OIT Enterprise Security

Overview

Combat the never-ending sea of cyber threats. Let OIT Enterprise Security ease your concerns with a cohesive cybersecurity program that is meant to safeguard the agency’s business operations and maintain customer trust in agency services.


How to Request Service

Contact your IT Director or Agency IT Portfolio Manager or submit a ticket in the Customer Service Portal below.

Customer Benefits

Security Compliance

Ensures agency systems comply with state policies and standards as well as federal regulatory requirements

Risk Management

Proactively monitors and manages information security risks, tracks and recommends remediation activities

Early Incident Detection

Provides early detection of security incidents and impact containment

Service Description

Enterprise information security services provisioning, management and support

Enterprise Information Security encompasses the provisioning and management of information security services and solutions to all executive branch agencies, as defined by C.R.S. § 24-37.5. These services are available to all employees, contractors, partners or vendors who: connect to the state network, operate or manage telecommunication and information technology services, equipment or data supporting the state’s business functions.

The service features and descriptions below are provided by the Chief Information Security Officer with support from five distinct security teams within OIT.

Service Features

Continuously ensure the enterprise’s information security program (principles, practices and system design) is in line with all state agency mission statements.

The development and management of principles, policies, standards, and procedures necessary to ensure the confidentiality, integrity, availability, and privacy of information throughout the information life cycle.

The development and delivery of training and activities designed to instruct workers about their security responsibilities, and the delivery of information security processes and procedures for performing duties optimally and securely within related environments.

The review, evaluation, analysis and periodic monitoring of processes against statutory requirements; information security laws; regulations; industry-wide best practices; and enterprise and agency security controls to achieve the state’s information security goals and assist agencies in their effort to comply with applicable technology requirements (Agencies have primary responsibility for compliance).

The identification and testing of vulnerabilities to information assets, such as: databases, applications, desktops, servers, switches, routers, etc; the issuance of recommendation(s); and the management of mitigation strategies that achieve needed security at an affordable cost.

Provide a balanced approach to the identification and assessment of risks to information assets, and the management of mitigation strategies that achieve enterprise information security goals and assist agencies in complying with applicable requirements (agencies have primary responsibility for compliance) at an affordable cost.

Taking ownership of IT audit response and remediation tracking to ensure that when agencies are audited who have OIT-managed systems included in the scope of the audit, that IT audit requests receive timely and accurate responses, and that audit remediation is occurring as agreed upon.

The provision of application risk assessments for agency critical and essential applications.  Issues discovered during the assessment will be tracked and discussed with the agency, and prioritized for corrective action (remediation).

The application of inbound email filtering and targeted attack protection, as well as outbound email encryption to minimize email threats and data exposure.

The development and issuance of processes and procedures to prepare and prevent, detect, contain, eradicate, recover and apply lessons learned from incidents impacting the mission of the State, and its agencies, including investigation and analysis used for recovering, authenticating, and analyzing electronic information to reconstruct events related to security incidents. E-discovery and data acquisition related to an investigation request is also included.

The maintenance, monitoring, control, hardening, and protection of the infrastructure, including servers and desktops, and the information residing on them to applicable State and agency requirements, during the operational phase of information systems and/or applications in production. This also ensures that tools are in place, on each OIT-managed endpoint to detect and prevent malicious activity, scan downloaded files for threats, validate compliance with state configuration and hardening requirements, and ensure patches and security updates are applied timely.

Provides inbound and outbound traffic filtering, firewalls, and remote connectivity to the agency network. This includes firewall changes, ongoing security updates and maintenance for the hardware and software supporting these functions.  

Ensures that the operation of IT systems and software does not present undue risk to the enterprise, and its information assets, through the integration of information security into an IT system or application during the System Development Life Cycle (SDLC).

The development and establishment of standards and contract language that promote the procurement of information products or services that meet the security requirements of the agencies. Vendor security assessments, as part of major purchases, ongoing vendor risk management for critical and essential services provided to the agencies.

Investigate and analyze potential violations of acceptable use policy. Investigation is conducted as part of a security incident investigation, or as requested by the agency’s Human Resources department. Agency HR teams may contact the Office of Information Security for additional investigation services beyond acceptable use policy violations.

Related Services

We work to ensure that security is built into all services that OIT provides. The security services are closely aligned to services such as: Identity and Access Management, Infrastructure services, Network/Firewall, Service Desk, application lifecycle management and project support.

Customer Responsibilities

Physical Security

Agencies are responsible for physical security for their own locations, workstations, and wiring closets. OIT provides physical security for systems residing in OIT-managed data centers.

Personnel Security

Agencies are responsible for the selection and management of employees and contractors, and for ensuring that these are following security and state policies.

Agency Compliance with Federal Regulations

Agencies maintain primary responsibility for ensuring their business practices and systems comply with applicable federal and state regulations. OIT provides technical support to the agencies in ensuring systems are configured to support in this effort.

Service Notes

Service Owner

Jill Fraser

Chief Information Security Officer

Jill.Fraser@state.co.us

Service Levels

It is the responsibility of the OIT Office of Information Security to deliver effective enterprise focused security services by:

Service Support

How to Get Help

Hours of Support

Monday-Friday, 8 a.m. to 5 p.m, excluding holidays


24/7 Major Incident Management

Service Costs

Search the Real-time Billing rate sheet for the latest rates for financial code 3151 and 3156

View detail on current utilization here: OIT Common Policy Real-time Billing website