{"id":696,"date":"2021-12-14T15:24:53","date_gmt":"2021-12-14T15:24:53","guid":{"rendered":"https:\/\/web.tarleton.edu\/build-website\/?page_id=696"},"modified":"2026-02-25T18:02:46","modified_gmt":"2026-02-25T18:02:46","slug":"home","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/","title":{"rendered":"Home"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">Tarleton State University <\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Information Security Controls Catalog<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" id=\"search-the-catalog-7d0b1d18-eba1-4cec-bdb5-70f7e56b4a80\">Search the Catalog<\/h2>\n\n\n\n<p><strong>Search for controls by Title, Group, or Number.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-advgb-search-bar advgb-search-bar-wrapper undefined is-style-default custom-search-bar\"><form method=\"get\" action=\"https:\/\/www.tarleton.edu\/security-controls-catalog\" class=\"advgb-search-bar-form\" role=\"search\"><div class=\"advgb-search-bar-inner\" style=\"width:100%\"><div class=\"advgb-search-bar\" style=\"border-radius:0\"><span class=\"advgb-search-bar-icon\"><svg fill=\"none\" height=\"20\" width=\"20\" stroke=\"currentColor\" stroke-width=\"2\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle fill=\"none\" cx=\"11\" cy=\"11\" r=\"8\"><\/circle><line x1=\"21\" x2=\"16.65\" y1=\"21\" y2=\"16.65\"><\/line><\/svg><\/span><input type=\"text\" class=\"advgb-search-bar-input\" name=\"s\" placeholder=\"Search Security Controls Catalog...\"\/><\/div><div class=\"advgb-search-button-wrapper\"><button type=\"submit\" class=\"advgb-search-bar-button advgb-search-btn-b17e00f7-27b6-48ac-8098-1dc9a389d337\" style=\"color:#ffffff;border-color:#ffffff;background-color:#4f2d7f;border-radius:0\">SEARCH<\/button><\/div><\/div><\/form><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Control Catalog Families<\/h2>\n\n\n\n<div class=\"wp-block-advgb-columns advgb-columns-wrapper\" id=\"advgb-cols-ff75916e-3f65-4c88-9fa8-74323f4d01d8\"><div class=\"advgb-columns-container\"><div class=\"advgb-columns advgb-columns-row advgb-is-mobile advgb-columns-2 layout-12-12 mbl-layout-stacked gutter-20 vgutter-10\">\n<div class=\"wp-block-advgb-column advgb-column\" id=\"advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<div class=\"wp-block-advgb-accordions advgb-accordions-1887df83-0950-4b61-a9d9-38661c6502ec advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Access Control (AC)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-1-policy-and-procedures\/\">AC-1: Access Control \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-2-account-management\/\">AC-2: Account Management<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-2-3-access-control-disable-accounts\/\">AC-2(3): Access Control \u2013 Disable Accounts<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-2-7-privileged-user-accounts\/\">AC-2(7): Privileged User Accounts<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-3-access-enforcement\/\">AC-3: Access Enforcement<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-3-access-enforcement-2\/\">AC-3(7): Role-based Access Control<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-5-separation-of-duties\/\">AC-5: Separation of Duties<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-6-least-privilege\/\">AC-6: Least Privilege<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-7-unsuccessful-logon-attempts\/\">AC-7: Unsuccessful Logon Attempts<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-8-system-use-notification\/\">AC-8: System Use Notification<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-11-device-lock\/\">AC-11: Device Lock<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-14-permitted-actions-without-identification-or-authentication\/\">AC-14: Permitted Actions Without Identification or Authentication<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-17-remote-access\/\">AC-17: Remote Access<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-18-wireless-access\/\">AC-18: Wireless Access<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-19-access-control-for-mobile-devices\/\">AC-19: Access Control for Mobile Devices<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-20-use-of-external-systems\/\">AC-20: Use of External Systems<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-22-publicly-accessible-content\/\">AC-22: Publicly Accessible Content<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-941ceddb-3801-4077-9591-281e73d9c12f advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Awareness and Training (AT)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/awareness-and-training-at\/at-1-policy-and-procedures\/\">AT-1: Security Awareness and Training Policy and Procedures \u00a0\u00a0<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/awareness-and-training-at\/at-2-literacy-training-awareness\/\">AT-2: Literacy Training and Awareness<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/awareness-and-training-at\/at-2-2-insider-threat\/\">AT-2(2): Literacy Training and Awareness Insider Threat<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/awareness-and-training-at\/at-3-role-based-training\/\">AT-3: Role-Based Training<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/awareness-and-training-at\/at-4-training-records\/\">AT-4: Training Records<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-a390062a-adff-45fa-881d-64aab3555d14 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Audit and Accountability (AU)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-1-policy-and-procedures\/\">AU-1: Audit and Accountability Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-2-event-logging\/\">AU-2: Event Logging\u00a0\u00a0<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-3-content-of-audit-records\/\">AU-3: Content of Audit Records<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-4-audit-log-storage-capacity\/\">AU-4: Audit Log Storage