File Type: pdf
G550 – Cleansing Data from Surplus Computer Equipment
ITA Guideline G550 outlines procedures for cleansing data from surplus computer equipment, ensuring secure and compliant disposal of state-owned devices.
Read Full ArticleG540 – Mobile Devices
ITA Guideline G540 provides a framework for managing and administering policies for mobile and handheld devices to ensure security and efficient use.
Read Full ArticleG536 – Firewall – Ports, Protocols, and Services Request
ITA Guideline G536 outlines the process for requesting firewall ports, protocols, and services, ensuring secure network configurations for state agencies.
Read Full ArticleG535 – Firewall Configuration
ITA Guideline G535 mandates firewall mechanisms in the DMZ to control access, ensuring secure routing, authentication, and traffic control for state networks.
Read Full ArticleG530 – Wireless Local Area Network (LAN) Security
ITA Guideline G530 outlines measures for security of wireless LANs for state agency networks.
Read Full ArticleG515 – Critical Security Controls 1-6 Written Policy Template
ITA Guideline G515 establishes a baseline of template language for use by agencies for written
policy development in support of CSCs 1-6.
G505 – Data Classification and Labeling
ITA Guideline G505 outlines procedures for data classification and labeling, ensuring state agencies properly identify and protect sensitive information.
Read Full ArticleG502 – Privacy Impact Assessment
ITA Guideline G502 outlines the process for conducting Privacy Impact Assessments, ensuring state agencies identify and mitigate privacy risks to maintain PII.
Read Full ArticleG501 – Cybersecurity Framework Guidance
ITA Guideline G501 provides guidance on implementing the Cybersecurity Framework to help identify and prioritize actions for reducing cybersecurity risk.
Read Full ArticleG420 – Roles of GIS Participants
ITA Guideline G420 defines and clarifies the relationships of the various participants involved in statewide geographic information systems (GIS) activities.
Read Full Article