Web Application Security Policy
The purpose of this policy is to enforce that web applications maintain the security posture, compliance, risk management, and change control of University IT Resources.
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- Web application security assessments must be performed to identify potential or realized weaknesses (e.g., insecure coding, inadvertent misconfiguration, weak authentication, insufficient error handling, sensitive information leakage) per the Vulnerability Management Policy.
- Web applications must follow regular security or out-of-band assessments if one of the following criteria are met:
- New or significant application releases are subject to the Software Development Life Cycle and Secure SDLC before approval of the change control documentation or release into the live environment.
- Third-party or acquired web applications (i.e., commercial applications for which source code is not available) must be scanned when installed or upgraded, and the vulnerabilities must be reported to the University Information Security Office (UISO), and the vendor for correction.
- Shared accounts are prohibited, except where it is not technically possible to individually provision accounts.
- All Internet-facing web applications should deploy the UISO approved technical controls (e.g., Web Application Firewall (WAF) or Intrusion Prevention System (IPS)).
- Other security controls include but are not limited to, the following:
- Access controls,
- Configuration changes (you must submit non-agreed upon configuration changes to the UISO for review),
- Authentication (multi-factor authentication must be used for except where it is not technically possible),
- Data protection (e.g., encryption, data masking),
- Error handling and logging,
- Input and output handling, and
- Session management.
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Web Application Security is a branch of information security that deals specifically with the security of websites, web applications, and web services.
Related Policies and Procedures
- Change Control Policy
- Dual-Homed Networks Policy
- Software Development Life Cycle and Secure SDLC Policy
- SDLC Procedure
- Vulnerability Management Policy
- Web Application Security Deployment Procedure
|Responsible Person:||Director, Applications Security|
|Approval Date:||July 31, 2019|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.