Legislative History: Approved by the President: 2004/04/28; Reviewed by UEC
Approval Authority: President
These guidelines and procedures are meant to ensure the availability and security of the shared network resources which support the learning, teaching and research mission of the University and the administrative activities that underpin this mission.
These guidelines and procedures supplement and clarify the principles set out in the Policy on Computing and Information Technology Facilities as they apply to the York University centrally managed network infrastructure and the operation of systems therein.
Roles and Responsibilities
Users: Those using University network resources.
System Administrators: Those responsible for installing and maintaining software and/or equipment attached to or operating via the central network infrastructure.
System Managers: Those who own and/or have management authority for Information Technology systems attached to or operating via the central network infrastructure.
Central Computing Support Group: Computing and Network Services (CNS) is responsible for the management of the University’s central information technology services. This includes Central Network Management and Information Security.
Central Network Management: The department within CNS with responsibility for the operation of the University data network infrastructure including network-authoritative services.
Information Security: The department within CNS with responsibility for the overall security of the University Information Technology systems and data.
University Network: The University-owned network infrastructure which is managed by the Central Computing Support Group. This includes the University network backbone, networks for individual buildings, modem pools, and wireless access points.
Network-Attached Device: Any type of computer system, network equipment, or other device which operates on the University network infrastructure. This includes personal computers, servers, network-enabled printers, network hubs or switches, and any other device which uses the network.
Network-Authoritative Service: Network services which are required for the integrity and stability of the central network infrastructure, including DNS, DHCP, and routing.
Network Access Point: A device which allows network traffic to flow from any external source to the University central network infrastructure. This includes wireless access points, modems, wired network drops, and routers connected to external networks not operated by the University.
Vulnerability Analysis: Any interaction with, or observation of a system which is used for determining security vulnerabilities present. Examples include network scanning, encryption cracking, and system information gathering.
- Network Access Points: All points of access to the University Network (including network drops and wireless access points) require authorization by the Central Computing Support Group. Operators of wireless access points shall also conform to the University guidelines for usage of unregulated radio spectrum bands.
- Network Traffic Types and Limits: The Central Computing Support Group will control bandwidth limits and the types of inbound and outbound network traffic permitted through the Internet gateway and other points within the University network. Decisions about the permitted types of traffic and bandwidth limitations will be based on the business and academic goals of the University and the security exposure involved.
- Network Monitoring: The Central Computing Support Group will monitor network traffic as necessary and appropriate to detect unauthorized activity or intrusion attempts, and for diagnostic purposes. All monitoring will be carried out in accordance with the University Policy on Computing and Information Technology Facilities. Interception or monitoring of network traffic without authorization from the Central Computing Support Group is prohibited.
- Baseline Security Configurations: The Central Computing Support Group will establish and provide recommended baseline configuration standards for selected operating systems. System Managers are responsible for ensuring that systems under their responsibility are configured in a secure manner, making use of the baseline standards at minimum.
- Vulnerability Analysis: System Administrators or System Managers are authorized to perform vulnerability analysis on systems for which they are responsible for. Information Security, or its designee, is authorized to perform vulnerability analysis of any device on the University Network at any time. All other vulnerability analysis of systems on the University Network requires prior approval of Information Security.
- IP Addresses: The Central Network Management assigns IP addresses to networked systems either at system installation time, or dynamically depending on the system and area of the network it is located. Using or attempting to use a different IP address than the one assigned is prohibited.
- 7. Domain Names: All IP addresses within the University Network are assigned within the “yorku.ca” domain name. Using or attempting to use a non-“yorku.ca” domain name to resolve to a York University IP address without authorization from the Central Computing Support Group is prohibited.
- Network Abuse: Interfering or attempting to interfere with the normal operation of networks and systems within or external to the University is prohibited. Examples of this type of abuse include unreasonable use of resources, denial of service, scanning, monitoring, interception, impersonation, or modification of systems or data without authorization or consent of the system or data owner.
- Network Authoritative Services: Operation of network-authoritative services (DNS, DHCP, and routing-related services) without authorization by Central Network Management is prohibited.
- Malicious Software Use: Use or transmission of malicious software such as computer viruses which could provide unauthorized access and/or infect systems is prohibited. Computers infected with malicious software are considered a security compromise.
- Commercial Use: Use of University Network connections to host services for unauthorized commercial purposes is prohibited.
- Inappropriate Use: Use of the University Network must not violate the University Policy on Computing and Information Technology Facilities . Such violations include copyright violations, distribution of computer viruses or other malicious programs, unauthorized access, or other unlawful use.
- Incident Response: In the event of a known or suspected incident of unauthorized access or other system security compromise, or in response to a violation of any guideline specified here, Information Security, or its designee, is authorized to investigate any device on the University Network in accordance with the Incident Response and Investigation procedures contained herein. This may involve disconnection of the system from the University Network, copying of system data, and/or physical collection of the device for examination.
Attaching to the Network
- Contact Information: All network-connected devices must have a Management and System Administrator point of contact registered with the Central Computing Support Group. An additional backup contact is required if the manager/system administrator are the same individual. Incomplete and/or incorrect contact information may result in termination of network service without notice.
- System Placement: The University network is divided into zones with varying degrees of security and functionality. Before operating a system on the network, the logical placement of the system within the network (i.e. zone) shall be decided in consultation with the Central Computing Support Group according to the function and sensitivity of the system.
- System Configuration and Operation: System Administrators shall follow existing recommended practices and/or standards for configuration and operation of equipment where these are available.
- System Updates: System Administrators shall apply relevant security patches in a regular and timely fashion as well as running up-to-date anti-virus software where applicable.
Incident Response and Investigation
- Complaints of Alleged Violations: Complaints regarding violations of law or University policy may be directed to System Managers, and/or to the Central Computing Support Group as appropriate. Complaints reported to the Central Computing Support Group will be investigated by Information Security which will (if appropriate) refer the matter to appropriate University authorities and/or law enforcement agencies.
- Reporting Security Compromises: All System Administrators and System Managers shall report security compromises which involve misuse or unauthorized access to University systems and/or data to the Central Computing Support Group. Information Security will coordinate investigations into any alleged computer or network security incident.
- Vulnerability Analysis: Systems which pose a significant risk to the security, integrity, or availability to other systems or the University Network due to a suspected security vulnerability will be investigated by Information Security and/or by the responsible System Manager.
- Access to System Information: System Administrators and/or System Managers shall provide access and/or information from a system which is the subject of a current investigation to Information Security upon request. Information required may include system logs, configuration information, a complete system image, and/or physical access depending on the type of incident and needs of the investigation.
- Disconnection: Systems operating in violation of law; these guidelines; or which pose a risk to the security, integrity, or availability of systems or the University Network may be disconnected from the network by Central Network Management or Information Security. Appropriate contact information will be used for notification in advance of disconnection when possible. Systems may be disconnected prior to notification of the affected contacts when such systems are the source of (or need to be protected from) an immediate and/or unacceptable risk, or if no appropriate contact can be notified.
- Reactivation: A system previously disconnected as a result of incident response may only be reactivated with the consent of Information Security.