Please report any problems to wiki-admin(a)lists.wisc.edu or use our support form. For more info Shared Tools KB

To follow disabled (grey) links, please log in to the wiki.

Skip to end of metadata
Go to start of metadata

Continuous Diagnostics and Mitigation (CDM) Implementation

The CDM Implementation Plan expands upon of the Vulnerability Scanning policy and the Computer Logging Statement. It includes such things: IT asset inventory management of both hardware and software, endpoint management, endpoint security, network monitoring, vulnerability scanning, firewall management, security information and event management (SIEM), account privilege management, incident reporting and response, encryption, and mobile device management (MDM).

 

The current vulnerability scanning policy is published at https://kb.wisc.edu/itpolicy/cio-vulnerability-scanning-policy.
The Computing Logging statement is at https://kb.wisc.edu/itpolicy/cio-computer-logging-statement.

For current activity in 2018-2019 and beyond please see CDM Advisory Group (wiki login required)

For the 2016-2017 CDM recommendations please see CDM Policy Stakeholders Team.

 

 

  • No labels