Capacity<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-5-response-to-audit-logging-process-failures\/\">AU-5: Response to Audit Logging Process Failures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-6-audit-record-review-analysis-and-reporting\/\">AU-6: Audit Record Review, Analysis, and Reporting<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-8-time-stamps\/\">AU-8: Time Stamps<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-9-protection-of-audit-information\/\">AU-9: Protection of Audit Information<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-11-audit-record-retention\/\">AU-11: Audit Record Retention<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/audit-and-accountability-au\/au-12-audit-record-generation\/\">AU-12: Audit Record Generation<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-623be2d6-e355-4156-bf8c-cbe7f634e154 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Assessment, Authorization, and Monitoring (CA)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-1-assessment-authorization-and-monitoring-policies-and-procedures\/\">CA-1: Assessment, Authorization, And Monitoring &#8211; Policies and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-2-control-assessments\/\">CA-2: Control Assessments<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-3-information-exchange\/\">CA-3: Information Exchange<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-5-plan-of-action-and-milestones\/\">CA-5: Plan Of Action and Milestones<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-6-authorization\/\">CA-6: Authorization<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-7-continuous-monitoring\/\">CA-7: Continuous Monitoring<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-74-continuous-monitoring-risk-monitoring\/\">CA-7(4): Continuous Monitoring &#8211; Risk Monitoring<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-8-penetration-testing\/\">CA-8: Penetration Testing<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-9-internal-system-connections\/\">CA-9: Internal System Connections<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-fffaeee2-0272-4ba8-b364-de8410ed86f4 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item its-accordion-grouping\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Configuration Management (CM)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-1-configuration-management-policy-and-procedures\/\">CM-1: Configuration Management Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-2-baseline-configuration\/\">CM-2: Baseline Configuration<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-3-configuration-change-control\/\">CM-3: Configuration Change Control<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-32-testing-validation-and-documentation-of-changes\/\">CM-3(2): Testing, Validation and Documentation of Changes<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-4-impact-analysis\/\">CM-4: Impact Analysis<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-5-access-restrictions-for-change\/\">CM-5: Access Restrictions for Change<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-6-configuration-settings\/\">CM-6: Configuration Settings<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-7-least-functionality\/\">CM-7: Least Functionality<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-8-system-component-inventory\/\">CM-8: System Component Inventory<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-10-software-usage-restrictions\/\">CM-10: Software Usage Restrictions<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-11-user-installed-software\/\">CM-11: User-Installed Software<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-ba6b8988-60e5-43b3-870a-f05cdf06e9cd advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Contingency Planning (CP)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-1-contingency-planning-policy-and-procedures\/\">CP-1: Contingency Planning \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-2-contingency-plan\/\">CP-2: Contingency Plan<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-21-coordinate-with-related-plans\/\">CP-2(1): Coordinate with Related Plans<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-3-contingency-training\/\">CP-3: Contingency Training<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-4-contingency-plan-testing\/\">CP-4: Contingency Plan Testing<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-41-coordinate-with-related-plans\/\">CP-4(1): Coordinate with Related Plans<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-6-alternate-storage-site\/\">CP-6: Alternate Storage Site<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-7-alternate-processing-site\/\">CP-7: Alternate Processing Site<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-8-telecommuncations-services\/\">CP-8: Telecommuncations Services<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-9-system-backup\/\">CP-9: System Backup<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-93-separate-storage-for-critical-information\/\">CP-9(3): Separate Storage for Critical Information<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-10-system-recovery-and-reconstitution\/\">CP-10: System Recovery and Reconstitution<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/contingency-planning-cp\/cp-11-alternate-communications-protocols\/\">CP-11: Alternate Communications Protocols<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-d9a7ec23-01a8-410f-8e35-96566747e1e2 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Identification and Authentication (IA)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-1-identification-and-authentication-policy-and-procedures\/\">IA-1: Identification and Authentication \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-2-identification-and-authentication-organizational-users\/\">IA-2: Identification and Authentication (Organizational