The end goal is to have full visibility into all systems on the CCNY network, a program in place by which system administrators can be notified in a timely fashion of vulnerabilities that need to be addressed, and a process that will monitor/confirm the progress of this work.
As suggested in the background section, historically information technology at CCNY has been deployed in silos, many divisions, schools, and researchers decided to support and maintain their own systems. In fact, many of these areas are reluctant to allow OIT access to these machines and it has been difficult to initiate change due to the historical context. This practice does not provide systems administrator credentials to OIT, which would give access and visibility to run cybersecurity vulnerability scans and remediate them when needed. Additionally, OIT has been slow to fully implement the tools at its disposal.
For OIT-managed systems, OIT will start mitigating vulnerabilities based on criticality with the highest criticality handled first. As much as possible we will adhere developer recommendations and industry best practices to remediate these issues utilizing OIT’s patch management solutions. OIT will make vulnerability remediation its highest priority and expects to resolve the most important vulnerabilities, as supplied to us by CIS, by the end of January 2023, which includes vulnerabilities listed as critical.
For non-OIT-managed systems, OIT will collaborate with the school, division, department, and research program systems administrators to remediate vulnerability issues. In cases where systems are not managed by an OIT-managed patch management solution, non-OIT technical support personnel will be required to address these issues. Furthermore, OIT expects to collaborate with all non-OIT personnel to resolve issues of patching vulnerabilities rated as high and critical. For systems with critical vulnerabilities, a “fix or disconnect” protocol will be enforced.
We will work with the Purchasing Office and Receiving Office to ensure that all computers are delivered to the appropriate system administrators, who must ensure that new systems have the appropriate security software and agents installed. Going forward, to be granted network access computers will be expected to be joined to OIT’s Active Directory domain. As a minimum, this will require installing software will include OIT-managed Anti-virus installation and Ivanti system/patch management software. If a system is needed that cannot support this software, alternatives must be installed with approval from the CIO.
To ensure out computer network environment remains highly secure and productive, it is essential that the management of CCNY systems be managed by a CCNY centralized vulnerability detection and patch management solution. In order to successfully manage CCNY systems, OIT, in conjunction with non-OIT personnel supporting and maintaining CCNY-owned systems, will need to perform the following:
Due to the coordination efforts that OIT needs to conduct with non-OIT technical support personnel, it is difficult to provide an optimistic or realistic completion date. However, our goal is to perform these actions on faculty and staff computers during the Spring 2023 semester and in special systems such as researchers’ systems or computer labs during Spring and Summer 2023.
Upon completion, OIT, in conjunction with non-OIT technical support personnel, expects: