Applies to all network firewalls at UW-Madison.
The Network Firewall Policy establishes the Guiding Principles and collaborative decision-making process for the administration, configuration, and operating procedures for network firewalls at UW-Madison.
The Network Firewall Implementation Plan describes the implementation of the policy.
The purpose of network firewall rules and operating procedures is to support and expedite research, teaching, and learning at the University, while reliably providing protection for all devices, services, and subnets connected to the UW-Madison network.
UW-Madison will have network firewall rules and operating procedures that are consistent with the academic and business needs of the University and with widely recognized best practices in cybersecurity.
Free and open access to information and resources available on the internet will continue as the University implements firewall protection against known threats and malicious actors.
Network firewall rules and operating procedures will be reviewed through an ongoing collaborative decision-making process which includes subject matter experts and participants from representative UW-Madison academic and business units.
Administration of network firewalls will be federated when technologically practical, so that a firewall administrator for a subnet can manage rules and operating procedures that are specific to that subnet.
If federated administration is not technologically practical, the shared, (i.e. non-federated,) operating procedures will, to the extent practical, accommodate the timely, efficient, and effective administration of subnet-specific rules.
There will be open and transparent communication with ample opportunities for feedback and engagement from IT professionals and impacted users, in order to gauge the effect of the policy on the university.
When an firewall interdiction occurs that prevents access to a resource, the end user should receive context for why the interdiction occurred and actionable steps they can take to mitigate or resolve the issue.
The administration, configuration, and operating procedures for network firewalls will follow the Guiding Principles. In order to meet evolving needs, additional Guiding Principles, consistent with those already in the Policy, may be added in the Implementation Plan.
UW-Madison will establish an ongoing collaborative Advisory Group that includes subject matter experts and participants from representative UW-Madison academic and business units. The Group is advisory to the Chief Information Security Officer. The CISO is assisted by the other Sponsors of the Advisory Group.
The Group will initially advise on the common (shared) network firewall rules and operating procedures that apply to all devices and services on subnets protected behind the Next Generation firewalls.
Longer-term, the Group will advise more generally on the administration, configuration, and operating procedures for network firewalls at UW-Madison.
The Executive Sponsors of the Advisory Group will at a minimum include the Chief Information Officer and the Chair of the Information Technology Committee, and may include other senior academic and business leaders.
The Sponsors of the Advisory Group will at a minimum include the Chief Information Security Officer (CISO), and may include other academic, business, or IT leaders to assist the CISO.
The organization and functioning of the Advisory Group will be further defined in the charter of the group, as approved by the Executive Sponsors. The provisions of the charter must be consistent with this Policy.
Personally-owned devices or other non-UW-Madison-owned devices and services are subject to this Policy while they are connected to the University network.
Exceptions to the Policy will be reviewed by the Advisory Group, the Sponsors, and if necessary, by the Executive Sponsors of the Group and the Risk Executives of the affected systems.
This Policy establishes the Guiding Principles and collaborative decision-making process for the administration, configuration, and operating procedures for network firewalls at UW-Madison. The purpose is to provide more extensive, adaptable, and consistent network protection in order to counter increasingly sophisticated and persistent attacks on University data and systems.
Strong and adaptable rules provide better and more consistent protection. However, strong and adaptable rules are more likely to have short term impact on university operations as they are tuned to maximum necessary protections and minimize inadvertent interference.
The principles and decision-making process established by the policy help reduce cybersecurity risk to the institution by enabling stronger and more adaptable protections than would otherwise be possible. The Policy and Implementation Plan, are designed to:
Enable more extensive and adaptable use of common (shared) network firewall rules. This is accomplished by applying firewall management principles that are responsive to the needs of the institution, along with a collaborative decision-making process to ensure that those needs are heard and addressed.
Increase the consistency of firewall protection. Common (shared) firewall rules add protection to all subnets behind the firewalls. When new threats are identified, common firewall rules reduce the risk of leaving some of those subnets vulnerable due to staff vacancies or lack of available staff time.
Introduce more advanced firewall protection features which can quickly detect and block new threats. These advanced features are necessary to protect data and assets from increasingly sophisticated and persistent attacks.
The immediate need is to select and manage the common (shared) network firewall rules that are specific to the Next Generation firewalls. Sound principles and a collaborative decision-making process are necessary because the common rules apply to all devices and services on subnets which are protected behind a Next Generation firewall.
Beyond the common (shared) network firewall rules, there is a longer-term need to more generally improve the administration, configuration, and operation of UW-Madison network firewalls, using the same principles and collaborative decision-making process.
The UW System Board of Regents policy 25.3 "Acceptable Use of Information Technology Resources" authorizes the UW System to,
"…take reasonable measures to protect the privacy of its IT resources and accounts assigned to authorized users... Any activity on UW System IT resources may be monitored, logged and reviewed by UW System-approved personnel... The UW System has the right to employ appropriate security measures, to investigate as needed, and to take necessary actions to protect UW System IT resources…"
The UW-Madison Network Firewall Policy is approved by the Information Technology Committee (ITC), representing shared governance, and issued by the Vice Provost for Information Technology (VP IT).
Mandatory portions of the Network Firewall Implementation Plan and operating procedures are extensions of this Policy, and inherit the authority of this Policy.
The Executive Sponsors and immediate Sponsors of the Advisory Group will ensure that the Advisory Group is adhering to the Guiding Principles and Policy.
All system administrators of network firewalls at UW-Madison will ensure that the administration, configuration, and operation of the network firewalls that they administer are consistent with the security controls included in the unit’s Risk Management Framework System Security Plan as accepted by the unit’s Risk Executive, and with the operating procedures established by the Advisory Group and its Sponsors.
Any device or service connected to the UW-Madison network, or that accesses or is accessed by such devices and services, that through its configuration or activity poses a unacceptable risk to the network, to other devices and services connected to the network, or to the availability, integrity or confidentiality of UW-Madison data, may have its access to the network limited or blocked until that risk is eliminated or reduced to an acceptable level.
Please address questions or comments about this Policy to email@example.com.