Users)<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-21-identification-and-authentication-organizational-users-multifactor-authentication-to-privileged-accounts\/\">IA-2(1): Identification and Authentication (Organizational Users) &#8211; Multifactor Authentication to Privileged Accounts<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-22-identification-and-authentication-organizational-users-multifactor-authentication-to-non-privileged-accounts\/\">IA-2(2): Identification and Authentication (Organizational Users) &#8211; Multifactor Authentication to Non-Privileged Accounts\u00a0<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-4-identifier-management\/\">IA-4: Identifier Management<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-5-authenticator-management\/\">IA-5: Authenticator Management<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-51-authenticator-management-password-based-authentication\/\">IA-5(1): Authenticator Management \u2013 Password Based Authentication<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-6-authenticator-feedback\/\">IA-6: Authenticator Feedback<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-7-cryptographic-module-authentication\/\">IA-7: Cryptographic Module Authentication<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-8-identification-and-authentication-non-organizational-users\/\">IA-8: Identification and Authentication (Non-Organizational Users)<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-11-re-authentication\/\">IA-11: Re-Authentication<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-12-identity-proofing\/\">IA-12: Identity Proofing<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/identification-and-authentication-ia\/ia-13-identity-providers-and-authorization-servers\/\">IA-13: Identity Providers and Authorization Servers<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-bbc5c02f-e78d-477a-b9f2-7f5478a2cff6 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Incident Response (IR)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-1-incident-response-policy-and-procedures\/\">IR-1: Incident Response \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-2-incident-response-training\/\">IR-2: Incident Response Training<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-3-incident-response-testing\/\">IR-3: Incident Response Testing<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-4-incident-handling\/\">IR-4: Incident Handling<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-5-incident-monitoring\/\">IR-5: Incident Monitoring<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-6-incident-reporting\/\">IR-6: Incident Reporting<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-7-incident-response-assistance\/\">IR-7: Incident Response Assistance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-8-incident-response-plan\/\">IR-8: Incident Response Plan<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-9-information-spillage-response\/\">IR-9: Information Spillage Response<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-f4133ddd-be8a-4b38-b5d0-18aefb20ccf6 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Maintenance (MA)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-1-maintenance-policy-and-procedures\/\">MA-1: Maintenance \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-2-controlled-maintenance\/\">MA-2: Controlled Maintenance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-3-maintenance-tools\/\">MA-3: Maintenance Tools<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-4-nonlocal-maintenance\/\">MA-4: Nonlocal Maintenance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-5-maintenance-personnel\/\">MA-5: Maintenance Personnel<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-6-timely-maintenance\/\">MA-6: Timely Maintenance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/maintenance-ma\/ma-7-field-maintenance\/\">MA-7: Field Maintenance<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-8834478d-f749-4d4d-9db9-390a4d81d243 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Media Protection (MP)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-1-media-protection-policy-and-procedures\/\">MP-1: Media Protection \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-2-media-access\/\">MP-2: Media Access<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-3-media-marking\/\">MP-3: Media Marking<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-4-media-storage\/\">MP-4: Media Storage<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-5-media-transport\/\">MP-5: Media Transport<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-6-media-sanitization\/\">MP-6: Media Sanitization<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-6_1-media-sanitization-review-approve-track-document-and-verify\/\">MP-6(1): Media Sanitization \u2013 Review, Approve, Track, Document, and Verify<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-7-media-use\/\">MP-7: Media Use<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/media-protection-mp\/mp-8-media-downgrading\/\">MP-8: Media Downgrading<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-column advgb-column\" id=\"advgb-col-3f7910a3-aace-47ac-a706-05820979729d\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<div class=\"wp-block-advgb-accordions advgb-accordions-8aca5ffa-8143-4382-a60b-cb7af33b1283 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Physical and Environmental Protection (PE)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-1-physical-and-environmental-protection-policy-and-procedures\/\">PE-1: Physical and Environmental Protection \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-2-physical-access-authorizations\/\">PE-2: Physical Access Authorizations<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-3-physical-access-control\/\">PE-3: Physical Access Control<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-4-access-control-for-transmission\/\">PE-4: Access Control for