What is a Unit Information Security Lead?
→ The Unit Information Security Lead (UISL) is a term for the Workforce Member(s) assigned responsibility for tactical execution of information security activities in a School or Unit.
On this site Bruins can:
→ Learn more about the Unit Information Security Lead (UISL) role.
→ Find out who your UISL, IT Strategic Partner (ITSP), and Unit Head are.
→ Explore policies and standards to learn how cybersecurity works across the UCLA campus and systemwide.
Empower the Bruin community
- Grow a security culture by socializing policies and services.
- Gather feedback from across campus.
Collaborate and Communicate
- Promote collaboration and enhance communication to support Units in their security needs.
- Empower the UISL community to serve as advocates for their Units.
Support cyber maturity goals
- Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
Build accountability
- Outline and define the roles and responsibilities of UISLs as they interact with Units.
- Identify opportunities for improvement in security practices on a regular basis.
Systemwide information security standards are developed by working groups appointed by the Information Technology Leadership Council (ITLC). The ITLC is responsible for developing, implementing, revising and consulting on standards in support of the IS-3 policy.
BFB-IS-3: Electronic Information Security
Information security management requires a combination of policies and standards. Procedures and guidelines can be used to explain specific requirements and methods for implementation.
IS-3 establishes a framework that ensures all UC Locations follow the same approach to reduce and manage cyber risk, protect information, and support the proper functioning of IT Resources. This consistent approach also positions UC Locations to collaborate on cyber security. While promoting systemwide consistency and collaboration, the IS-3 policy along with the standards listed below also supports local flexibility and control.
The IT Policy Glossary includes defined terms relevant to using UC’s IT and information security policies and standards. The standards below are listed in the order dictated by the IT Security Committee.
Item 1: UC Minimum Security Standard
Item 2: UC Institutional Information and IT Resource Classification Standard
Item 3: UC Protection Level Classification Guide
Item 4: UC Availability Level Classification Guide
Item 5: UC Secure Software Configuration Standard
Item 6: UC Secure Software Development Standard
Item 7: UC Information Security Incident Response Standard
Item 8: UC Event Logging Standard
Item 9: UC Institutional Information Disposal Standard
Item 10: UC Account and Authentication Management Standard
Item 11: UC Encryption Key and Certificate Management Standard
Empower the Bruin community
- Grow a security culture by socializing policies and services.
- Gather feedback from across campus.
Collaborate and Communicate
- Promote collaboration and enhance communication to support Units in their security needs.
- Empower the UISL community to serve as advocates for their Units.
Support cyber maturity goals
- Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
Build accountability
- Outline and define the roles and responsibilities of UISLs as they interact with Units.
- Identify opportunities for improvement in security practices on a regular basis.