authenticity of data across the CSU system.
ISO Domain 10: Cryptography Policy Link
ISO Domain 10: Cryptography Standard
This standard details the cryptographic techniques, methods, and tools that must be used to ensure the security of CSU data, both in transit and at rest.
ISO Domain 10: Cryptography Standard Link
ISO Domain 11: Physical and Environmental Security Policy
This policy provides the framework for protecting physical locations and the environment where information systems are hosted from natural, physical, and environmental threats.
ISO Domain 11: Physical and Environmental Security Policy Link
ISO Domain 11: Physical and Environmental Security Standard
This standard sets forth the specific requirements for safeguarding physical spaces, hardware, and systems, such as data centers, server rooms, and office spaces, from unauthorized access and environmental hazards.
ISO Domain 11: Physical and Environmental Security Standard Link
ISO Domain 12: Operations Security Policy
This policy establishes the responsibilities and activities required to ensure that operational processes within CSU campuses are protected against security threats.
ISO Domain 12: Operations Security Policy Link
ISO Domain 12: Operations Security Standard
This standard provides guidance on the implementation of operational security measures, including incident response procedures, monitoring, and event logging, to detect and mitigate security risks.
ISO Domain 12: Operations Security Standard Link
ISO Domain 13: Communications Security Policy
The policy outlines the controls necessary to protect CSU’s communication systems, ensuring the confidentiality, integrity, and availability of communications within and between campuses.
ISO Domain 13: Communications Security Policy Link
ISO Domain 13: Communications Security Standard
This standard defines the practices for securing communication channels and protocols, such as email, voice, and network communications, to prevent unauthorized interception or tampering.
ISO Domain 13: Communications Security Standard Link
ISO Domain 14: System Acquisition, Development, and Maintenance Policy
This policy governs the requirements for ensuring that information security is incorporated into the acquisition, development, and maintenance of IT systems and software.
ISO Domain 14: System Acquisition, Development, and Maintenance Policy Link
ISO Domain 14: System Acquisition, Development, and Maintenance Standard
This standard outlines the procedures for ensuring secure system development and maintenance practices, including the use of secure coding techniques and regular security testing throughout the software lifecycle.
ISO Domain 14: System Acquisition, Development, and Maintenance Standard Link
ISO Domain 15: Supplier Relationships Policy
This policy addresses the need for CSU campuses to establish clear and effective security requirements when working with third-party suppliers and contractors.
ISO Domain 15: Supplier Relationships Policy Link
ISO Domain 15: Supplier Relationships Standard
This standard provides guidelines for managing security risks that may arise from third-party suppliers, including security clauses in contracts and monitoring third-party performance.
ISO Domain 15: Supplier Relationships Standard Link
ISO Domain 16: Information Security Incident Management Policy
The policy outlines the approach to detecting, reporting, and responding to information security incidents within the CSU system, ensuring rapid containment and remediation.
ISO Domain 16: Information Security Incident Management Policy Link
ISO Domain 16: Information Security Incident Management Standard
This standard specifies the processes for handling security incidents, including incident detection, reporting, response, recovery, and post-incident analysis to improve the security posture of the CSU system.
ISO Domain 16: Information Security Incident Management Standard Link
ISO Domain 17: Information Security Aspects of Business Continuity Management Policy
This policy ensures that information security requirements are included in business continuity and disaster recovery planning at CSU campuses.
ISO Domain 17: Information Security Aspects of Business Continuity Management Policy Link
ISO Domain 17: Information Security Aspects of Business Continuity Management Standard
This standard outlines the procedures for integrating information security into business continuity plans, disaster recovery plans, and incident response strategies to maintain operational resilience.
ISO Domain 17: Information Security Aspects of Business Continuity Management Standard Link
ISO Domain 18: Compliance Policy
This policy establishes the guidelines for ensuring that CSU campuses comply with applicable legal, regulatory, and contractual requirements related to information security.
ISO Domain 18: Compliance Policy Link
ISO Domain 18: Compliance Standard
This standard provides guidance for CSU campuses to comply with relevant laws, regulations, and contractual obligations, ensuring that information security practices align with external compliance requirements.
ISO Domain 18: Compliance Standard Link
CSU Responsible Use Policy
This policy is intended to define, promote, and encourage responsible use of CSU information assets among members of the CSU community. This policy is not intended to prevent, prohibit, or inhibit the sanctioned use of CSU information assets as required to meet the CSU’s core mission and campus academic and administrative purposes.
Responsible Use Policy
Assessment results of this policy will be kept on record by Information Security Office.