Overview
UC's Electronic Information Security Policy, IS-3, brings changes to the way information security risk is managed at UC, and here at Berkeley. This project is designed to integrate IS-3's requirements and principles into Berkeley's existing information security program in a way that aligns with core campus priorities and values. It will help to ensure that risk is understood and addressed at the appropriate organizational levels, and includes updating the fundamentals of the campus’ security program to current UC and industry standards.
Implementation Plan for UC Berkeley
As part of our multi-year program for implementing IS-3, ISO will roll out a comprehensive plan to enable Units to comply with their obligations under UC Berkeley’s local implementation of IS-3. Refer to these slides for background and the initial (Phase 1) implementation plan (login required)
Our goal is to integrate IS-3 into UC Berkeley’s existing information security program in a way that makes sense for campus:
- Maintain MSSND/MSSEI concepts
- Identify/define key roles and responsibilities
- Update policies, standards, exception process, etc.
- Move to systemwide Protection Levels and incorporate Availability Level
- Broad collaboration and communication around program changes
Implementation Schedule
As-of May 2023, all campus academic and administrative units that were initially identified as high risk had completed their initial IS-3 onboarding. Lower risk units are scheduled for onboarding during the FY 2023-24 year. Visit our IS-3 Unit Onboarding Schedule page (CalNet protected) for more information.
Phase 5 - FY2023-24:
- Onboard remaining Academic and Administrative Units
- Periodic review for Units originally onboarded in Fall 2021
- Development of ongoing, operational program of review, metrics, and reporting
Visit our IS-3 Unit Onboarding Schedule page (CalNet protected) for more information
History - Phases 1-4:
Began in 2019-2020 and focused on:
- Updating/developing foundational policies:
- Roles and Responsibilities
- Data Classification Standard*
- Exception Process
- MSSND | Article highlighting MSSND changes
- MSSEI PL “quick fix”: updating the Protection Level numbers in the MSSEI without changing requirements*
- Identifying and orienting Pilot Units, Unit Heads, and Unit Security Leads
- Updating Socreg (formerly known as NetReg) with new data classifications and having Security Contacts review and confirm/update their assets
- Developing high-level dashboard for Pilot Units
- High-level IS-3 assessment for Pilot Units
Spring 2021 Focus - “Phase 2”:
- Identifying and onboarding the first non-pilot cohort of Units into the IS-3 framework
- Continue to update and develop foundational IT policies, including
- Convening MSSEI workgroup and beginning work on updating the Standard
- Finalizing and publishing the formal campus Information Security Incident Response Plan and Information Security Management Program
- Formalized risk acceptance processes
- Continuing to publicize the updated data Protection Levels*
- Refining tools, processes, and resources to facilitate and streamline the onboarding process
Fall 2021- Fall 2022 Focus - "Phase 3":
- Identify and onboard high-risk Units into the IS-3 framework using a cohort model -- currently scheduled to extend through Dec. 2022.
- Beginning to incorporate the concept of Availability Level.
- Continuing to update and develop foundational policies.
- Complete the first annual review.
Phase 4 - Spring 2023:
- Retool the onboarding process and unit self-assessment questionnaire in preparation for lower risk unit onboarding, based on lessons-learned from higher-risk unit onboarding.
- Develop an ongoing, operational program of periodic reviews.
- Develop Executive and unit-level reporting and metrics to identify progress and trends.
- Continue to update and develop foundational policies.
- Identify remaining Academic and Administrative Units, Unit Heads, and Unit Information Security Leads (UISLs).
What Units Can Do Now:
Campus-level implementation of IS-3 will happen in phases. However, there are things that Units at all levels can do to get started.
Roles and Responsibilities
Familiarize yourself with the roles and responsibilities identified in IS-3 through our Roles and Responsibilities Policy Home Page. This policy consolidates existing UC Berkeley responsibilities and key IS-3 responsibilities. Identified roles include Workforce Members, Researchers, Unit Heads, Unit Security Leads, Information and Resource Proprietors, Service Providers, and Workforce Managers. Learn even more at the UCOP Quick Start Guide.
-
Identify your Unit Head and Unit Information Security Lead(s). These people have key roles in IS-3. Also visit our Unit Heads and Security Leads page for additional resources for these roles.
-
Identify any IT Services that your Unit provides. Many of the Service Provider responsibilities in this policy are not new, but were previously divided among several policies. Service Providers may benefit from this consolidated list of responsibilities.
Work on bringing your Unit into compliance with UC Berkeley’s current minimum security standards.
IS-3 will build on these, so this is a good place to start:
Be aware that Protection Levels have changed
UC Berkeley’s Protection Level scale has been updated to align with the rest of the UC system. We now have a P1-P4 scale instead of our old PL0-PL3 scale. This means that all Protection Level numbers have changed. There are also category changes for certain types of information, so it's not as simple as just adding 1 to the old PL number. Please refer to Berkeley's Data Classification Standard for details. At a high level, this is what you’ll see:
Learn about Availability Levels
This is a relatively new concept for information security at UC. Availability Level refers to the impact of loss of availability or service, measured on a scale of 1-4. A4 is the highest level of impact and A1 is the lowest. Availability Level helps to determine what protections are required to ensure that information and resources are available when needed. The four Availability Levels are described in the updated Berkeley Data Classification Standard. Additional information is also available in the UC Data Classification Standard and Guide).
Identify and classify your Unit's Institutional Information and IT Resources
-
Use the new Protection Levels to re-classify your information and IT Resources.
-
Register any P3 and P4 assets in Socreg that would be considered Institutional Devices or Privileged Access Devices.
-
Begin to think about the Availability Levels of your information and IT Resources and start to identify your A4 assets
- A4 assets should be registered in Socreg, too.
-
This is a good time to confirm and update your Unit’s information in UC Ready (UC's business continuity/disaster recovery tool). All A4 IT Resources and data maintained by your unit should be registered in UC Ready. For questions or assistance, contact itdrhelp@berkeley.edu.
-
Work on bringing your Unit into compliance with UC Berkeley’s current minimum security standards. IS-3 will build on these, so this is a good place to start:
Update outdated references to Protected Data and PL numbers on your websites and internal documentation
We've put together the following table to help you convert general references to Protection Levels. You can convert straight over to the new UC P# directly.
Former UCB Protection Level Numbers |
Current UC Protection Level Numbers |
---|---|
UCB PL0 |
P1 |
UCB PL1 |
P2* or P3* |
UCB PL2/PL3 |
P4 |
*Please note: These general conversions are only best approximations and are not a perfect mapping. For documents that speak to specific references refer to the Data Classification Standard https://security.berkeley.edu/data-classification-standard#plclassification
For example: FERPA-protected data used to be listed as UCB PL1, but became P3 in the new numbering system.
*UC Berkeley’s Data Protection Levels were updated to align with the new UC systemwide scale. However, the associated controls or requirements were not modified to help support a smooth migration. Review and update of the controls and requirements for each classification level are taking place separately.