{"id":43842,"date":"2020-07-16T09:27:44","date_gmt":"2020-07-16T16:27:44","guid":{"rendered":"https:\/\/policies.wsu.edu\/prf\/?page_id=43842"},"modified":"2022-11-29T08:20:08","modified_gmt":"2022-11-29T16:20:08","slug":"bppm-revision-552","status":"publish","type":"page","link":"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-552\/","title":{"rendered":"BPPM Revision 552"},"content":{"rendered":"<div class=\"wsu-row wsu-row--single\" >\r\n    \n<div class=\"wsu-column\"  style=\"\">\r\n\t\n\n<h1>BPPM Revision #552<\/h1>\n<p><strong>July 16, 2020<\/strong><\/p>\n<hr>\n<p>This BPPM revision includes the following changes:<\/p>\n<p><strong>Information Security Planning <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-15\/\">87.15<\/a><\/strong><\/p>\n<p>This new section provides planning requirements and processes for the effective implementation of information security controls to protect the confidentiality, integrity, availability, and privacy of institutional systems and information.<\/p>\n<p><strong>Security Assessment and Authorization <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-20\/\">87.20<\/a><\/strong><\/p>\n<p>This new section provides requirements and procedures regarding security assessments and authorization of information systems and services.<\/p>\n<p><strong>Information Security Risk Assessment <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-25\/\">87.25<\/a><\/strong><\/p>\n<p>This new section provides requirements for incorporating consistent and effective risk assessment of potential threats to information systems and data, in order to manage the impact of potential harm.<\/p>\n<p><strong>Configuration Management <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-30\/\">87.30<\/a><\/strong><\/p>\n<p>This new section provides requirements, roles, responsibilities, and procedures for managing the configuration of WSU information systems and associated components.<\/p>\n<p><strong>Wireless Local Area Network (LAN) Management <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-35\/\">87.35<\/a><\/strong><\/p>\n<p>This new section provides requirements for management, deployment, equipment, and security of wireless LANs for data communications throughout the University system.<\/p>\n<p><strong>System and Information Integrity <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-40\/\">87.40<\/a><\/strong><\/p>\n<p>This new section provides requirements and procedures for guarding information systems against improper information modification or destruction and ensuring information nonrepudiation, authenticity, and authorized access.<\/p>\n<p><strong>Audit and Accountability <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-50\/\">87.50<\/a><\/strong><\/p>\n<p>This new section provides requirements and procedures implementing audit and logging controls, as required for compliance with state, federal, and industry information security and privacy policies, regulations, and standards.<\/p>\n<p><\/p>\n\n<\/div>\r\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1061,"featured_media":0,"parent":21116,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"wsuwp_university_location":[],"wsuwp_university_org":[],"_links":{"self":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43842"}],"collection":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/comments?post=43842"}],"version-history":[{"count":8,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43842\/revisions"}],"predecessor-version":[{"id":56556,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43842\/revisions\/56556"}],"up":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/21116"}],"wp:attachment":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/media?parent=43842"}],"wp:term":[{"taxonomy":"wsuwp_university_location","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_location?post=43842"},{"taxonomy":"wsuwp_university_org","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_org?post=43842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}