Skip to Main Content

What is a Unit Information Security Lead?

The Unit Information Security Lead (UISL) is a term for the Workforce Member(s) assigned responsibility for tactical execution of information security activities in a School or Unit.

On this site Bruins can: 

→ Learn more about the Unit Information Security Lead (UISL) role.

→ Find out who your UISL, IT Strategic Partner (ITSP), and Unit Head are.

→ Explore policies and standards to learn how cybersecurity works across the UCLA campus and systemwide.

Bruin Bear

Empower the Bruin community

  • Grow a security culture by socializing policies and services.
  • Gather feedback from across campus.

 

diverse hands putting together a puzzle piece

Collaborate and Communicate

  • Promote collaboration and enhance communication to support Units in their security needs.
  • Empower the UISL community to serve as advocates for their Units.
giant lock over internal computer hardware

Support cyber maturity goals

  • Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
person walking and making check marks on a line leading towards a green flag

Build accountability

  • Outline and define the roles and responsibilities of UISLs as they interact with Units.
  • Identify opportunities for improvement in security practices on a regular basis.

Systemwide information security standards are developed by working groups appointed by the Information Technology Leadership Council (ITLC). The ITLC is responsible for developing, implementing, revising and consulting on standards in support of the IS-3 policy. 

BFB-IS-3: Electronic Information Security

Information security management requires a combination of policies and standards. Procedures and guidelines can be used to explain specific requirements and methods for implementation.

IS-3 establishes a framework that ensures all UC Locations follow the same approach to reduce and manage cyber risk, protect information, and support the proper functioning of IT Resources. This consistent approach also positions UC Locations to collaborate on cyber security. While promoting systemwide consistency and collaboration, the IS-3 policy along with the standards listed below also supports local flexibility and control.

 

The IT Policy Glossary includes defined terms relevant to using UC’s IT and information security policies and standards.  The standards below are listed in the order dictated by the IT Security Committee. 

 

Item 1: UC Minimum Security Standard

 

Item 2: UC Institutional Information and IT Resource Classification Standard

 

Item 3: UC Protection Level Classification Guide

 

Item 4: UC Availability Level Classification Guide

 

Item 5: UC Secure Software Configuration Standard

 

Item 6: UC Secure Software Development Standard

 

Item 7: UC Information Security Incident Response Standard

 

Item 8: UC Event Logging Standard

 

Item 9: UC Institutional Information Disposal Standard

 

Item 10: UC Account and Authentication Management Standard

 

Item 11: UC Encryption Key and Certificate Management Standard

Bruin Bear

Empower the Bruin community

  • Grow a security culture by socializing policies and services.
  • Gather feedback from across campus.

 

diverse hands putting together a puzzle piece

Collaborate and Communicate

  • Promote collaboration and enhance communication to support Units in their security needs.
  • Empower the UISL community to serve as advocates for their Units.
giant lock over internal computer hardware

Support cyber maturity goals

  • Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
person walking and making check marks on a line leading towards a green flag

Build accountability

  • Outline and define the roles and responsibilities of UISLs as they interact with Units.
  • Identify opportunities for improvement in security practices on a regular basis.