8.2.2.22 Risk Assessment Standard

Purpose

Information Technology (IT) risk management refers to the process of identifying risk, assessing risk, and prioritizing the major IT risks associated with the University’s key objectives.  Risk management is crucial for the University to maintain situational awareness and remain both secure and compliant.  The purpose of this policy is to define the procedures and standards for identifying, assessing, and prioritizing IT risk.

OU IT must establish a process to manage IT risks to the University that result from threats to university data, hardware, software, or third-party technology services.

Supporting Policy

To Be Determined

Scope

This standard applies to Colleges, Departments, or Units managing or operating IT and software, hardware, or third-party technology.

Definitions

Information Technology and Security Definitions

Standard

Risk Assessment

Risk assessment is the process of taking identified risks and analyzing their potential severity of impact and likelihood of occurrence.  Risk assessment must be conducted through IT system life cycles:

  1. All data usage and integration requests must undergo a Privacy Impact Assessment.  The Privacy Impact Assessment will evaluate the privacy of data usage requests that includes but is not limited to: lawfulness, accuracy, integrity, confidentiality, and availability.
  2. New hardware, software, or third-party technology service that collects, stores, transmits, or processes Institutional Data must be registered using the OU IT Security Consultation request form.  An IT Security Assessment must be completed before the purchase or integration of hardware, software, or third-party technology services.  IT Security Assessments must be updated periodically to monitor the environment for risks.  IT Security Assessments must be updated following the frequency described below:
    1. Category A - ePHI, HIPAA: Every 2 years
    2. Category B - PCI/Credit Card: Every 3 years
    3. Category C - FERPA/GLBA/Teaching: Every 3 years
    4. Category D1 - CUI/ITAR/Export Control: Every year
    5. Category D2 - Research: Every 3 years
    6. Category E - Administrative: Every 3 years
    7. Category F - Public: Every 5 years
  3. Third Parties may include service or technology providers, contractors, vendors, and agents who are not employed by or directly affiliated with OU. Third Parties must undergo a Vendor Risk Assessment to verify they have implemented security measures comparable to OU minimum security requirements.  Vendors and/or systems with a score at or below C (600 or below) shall require department leadership and IT governance approval.
  4. An IT Risk Assessment must be completed annually for any College, Department, or Unit that manage or. operating hardware, software, or third-party technology services.

Risk Treatment

Risk Treatment is the process of deciding how to respond to risk.

  1. Risk remediation is a decision to systematically reduce the risk.  Data Owners or Stewards shall work with OU IT GRC to develop risk remediation plans where feasible. 
    1. Critical risks require immediate action to reduce the risk.  Hardware, software, or third-party service with critical risk exposure may be required to be disconnected until resolutions or mitigations are found.  Critical risks found during an assessment must be communication upon discovery.
    2. High risks require prompt action to reduce the risk.  All high risks must be reduced before the close of the next semester or instruction.
    3. Medium risks must be prioritized within three (3) months of identification and be remediated based on prioritization.
    4. Low risks require documentation in the risk register and be reviewed at the next assessment, or sooner if changes to the likelihood or impact become apparent.
  2. Risk acceptance is a decision where the cost of remediating the risk is acceptable because the risk level is insufficient to justify the cost. 
    1. Critical or High risks must be approved by ITESC.
    2. Medium must be approved by the appropriate Tier II IT Governance Committee.
    3. Low risks must be approved by the Data Owner.
  3. Risk transfer is a decision where the risk responsibility is transferred to another entity (e.g., Business Associate, cyber insurance, or other legally binding contract).

Risk Management

Risk management is the ongoing management process of assessing risks and implementing plans to address them.

  1. Risks identified during IT Security Assessments and Vendor Risk Assessments must be captured in the OU IT vendor risk register for management and tracking.  Vendor risks are identified by many sources including, but not limited to vulnerability scanning, security incident and event monitoring, vendor notifications, and other continuous monitoring. 
  2. Risks identified during Privacy Impact Assessments must be captured in the OU IT risk register for management and tracking purposes.  Data privacy risks are identified by many sources including, but not limited to data usage requests, security incident and event monitoring, and audits. 
  3. Risks identified during IT Risk Assessments must be captured in the OU IT risk register for management and tracking purposes. 
  4. The IT Risk Assessment point of contact must prioritize IT risks and present a risk management plan that will allocate resources to ensure compliance with policies and regulations for approval to the Data Owner.  A single Data Owner cannot determine the treatment for a risk that can impact resources shared within the OU enterprise. 
  5. Data Owners must oversee the completion of the risk treatment and provide notification to OU IT GRC when the risk treatment activity has been completed. 
  6. OU IT GRC must review the treatment activity work completed, validate that the issue has been addressed. 
  7. In situations where a risk has the potential to impact resources under the care of more than one Data Owner, the Chief Information Security Officer (CISO) is responsible for coordinating the risk treatment strategy with all impacted Data Owners.

Risk Reporting

  1. OU IT GRC must periodically report risk and compliance measures to the Cybersecurity and Infrastructure Advisory Committee (CIAC), Information Technology Executive Steering Committee (ITESC), and the Board of Regents through a formal IT Risk Management Program.

References

  1. Data Governance Policy
  2. National Institute of Standards and Technology Cybersecurity Framework (CSF)
  3. National Institute of Standards and Technology Special Publication 800-171, Controlled Unclassified Information
  4. Health Insurance Portability and Accountability Act of 1996 (HIPAA), Security Rule, §164.308(b)(1), 164.308(b)(4), 164.312(c)(1), 164.312(c)(2), 164.312€(2)(i), 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii)
  5. General Data Protection Regulation (GDPR)
  6. Payment Card Industry (PCI) Data Security Standards
  7. Gramm-Leach-Bliley Act (GLBA)
  8. Family Education Rights and Protection Act (FERPA)

Revision, Review, and Approval History

  • October 2023: OU IT Governance, Risk, and Compliance: Initial draft, opened for comments
  • January 2024: OU IT Governance, Risk, and Compliance: Comment period closed
  • January 2024: Office of Compliance: Standard reviewed, comments submitted
  • February 2024: OU IT Governance, Risk, and Compliance: The criteria for remediating risks has been moved to Risk Treatment item #1.
  • March 2024: Internal Audit: Standard reviewed, comments submitted
  • March 2024: OU IT Governance, Risk, and Compliance:  Minor revision to policy statement.  Updated "Department IT" references.
 
Print Article

Details

Article ID: 3095
Created
Wed 10/25/23 12:42 PM
Modified
Mon 3/4/24 11:31 AM