Transmission<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-5-access-control-for-output-devices\/\">PE-5: Access Control for Output Devices<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-6-monitoring-physical-access\/\">PE-6: Monitoring Physical Access<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-63-video-surveillance\/\">PE-6(3): Video Surveillance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-8-visitor-access-records\/\">PE-8: Visitor Access Records<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-9-power-equipment-and-cabling\/\">PE-9: Power Equipment and Cabling<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-10-emergency-shutoff\/\">PE-10: Emergency Shutoff<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-11-emergency-power\/\">PE-11: Emergency Power<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-12-emergency-lighting\/\">PE-12: Emergency Lighting<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-13-fire-protection\/\">PE-13: Fire Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-14-environmental-controls\/\">PE-14: Environmental Controls<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-15-water-damage-protection\/\">PE-15: Water Damage Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-16-delivery-and-removal\/\">PE-16: Delivery and Removal<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-17-alternate-work-site\/\">PE-17: Alternate Work Site<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-18-location-of-system-components\/\">PE-18: Location of System Components<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-19-information-leakage\/\">PE-19: Information Leakage<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-20-asset-monitoring-and-tracking\/\">PE-20: Asset Monitoring and Tracking<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-21-electromagnetic-pulse-protection\/\">PE-21: Electromagnetic Pulse Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-22-component-marking\/\">PE-22: Component Marking<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-8cf8ffee-598b-46a0-9364-91496c80b0a1 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Planning (PL)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-1-planning-policy-and-procedures\/\">PL-1: Planning \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-2-system-security-and-privacy-plans\/\">PL-2: System Security and Privacy Plans<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-4-rules-of-behavior\/\">PL-4: Rules of Behavior<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-41-rules-of-behavior-social-media-and-external-site-application-usage-restrictions\/\">PL-4(1): Rules of Behavior \u2013 Social Media and External Site\/Application Usage Restrictions<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-10-baseline-selection\/\">PL-10: Baseline Selection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/pl-11-baseline-tailoring\/\">PL-11: Baseline Tailoring<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-e3fc4c32-f022-4d83-9167-7fe5af7c882e advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Program Management (PM)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-1-information-security-program-plan\/\">PM-1: Information Security Program Plan<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-2-information-security-program-role\/\">PM-2: Information Security Program Role<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-3-information-security-and-privacy-resources\/\">PM-3: Information Security and Privacy Resources<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-4-plan-of-action-and-milestones-process\/\">PM-4: Plan of Action and Milestones Process<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-5-system-inventory\/\">PM-5: System Inventory<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-6-measures-of-performance\/\">PM-6: Measures of Performance<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-7-enterprise-architecture\/\">PM-7: Enterprise Architecture<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-9-risk-management-strategy\/\">PM-9: Risk Management Strategy<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-10-authorization-process\/\">PM-10: Authorization Process<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-14-testing-training-and-monitoring\/\">PM-14: Testing, Training, and Monitoring<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-15-security-and-privacy-groups-and-associations\/\">PM-15: Security and Privacy Groups and Associations<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-16-threat-awareness-program\/\">PM-16: Threat Awareness Program<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-afed9be4-903f-414e-a524-8181091b7eb8 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Personnel Security (PS)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-1-personnel-security-policy-and-procedures\/\">PS-1: Personnel Security \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-2-position-risk-designation\/\">PS-2: Position Risk Designation<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-3-personnel-screening\/\">PS-3: Personnel Screening<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-4-personnel-termination\/\">PS-4: Personnel Termination<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-5-personnel-transfer\/\">PS-5: Personnel Transfer<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-6-access-agreements\/\">PS-6: Access Agreements<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-7-external-personnel-security\/\">PS-7: External Personnel Security<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-8-personnel-sanctions\/\">PS-8: Personnel Sanctions<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personnel-security-ps\/ps-9-position-descriptions\/\">PS-9: Position Descriptions<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-79a24dce-e21c-4261-acc7-f9f72376e807 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Personally Identifiable Information Processing and Transparency (PT)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-1-personally-identifiable-information-processing-and-transparency-policy-and-procedures\/\">PT-1: Personally Identifiable Information Processing and Transparency \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-2-authority-to-process-personally-identifiable-information\/\">PT-2: Authority to Process Personally Identifiable Information<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-3-personally-identifiable-information-processing-purposes\/\">PT-3: Personally Identifiable Information Processing Purposes<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-4-consent\/\">PT-4: Consent<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-5-privacy-notice\/\">PT-5: Privacy Notice<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-6-system-of-records-notice\/\">PT-6: System of Records Notice<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/personally-identifiable-information-processing-and-transparency-pt\/pt-7-specific-categories-of-personally-identifiable-information\/\">PT-7: Specific Categories of Personally Identifiable Information<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-136fbf63-61bb-4bd8-97f8-55592932a658 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Risk Assessment (RA)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-1-risk-assessment-policy-and-procedures\/\">RA-1: Risk Assessment \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-2-security-categorization\/\">RA-2: Security Categorization<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-3-risk-assessment\/\">RA-3: Risk Assessment<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-31-risk-assessment-supply-chain-risk-assessment\/\">RA-3(1): Risk Assessment \u2013 Supply Chain Risk Assessment<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-5-vulnerability-monitoring-and-scanning\/\">RA-5: Vulnerability Monitoring and Scanning<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-52-vulnerability-monitoring-and-scanning-update-vulnerabilities-to-be-scanned\/\">RA-5(2): Vulnerability Monitoring and Scanning \u2013 Update Vulnerabilities to be Scanned<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-511-vulnerability-monitoring-and-scanning-public-disclosure-program\/\">RA-5(11): Vulnerability Monitoring and Scanning \u2013 Public Disclosure Program<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-7-risk-response\/\">RA-7: Risk Response<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-8-privacy-impact-assessments\/\">RA-8: Privacy Impact Assessments<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/risk-assessment-ra\/ra-10-threat-hunting\/\">RA-10: Threat Hunting<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-b830cb48-29c0-4a6c-a9ab-b2fb10678d7f advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">System and Service Acquisition (SA)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-1-system-and-services-acquisition-policy-and-procedures\/\">SA-1: System and Services Acquisition \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-2-allocation-of-resources\/\">SA-2: Allocation of Resources<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-3-system-development-life-cycle\/\">SA-3: System Development Life Cycle<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-4-acquisition-process\/\">SA-4: Acquisition Process<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-5-system-documentation\/\">SA-5: System Documentation<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-8-security-and-privacy-engineering-principles\/\">SA-8: Security and Privacy Engineering Principles<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-9-external-system-services\/\">SA-9: External System Services<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-10-developer-configuration-management\/\">SA-10: Developer Configuration Management<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-11-developer-testing-and-evaluation\/\">SA-11: Developer Testing and Evaluation<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-services-acquisition-sa\/sa-22-unsupported-system-components\/\">SA-22: Unsupported System Components<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-41e14b55-b4b7-4d7d-96eb-4ebae6858bbd advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">System and Communication Protection (SC)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-1-system-and-communications-protection-policy-and-procedures\/\">SC-1: System and Communications Protection \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-5-denial-of-service-protection\/\">SC-5: Denial-of-Service Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-7-boundary-protection\/\">SC-7: Boundary Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-8-transmission-confidentiality-and-integrity\/\">SC-8: Transmission Confidentiality and Integrity<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-12-cryptographic-key-establishment-and-management\/\">SC-12: Cryptographic Key Establishment and Management<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-13-cryptographic-protection\/\">SC-13: Cryptographic Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-15-collaborative-computing-devices-and-applications\/\">SC-15: Collaborative Computing Devices and Applications<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-20-secure-name-address-resolution-service-authoritative-source\/\">SC-20: Secure Name\/Address Resolution Service (Authoritative Source)<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-21-secure-name-address-resolution-service-recursive-or-caching-resolver\/\">SC-21: Secure Name\/Address Resolution Service (Recursive or Caching Resolver)<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-22-architecture-and-provisioning-for-name-address-resolution-service\/\">SC-22: Architecture and Provisioning for Name\/Address Resolution Service<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-39-process-isolation\/\">SC-39: Process