Controls
The Information Security Control Requirements provide detailed implementation guidance for each risk objective specified in the standards. Each standard has it's own control document breaking down the risk objectives into specific controls at various data and system sensitivity levels. The coding scheme makes it easy to identify what controls map to the system security level and the university's priority. This enables university organizations to apply only the controls that are required for their IT resources. The standards are listed below with links to the individual control documents. You must be a member of the campus community to access them and will be prompted to login.