File Type: pdf

G550 – Cleansing Data from Surplus Computer Equipment

ITA Guideline G550 outlines procedures for cleansing data from surplus computer equipment, ensuring secure and compliant disposal of state-owned devices.

Read Full Article

G540 – Mobile Devices

ITA Guideline G540 provides a framework for managing and administering policies for mobile and handheld devices to ensure security and efficient use.

Read Full Article

G536 – Firewall – Ports, Protocols, and Services Request

ITA Guideline G536 outlines the process for requesting firewall ports, protocols, and services, ensuring secure network configurations for state agencies.

Read Full Article

G535 – Firewall Configuration

ITA Guideline G535 mandates firewall mechanisms in the DMZ to control access, ensuring secure routing, authentication, and traffic control for state networks.

Read Full Article

G530 – Wireless Local Area Network (LAN) Security

ITA Guideline G530 outlines measures for security of wireless LANs for state agency networks.

Read Full Article

G515 – Critical Security Controls 1-6 Written Policy Template

ITA Guideline G515 establishes a baseline of template language for use by agencies for written
policy development in support of CSCs 1-6.

Read Full Article

G505 – Data Classification and Labeling

ITA Guideline G505 outlines procedures for data classification and labeling, ensuring state agencies properly identify and protect sensitive information.

Read Full Article

G502 – Privacy Impact Assessment

ITA Guideline G502 outlines the process for conducting Privacy Impact Assessments, ensuring state agencies identify and mitigate privacy risks to maintain PII.

Read Full Article

G501 – Cybersecurity Framework Guidance

ITA Guideline G501 provides guidance on implementing the Cybersecurity Framework to help identify and prioritize actions for reducing cybersecurity risk.

Read Full Article

G420 – Roles of GIS Participants

ITA Guideline G420 defines and clarifies the relationships of the various participants involved in statewide geographic information systems (GIS) activities.

Read Full Article
1 2 3 4 13