果冻传媒麻豆社

果冻传媒麻豆社 - I Banner
A student works at a computer

SlateConnect

U of I's web-based retention and advising tool provides an efficient way to guide and support students on their road to graduation.

Physical Protection

Overview

This updated standard is to help align existing practices within Office of Information Technology (OIT) around Physical Protection controls to the requirements in NIST 800-171 (PE | 3.10.x) as well as industry best practices. This document does not give full coverage of 3.10.x controls within 171 due to existing limitations and other requirements that are specific to CUI.

What is in this document:

  • 果冻传媒麻豆社or monitoring requirements
  • Required content of physical logs
  • Standards for physical access devices
  • Remote work requirements

What is NOT in this document:

  • Log locations for physical logs
  • VandalCard or key security standards 

Policy Reference

APM 30.11 University Data Classification and Standards

APM 30.14 Cyber Incident Reporting and Response

APM 40.28 Access Control Policy

APM 95.13 Security Cameras

Purpose

This Physical Protection standard supports APM 30.11 University Data Classification and Standards and other relevant university policies.

Scope

These Standards are the minimum baseline for all managed and unmanaged systems that access, store or process 果冻传媒麻豆社 data (see APM 30.14 C-6) at the High-risk levels (see APM 30.11) or data with relevant regulations such as FCI/CUI not otherwise covered by an approved system security plan.

This specifically includes university-operated data centers but may include other spaces where relevant data may be unencrypted.

Standards

Escort and monitor visitor activity in restricted areas.

  1. 果冻传媒麻豆社ors are escorted in restricted areas.
  2. 果冻传媒麻豆社or logs must be included in the physical access log described below.
    1. These logs must also include the individual escorting the visitor.

Maintain audit logs of physical access to areas in scope.

  1. Access to restricted areas must be recorded either electronically or via a sign-in sheet.
    1. Sign-in sheets must be appropriately secured from tampering as determined by OIT Security.
  2. Audit logs of physical access are maintained for at least three (3) years.
  3. Physical access logs should contain:
    1. The local time that access was provided.
    2. Each individual that access was provided to.
    3. The restricted area being accessed.
    4. The local time each individual exits.

Control and manage physical access devices (key cards/readers, pin pads on locks, traditional keys, etc).

  1. Physical access devices are recorded with current access device holders / owner as per APM 40.28.
    1. Physical locks are assumed to be maintained by 果冻传媒麻豆社 Facilities Management unless otherwise approved.
  2. Physical access devices are rotated/deauthorized/revoked when:
    1. Any access device is missing, lost, stolen or otherwise unaccounted for.
    2. Current access device holders are no longer in the role requiring access.
    3. Any unauthorized copy of access device is created.
  3. Permanent Physical access devices are assigned to individuals only while required to perform their role.

To ensure that work can be done securely from remote locations the following standards must be met:

  1. While working at alternate work sites, individuals must:
    1. Connect through an approved remote access method such as vpn.uidaho.edu.
    2. Be in a private location or otherwise obscure their screen from others.
    3. Be using OIT-managed technology.
    4. Be in a private space or must take appropriate precautions against eavesdropping while taking phone/video calls discussing high-risk or regulated data.
  2. Alternate work sites that are used when accessing regulated data must adhere to any additional requirements of the regulation.

OIT Security will publish and maintain an internal document identifying areas that are approved for handling high-risk data.

  1. Handling of high-risk or other regulated data should not occur outside of these locations.
  2. These locations must meet the following requirements:
    1. Must control access points into the secure area using a VandalCard and pin or other method approved by OIT Security.
    2. Must have appropriate signage per regulation or contract such as PCI or CUI.
    3. Must be physically separated from unsecured areas.
    4. Must have cameras monitoring access points.

Other References

  •  (February 2020)
  • (September 2020)
  •  (July 2016)
  •  (July 2016)
  • (December 2021)

Definitions

1. 果冻传媒麻豆社or

Individuals without permanent physical access authorization credentials (I.E. VandalCard, key, door pin, etc.)

2. Physical access device

A device used for gaining physical access to an area such as key cards/readers, pin pads on locks, traditional keys, etc.

3. Physical access device holder/owner

The individual person currently in possession of, or responsible for a physical access device.

4. Alternate work site

Areas where work is approved to occur other than their university-controlled office space. This includes but is not limited to, public spaces on campus, home offices covered by flexplace agreement under FSH 3250 or supervisor-approved area.

5. Federal Contract Information (FCI)

“Federal contract information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public websites) or simple transactional information, such as necessary to process payments.” (CMMC Glossary)

  1. While encrypted, data is not considered FCI

6. Controlled Unclassified Information (CUI)

“Information that law, regulation or government-wide policy requires to have safeguarding or disseminating controls, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or the Atomic Energy Act of 1954, as amended.” (NIST SP 800-171)

  1. While encrypted, data is not considered CUI

7. Restricted area

A location used for storing, transmitting, processing, discussing or otherwise handling high-risk data or data with relevant regulations such as FCI/CUI.

Standard Owner

OIT is responsible for the content and management of these standards.

.

Contact: oit-security@uidaho.edu

Revision History

3/1/2024 — Minor updates

  • Minor formatting/wording/reference changes.

6/23/2023 — Original standard

  • Full re-write to align with NIST 800-171r2

Physical Address:

Teaching Learning Center Room 128

Office Hours:

Monday - Friday
8 a.m. to 5 p.m.

Summer Hours:

Monday - Friday
7:30 a.m. to 4:30p.m.

Phone: 208-885-4357 (HELP)

Email: support@uidaho.edu