IdMS Operations must be managed to resist various potential threats such as unauthorized intrusions and service disruptions that might result in false Assertions of Identity or other erroneous communications.
4.2.8.1 Software Maintenance
- IdMS systems are maintained with software versions that are current and are patched on a regular schedule with critical security patches applied within four weeks of release.
4.2.8.2 Network Security
- We have an intrusion detection and preventions system at the network border. All systems communicate through secure channels.
- All personnel with login access to IdMS systems use credentials with Silver or higher strength.
4.2.8.3 Physical Security
All IdMS systems are physically located within our two secure data centers. The data centers are secured by keycard access to authorized personnel only. Doors are monitored with cameras, and the physical servers are inside a lockable cabinet. Keys to the locked cabinet are stored off-site in the UNL Police Department. Keys can be checked out only by authorized personnel and notification is sent via email to a watch list when the key is checked out and returned.
4.2.8.4 Reliable Operations
Our IdMS systems are configured in load balanced clusters for redundancy. We utilize redundant power connections to our datacenter as well as redundant connections to the Internet to insure connectivity.