SPS-IT: SPS Policy on Endpoint Detection and Response (EDR) and Vulnerability Assessment Scanning (VAS)
1. Purpose
This policy defines which systems in the School of Physical Sciences (SPS) must run EDR and VAS protection, outlines exemption criteria, and describes the process for requesting exceptions. It aligns with UC San Diego’s Security Exception Policy.
2. Scope
Applies to all SPS devices—including servers, workstations, instruments and devices—compatible with campus security software and connected to the UCSD network. Oversight is provided by SPS-IT and the Office of Information Assurance (OIA).
3. Systems Requiring EDR/VAS
Protection is required for:- Vendor-supported instruments and data acquisition (DAQ) systems.
- Stand-alone data processing and visualization workstations.
- Public-facing services and applications.
- Desktop Environments and Portable Computers
- Devices listed as compatible with EDR/VAS tools.
- Systems subject to UC San Diego’s baseline security standards (e.g., antivirus, firewalls, vulnerability scanning).
- General Purpose Servers (File, Application, Database, Mail, VM)
4. Exemption-Eligible Systems
Exemption evaluations may be considered for, but are not limited to, the following circumstances:- High-performance systems where EDR/VAS degrades performance.
- DAQ systems that require real-time operation.
- Legacy systems lacking upgradability paths.
- Storage systems with conflicting security controls.
- Specialized research or medical equipment.
5. Requesting an Exception
PIs or system owners must submit the Vulnerability Remediation Exception Request Form with:- Justification for exemption.
- Description of performance, reliability, or compliance impact.
- Proposed alternative safeguards.
- Duration of exemption.
- Approvals from the Unit Information Security Lead (UISL) and Unit Head (if applicable).
6. Requirements for Exempted Systems
All exempt systems must implement mitigation strategies that should include, at a minimum, the following:- Use private VLANs/IP spaces and firewalls (when applicable).
- Implement alternative protections (e.g., segmentation, logging, restricted access).
- Be manually monitored for threats.
- Undergo annual review for continued exemption.
7. Enforcement
The SPS Research IT Advisory Committee (RITSAC) and the Dean ensure oversight.- Periodic audits will verify that exceptions are valid and risks mitigated.
- Exceptions can be revoked if systems are found vulnerable or exploited.
- Units are responsible for maintaining security compliance.
- Non-compliant incidents are escalated to the UCSD Computer Incident Response Team (CIRT).
Questions or Requests
Contact SPS-IT at: sps-it@ucsd.edu
Download the Policy
SPS Secure Connect Local Implementation Policy: [download]
Need Help? sps-it@ucsd.edu
Want to stop by for in-person support?: Mayer Hall 3405
(Same day appointments M-F 8:00-3:00PM)