UWSA Policy Controls

The UWSA Policy Controls Website is a web-based tool designed to help users efficiently understand and apply UWSA information security policy requirements. This interface offers a structured view of policy content aligned with the NIST Cybersecurity Framework (CSF) 2.0.

Some key features include:

  Policy content organized by common operational areas, with tailored views for:

  • End User Devices – Desktops, laptops, tablets, and virtual devices
  • Servers – Including on-premises, IaaS, PaaS, virtual, and hybrid environments
  • Applications – Covering on-premises, SaaS, and hybrid systems

 Direct links to official UWSA policies, enabling quick reference and deeper exploration

  References to NIST CSF 2.0, Govern, Identify, Protect, Detect, Respond, and Recover

Cross-references to NIST SP 800-171, supporting efforts to align institutional policies with NIST


End User Devices – Desktops, laptops, tablets, and virtual devices

ControlFrequencyWhat to doReferencesCSF Function
Operating SystemOngoing maintenanceMaintain supported operating systems.Policy 1036
NIST 800-171 Rev 3: 3.4.2
Protect
ConfigurationsOn setup and reviewEnable host firewall.
Disable remote access protocols (RDP, SSH), by default.
Activate screen lock after 15 minutes of inactivity.
Policy 1036
NIST 800-171 Rev 3: 3.4.2, 3.4.6, 3.4.7
Protect
Malware ProtectionContinuous monitoringProtect against malware using host-based and institutionally managed software.Policy 1042
NIST 800-171 Rev 3: 3.14.2, 3.14.4
Protect
Vulnerability ScanningMonthly/Quarterly/Ad-hocConfigure endpoints for scheduled vulnerability scans.
Monthly for high risk or high impact, quarterly for other systems, include authenticated internal scanning for maximum visibility.
Perform ad hoc scans after environmental changes.
Policy 1042
NIST 800-171 Rev 3: 3.14.1, 3.14.5, 3.4.7
Protect
PatchingOngoingPrioritize endpoint patching based on importance.
Follow remediation timelines and CVSS ratings.
Policy 1042
NIST 800-171 Rev 3: 3.14.1
Protect
Infected DeviceOn detectionIsolate the endpoint from the network until triaged.Policy 1036
NIST 800-171 Rev 3: 3.14.3
Protect
Logging and MonitoringContinuousCreate logs for monitoring, investigation, reporting unauthorized activity.
Applies to end-user devices with increased security risks.
Logs must be monitored locally or centrally.
Policy 1041
NIST 800-171 Rev 3: 3.1.7, 3.3.1, 3.3.5, 3.3.7
NIST 800-171 Rev 3: 3.14.7
Detect
InventoryOn setupAdd endpoint to asset inventory.Policy 1035
NIST 800-171 Rev 3: 3.4.1
Identify
IncidentContinuousReport an incident that meets medium or higher cyber incident severity criteria. Refer to UW System IR plan.Policy 1033
NIST 800-171 Rev 3: 3.6.2
Respond
VPNOn setupEnable workstation VPN.Policy 1038
NIST 800-171 Rev 3: 3.13.8
Protect
Security RisksContinuousCapture security risks via methods such as vulnerability scanning, incident response, SIEM alert, and vendor notifications.Policy 1039
NIST 800-171 Rev 3: 3.11.2, 3.6.1, 3.14.7
Protect
Servers – On-premises, IaaS, PaaS, virtual, and hybrid environments

