Accurate and complete registration of assets lets the Information Security Office (ISO) notify your department of problems and security risks. Security Contacts can register or claim network assets including: Cloud Accounts, Subnets (as defined by the Network group), IP addresses, Subdomains, Offsite hostnames, Devices, and Protected Data Applications and Services.
Cloud Accounts are provisioned by bIT Cloud and should be registered in Socreg to the Unit Security Contact using them so that ISO can monitor cloud assets for vulnerabilities and other security risks
bIT Network Services allocates subnets in both IPv4 and IPv6 address space. Security Contacts claim subnets for the purpose of receiving security notices involving IP addresses within the subnets. Note: when a physical subnet is configured with both IPv4 and IPv6 IP address space, Socreg will claim, transfer, and abandon both subnets as a pair.
Individual IP Addresses
Individual IP Addresses (IPv4 only) can also be registered to Unit Security Contacts and may be requested and transferred among Security Contacts. IPv6 IP Addresses cannot be individually assigned to Security Contacts.
Registered subdomains are necessary to facilitate the self-service registration of Fixed DHCP Devices.
Security Contacts must register Offsite hostnames before the Domain Name Service (DNS) hostnames are approved and created.
See Offsite Hostnames for more information.
Devices (i.e., Ethernet MAC addresses) must be registered in order to use the campus DHCP service and will receive security notices involving those devices.
University-owned devices must be registered to Unit Security Contacts. Personally-owned devices should be registered to individuals.
See Devices for more information.
Protected Data Applications
PD Applications are Information systems that handle, store, or transmit institutional data restricted by laws and policies, or that handle institutional data classified as UC P2 or higher as defined by the Berkeley Data Classification Standard PD Applications are registered in order to receive enhanced monitoring and to comply with Policy.
See Protected Data Applications for more information.