UMMS Information Technology Procedures
UMMS Information Technology Procedures are a mandatory sequence of activities that must be followed to correctly perform a task. In addition, they are designed to provide standards with the support structure and specific direction they require to be meaningful and effective. The procedures below are applicable to all IT groups.
Academic Technology:
Customer Service:
- Computer Build Procedure
- Computer Decommission Procedure
- Computer Naming Conventions Procedure
- Computer Procurement Procedure
Research Technology:
- AWS Access Management Procedure
- AWS Restore Procedure
- Azure Server Build Procedure
- DocuSign 21 CFR Part 11 - Access Request Procedure
- DocuSign 21 CFR Part 11 - Access Review Procedure
- Patch Management Procedure - AWS
- Access Review Procedure - Infoblox
- Adding WiFi Access Point Procedure
- Backup Data Destruction Procedure
- Backup Restore Testing Procedure
- Change Control Procedure
- Conditional Access MFA Policy Device Exceptions Procedure
- Creating a New Voicemail Box Procedure
- Data Center Access Daily and Weekly Review
- Data Masking Procedure - Oracle
- Data Masking Procedure - SQL
- Data Retention and Backup Procedure
- Domain Admin Account Recertification Procedure
- Electronic Media Disposal Procedure
- Emergency Termination Procedure
- Firewall, Router, and Switch Hardening Procedure
- Firewall, Router, Switch, and Appliance Patching Procedure
- Information Technology Data Center Physical Site Security and Access Controls
- Infrastructure Services OnCall Procedure
- Iron Mountain Access Procedure
- IT Infrastructure Firewall Modification Procedure
- Manual Patching Procedure - Unix
- MoveIT - SLA
- MoveIT - SOP
- Multifactor Setup Procedure
- Network Device Access Procedure
- Remote Access Procedure
- Root Cause Analysis Procedure
- Server Build Procedure - Linux
- Tape Vault Access Procedure
- Virtual Desktop Patching Procedure
- Windows Server Build Procedure
Information Security
- Customer Account Recertification Procedure
- IAM Override Procedure
- JAMF Email Enrollment Procedure
- JAMF Pro Enrollment Procedure
- JAMF Third-Party Patching Procedure
- Log Analysis and Review Process
- Logging Agent Deployment Procedure
- Logging Agent Deployment Procedure - Linux
- Logging System Backup Procedure
- Network Access Recertification Procedure
- Non-UMMS User Account Request Procedure
- Patching Procedure - Windows
- Phishing Incident Response Procedure
- Risk Assessment Procedure
- Tenable Scanning Procedure
- Web Application Scanning Procedure