CA-6 Security Authorization
Last Review: 10/1/22
Statement
WTAMU must identify an owner for each information system. The owner must authorize the information system for processing before commencing operations.
Applicability
This control applies to all West Texas A&M personnel who use University information resources.
Implementation
- The CIO and ISO will identify the appropriate information resource owner for system used by multiple departments.
- A resource custodian within IT shall be assigned to all information resources. Assignment will be based on the use of the system and its alignment with the University.
- The CIO is responsible for authorizing implementation of all Information Systems.
- The CIO and ISO will verify needed security controls prior to a system implementation.