Security Assessment

Security Assessment

Employees requesting to purchase, download, or access new technologies must request a security assessment for items including software, hardware, web-based, and AI applications and integrations. The assessment is essential for understanding the security posture of technology-related items and for initiating remediation measures that will strengthen defenses against potential threats.

Features

  • Assessment Time: Most platforms and services with readily available security documentation can typically be assessed within a few days. However, the timeline may extend due to potential delays in vendor responses.
  • Vendor and Product Research: Evaluate the security posture and overall risk associated with each IT vendor and product, focusing on supply chain security.
  • Security Audit Reports and Certifications: Request and review security audit reports (e.g., SOC2) and certifications (e.g., ISO) from vendors.
  • HECVAT Evaluation: Utilize the Higher Education Community Vendor Assessment Tool (HECVAT) to assess vendors that lack standard certifications, helping to identify and mitigate potential security risks effectively.
  • Risk Determination and Control Specification: Establish initial risk levels and define necessary security controls to mitigate identified risks.
  • TX RAMP Compliance: Verify applicable cloud services comply with TX RAMP, FedRAMP, or StateRAMP certification requirements.
  • Reporting and Recommendations: Generate a detailed report on the assessment findings with specific required security controls and recommendations.

Designed For

  • Faculty
  • Staff

Requirements

  • An active Del Mar College account

Data Security

  • Del Mar College's Information Technology (IT) systems are essential for delivering quality education. Protecting these systems involves verifying that all software, hardware, and third-party solutions comply with relevant security standards before they are acquired and deployed.

Get Started

  • Before purchasing, accessing, or installing any new technology, first raise a request for a security assessment. This includes items such as software, hardware, web-based applications, and AI applications and integrations.
  • Software described on this IT Services website and hardware listed in the Approved Technology list have been assessed and approved for use by the Del Mar College community.

Get Help

Learn More

Related Services

Page last updated September 21, 2024.