Service Catalog

Cybersecurity Services

The Information Security & Privacy Office provides the following services to the UNM community free of charge, excluding branch campuses. To request information security and privacy services, please make a request using ServiceNow

Account Access Reinstatement

Restore access after an account has been restricted.

Allows eligible users to request the reinstatement of access to university systems after an account has been locked, suspended, or deactivated.

Accounts may be temporarily locked, disabled, or restricted by predefined automated security policies or manual processes.

Business Continuity Access

Temporary access to business-critical resources during periods of staff unavailability.

Facilitates temporary access to an employee's work-related files in enterprise IT systems where there is an immediate need for work-related, non-investigatory purposes.

Cloud Vendor Assessment

Technical cybersecurity evaluation of prospective cloud service providers.

Provides expert cybersecurity advice while evaluating cloud providers, ensuring alignment with institutional requirements.

Cybersecurity Application Access

Access to cybersecurity-related applications and tools.

Allows eligible users to request access to cybersecurity software applications.

Cybersecurity Application Maintenance

Updates or fixes for cybersecurity applications and tools.

Provides support to ensure operational health and effectiveness of cybersecurity software applications.

Cybersecurity Application Support

Report issues or get help using cybersecurity applications and tools.

Provides technical assistance, troubleshooting, and guidance for users of cybersecurity software applications.

Cybersecurity Awareness Training

Cybersecurity awareness training simulations.

Provides phishing simulations and security awareness modules to enhance user vigilance and reduce risk.

Cybersecurity Consulting

Cybersecurity guidance on system design and implementation.

Provides expert advice to support secure deployment and adherence to best practices when configuring systems and developing services.

Cybersecurity Feedback

Submit feedback on cybersecurity services, applications, or tools.

Collects user feedback to improve cybersecurity services, tools, and operational processes.

Cybersecurity Incident Data Analysis

Analysis of data related to cybersecurity incidents.

Supports the analysis and documentation of data identified during the cybersecurity incident response process, with a focus on identifying sensitive or regulated information such as customer PII.

Request for Cybersecurity Information

Information related to cybersecurity services, applications, tools, or best practices.

Provides users with information, guidance, or clarification related to cybersecurity services, policies, controls, or procedures.

Cybersecurity Program Maintenance

Management of university cybersecurity programs.

Supports the maintenance and evolution of the university’s cybersecurity programs and initiatives.

Cybersecurity Vendor Management

Management of trusted third-party cybersecurity vendors.

Manages relationships with external cybersecurity vendors to ensure technical alignment, service quality, and performance.

Digital Certificate

Request or renew digital certificates for secure communications.

Issues and renews SSL/TLS and code-signing certificates to support secure communications and authentication.

Digital Forensics

Analysis of digital evidence.

Provides forensic examinations of digital artifacts to support cybersecurity incident response.

Firewall Change

Request a change to firewall rules or network access controls.

Modifies firewall settings or access rules to meet evolving cybersecurity needs or support new systems and services.

Firewall Configuration Assessment

Evaluate existing firewall configurations for appropriate network security.

Reviews firewall rule sets and architecture to optimize security posture and eliminate common misconfigurations.

IDS/IPS Configuration Assessment

Evaluate the configuration of intrusion detection and prevention systems.

Review IDS/IPS rules and configurations to ensure accurate detection coverage and tuned rules for threat prevention.

Investigation Support

Support for UNM-authorized internal investigations.

Provide subject matter expertise in support of investigations authorized by the university.

Network Access Reinstatement

Restore network connectivity after a device has been restricted.

Allows eligible users to request the reinstatement of network access after network access has been suspended.

Network access may be temporarily suspended by predefined automated security policies or manual processes.

Other Cybersecurity

Cybersecurity-related support not covered by existing catalog items.

Handles miscellaneous cybersecurity requests that fall outside standard support categories.

Penetration Testing

Controlled testing of university systems to identify exploitable security weaknesses.

Simulates a cyberattack to identify vulnerabilities in a system, application, or network, informing service design, cybersecurity, and continual service improvement.

Staff Separation

Initiate secure removal of IT access for departing staff.

Revokes system access, credentials, and privileges for departing university staff.

Vulnerability Assessment

Ad-hoc scanning and evaluation of systems to identify known security vulnerabilities.

Executes targeted ad-hoc scans to identify vulnerabilities in systems and provides recommendations for remediation.

Privacy, Compliance, and Risk Services

Consulting Request

Privacy, Compliance, and Risk guidance on system design and implementation.

Provides expert advice to support secure deployment and adherence to best practices when configuring systems and developing services.

Consulting Request

Information related to privacy, compliance, and risk services, applications, tools, or best practices.

Provides users with information, guidance, or clarification related to privacy, compliance, and risk services.


Report an Incident

If you suspect that your NetID (i.e. LoboMail account) or a computer have been compromised and you need to know what to do, please see our FAQ

Abuse Report Form

- or -

Report Message: Junk

 - or -

Report Message: Phishing

 - or - 

UNM ServiceNow

 - or -

UNM EthicsPoint


For more information, visit our Contact Information page