As an Application Administrator of a virtual or physical server in the Texas State University data center (whether on-premise or cloud), you and the Technology Resources Systems Administration Team have specific responsibilities and must work together to maintain a safe and secure environment for the university and its data. You are also responsible for ensuring that external vendors and contractors follow these guidelines.
State Laws and University Policies
All parties must adhere to applicable federal and state laws, university policies, and information technology best practices and procedures.
TXST Shared Responsibility Model
Onboarding Checklist
Ensure your software is evaluated and authorized by the Information Security Office.
Service Evaluation Request
- Request a server to be provisioned. This will route to the Information Security Office for a review of the system prior to the Systems Administration Team provisioning the server. You may request a DNS alias (CNAME) at this time.
- Install and configure your system.
- Application support issues should be referred to your vendor.
- Requests for support regarding the server itself can be made through a Server Support Request.
- If your service needs an SSL certificate, please request via the SSL Certificate Request.
- Any file shares should be requested through a Server Support Request.
- IMPORTANT: You are not authorized to use this application in a production manner until ISO signs off on your vulnerability scan.
- Production means having users log in and use the application for its intended design with real data. You may only test until the application is authorized.
- Request a vulnerability scan. Issues discovered during the vulnerability scan will need to be resolved before proceeding.
- If your server will only need to be accessible on the TXST network or through VPN.
- Request changes to the server's host-based firewall.
- If your server will need to be accessible via the internet (not through VPN)
Tasks prohibited on University servers without authorization
Installing or running services that include, but not limited to,
- Active Directory Services
- DNS
- DHCP
- SSH on Windows
- FTP/SFTP/FTPS
- Web browsing
- Checking email
- Using as a primary desktop
- Installing software not authorized by the Information Security Office or Systems Administration Team.
- Free software must still be evaluated for use.
- Installing software not required for the main function of the server.
- Circumventing controls established by TXST IT.
- Modifying host-based firewall.
- File share creation
- Use of packet capture applications such as Wireshark.
Authorization for these tasks must be requested through the Systems Administration Team. You may be required to get additional authorization from the Information Security Office.