Title: Acquisition and Development Lifecycle  
Author: Unknown User (dlwoodbe) Jan 06, 2014
Last Changed by: Valerie Vogel Dec 06, 2017
Tiny Link: (useful for email) https://spaces.at.internet2.edu/x/WgEDAw
Export As: Word · PDF  
Incoming Links
Higher Ed Information Security Guide (1)
    Page: Asset and Data Management
Hierarchy
Parent Page
    Home page: Home
Outgoing Links
External Links (48)
    https://events.educause.edu/security-professionals-conferen…
    https://security.illinois.edu/content/purchasing-software-a…
    www.itil-officialsite.com
    https://events.educause.edu/security-professionals-conferen…
    www.iso.org/iso/store.htm
    https://www.sans.org/partnership/education
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    https://events.educause.edu/security-professionals-conferen…
    https://cloudsecurityalliance.org/
    net.educause.edu/SEC10/Program/1023654?PRODUCT_CODE=SEC10/S…
    www.isaca.org/cobit
    www.sans.org/security-training/curriculums/system-administr…
    https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Proj…
    er.educause.edu/articles/2011/7/cloud-services-policy-and-a…
    https://events.educause.edu/security-professionals-conferen…
    www.nist.gov/cyberframework/
    https://events.educause.edu/security-professionals-conferen…
    net.educause.edu/section_params/conf/CCW10/issues.pdf
    www.owasp.org/index.php/OWASP_Top_Ten_Project
    sectooladdict.blogspot.com/2011/08/commercial-web-applicati…
    sharedassessments.org/media/pdf-EnterpriseCloud-SA.pdf
    creativecommons.org/licenses/by-nc-sa/4.0/
    https://library.educause.edu/topics/policy-and-law/pci-dss
    educause.mediasite.com/mediasite/Viewer/?peid=906ef06529f34…
    https://www.microsoft.com/security/sdl/default.aspx?mstLocP…
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    net.educause.edu/ir/library/pdf/ACTI1303.pdf
    https://events.educause.edu/security-professionals-conferen…
    https://events.educause.edu/security-professionals-conferen…
    www.sans.org/partnership
    csrc.nist.gov/publications/PubsSPs.html
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    www.educause.edu/events/security-professionals-conference/2…
    https://www.pcisecuritystandards.org/index.shtml
    www.incommon.org/docs/assurance/IAP.pdf
    https://cloudsecurityalliance.org/research/ccm/
    https://events.educause.edu/security-professionals-conferen…
    www.atlassian.com/software/jira
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-6…
    www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    www.sans.org/security-training/curriculums/developer
    mailto:security-council@educause.edu?subject=System Acquisi…
    www.it.northwestern.edu/about/departments/itms/cpo/assessme…
    https://spaces.internet2.edu/display/2014infosecurityguide/…
Higher Ed Information Security Guide (3)     Page: Cloud Computing Security
    Page: Guidelines for Data De-Identification or Anonymization
    Page: Security Operations