Did you get an email about an application called Socreg that you don’t know anything about? Maybe your manager just told you you're a ‘Security Contact’? Or perhaps you got a scary email about a security incident involving a computer in your Department? No matter how you got here, let’s take a look at what’s involved and how to succeed as a Security Contact.
First, a Security Contact is actually a group of people who have been designated to receive and respond to security notices from UC Berkeley’s Information Security Office (ISO) for their department or for a specific set of IT Resources. So really you are a member of your Department’s ‘Security Contact’.
Second, as a member of a Security Contact you have two responsibilities:
-
Manage your Department’s registered assets, so that the Information Security Office (ISO) can do routine security monitoring.
-
Respond to (and/or forward accordingly) any Security Notices you receive regarding those registered assets.
Registered assets are simply computers or devices that are connected to the campus network. There are a variety of ways that these things connect to the network so that’s why there are different types of assets to register. We call them out to assist you in identifying and registering your Department’s assets. In fact, every page in Socreg has helpful information - just click “Help” in the top bar.