Generative AI Security Standard
1.0 Purpose
The purpose of this standard is to ensure the appropritate use of the °µÍøÊÓÆµnetwork with the following objectives:
- To guarantee a high-availability, secure and productive network and computing infrastructure serving faculty, staff, students and patrons.
- To improve the ability of UAA/IT to monitor and manage campus internetworks from end to end.
- To establish guidelines for creation of network extensions within campus internetworks.
- To define the limited role and guidelines for creation and operation of private networks within campus internetworks.
- To define actions that will be taken by °µÍøÊÓÆµIT when exceptions to this procedure are identified.
2.0 Standard
2.1 Scope of Standard
The scope of this standard includes all UAA-operated facilities, including all UAA campuses and extension offices.
2.2 General Standards
- Computer, printer, and network equipment referred to in this section is classified as user equipment as defined in Section 4.0.
- Any computer connected to a campus internetwork directly or indirectly though a network
extension or private network must comply with the following:
- Use either °µÍøÊÓÆµIT-provided DHCP or a valid °µÍøÊÓÆµIT-assigned static IP address for network identification;
- Use °µÍøÊÓÆµIT-provided DNS services;
- Ensure that client antivirus software is fully operational and running at all times when such software is available; standard client antivirus software approved by UAA IT will be used for computers/operating systems specified in an approved manner.
- All network-attached printers and peripherals will use either °µÍøÊÓÆµIT-provided DHCP or a valid °µÍøÊÓÆµIT-assigned static IP address for network identification.
- Users will not operate separate DHCP or DNS services unless approved by °µÍøÊÓÆµIT prior to connection to a campus internetwork.
- All network devices connected to a campus internetwork must comply with the following:
- Network devices must be approved by °µÍøÊÓÆµIT prior to purchase;
- Network device setup and configuration must be approved by UAA/IT prior to connection to a campus internetwork;
- Network devices must be configured to permit °µÍøÊÓÆµIT surveillance access for monitoring.
- The management demarcation point for network extensions that are managed by users will be a campus internetwork switch port connected to the network device that creates the network extension.
- The management demarcation point for network extensions that are managed by °µÍøÊÓÆµIT will be any port within the network extension.
- Under extraordinary circumstances a user may require creation of a private network within a campus internetwork. °µÍøÊÓÆµIT will create such private networks on private virtual local area networks (VLANs) within a campus internetwork. Proposals for creation of all private networks outlining business and security needs will be approved by the Chief Information Officer prior to procurement and installation.
- No external networks will be permitted within UAA-operated facilities.
3.0 Procedures
- °µÍøÊÓÆµIT personnel will conduct monitoring and surveillance activities of all network ports within campus internetworks, including network devices which create network extensions or private networks.
- Exceptions to the standards outlined in Section 2.0 that are noted during routine surveillance or due diligence associated with implementation of this procedure will be immediately investigated by °µÍøÊÓÆµIT.
- °µÍøÊÓÆµIT will disconnect non-conforming user equipment from a campus internetwork at a demarcation point defined as either the campus internetwork port or the demarcation point defined in Section 2.2.6 or Section 2.2.7 above until compliance with this procedure is achieved.
- During routine monitoring and surveillance activities, if °µÍøÊÓÆµIT determines that user equipment connected to a campus internetwork has been compromised by an unauthorized person or is unexpectedly and adversely impacting a campus internetwork, every attempt will be made to immediately contact the owner of the equipment and request immediate resolution of the noted problem.
- If, after one (1) hour from problem identification by °µÍøÊÓÆµIT the user cannot be contacted or the noted problem is not resolved, °µÍøÊÓÆµIT will disconnect the user equipment from the campus internetwork at the demarcation point specified in Section 2.2.6 or Section 2.2.7 above.
- Users whose user equipment has been disconnected from a campus internetwork will provide °µÍøÊÓÆµIT with proof of resolution of problem(s) noted in Section 3.0.4 above prior to re-connection.
4.0 Definitions
See IT Policies and Standards Definitions.
5.0 References
Acceptable Use Policy - University IT Policy 104
/about/administrative-services/policies/information-technology/acceptable-use.cshtml
University of Alaska Board of Regents Policy & Regulations
6.0 Standard Information
Standard Effective Date: 12/15/2004
Standard Revision Date: 02/25/2025
Standard Owner: Ryan McDaniel - Associate Vice Chancellor and CIO
Standard Author: Ryan McDaniel - Associate Vice Chancellor and CIO
(Release 02.07.1c, dated 12/15/04)