Information Security for Maricopa Community College District is governed by the Administrative Regulations and IT Directives. The program is structured around the NIST Cyber Security Framework.
The Administrative Regulations are the overarching regulations that govern the process by which MCCCD IT Directives are administered. Information technology regulations are located in Section 4, Auxiliary Services. Important technology use resources can be found under 4.4 Technology Resource Standards.
Information Technology Directives
In accordance with Administrative Regulation 4.23 Written Information Security Program, these policies and standards enforce the foundational information security and privacy policies and practices across the District.
MCCCD Information Security Program
The Information Security Program at MCCCD is based on the NIST Cyber Security Framework. This graphic shows how we map our efforts and resources to the framework core functions. Below are brief descriptions of the core areas.
Strategic (NIST CSF 'Identify' Function)
Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.
The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.
Develop and implement appropriate safeguards to ensure delivery of critical Services.
The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Identity Management and Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology.
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
The Detect Function enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes.
Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
The Respond Function supports the ability to contain the impact of a potential cybersecurity incident. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements.
Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity Incident.
The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident. Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications.