Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Security for Applications with Confidential University Data

Security for Applications with Confidential University Data

The University of Pennsylvania expects Application Owners to know the specific types of data they handle/are responsible for. Application Owners are expected to make security decisions regarding access to and the protection of data under their charge. The following recommendations for Application Owners are applicable to all applications handling Confidential University Data (CUD). All of the recommendations will be considered for future inclusion in official University IT Policy:

  1. Ensure that all applications are coded in a secure manner that at a minimum address the vulnerabilities defined in the OWASP Top 10 list. OWASP contains a number of best practices, including input validation, parameterized queries and ensuring the principle of least privilege is in place for access to databases. 
  2. Application testing and monitoring:  
    • Regularly assess the security of applications using automated vulnerability scanning and penetration testing. In addition, conduct an IT security audit as needed, such as, prior to initial implementation, after a major code revision, upon publication of a new vulnerability, etc. 
    • Have a defined log monitoring practice to identify unusual or anomalous behavior associated with the application and follow it. 
  3. Platform Testing and Monitoring:  
    • Register platforms that house highly sensitive data as a Critical Host. This will result in regular platform vulnerability scanning by ISC Information Security. When notified that an application registry is available, register applications that access or store Confidential University Data (CUD).
    • Have a defined log monitoring practice to identify unusual or anomalous behavior associated with the platform and follow it. Consider using a host intrusion detection system (HIDS) to monitor platforms housing applications with CUD to observe unauthorized or unusual activity. 
  4. Establish a repeatable process for responding to external notifications of current/observed attacks. This process should include identifying your organization's Security Liasion and how they will communicate critical information. 
  5. Purge unused sensitive data from the application regularly and move old data offline whenever possible. 
  6. Consider encryption for sensitive data at rest. 

For applications built by a third party or housed on a third party's system (including ISC), data owners should work with the contracted developers and vendors to ensure that these requirements are met. 

Please contact ISC Information Security at security@isc.upenn.edu or at (215) 898- 2172 for assistance with implementation of these recommendations. 

Resources & Links

  1. Confidential University Data (CUD) is defined in the Computer Security Policy, and includes Sensitive Personally (PII), proprietary information, and other data whose disclosure would cause significant harm to Penn or its constituents.

  2. Penn Data Access Standards.

  3. The OWASP Top 10 list can be found.

    • Also, for a comprehensive list, review the OWASP Development Guide.

  4. Penn Critical Host Registration.

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • InfoSec Training & Awareness
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff