36 Miss. Code. R. 1-7.2
ITS will monitor for network activity that indicates the presence of malicious code and upon detection will perform the following actions:
A. For isolated infections,
ITS will block access to the state network for infected workstations or servers
and notify the agency contact. Once the agency contact confirms that the
workstation or server has been cleaned, ITS will remove the block. Detailed
information regarding this process is provided in the ISD-Ticket Response
Guidelines document. State employees can access this document from the ITS
website.
B. For cases of infection
within an agency that have the potential to impact other agencies, ITS will
limit or remove connections to the state network for the infected agency. Such
drastic action will be considered any time the availability, reliability, or
integrity of the state network is at risk, but ITS will attempt to work with
the infected agency to find a mitigating alternative prior to removing
access.
Notes
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.