Obviously Trusted CI takes cybersecurity seriously and as such has concern for both its own data and the data of any projects it engages with. To that end, Trusted CI presents our Cybersecurity program based on the Guide to Developing Cybersecurity Programs. Our Cybersecurity program was revised in 2016 as we launched the NSF Cybersecurity Center of Excellence. The Master Information Security Policy & Procedures document defines the foundation of our program and governs all Trusted CI staff and information resources.
Additional supporting documents are also provided to show the risk-based process that was used in creating Trusted CI's cybersecurity program:
- Information Classification Policy
- Information Asset Inventory
- Access Control Policy
- Risk Assessment Table
- AssetSpecific Access and Privilege Specification (ASAPS): Teleconference Services