IT security is a shared responsibility. Learn more:
- Information Security Risk Management
Identify, assess, and limit threats to the university’s most important information systems and data.
- Securely Dispose of U-M Data and Devices
How to properly erase university-owned devices for disposal or transfer.
- Server & Database Hardening
Follow these instructions to ready your servers and databases to handle sensitive data.
- Third Party Vendor Security & Compliance
If your unit uses a non-university product or service with university data, you must ensure adequate protection of the data.
- Vulnerability Management
Vulnerability scans and notifications help you know what to mitigate.