Viewable by the world
Alerts
No Alerts at this time.
E-mail: [email protected]
Cyber Security Requirements
Parent Policy: Security for Information Technology
Document #: 10.01.002.003
Requirements
The Security for Information Technology policy requires employees and affiliates to comply with the following requirement
Procedures
Cyber Security uses the following procedures to help protect Berkeley Lab. Use of Laboratory IT may not conflict with or interrupt these procedures.
- Acquisition
- Blocking
- Patch Management(Intranet)
- Critical Patch Enforcement
- Vulnerability Scanning(Intranet)
- Data Center Access Control
- Outdated Computers and Operating Systems
- Other Procedures from RPM 9.02 (in process of being migrated)