Question FIDP-03
Do you have a documented policy for firewall change requests?
Weight | 25 |
High Risk | Yes |
Required | Yes |
Compliant Answer | Yes |
Standard Guidance
EDUCAUSE provides no guidance here
Answering "NO"
Describe your plans to implement a documented policy for firewall change requests.
Answering "YES"
Describe your documented firewall change request policy.
Reason for Question
In the context of the CIA triad, this question is focused on system integrity, ensuring that system changes are only executed by authorized users. Any change to a verified, known, secure environment should be carefully evaluated by stakeholders in a structured manner.
Follow-Up Inquiries
Follow-up inquiries for firewall change requests will be institution/implementation specific.
HECVAT Pro Advice
[Add expert insights and best practices]
Implementation Tips
[Add practical steps for SME SaaS vendors]
FAQ
[Add common questions related to this HECVAT item]
Resources
[Add links to relevant articles or tools]