5.4 Endpoint Protection Policy
I. Overview
The confidentiality, integrity and availability of data, information, and systems are of vital importance to the continued operation of Bucks County Community College (the College) and furtherance of its mission. An endpoint protection policy provides the minimum requirements to secure and manage the College’s endpoints.
II. Purpose
To establish the minimum-security requirements to ensure effective virus and malware prevention on all College owned endpoints that can connect to any of the College’s networks.
III. Scope
This policy applies to all endpoints owned by the College.
IV. Policy Owner
The Chief Information Officer is responsible for this policy and its administration. At a minimum, the policy will be reviewed and updated once per year, where applicable. If significant changes in the environment warrant updating of this policy, those updates will be applied as soon as possible. The policy will be disseminated whenever it is updated.
V. Definitions and Terms
- Endpoint – all computers owned or controlled by the College including but not limited to desktops, laptops, and servers.
- Endpoint Protection Platform – a security solution deployed on endpoints to prevent file-based malware attacks, detect malicious activity, and provide investigation and remediation capabilities.
- Patches – software that is used to fix existing vulnerabilities, add new features, or enhance security on an endpoint.
- Malware - software that is specifically designed to disrupt, damage, or gain unauthorized access to an endpoint.
VI. Policy
General Policy Statements:
- College-owned endpoints are strategic and vital assets to the institution. As such, these devices must use appropriate security measures and have appropriate security software installed.
- All College-owned endpoints are required to have an endpoint protection solution installed. ITS will centrally manage the configuration of the endpoint protection platform.
- All processes and files that are found to be malicious by the endpoint protection platform will be automatically quarantined.
- All College-owned endpoints will have operating system patches installed via an automatic or a manual process. ITS will manage this process via centrally configured or manual processes.
VII. Exceptions
Any exception to the policy must be approved by the policy owner in advance.
VIII. Compliance
Information Technology Services (ITS) will verify compliance with this policy through various methods, including but not limited to, internal and external audits, and feedback to the policy owner.
IX. Related Standards, Policies and Processes
Responsible Use Policy
X. Approval
Board of Trustees – June 13, 2024