Effective Date: March 19, 2015
Last Reviewed: September 11, 2024
Approval Date: October 21, 2025
Information technology and data constitute valuable Weill Cornell Medicine (WCM) assets. Depending on their classification, these assets may be subject to state and federal regulations. This policy provides a framework for facilitating compliance with applicable regulations and adherence to established security best practices.
Information Technologies & Services Department (“ITS”) is responsible for evaluating and managing threats that pose an unacceptable risk to WCM information systems and applications (“systems”), networks, or data. If a system is deemed vulnerable to a threat or at risk of compromise, the Chief Information Security Officer (CISO) or their delegate may block tits access to other systems, networks, and data. This policy specifies the standards and thresholds used to assess risk and determine when access restrictions are necessary.
Common Vulnerability Scoring System (CVSS): Standardized framework for evaluating and ranking the severity of computer system vulnerabilities.
Workforce Members: Any Faculty; Staff; Students; Volunteers; Trainees; and other persons whose conduct, in the performance of work for WCM, is under the direction and control of WCM, whether or not they are paid by WCM.
Pursuant to ITS policy 500.11 – Requirements for Securing Systems, the CISO has the authority to evaluate the seriousness and urgency of any threat to WCM systems, networks, and data. Actions such as powering off systems or restricting/ network access are based on a risk assessment that considers both the likelihood and impact of compromise. Relevant sources, such as vulnerability reports and industry alerts, should be reviewed and considered before any action is taken on a system.
Any findings and appropriate action will be communicated to the appropriate Administrators. All systems must be configured in accordance with the 500.11 – Requirements for Securing Systems policy. Any system which cannot meet the minimum security requirements set forth in ITS policy must submit a variance request pursuant to ITS policy 500.20 – Variances.
Threats and vulnerabilities have been categorized into different risk ratings that dictate remediation timeframes: critical, high, medium, and low.
A Critical Risk rating has a very significant likelihood or impact of compromise to systems, networks, or data. Threats or vulnerabilities in this category must be appropriately managed within 24 hours, or relevant systems or networks may be shut off or disconnected with little or no prior notice.
By way of example, a Critical Risk rating may consist of any of the following:
A system with a High Risk rating has an elevated likelihood or impact of compromise to systems, networks, or data. Threats or vulnerabilities in this category must be appropriately managed within 7 days, or relevant systems or networks may be shut off or disconnected with little or no prior notice.
By way of example, a High Risk rating may consist of any of the following:
A system with a Medium Risk rating has a reduced likelihood or impact of compromise to systems, networks, or data. Threats or vulnerabilities in this category must be appropriately managed within 60 days, or relevant systems or networks may be shut off or disconnected with little or no prior notice.
By way of example, a Medium Risk rating may consist of any of the following:
A system with a Low Risk rating has minimal likelihood or impact of compromise to systems, networks, or data. Threats or vulnerabilities in this category must be appropriately managed within 120 days, or relevant systems or networks may be shut off or disconnected with little or no prior notice.
By way of example, a Low Risk rating may consist of any of the following:
All WCM Workforce Members must comply with this policy. Failure to comply will be evaluated on a case-by-case basis and could lead to corrective action, up to and including termination, consistent with other relevant WCM and University Policies. Instances of non-compliance that potentially involve a lapse of professionalism may lead to engagement of the Office of Professionalism for evaluation and intervention.
Direct any questions about this policy, ITS-500.12 – Restricting Access for Insecure Systems, to the Office of the CISO, using one of the methods below:
Office: (646) 962-3609
Email: ciso@med.cornell.edu
This policy was reviewed and approved by: