Pages

    IT Security Policies ↳

    Standard
    These Information Security Requirements apply to everyone at Harvard. They provide additional detail on how to be compliant with Policy and should be used as a normal part of daily life at Harvard in order to keep both Harvard confidential data and your own personal information secure.

    Cloud Resource Tagging

     
     
     
     
    Standard
    This document describes the required metadata tags for Cloud Resources (e.g. instances, volumes, snapshots, managed databases, load balancers, distributed caching services) so that resources can be effectively leveraged across stakeholders.

    ...

    Cloud Asset Naming Conventions

     
     
     
     
    Standard
    This document presents a consolidated reference for consistent naming of Cloud Resources across all IT Organizations, which benefits the University in cost savings, automation and reduction of ambiguity.

    ...

    Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

    Standard
    The scope of this standard extends to all server instances that are within the HUIT domains on a fully-managed basis, or are hosted within HUIT on behalf of customers that administer the server instances. The overarching goal of this work is to satisfy Harvard’s HUIT Information Security Policy Objectives and NIST Cyber-Security Framework (CSF) Objectives.

    ... Read more about Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

    Digital Accessibility Policy ↳

    Standard
    The Harvard University Digital Accessibility Policy addresses the needs of individuals with disabilities who seek to use University Websites to participate in University programs and activities and/or conduct University Business.