Policies & Practices
CSU and SDSU IT Security Policies, Standards, and Procedures
The Board of Trustees of the California State University (CSU) and SDSU is responsible for protecting the confidentiality, integrity and availability of CSU information assets. Unauthorized modification, deletion, or disclosure of information assets can compromise the mission of the CSU, violate individual privacy rights, and possibly constitute a criminal act.
The CSU Information Security Program activities are guided by ISO 27002:2013 (Information technology — Security techniques — Code of Practice for Information Security Controls), which are the best industry practices for the management of information security controls.
The CSU and SDSU IT security policies, standards, and/or guidelines are formal statements that specify a set of rules that all users must follow when gaining access to SDSU’s information and information systems.
- Information Security Responsible Use Policy
- Information Security Privacy of Personal Information Policy
- Information Security Policy
Organization of Information Security
Human Resource Security
Physical and Environmental Security
|CSU||Policy||ISO Domain 12: Operations Security Policy|
|Standard||ISO Domain 12: Operations Security Standard|
|SDSU||Policy||Server Security Policy|
|Policy||Mobile Device Security Policy|
|Standard||Vulnerability Management Standard|
|Standard||Security and Configuration of Information Systems Standard|
|Standard||Minimal Endpoint Security Baseline Standard|
|Guideline||IT Security Guidance for Remote Access|