Isolation<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-2c43efbb-d548-440a-9e6b-686c01a7e454 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">System and Information Integrity (SI)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-1-system-and-information-integrity-policy-and-procedures\/\">SI-1: System and Information Integrity \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-2-flaw-remediation\/\">SI-2: Flaw Remediation<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-3-malicious-code-protection\/\">SI-3: Malicious Code Protection<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-4-system-monitoring\/\">SI-4: System Monitoring<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-5-security-alerts-advisories-and-directives\/\">SI-5: Security Alerts, Advisories, and Directives<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-10-information-input-validation\/\">SI-10: Information Input Validation<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-information-integrity-si\/si-12-information-management-and-retention\/\">SI-12: Information Management and Retention<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-723e73ec-0930-4e62-8031-64cd58996772 advgb-accordion-wrapper its-accordion-grouping\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#ffffff;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Supply Chain Risk Management (SR)<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\"><ul class=\"its-page-list wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-1-supply-chain-risk-management-policy-and-procedures\/\">SR-1: Supply Chain Risk Management \u2013 Policy and Procedures<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-2-supply-chain-risk-management-plan\/\">SR-2: Supply Chain Risk Management Plan<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-3-supply-chain-controls-and-processes\/\">SR-3: Supply Chain Controls and Processes<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-5-acquisition-strategies-tools-and-methods\/\">SR-5: Acquisition Strategies, Tools, and Methods<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-8-notification-agreements\/\">SR-8: Notification Agreements<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/supply-chain-risk-management-sr\/sr-12-component-disposal\/\">SR-12: Component Disposal<\/a><\/li><\/ul><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Purpose of the Catalog<\/h2>\n\n\n\n<p>The Tarleton State University (Tarleton) Security Controls Catalog establishes the minimum standards and controls for university information security in accordance with <a href=\"https:\/\/texas-sos.appianportalsgov.com\/rules-and-meetings?chapter=202&amp;interface=VIEW_TAC&amp;part=10&amp;title=1\" target=\"_blank\" rel=\"noreferrer noopener\">Title 1, Texas Administrative Code (TAC 202), Information Security Standards for Institutions of Higher Education.<\/a>&nbsp;<\/p>\n\n\n\n<p>The purpose of this Controls Catalog is to provide Tarleton information resource owners, custodians, and other users with specific guidance for implementing security controls conforming to security control standards currently required in the most current version of the <a href=\"https:\/\/dir.texas.gov\/sites\/default\/files\/2023-06\/Security%20Control%20Standards%20Catalog%202.1%20for%20Web%20-%20UPDATED%206.21.23.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Texas Department of Information Resources (DIR) Security Control Standards Catalog<\/a> and <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final\" target=\"_blank\" rel=\"noreferrer noopener\">the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security controls<\/a>. &nbsp;It is at Tarleton\u2019s discretion to go above and beyond any of the minimum, required baselines established for information security controls by NIST, DIR,&nbsp;TAC 202, or Texas A&amp;M University System (TAMUS). &nbsp;Those discretionary and\/or additional security controls are also included in this catalog where Tarleton has deemed that an elevated security posture is required to mitigate risks. &nbsp;<\/p>\n\n\n\n<p>Each control group is organized under its two-letter group identification code and title, thus adopting the numbering format of the <a href=\"https:\/\/dir.texas.gov\/sites\/default\/files\/2022-01\/DIR%20Security%20Control%20Standards%20Catalog%202.0.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DIR Security Control Standards Catalog<\/a> and <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final\">NIST SP 800-53<\/a>. Each control includes the following formatting and\/or information:&nbsp;<\/p>\n\n\n\n<p><strong>[Control ID Number] [Control Name]<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>NIST Baseline:<\/strong> [Low\/Moderate\/High] This is the NIST baseline associated with the respective control: there are three control baselines (one for each system impact level \u2013 low-impact, moderate-impact, and high-impact).&nbsp; This is an informational field only. The DIR Security Control Standards Catalog does not contain distinct baselines. As such, agencies should determine whether additional controls or control baselines are appropriate for a given information system.