Skip to main content
Main content

Information System Standards 2.0

These standards, originally established in 2019, establish the minimum requirements for Information Systems.

The 2.0 standards are a direct subset of NIST 800-171r3. The subset represents:

  • 800-171 control equivalents to the previous 1.0 standards

  • 15 controls needed for CMMC 1.0 compliance

  • 800-171 controls essential for material security

Standard ITS-S006

Purpose

These standards establish the minimum requirements for Information Systems and End User Devices (EUDs). They cannot be diminished, but stronger requirements based on these standards may be implemented as units or divisions find appropriate.

Designated Individuals

Responsible Executive(s): Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services

Applicability

All University faculty, other academic appointees, students, staff, volunteers, associates, and contractors (“Covered Persons”) must adhere to these standards, per the Information Security Policy.

These standards apply to all University information resources used to conduct University activities in support of the academic, research, and service mandates of the University, connect to the University network, or store University data or information. This includes data processed or stored and applications used by the University in hosted environments where the University does not operate the technology infrastructure.

Standard Ownership

Responsible Executive(s): Assistant Vice President and Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services
Effective date: 5/1/2019
Last Updated: 9/15/2025

Definitions

  • Information System: Server based software that resides on a single server or multiple servers. “Application” or “Information System” is synonymous with “system” e.g. a database server, web server or other application server.

  • End User Device: Any desktop or laptop computer, any tablet, smart phone, or other mobile device that is used by an end user to access data over a network is an End User Device.

  • Asset: A term used in these standards to refer either to an End User Device or an Information System.

  • Restricted Information: Confidential information requiring the highest level of security and privacy protection. Access is only permitted as directed by the associated Data Steward or applicable University authority. Please see the Data Classification Standard and the UChicago Sensitive Data Usage Guide for additional information.

  • Privileged Access: Access for use in administering or controlling Information Systems.

Standards

The controls below:

  • Have been uniquely numbered according to the NIST standard

  • Where applicable, the ISS 1.0 control has been referenced

  • Has a Control Name that acts as a simple reference

To apply these controls, leverage the Information System Standards 2.0 Detailed Appendix.

SP 800-171 R3 Identifier SP 800-171 r3 Control Name iSS 1.0 Standard Number
03.01.01

Account Management

12

03.01.02

Access Enforcement

12
13

03.01.05

Least Privilege

14

03.01.06 

Least Privilege - Privileged Accounts

14

03.01.07

Least Privilege - Privileged Functions

13
14

03.01.08

Unsuccessful Logon Attempts

15 

03.01.09

System Use Notification

16 

03.01.10

Device Lock 

17

03.01.12

Remote Access 

18 

03.01.18 

Access Control for Mobile Devices

15

03.01.20

Use of External Systems

20

03.01.22

Publicly Accessible Content 

 

03.03.01 

Event Logging

31
32
39
42

03.03.02 

Audit Record Content

32 

03.03.03

Audit Record Generation 

31 

03.03.04

Response to Audit Logging Process Failures

33
34

03.03.05

Audit Record Review, Analysis, and Reporting 

35 

03.03.07 

Time Stamps 

37

03.03.08

Protection of Audit Information

38 

03.04.01 

Baseline Configuration 

1, 4, 6

03.04.02

Configuration Settings

 

03.04.03

Configuration Change Control

2

03.04.04 

Impact Analyses

03.04.06 

Least Functionality 

03.04.08 

Authorized SOftware - Allow by exception 

03.04.10

System Component Inventory 

 

03.04.11 

Information Location

 

03.04.12

System and Component Configuration for High Risk Areas 

 

03.05.01

User Identification and Authentication

 

03.05.02 

Device Identification and Authentication 

12

03.05.03 

Multi-FactorAuthentication

11, 14, 25 

03.05.04 

Authenticator Management 

 

03.06.05 

Incident Response Plan 

 

03.08.01 

Media Storage 

23 

03.08.03 

Media Sanitization 

24 

03.08.09 

System Backup - Cryptographic Protection 

30 

03.10.01 

Physical Access Authorization 

 

03.10.07 

Physical Access Control 

 

03.10.08 

Access Control for Transmission 

 

03.11.04

Risk Response 

 

03.13.01 

Boundary Protection 

43 

03.13.08

Transmission and Storage Confidentiality 

44 

03.13.10 

Cryptographic Key Establishment and Management 

26 

03.13.11 

Cryptographic Protection

27 

03.13.12 

Collaborative Computing Devices and Applications 

28 

03.14.01

Flaw Remediation 

03.14.02 

Malicious Code Protection 

03.14.06 

System Monitoring 

10, 43

03.14.08 

Information Management and Retention

 

03.16.02 

Unsupported System Components

 

Enforcement

Per the University of Chicago’s Information Security Policy, non-adherence may “result in disciplinary action, up to and including the suspension of network privileges, suspension or expulsion from further study and termination of employment.”

Frequently Asked Questions

What are the Information Security Standards?
Why would an institution align to NIST 800-171??
What process does the University use to revise its security standards??
In what situations do the Information Security Standards become relevant??
How might these standards impact faculty members??
What happens if a system cannot meet these standards?
How does one review infrastructure against the standards?
Is an individual solely responsible for compliance with all these standards?
How does one determine if a system contains restricted data?
What should be done when encountering placeholders for values in compliance forms?