New IT Solutions and Services Review
To protect Purdue University IT Resources and Information Assets, all new purchases of IT software, applications, or cloud services for use by the University must undergo a security review prior to purchase to identify any risks that software or service presents to these resources. If the product or service will store, process, or transmit data classified by Purdue as Sensitive or Restricted or will integrate with existing University systems, security controls must be in place to safeguard the data. The security review identifies security controls that have been implemented by the vendor software or services. Implementation readiness includes the implementation of recommendations made in the review report, as well as, security services for vulnerability management, endpoint protection, authentication, and logging. Requirements relative to security policy, standards, or data handling that are not met require the submission of a Security Policy/Procedures Exception request. Purchasers of cloud computing services should also be aware of the Cloud Computing Consumer Guidelines, which provide guidance on operational and contractual requirements.
Procedure to Request a New IT Software or Services Security Review
For questions about this process, please email the Purdue System Security - Information Assurance team (PSS-IA) at firstname.lastname@example.org.
If this is concerning a Brightspace integration review, please go here: https://www.purdue.edu/brightspace/Integrations.php
If this is concerning systems that will involve financial transactions or take credit/debit card purchases, please also contact MerchantService@purdue.edu.
Service Level Expectation: Reviews will be completed within 30 days of receipt of all required information. This includes completed Vendor Security Questionnaire and all additional requested documentation within the Questionnaire.
- Download the Vendor Security Questionnaire.
- Follow the instructions on the Instructions tab of the Vendor Security Questionnaire.
- Submit the Vendor Security Questionnaire with Tab 1 and Tab 2 completed to email@example.com. This will create a Footprints ticket for tracking.
- Purdue System Security will review the submitted information and will determine if a full security review is required.
- Purdue System Security will notify you if a full review is not required, and you may move forward with your request to purchase.
- For those requiring further review, Purdue System Security will close the original ticket and request that either Tab 3 or Tab 4 be completed.
- Submit the fully completed Vendor Security Questionnaire, with supporting documents, to firstname.lastname@example.org. This will create a Footprints ticket for tracking and start the 30 day count for competition by PSS-IA.
- Purdue System Security will then do a risk review and provide you with a report of findings and recommendation.
- If you have questions regarding the status of your request please be sure to reply to the Footprints ticket for your request.