File Type: pdf

P5010 – Web Publishing

ITA Policy P5010 mandates the use of the State Web Design Template, ensuring a consistent look and navigation experience across all State of Idaho websites.

Read Full Article

P4590 – Cybersecurity Incident and Breach Response Management and Reporting

ITA Policy P4590 mandates the establishment of an incident response program within state agencies, ensuring timely reporting and management of cybersecurity incidents and breaches.

Read Full Article

P4570 – Firewall Security

ITA Policy P4570 defines security requirements for state agency firewalls, ensuring secure network communications and restricted access.

Read Full Article

P4550 – Mobile Device Management

ITA Policy P4550 ensures mobile device use does not compromise state information security, defining minimum security requirements for all devices.

Read Full Article

P4540 – Wireless Security for State Local Area Network

ITA Policy P4540 defines security requirements for state agency wireless networks, ensuring secure communications and restricted access.

Read Full Article

P4530 – Cleansing Data from Surplus Computer Equipment

ITA Policy P4530 defines requirements for data removal from surplus computer equipment, ensuring sensitive information is unrecoverable.

Read Full Article

P4520 – Patching and Vulnerability Management

ITA Policy P4520 establishes guidelines for managing IT vulnerabilities, ensuring timely deployment of patches to prevent exploitation.

Read Full Article

P4505 – Cybersecurity Awareness Training

ITA Policy P4505 mandates cybersecurity awareness training for all state agency personnel, ensuring they understand and mitigate cybersecurity risks.

Read Full Article

P4503 – Identity and Access Management

ITA Policy P4503 mandates identity and access management practices to protect state agency assets with best practice authentication standards.

Read Full Article

P4502 – Privilege Access Management

ITA Policy P4502 mandates the use of multifactor authentication for privileged accounts to reduce the risk of compromise to agency information and assets.

Read Full Article
1 8 9 10 11 12 13