Skip to content Skip to navigation

Minimum Security Control Requirements for Applications

Description of what this means and how it aligns with the Controlled Unclassified Information (CUI) Standards driven by UNM policy....

An application is defined as software running on a server that is remotely accessible, including mobile applications.

  1. Determine the risk level by reviewing the data, server, and application risk classification examples and selecting the highest applicable risk designation across all. For example, an application providing access to Low Risk Data but running on a High Risk server is designated as High Risk.
  2. Follow the minimum security standards in the table below to safeguard your applications.
StandardsRecurring TasksWhat to doLow RiskMedium RiskHigh Risk
Patching
Based on National Vulnerability Database (NVD) ratings, apply high severity security patches within seven days of publish and all other security patches within 90 days. Use a supported version of the application.
Vulnerability Management
Perform a monthly Qualys application scan. Remediate severity 4 and 5 vulnerabilities within seven days of discovery and severity 3 vulnerabilities within 90 days.
Inventory
Maintain a list of applications and the associated risk classifications and data volume estimates. Review and update records quarterly.
Credentials and Access Control
Review existing accounts and privileges quarterly. Enforce password complexity. Logins with UNM NetID credentials via WebAuth/SAML recommended.
Firewall Permit the minimum necessary services through the network firewall.
Two-Step Authentication Review existing accounts and privileges quarterly. Enforce password complexity. Logins with UNM NetID credentials via WebAuth/SAML recommended.
Centralized Logging Require Duo two-step authentication for all interactive user and administrator logins.
Secure Software Development Forward logs to a remote log server. UNM IT Splunk service recommended.
Developer Training
Include security as a design requirement. Review all code and correct identified security flaws prior to deployment. Use of static code analysis tools recommended.
Backups Attend at least one UNM Information Security Academy training course annually.
Dedicated Admin Workstation Access administrative accounts only via a Privileged Access Workstation.
Security, Privacy, and Legal Review Request a Security, Privacy, and Legal review and implement recommendations prior to deployment.
Regulated Data Security Controls Implement PCI, DSS, HIPAA, FISMA, or Export Controls as applicable.