Information System Standards 2.0
These standards, originally established in 2019, establish the minimum requirements for Information Systems.
The 2.0 standards are a direct subset of NIST 800-171r3. The subset represents:
-
800-171 control equivalents to the previous 1.0 standards
-
15 controls needed for CMMC 1.0 compliance
-
800-171 controls essential for material security
Standard ITS-S006
Purpose
These standards establish the minimum requirements for Information Systems and End User Devices (EUDs). They cannot be diminished, but stronger requirements based on these standards may be implemented as units or divisions find appropriate.
Designated Individuals
Responsible Executive(s): Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services
Applicability
All University faculty, other academic appointees, students, staff, volunteers, associates, and contractors (“Covered Persons”) must adhere to these standards, per the Information Security Policy.
These standards apply to all University information resources used to conduct University activities in support of the academic, research, and service mandates of the University, connect to the University network, or store University data or information. This includes data processed or stored and applications used by the University in hosted environments where the University does not operate the technology infrastructure.
Standard Ownership
Responsible Executive(s): Assistant Vice President and Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services
Effective date: 5/1/2019
Last Updated: 9/15/2025
Definitions
-
Information System: Server based software that resides on a single server or multiple servers. “Application” or “Information System” is synonymous with “system” e.g. a database server, web server or other application server.
-
End User Device: Any desktop or laptop computer, any tablet, smart phone, or other mobile device that is used by an end user to access data over a network is an End User Device.
-
Asset: A term used in these standards to refer either to an End User Device or an Information System.
-
Restricted Information: Confidential information requiring the highest level of security and privacy protection. Access is only permitted as directed by the associated Data Steward or applicable University authority. Please see the Data Classification Standard and the UChicago Sensitive Data Usage Guide for additional information.
-
Privileged Access: Access for use in administering or controlling Information Systems.
Standards
The controls below:
-
Have been uniquely numbered according to the NIST standard
-
Where applicable, the ISS 1.0 control has been referenced
-
Has a Control Name that acts as a simple reference
To apply these controls, leverage the Information System Standards 2.0 Detailed Appendix.
| SP 800-171 R3 Identifier | SP 800-171 r3 Control Name | iSS 1.0 Standard Number |
|---|---|---|
| 03.01.01 |
Account Management |
12 |
|
03.01.02 |
Access Enforcement |
12 |
|
03.01.05 |
Least Privilege |
14 |
|
03.01.06 |
Least Privilege - Privileged Accounts |
14 |
|
03.01.07 |
Least Privilege - Privileged Functions |
13 |
|
03.01.08 |
Unsuccessful Logon Attempts |
15 |
|
03.01.09 |
System Use Notification |
16 |
|
03.01.10 |
Device Lock |
17 |
|
03.01.12 |
Remote Access |
18 |
|
03.01.18 |
Access Control for Mobile Devices |
15 |
|
03.01.20 |
Use of External Systems |
20 |
|
03.01.22 |
Publicly Accessible Content |
|
|
03.03.01 |
Event Logging |
31 |
|
03.03.02 |
Audit Record Content |
32 |
|
03.03.03 |
Audit Record Generation |
31 |
|
03.03.04 |
Response to Audit Logging Process Failures |
33 |
|
03.03.05 |
Audit Record Review, Analysis, and Reporting |
35 |
|
03.03.07 |
Time Stamps |
37 |
|
03.03.08 |
Protection of Audit Information |
38 |
|
03.04.01 |
Baseline Configuration |
1, 4, 6 |
|
03.04.02 |
Configuration Settings |
|
|
03.04.03 |
Configuration Change Control |
2 |
|
03.04.04 |
Impact Analyses |
3 |
|
03.04.06 |
Least Functionality |
5 |
|
03.04.08 |
Authorized SOftware - Allow by exception |
5 |
|
03.04.10 |
System Component Inventory |
|
|
03.04.11 |
Information Location |
|
|
03.04.12 |
System and Component Configuration for High Risk Areas |
|
|
03.05.01 |
User Identification and Authentication |
|
|
03.05.02 |
Device Identification and Authentication |
12 |
|
03.05.03 |
Multi-FactorAuthentication |
11, 14, 25 |
|
03.05.04 |
Authenticator Management |
|
|
03.06.05 |
Incident Response Plan |
|
|
03.08.01 |
Media Storage |
23 |
|
03.08.03 |
Media Sanitization |
24 |
|
03.08.09 |
System Backup - Cryptographic Protection |
30 |
|
03.10.01 |
Physical Access Authorization |
|
|
03.10.07 |
Physical Access Control |
|
|
03.10.08 |
Access Control for Transmission |
|
|
03.11.04 |
Risk Response |
|
|
03.13.01 |
Boundary Protection |
43 |
|
03.13.08 |
Transmission and Storage Confidentiality |
44 |
|
03.13.10 |
Cryptographic Key Establishment and Management |
26 |
|
03.13.11 |
Cryptographic Protection
|
27 |
|
03.13.12 |
Collaborative Computing Devices and Applications |
28 |
|
03.14.01 |
Flaw Remediation |
8 |
|
03.14.02 |
Malicious Code Protection |
9 |
|
03.14.06 |
System Monitoring |
10, 43 |
|
03.14.08 |
Information Management and Retention |
|
|
03.16.02 |
Unsupported System Components |
|
Enforcement
Per the University of Chicago’s Information Security Policy, non-adherence may “result in disciplinary action, up to and including the suspension of network privileges, suspension or expulsion from further study and termination of employment.”
Frequently Asked Questions