Executive Summary
Running software that is no longer supported by the vendor and unable to receive security updates represents a significant cyber security risk to the University. In order to maintain a strong security posture, Information Security will monitor for non-compliant systems and take appropriate action, including restricting network access and/or removing end-of-life software. The following information provides guidance and support to mitigate this risk.
Introduction
Information Security requires that all devices connected to the University network, or accessing sensitive University data or services, must run vendor-supported software for which security patches are available and installed as specified in the University Acceptable Use Policy and Vulnerability Management Policy. In the context of this statement, software includes both operating systems and applications.
The Information Security team is committed to protecting the University from cyber threats and enforcing security best practices on our network. To reduce risk, enhance our overall security posture, and ensure compliance with regulatory requirements and industry standards, Information Security will begin the process of restricting network access for systems running end-of-life (EOL) operating systems and removing EOL software from University-owned devices.
Following the software lifecycle, vendors will declare a product end-of-life when it will no longer provide security updates or technical support for that product. This applies to operating systems and applications on desktop computers, laptops, servers, and mobile devices, such as tablets and smartphones. Software that has reached EOL is highly vulnerable to emerging threats, including malware, exploits, and other security vulnerabilities. Operating a system on the University network with an end-of-life operating system or application exposes the entire University to an increased risk of unauthorized access, data breach, and service disruption for our students, staff, and faculty.
Running EOL operating systems or software substantially increases the risk to the University, including the campus network and University systems and data.
These risks include:
End of Life Dates
CCS (Computing and Communications Services) will monitor and communicate key end of life dates to the University IT community, however system owners are responsible for monitoring their systems to ensure that they are running supported and current software.
Key upcoming EOL dates include, but are not limited to:
Previous EOL dates include:
More information on end-of-life dates for various operating systems and software packages can be found at https://endoflife.date and via the links included below:
Enforcement
Information Security constantly monitors the University network for vulnerabilities and security threats, including the detection of systems running outdated operating systems and applications. Information Security also regularly reports on system compliance to the Board of Governor’s Audit and Risk Committee.
To proactively address the risks listed above, CCS Information Security will remove end-of-life software on University-owned devices and restrict network access for devices running EOL operating systems in order to better secure the University from cyber threats. Network access may be suspended with little or to no notice based upon the potential risk associated with any device connecting to the University network, regardless of ownership or department responsibility. Efforts will be made to contact impacted system owners in a timely manner and provide sufficient notice to make alternate plans. System owners are responsible for proactively monitoring the systems they are responsible for and planning and budget refresh efforts appropriately.
Available Options and Mitigating Security Controls
We understand that upgrading software and operating systems is not a trivial task and there may be circumstances where continued use is necessary to maintain business operations of the University. However, the risk associated with end-of-life software and potential impact on the University must not be underestimated.
As the end-of-life date approaches, CCS and Information Security can work with you to understand the available options and mitigating security controls available to ensure your system remains secure and does not put the University at unnecessary risk.
These options include:
Maintaining the security of the University is a shared responsibility, and the Information Security team appreciates your cooperation and understanding as we work collectively to improve our security posture.
Users with questions or requiring assistance should contact the Information Security team via email (infosec@uoguelph.ca) or the CCS Help Centre (IThelp@uoguelph.ca or Ext.58888).
CCS Information Security
https://infosec.uoguelph.ca