OIT Enterprise Security
Overview
Combat the never-ending sea of cyber threats. Let OIT Enterprise Security ease your concerns with a cohesive cybersecurity program that is meant to safeguard the agency’s business operations and maintain customer trust in agency services.
How to Request Service
Contact your IT Director or Agency IT Portfolio Manager or submit a ticket in the Customer Service Portal below.
Customer Benefits
Security Compliance
Ensures agency systems comply with state policies and standards as well as federal regulatory requirements
Risk Management
Proactively monitors and manages information security risks, tracks and recommends remediation activities
Early Incident Detection
Provides early detection of security incidents and impact containment
Service Description
Enterprise information security services provisioning, management and support
Enterprise Information Security encompasses the provisioning and management of information security services and solutions to all executive branch agencies, as defined by C.R.S. § 24-37.5. These services are available to all employees, contractors, partners or vendors who: connect to the state network, operate or manage telecommunication and information technology services, equipment or data supporting the state’s business functions.
The service features and descriptions below are provided by the Chief Information Security Officer with support from five distinct security teams within OIT.
Security Governance
Security Architecture
Security Risk and Compliance
Security Operations
Service Features
Strategic Planning and Management
Continuously ensure the enterprise’s information security program (principles, practices and system design) is in line with all state agency mission statements.
Information Security Management
The development and management of principles, policies, standards, and procedures necessary to ensure the confidentiality, integrity, availability, and privacy of information throughout the information life cycle.
Information Security Training & Awareness
The development and delivery of training and activities designed to instruct workers about their security responsibilities, and the delivery of information security processes and procedures for performing duties optimally and securely within related environments.
Policy and Regulatory Assessment and Compliance
The review, evaluation, analysis and periodic monitoring of processes against statutory requirements; information security laws; regulations; industry-wide best practices; and enterprise and agency security controls to achieve the state’s information security goals and assist agencies in their effort to comply with applicable technology requirements (Agencies have primary responsibility for compliance).
Vulnerability Management
The identification and testing of vulnerabilities to information assets, such as: databases, applications, desktops, servers, switches, routers, etc; the issuance of recommendation(s); and the management of mitigation strategies that achieve needed security at an affordable cost.
Risk Management
Provide a balanced approach to the identification and assessment of risks to information assets, and the management of mitigation strategies that achieve enterprise information security goals and assist agencies in complying with applicable requirements (agencies have primary responsibility for compliance) at an affordable cost.
IT Audit Facilitation
Taking ownership of IT audit response and remediation tracking to ensure that when agencies are audited who have OIT-managed systems included in the scope of the audit, that IT audit requests receive timely and accurate responses, and that audit remediation is occurring as agreed upon.
Critical and Essential Application Risk Assessments
The provision of application risk assessments for agency critical and essential applications. Issues discovered during the assessment will be tracked and discussed with the agency, and prioritized for corrective action (remediation).
Email Filtering and Security
The application of inbound email filtering and targeted attack protection, as well as outbound email encryption to minimize email threats and data exposure.
Security Event Monitoring and Incident Management
The development and issuance of processes and procedures to prepare and prevent, detect, contain, eradicate, recover and apply lessons learned from incidents impacting the mission of the State, and its agencies, including investigation and analysis used for recovering, authenticating, and analyzing electronic information to reconstruct events related to security incidents. E-discovery and data acquisition related to an investigation request is also included.
Security Operations and Maintenance, including Endpoint Security
The maintenance, monitoring, control, hardening, and protection of the infrastructure, including servers and desktops, and the information residing on them to applicable State and agency requirements, during the operational phase of information systems and/or applications in production. This also ensures that tools are in place, on each OIT-managed endpoint to detect and prevent malicious activity, scan downloaded files for threats, validate compliance with state configuration and hardening requirements, and ensure patches and security updates are applied timely.
Network Security and Firewalls
Provides inbound and outbound traffic filtering, firewalls, and remote connectivity to the agency network. This includes firewall changes, ongoing security updates and maintenance for the hardware and software supporting these functions.
System and Application Security
Ensures that the operation of IT systems and software does not present undue risk to the enterprise, and its information assets, through the integration of information security into an IT system or application during the System Development Life Cycle (SDLC).
Vendor Risk Management
The development and establishment of standards and contract language that promote the procurement of information products or services that meet the security requirements of the agencies. Vendor security assessments, as part of major purchases, ongoing vendor risk management for critical and essential services provided to the agencies.
Employee Investigations
Investigate and analyze potential violations of acceptable use policy. Investigation is conducted as part of a security incident investigation, or as requested by the agency’s Human Resources department. Agency HR teams may contact the Office of Information Security for additional investigation services beyond acceptable use policy violations.
Related Services
We work to ensure that security is built into all services that OIT provides. The security services are closely aligned to services such as: Identity and Access Management, Infrastructure services, Network/Firewall, Service Desk, application lifecycle management and project support.
Customer Responsibilities
Ensure that agency employees, contractors, partners and vendors who connect to the State network, operate or manage telecommunication and information technology services, equipment or data which supports the State’s business functions abide by the Colorado Information Security policies, procedures, standards, and guidelines.
Develop and implement agency procedures and governance to ensure that appropriate processes are in place to detect security events.
Report suspicious activities associated with systems, personnel, and/or applications to the Office of Information Security as soon as possible. This can be done through the OIT Service Desk.
Physical Security
Agencies are responsible for physical security for their own locations, workstations, and wiring closets. OIT provides physical security for systems residing in OIT-managed data centers.
Personnel Security
Agencies are responsible for the selection and management of employees and contractors, and for ensuring that these are following security and state policies.
Agency Compliance with Federal Regulations
Agencies maintain primary responsibility for ensuring their business practices and systems comply with applicable federal and state regulations. OIT provides technical support to the agencies in ensuring systems are configured to support in this effort.
Service Notes
For Additional Assistance:
Service Owner
Service Levels
It is the responsibility of the OIT Office of Information Security to deliver effective enterprise focused security services by:
Providing support during published hours for questions and/or problems
Providing support 24/7 in the event of an emergency
Working with agencies to mitigate risks to their systems and notifying agencies of changing or new risks to their systems
Service Support
How to Get Help
Call 303.239.HELP
Submit a ticket in the Customer Service Portal
Hours of Support
Monday-Friday, 8 a.m. to 5 p.m, excluding holidays
24/7 Major Incident Management
Call 303.239.HELP
Access a live agent via Customer Service Portal Chatbot
Service Costs
Search the Real-time Billing rate sheet for the latest rates for financial code 3151 and 3156
View detail on current utilization here: OIT Common Policy Real-time Billing website