• Skip to primary navigation
  • Skip to main content

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Collaboration
    • Project Management
    • Organizational Change Management
    • The Texas A&M University System Technology Summit
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • IT Governance Framework
    • Accessibility
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Cybersecurity

Cybersecurity at the A&M System is an individual and collective effort of our members. It is necessary for us to work together, sharing resources and information assets.

You are here: Home / Cybersecurity / System Offices Security Control Standards and Procedures

System Offices Security Control Standards and Procedures

The following standards and procedures guide the System Offices IT organization and other Texas A&M System Offices in execution of information security and compliance activities.

They only apply to the System Offices.

These standards supplement Texas A&M System policies and the System’s Cybersecurity Control Standards.

NumberStandard/SAPDocument Link
Accessibility
29.01.99.S0.01 SAP Web Accessibility and Usability Procedures
Security
StandardAcceptable Use
StandardAccount Management
StandardAdministrator and Special Access
StandardAuthorized Software
StandardBackup and Recovery
StandardChange Management
StandardData Breach Reporting
StandardData Classification and Data Protection
StandardDisaster Recovery
StandardEmployee Instant Messaging
StandardEncryption of Confidential and Sensitive Information
StandardExclusions from Controls and Risk Management
StandardIncident Management
StandardInternet and Intranet Usage
StandardIntrusion Detection
StandardMalicious Code
StandardNetwork Configuration
StandardPassword Authentication
StandardPeer-To-Peer Networking Usage
StandardPhysical Access
StandardPortable Device Usage
StandardPrivacy
StandardSystem Development Life Cycle
StandardSecurity Awareness Training
StandardSecurity Monitoring
StandardSecurity Risk Assessment
StandardSecurity Surveillance
StandardServer Hardening
Standard Unauthorized Access Notice
StandardVendor Access
StandardWeb Accessibility
StandardWireless Access

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: support@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System