Service Catalog
Cybersecurity Services
The Information Security & Privacy Office provides the following services to the UNM community free of charge, excluding branch campuses. To request information security and privacy services, please make a request using ServiceNow
Account Access Reinstatement
Allows eligible users to request the reinstatement of access to university systems after an account has been locked, suspended, or deactivated.
Accounts may be temporarily locked, disabled, or restricted by predefined automated security policies or manual processes.
Business Continuity Access
Facilitates temporary access to an employee's work-related files in enterprise IT systems where there is an immediate need for work-related, non-investigatory purposes.
Cloud Vendor Assessment
Provides expert cybersecurity advice while evaluating cloud providers, ensuring alignment with institutional requirements.
Cybersecurity Application Access
Allows eligible users to request access to cybersecurity software applications.
Cybersecurity Application Maintenance
Provides support to ensure operational health and effectiveness of cybersecurity software applications.
Cybersecurity Application Support
Provides technical assistance, troubleshooting, and guidance for users of cybersecurity software applications.
Cybersecurity Awareness Training
Provides phishing simulations and security awareness modules to enhance user vigilance and reduce risk.
Cybersecurity Consulting
Provides expert advice to support secure deployment and adherence to best practices when configuring systems and developing services.
Cybersecurity Feedback
Collects user feedback to improve cybersecurity services, tools, and operational processes.
Cybersecurity Incident Data Analysis
Supports the analysis and documentation of data identified during the cybersecurity incident response process, with a focus on identifying sensitive or regulated information such as customer PII.
Request for Cybersecurity Information
Provides users with information, guidance, or clarification related to cybersecurity services, policies, controls, or procedures.
Cybersecurity Program Maintenance
Supports the maintenance and evolution of the university’s cybersecurity programs and initiatives.
Cybersecurity Vendor Management
Manages relationships with external cybersecurity vendors to ensure technical alignment, service quality, and performance.
Digital Certificate
Issues and renews SSL/TLS and code-signing certificates to support secure communications and authentication.
Digital Forensics
Provides forensic examinations of digital artifacts to support cybersecurity incident response.
Firewall Change
Modifies firewall settings or access rules to meet evolving cybersecurity needs or support new systems and services.
Firewall Configuration Assessment
Reviews firewall rule sets and architecture to optimize security posture and eliminate common misconfigurations.
IDS/IPS Configuration Assessment
Review IDS/IPS rules and configurations to ensure accurate detection coverage and tuned rules for threat prevention.
Investigation Support
Provide subject matter expertise in support of investigations authorized by the university.
Network Access Reinstatement
Allows eligible users to request the reinstatement of network access after network access has been suspended.
Network access may be temporarily suspended by predefined automated security policies or manual processes.
Other Cybersecurity
Handles miscellaneous cybersecurity requests that fall outside standard support categories.
Penetration Testing
Simulates a cyberattack to identify vulnerabilities in a system, application, or network, informing service design, cybersecurity, and continual service improvement.
Staff Separation
Revokes system access, credentials, and privileges for departing university staff.
Vulnerability Assessment
Executes targeted ad-hoc scans to identify vulnerabilities in systems and provides recommendations for remediation.
Privacy, Compliance, and Risk Services
Consulting Request
Provides expert advice to support secure deployment and adherence to best practices when configuring systems and developing services.
Consulting Request
Provides users with information, guidance, or clarification related to privacy, compliance, and risk services.