SKIP TO PAGE CONTENT

CA-1 Security Assessment and Authorization Policy and Procedures

Last Review: 10/1/22

Overview

The West Texas A&M Information Security Controls Catalog establishes the minimum standards and controls for University information security in accordance with the state's Information Security Standards for Institutions of Higher Education found in Title 1, Chapter 202, Texas Administrative Code (TAC 202).

Purpose

This document establishes information security assessment and authorization regulations and procedures. The purpose of these regulations and procedures are to manage risks that may impact West Texas A&M University from inadequate security assessment, authorization, and continuous monitoring of university information assets through the establishment of an effective security planning program.

Scope

The scope of these regulations and procedures are applicable to all information resources owned or operated by WTAMU. All users are responsible for adhering to this policy. If needed or appropriate, information regarding roles, responsibilities, management commitment, and coordination among organizational entities are embedded within these procedures.

Regulations and Procedures

The State of Texas Department of Information Resources (DIR) has chosen to adopt a select number of Security Assessment and Authorization Controls as established within the NIST SP 800-53 control family guidelines identified by the DIR Security Control Standards Catalog.DIR Standards Catalog

WTAMU shall develop, adopt or adhere to a formal, documented security assessment and authorization procedure that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.

The information security office will maintain regulations and procedures for assessment and authorization that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.

Phone
Twitter
Facebook
Instagram
Mail