
Policy & Practices
Data Encryption
Encryption plays a key role in keeping information safe by ensuring that it can't be obtained through theft or eavesdropping. As part of its overall program to ensure appropriate measures to protect PII and other sensitive data in a robust and least-intrusive manner, Arizona State University provides requirements for encrypting data in transit and storage.
Data Storage
ASU’s data and applications are stored and deployed in increasingly complex IT environments. Based on the data classification type (Public, Internal, Sensitive, Highly Sensitive), Arizona State University implements encryption with various data storage strategies.
Effective Practices
The most effective and efficient proven techniques, procedures and methods to protect the ASU network and the university community on your remote devices.
Identity Theft Protection
Routine things we do every day put us at risk of identity theft. Students are often especially vulnerable because their personal information is more available and they may not be as aware of the need to protect it.
Logging Best Practices
ASU leverages the Splunk enterprise logging management tool for collecting system logs across the organization. System logging is ingested into Splunk from each endpoint that is running the Splunk Universal Forwarder.
Physical Security
Physical Security is essential to protect the organization’s assets and facilities. Arizona State University recommends various measures to prevent potential physical security threats.
Policy and Standards
A library of policies to elevate development standards, protect information, and secure data infrastructure.
Security Tips
Arizona State University cyber security tips on Do’s and Don’ts.
Telecommuting, Mobile and Travel
Telecommuting, mobile and travel security guidance ensure protection of ASU’s information assets and technology infrastructure.