These Information Security Requirements apply to everyone at Harvard. They provide additional detail on how to be compliant with Policy and should be used as a normal part of daily life at Harvard in order to keep both Harvard confidential data and your own personal information secure.
This document describes the required metadata tags for Cloud Resources (e.g. instances, volumes, snapshots, managed databases, load balancers, distributed caching services) so that resources can be effectively leveraged across stakeholders.
This document presents a consolidated reference for consistent naming of Cloud Resources across all IT Organizations, which benefits the University in cost savings, automation and reduction of ambiguity.
This document includes the HUIT standard for including REST APIs in the API gateway and portal, as well as a guide to decisions related to HUIT’s API program.
The scope of this standard extends to all server instances that are within the HUIT domains on a fully-managed basis, or are hosted within HUIT on behalf of customers that administer the server instances. The overarching goal of this work is to satisfy Harvard’s HUIT Information Security Policy Objectives and NIST Cyber-Security Framework (CSF) Objectives.
The Harvard University Digital Accessibility Policy addresses the needs of individuals with disabilities who seek to use University Websites to participate in University programs and activities and/or conduct University Business.
This document provides guidance to Harvard University’s minimum standards and recommended best practices for Integrated Automation of Operations Technology and Industrial Control systems design and implementation
This HUIT standard presents a discussion and implementation guide for incorporating enterprise level meta-data on IT resources and infrastructure. Details of the tags can be found in the attached pdf document.