Addressing High-Risk Security Vulnerabilities and Enhancing System Management Practices
From: Dean Roger Bonnecaze <comm@engr.utexas.edu>
Sent: Wednesday, December 4, 2024 2:28 PM
To:
Subject: Addressing High-Risk Security Vulnerabilities and Enhancing System Management Practices
As a school deeply involved in advanced research that is often targeted by external parties, including nation-states, it is critical that we maintain robust cybersecurity practices. Recent federal regulations and industry standards have underscored the importance of proactively managing our computer systems to mitigate potential risks and vulnerabilities. These requirements are incorporated into agreements we routinely make with our federal funding agencies. We also do not want to be responsible for a cybersecurity breach that affects the entire university. What is a software or system vulnerability? To that end, we are implementing a focused initiative targeting high-risk security vulnerabilities that are older than 120 days. In collaboration with the Information Security Office (ISO), we will be identifying the individuals and systems associated with these vulnerabilities to ensure remediation. Key Points of the Initiative: 1. Communications in December and early January: The ISO will reach out to faculty and staff associated with systems that have security vulnerabilities older than 120 days. This will allow time to address the issues before more stringent actions are taken. 2. Starting February - System Isolation Notices: The Information Security Office will send out future quarantine notices beginning February 1 for systems that still have vulnerabilities. System isolation or quarantines will occur 30 days after notices are received if remediation of vulnerabilities has not occurred. 3. Standard Practice for Vulnerability Management: Going forward, network isolation of systems with older vulnerabilities will be our standard protocol to ensure that the security of our systems remains strong and that we are safeguarding the sensitive data and research under our care. Importance of Centralized System Management I appreciate your cooperation and attention to these important changes. If you have any questions or need further clarification, please contact Bob Gloyd or me. Sincerely,
Roger T. Bonnecaze |