&nbsp; &nbsp;<\/p>\n\n\n\n<p><strong>Privacy Baseline: &nbsp;<\/strong>[Yes, if applicable] This is the NIST privacy baseline associated with the respective control and is provided, if applicable (i.e. identified by NIST as \u201cYes\u201d) irrespective of impact level. &nbsp;The privacy control baseline supports federal agencies in addressing privacy requirements and managing privacy risks that arise from processing personally identifiable information (PII) based on privacy program responsibilities under <a href=\"https:\/\/csrc.nist.gov\/topics\/laws-and-regulations\/executive-documents\/omb-a-130\" target=\"_blank\" rel=\"noreferrer noopener\">OMB Circular A-130<\/a>. &nbsp;Tarleton has noted these in the catalog as an informational field only. &nbsp;&nbsp; &nbsp;<\/p>\n\n\n\n<p><strong>DIR Required By:<\/strong> [Date required by DIR, if applicable]&nbsp;<\/p>\n\n\n\n<p><strong>TAMUS Required By:<\/strong> [Date required by Texas A&amp;M University System (TAMUS), if applicable] &nbsp;<\/p>\n\n\n\n<p><strong>[If the specific control is not required by DIR or TAMUS, a statement regarding the control being per Tarleton\u2019s discretion for additional security measures will be included here]<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>Review Date: <\/strong>[Date of last review]&nbsp;<\/p>\n\n\n\n<p><strong>[Language of the control requirement and applicability for Tarleton]<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>References\/Additional Resources: <\/strong>Any applicable resources and\/or regulatory requirement references will be included in this section, as applicable. &nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Definitions<\/h2>\n\n\n\n<div class=\"wp-block-group is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<p>Below are the terms used frequently in these standards. Additional definitions can be found in:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/texas-sos.appianportalsgov.com\/rules-and-meetings?$locale=en_US&amp;interface=VIEW_TAC_SUMMARY&amp;queryAsDate=04%2F23%2F2025&amp;recordId=215512\" target=\"_blank\" rel=\"noreferrer noopener\">Title 1 TAC \u00a7202.1, Applicable Terms and Technologies for Information Security Standards<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/assets.system.tamus.edu\/files\/policy\/pdf\/securitystandards\/data_classification.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Texas A&amp;M University System Data Classification Standard<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/csrc.nist.gov\/glossary\" target=\"_blank\" rel=\"noreferrer noopener\">Glossary | CSRC (nist.gov)<\/a>&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordions advgb-accordions-39e1f89a-7155-49bc-9d75-6bd29066df1c advgb-accordion-wrapper\" data-collapsed=\"true\">\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Information Resource \/ Information System<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>IT hardware and software systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This includes:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>data,&nbsp;&nbsp;<\/li>\n\n\n\n<li>equipment, facilities, and software, that create, process, store, retrieve, display, or transmit data, and&nbsp;&nbsp;<\/li>\n\n\n\n<li>any computer-related activities involving any device capable of receiving, storing, managing, or transmitting data.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Examples include: mainframes, servers, network infrastructure, desktop and laptop computers, IP phones, printers, web applications and cloud services.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Information Resources Manager (IRM)\u00a0<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>The executive responsible for information resources across the institution as defined in Chapter 2054, Subchapter D, Texas Government Code.&nbsp; This is the Tarleton Chief Information Officer (CIO).&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Information Resource Owner\u00a0<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>The person legally or operationally responsible and accountable for the data and\/or business function supported by an information resource.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Owner determines controls and access to information resources supporting that business function.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Typically, this is a department head and may be the person responsible for the procurement, development, operation, and maintenance of an information resource.&nbsp;&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Information Resource Custodian<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>An individual, department, institution, or third-party service provider responsible for supporting and implementing owner-defined controls to information resources.&nbsp; Custodians include information technology units, staff, vendors, and any third-party acting as an agent of or otherwise on behalf of the Tarleton Office of Innovative Technology Solutions.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\" id=\"HighImpactInformationResourcesDef\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">High Impact Information \/ Information Resources\u00a0<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>Information and information resources that are essential to the mission and operations of the Texas A&amp;M University System or Tarleton State University (Tarleton).&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Loss or disruption to the confidentiality, integrity, or availability of a High Impact Information Resource would result in a severe or catastrophic adverse effect on organization operations, assets, or individuals. Such an event could:&nbsp;&nbsp;<\/p>\n\n\n\n<p>1. Cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions;&nbsp;&nbsp;<\/p>\n\n\n\n<p>2. Result in major damage to organizational assets;&nbsp;&nbsp;<\/p>\n\n\n\n<p>3. Result in major financial loss; or&nbsp;&nbsp;<\/p>\n\n\n\n<p>4. Result in severe or catastrophic harm to individuals involving loss of life or serious life-threatening injuries.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This term equates to HIGH impact in the Federal Standards for Security Categorization of Federal Information and Information Systems, FIPS 199.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>A risk assessment should be completed annually on these types of information systems.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\" id=\"ModerateImpactInformationResourcesDef\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Moderate Impact Information \/ Information Resources\u00a0<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>Information and information resources whose loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.