UMMS Information Technology Procedures
UMMS Information Technology Procedures are a mandatory sequence of activities that must be followed to correctly perform a task. In addition, they are designed to provide standards with the support structure and specific direction they require to be meaningful and effective. The procedures below are applicable to all IT groups.
Customer Service:
Research Computing:
- Patch Management Procedure - AWS
- Cloud Strategy - Access Management Procedure
- Cloud Strategy - UMass Medical Instance Restore Procedure
Engineering:
- Change Control Procedure
- Data Masking Procedure - Oracle
- Data Masking Procedure - SQL
- Root Cause Analysis Procedure
Infrastructure
- Adding WiFi Access Point Procedure
- Backup Data Destruction Procedure
- Creating a New Voicemail Box Procedure
- Data Center Access Daily and Weekly Review
- Data Retention and Backup Procedure
- Electronic Media Disposal Procedure
- Emergency Termination Procedure
- Infoblox Access Review Procedure
- Infrastructure Services OnCall Procedure
- Iron Mountain Access Procedure
- IT Infrastructure Firewall Modification Procedure
- IT Phone Factor for Multifactor Authentication Procedure
- MoveIT - SLA
- MoveIT - SOP
- Patching Procedure - Unix
- Server Build Request Form
- Server Decommission Checklist
- Tape Vault Access Procedure
Information Security
- Alienvault - Agent Deployment Procedure
- Alienvault - Agent Deployment Procedure - Linux
- Alienvault - Backup Procedure
- Alienvault - Review Process for Logging
- OWASP Scanning Procedure
- Patching Procedure - Windows
- Phishing Incident Response Procedure
- Policy Standard and Procedure Review Procedure
- Risk Assessment Procedure
- Tenable Scanning Procedure
- Third Party Clinical Data Procedure
- Third-Party Vendors and Protected Health Information Procedure