ControlFrequencyWhat to doReferencesCSF Function
Accounts and AuthorizationsOn creation or changeUse only UW-authorized accounts and identity providers.
Use Single Sign-On (SSO) by an institution authorized identity provider, when available.
Apply security controls aligned with standard, privileged, and highly privileged authorizations.
Policy 1030
NIST 800-171 Rev 3: 3.1.1, 3.1.2, 3.1.5, 3.5.1, 3.5.5
Protect
Privileged AuthorizationsOn assignmentPrivileged authorizations require separate accounts or RBAC, with identities verified through in-person or equivalent assurance methods.
Highly privileged authorizations must also use a separate account or PAM workflows.
Highly privileged authorizations require approval from the Data Steward(s) responsible for the associated IT Asset(s).
Policy 1030
NIST 800-171 Rev 3: 3.1.6, 3.1.7, 3.13.3
Protect
Attestation for Service Account AccessAnnuallyAuthorizations must be reviewed annually for all service accounts.Policy 1030
NIST 800-171 Rev 3 3.1.2
Protect
Operating SystemOngoing maintenanceMaintain supported operating systems.Policy 1036
NIST 800-171 Rev 3: 3.4.2
Protect
ConfigurationsOn setup and reviewEnable host firewall.
Disable remote access protocols (RDP, SSH), by default.
Activate screen lock after 15 minutes of inactivity.
Policy 1036
NIST 800-171 Rev 3: 3.4.2, 3.4.6, 3.4.7
Protect
Malware ProtectionContinuous monitoringProtect against malware using host-based and institutionally managed software.Policy 1042
NIST 800-171 Rev 3: 3.14.2, 3.14.4
Protect
Vulnerability ScanningMonthly/Quarterly/Ad-hocConfigure servers for scheduled vulnerability scans.
Monthly for high risk or high impact, quarterly for other systems, include authenticated internal scanning for maximum visibility.
Perform ad hoc scans after environmental changes.
Policy 1042
NIST 800-171 Rev 3: 3.14.1, 3.14.5, 3.4.7
Protect
PatchingOngoingPrioritize server patching based on importance.
Follow remediation timelines and CVSS ratings.
Policy 1042
NIST 800-171 Rev 3: 3.14.1
Protect
Infected DeviceOn detectionIsolate the server from the network until triaged.Policy 1036
NIST 800-171 Rev 3: 3.14.3
Protect
Logging and MonitoringContinuousCreate logs for monitoring, investigation, reporting unauthorized activity.
For high impact services the logs must include security events and must be transferred to a managed logging service.
Logs must be monitored locally or centrally.
Keep logs for at least 30 days.
Policy 1041
NIST 800-171 Rev 3: 3.1.7, 3.3.1, 3.3.5, 3.3.7
NIST 800-171 Rev 3: 3.14.7
Detect
InventoryOn setupAdd server to asset inventory.Policy 1035
NIST 800-171 Rev 3: 3.4.1
Identify
IncidentContinuousReport an incident that meets medium or higher cyber incident severity criteria. Refer to UW System IR plan.Policy 1033
NIST 800-171 Rev 3: 3.6.2
Respond
Security RisksContinuousCapture security risks via methods such as vulnerability scanning, incident response, SIEM alert, and vendor notifications.Policy 1039
NIST 800-171 Rev 3: 3.11.2, 3.6.1, 3.14.7
Protect

Applications – On-premises, SaaS, and hybrid systems

ControlFrequencyWhat to doReferencesCSF Function
Accounts and AuthorizationsOn creation or changeUse only UW-authorized accounts and identity providers.
Use Single Sign-On (SSO) by an institution authorized identity provider, when available.
Apply security controls aligned with standard, privileged, and highly privileged authorizations.
Policy 1030
NIST 800-171 Rev 3: 3.1.1, 3.1.2, 3.1.5, 3.5.1, 3.5.5
Protect
Privileged AuthorizationsOn assignmentPrivileged authorizations require separate accounts or RBAC, with identities verified through in-person or equivalent assurance methods.
Highly privileged authorizations must also use a separate account or PAM workflows.
Highly privileged authorizations require approval from the Data Steward(s) responsible for the associated IT Asset(s).
Policy 1030
NIST 800-171 Rev 3: 3.1.6, 3.1.7, 3.13.3
Protect
Attestation for Service Account AccessAnnuallyAuthorizations must be reviewed annually for all service accounts.Policy 1030
NIST 800-171 Rev 3 3.1.2
Protect
Vulnerability ScanningMonthly/Quarterly/Ad-hocConfigure applications for scheduled vulnerability scans.
Monthly for high risk or high impact, quarterly for other systems, include authenticated internal scanning for maximum visibility.
Perform ad hoc scans after environmental changes.
Policy 1042
NIST 800-171 Rev 3: 3.14.1, 3.14.5, 3.4.7
Protect
PatchingOngoingPrioritize application patching based on importance.
Follow remediation timelines and CVSS ratings.
Policy 1042
NIST 800-171 Rev 3: 3.14.1
Protect
Infected ApplicationOn detectionIsolate the application from the network until triaged.Policy 1036
NIST 800-171 Rev 3: 3.14.3
Protect
Logging and MonitoringContinuousCreate logs for monitoring, investigation, reporting unauthorized activity.
For high impact services the logs must include security events and must be transferred to a managed logging service.
Logs must be monitored locally or centrally.
Keep logs for at least 30 days.
Policy 1041
NIST 800-171 Rev 3: 3.1.7, 3.3.1, 3.3.5, 3.3.7
NIST 800-171 Rev 3: 3.14.7
Detect
InventoryOn setupAdd application to inventory.Policy 1035
NIST 800-171 Rev 3: 3.4.1
Identify
IncidentContinuousReport an incident that meets medium or higher cyber incident severity criteria. Refer to UW System IR plan.Policy 1033
NIST 800-171 Rev 3: 3.6.2
Respond
Security RisksContinuousCapture security risks via methods such as vulnerability scanning, incident response, SIEM alert, and vendor notifications.Policy 1039
NIST 800-171 Rev 3: 3.11.2, 3.6.1, 3.14.7
Protect