&nbsp; Such an event could:&nbsp;&nbsp;<\/p>\n\n\n\n<p>1.&nbsp; Cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced;&nbsp;&nbsp;<\/p>\n\n\n\n<p>2.&nbsp; Result in significant damage to organizational assets;&nbsp;&nbsp;<\/p>\n\n\n\n<p>3.&nbsp; Result in significant financial loss; or&nbsp;&nbsp;<\/p>\n\n\n\n<p>4.&nbsp; Result in significant harm to individuals that does not involve loss of life or serious life-threatening injuries.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A risk assessment should be completed every two years on these types of information systems.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-accordion-item advgb-accordion-item\" style=\"margin-bottom:15px\"><div class=\"advgb-accordion-header\" style=\"background-color:#4f2d7f;color:#eee;border-style:solid;border-width:1px;border-radius:2px\"><span class=\"advgb-accordion-header-icon accordion-state\"><svg class=\"advgb-icon-closed\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M16.59,8.59L12,13.17L7.41,8.59L6,10l6,6l6-6L16.59,8.59z\"><\/path><\/svg><svg class=\"advgb-icon-opened\" fill=\"#fff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path opacity=\"0.87\" fill=\"none\" d=\"M24,24H0L0,0l24,0V24z\"><\/path><path d=\"M7.41,15.41L12,10.83l4.59,4.58L18,14l-6-6l-6,6L7.41,15.41z\"><\/path><\/svg><\/span><h3 class=\"advgb-accordion-header-title\" style=\"color:inherit\">Low Impact Information \/ Information Resources\u00a0\u00a0<\/h3><\/div><div class=\"advgb-accordion-body\" style=\"border-style:solid !important;border-width:1px !important;border-color:undefined !important;border-top:none !important;border-radius:2px !important\">\n<p>Information and information resources whose loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. Such an event could:&nbsp;&nbsp;<\/p>\n\n\n\n<p>1.&nbsp; Cause a degradation in mission capability to an extent and duration that the organization can perform its primary functions, but the effectiveness of the functions is noticeably reduced;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>2.&nbsp; Result in minor damage to organizational assets;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>3.&nbsp; Result in minor financial loss; or&nbsp;&nbsp;<\/p>\n\n\n\n<p>4.&nbsp; Result in minor harm to individuals.&nbsp;<\/p>\n\n\n\n<p>A risk assessment should be completed every three years on these types of information systems.&nbsp;<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Publication Requirement<\/h2>\n\n\n\n<p>Tarleton maintains a Security Controls Catalog in accordance with <a href=\"https:\/\/texas-sos.appianportalsgov.com\/rules-and-meetings?$locale=en_US&amp;interface=VIEW_TAC_SUMMARY&amp;queryAsDate=04%2F23%2F2025&amp;recordId=207719\" target=\"_blank\" rel=\"noreferrer noopener\">TAC \u00a7202.76<\/a>, which requires publication of mandatory and minimum required security controls for institutions of higher education.&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Exceptions to the Catalog<\/h2>\n\n\n\n<p>Information resource owners are responsible for ensuring that the protective measures in the Security Controls Catalog are implemented. Information resource owners may request to exclude certain protection measures mandated by a control in favor of an alternate mitigation based on risk management considerations and business functions.&nbsp; Any exceptions to the information security controls in this catalog must be approved and documented.&nbsp;<\/p>\n\n\n\n<p>Contact the <a href=\"mailto:cshaw@tarleton.edu\" data-type=\"mailto\" data-id=\"mailto:cshaw@tarleton.edu\">Tarleton Chief Information Security Officer (CISO)<\/a> or the <a href=\"mailto:ITsecurity@tarleton.edu\">Tarleton Office of Innovative Technology Solutions (OITS) \u2013 Security Team<\/a> to request an exception to a security control.&nbsp; Once processed and reviewed by the CISO and the OITS \u2013 Security Team, an opinion for approval or denial will be returned to the requestor.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<style class=\"advgb-styles-renderer\">.advgb-search-btn-b17e00f7-27b6-48ac-8098-1dc9a389d337:hover{color:#4f2d7f !important;background-color:#ffffff !important;box-shadow:1px 1px 12px 0px #ccc !important;opacity:1;transition:all 0.2s ease;}#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}}#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}}#advgb-cols-ff75916e-3f65-4c88-9fa8-74323f4d01d8{}@media screen and (max-width: 1023px) {#advgb-cols-ff75916e-3f65-4c88-9fa8-74323f4d01d8{}}@media screen and (max-width: 767px) {#advgb-cols-ff75916e-3f65-4c88-9fa8-74323f4d01d8{}}#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-84eb8c88-2ae0-4e62-95c3-ff1b8a42e3c9>.advgb-column-inner{}}#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-3f7910a3-aace-47ac-a706-05820979729d>.advgb-column-inner{}}<\/style>","protected":false},"excerpt":{"rendered":"<p>Tarleton State University Information Security Controls Catalog Search the Catalog Search for controls by Title, Group, or Number. Control Catalog Families Purpose of the Catalog The Tarleton State University (Tarleton) &#8230;<\/p>\n","protected":false},"author":3,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":"[]"},"class_list":["post-696","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/keegan-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/","display_name":"keegan"},"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 2 months ago"},"absolute_dates":{"created":"Posted on December 14, 2021","modified":"Updated on February 25, 2026"},"absolute_dates_time":{"created":"Posted on December 14, 2021 3:24 pm","modified":"Updated on February 25, 2026 6:02 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=696"}],"version-history":[{"count":3,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/696\/revisions"}],"predecessor-version":[{"id":2669,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/696\/revisions\/2669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}