- Plano Independent School District
- Texas Cybersecurity Framework Mapping
-
-
Texas Cybersecurity Framework Mapping for Plano ISD Information Security Regulations
This page provides a comprehensive mapping between Plano Independent School District's Information Security Regulations and the Texas Cybersecurity Framework (TCF). This mapping demonstrates how the district's security regulations align with state-recommended cybersecurity practices.
IDENTIFY Function
Control#1. Identify: Privacy & Confidentiality
Users shall not disclose confidential District data except as permitted or required by law and only as part of their official duties on behalf of the District. (Data Security)
Control#2. Identify: Data Classification
"Confidential Data" shall include, but is not limited to, the following: student data, educational records, employee data, metadata, user content, course content, materials, and any and all data and information that the District maintains. (Data Security)
Control#3. Identify: Critical Information Asset Inventory
The district will use a layered approach of security controls, hardware/software inventory, secure baseline configuration, patching, monitoring, protection, detection, and authentication to ensure overall security of the System. (General)
Control#4. Identify: Enterprise Security Policy, Standards and Guidelines
Maintain confidentiality, integrity and availability of the Plano Independent School District's electronic communication and data management systems, including, without limit, its telephone system, managed computers, computer networks, electronic mail systems, videoconferencing systems, cloud services, and its Internet and intranet access capabilities. (Purpose)
Control#5. Identify: Control Oversight and Safeguard Assurance
Security reviews of servers, firewalls, routers, monitoring platforms, backups, and audit logs must be conducted on a regular basis. (General)
Control#6. Identify: Information Security Risk Management
Vulnerability and risk assessment tests of the System must be conducted on a regular basis. (General)
Control#7. Identify: Security Oversight and Governance
Foster responsible use of the System by building a culture of information security risk awareness and mitigation. (Purpose)
Control#8. Identify: Security Compliance and Regulatory Requirements Mgmt
Comply with applicable laws and regulations. (Purpose)
Control#9. Identify: Cloud Usage and Security
Confidential Data or other information essential to the mission of the District should be stored on a District-managed network server and cloud storage when possible, rather than on District-owned desktop workstations, laptops, or portable devices. (Data Security)
Control#10. Identify: Security Assessment and Authorization/Technology Risk Assessments
Vulnerability and risk assessment tests of the System must be conducted on a regular basis. (General)
Control#11. Identify: External Vendors and Third Party Providers
All software must be reviewed for network and hardware compatibility by the IT Department prior to authorization of purchase, donation or use by the Administration. Unauthorized software is subject to removal upon discovery. (Acceptable Use)
All third-party providers are required to comply with the District Data Sharing Agreement. (Data Security)
Control#43. Identify: Secure Application Development
Not Applicable as the District does not develop applications in-house
Control#44. Identify: Beta Testing
Not Applicable as the District does not develop applications in-house
Control#45. Identify: Penetration Testing
Vulnerability and risk assessment tests of the System must be conducted on a regular basis. (General)
Control#46. Identify Vulnerability Testing
Vulnerability and risk assessment tests of the System must be conducted on a regular basis. (General)
PROTECT Function
Control#12. Protect: Enterprise Architecture, Roadmap & Emerging Technology
All enterprise architecture, roadmap, and emerging technology must be reviewed for network, hardware and security compliance by the IT Department prior to authorization of purchase, donation or use by the Administration.(Acceptable Use)
Control#13. Protect: Secure System Services, Acquisition and Development
All software must be reviewed for network and hardware compatibility by the IT Department prior to authorization of purchase, donation or use by the Administration. Unauthorized software is subject to removal upon discovery. (Acceptable Use)
Control#14. Protect: Security Awareness and Training
Cybersecurity awareness and education must be implemented to ensure that users understand their shared responsibility of protecting the district's data, network and system resources. (General)
Control#15. Protect: Privacy Awareness and Training
Cybersecurity awareness and education must be implemented to ensure that users understand their shared responsibility of protecting the district's data, network and system resources. (General)
Control#16. Protect: Cryptography
Sensitive and protected district data must be encrypted, using secure protocols/algorithms, at-rest and in transport. (Data Security)
Control#17. Protect: Secure Configuration Management
The district will use a layered approach of security controls, hardware/software inventory, secure baseline configuration, patching, monitoring, protection, detection, and authentication to ensure overall security of the System. (General)
Control#18. Protect: Change Management
All software and hardware changes must be reviewed by the IT Department for authorization. (Acceptable Use)
Control#19. Protect: Contingency Planning
Disaster recovery plan, recovery prioritization, and the security of backup data must be maintained. (General)
Control#20. Protect: Media
District shall require electronic recyclers to erase all data on all hard drives on (all) computer equipment to the latest Department of Defense (Dod 5220.22-M) specifications and provide the district with a Certificate of Destruction which verifies the same. (Data Security)
Control#21. Protect: Physical and Environmental Protection
Users may not share individually-assigned access control devices (e.g. door access badges, and/or door keys) unless necessary to preserve life safety. (Access Control)
Control#22. Protect: Personnel Security
When employment relationships are subject to change or termination, responsible management will participate in checkout processes defined by Human Resources to ensure timely disabling of system access. (Access Control)
Control#23. Protect: Third-Party Personnel Security
All third-party providers are required to comply with all security policies and standards. (Access Control)
All third-party providers are required to comply with the District Data Sharing Agreement. (Data Security)
Control#24. Protect: System Configuration Hardening & Patch Management
The district will use a layered approach of security controls, hardware/software inventory, secure baseline configuration, patching, monitoring, protection, detection, and authentication to ensure overall security of the System. (General)
Control#25. Protect: Access Control
Access privileges will be assigned to users to provide the minimum necessary permission to perform job responsibilities. (Access Control)
Control#26. Protect: Account Management
Network accounts will be assigned to individuals, except when a shared account is justified by the functions being performed. Accounts designed specifically for a shared purpose or specific system task, such as facilitating data backups or scheduled batch processing, will be granted only in cases when absolutely necessary and will be shared with as few individuals as necessary to effectively perform District operations. (Access Control)
Control#27. Protect: Security Systems Management
Security reviews of servers, firewalls, routers, monitoring platforms, backups, and audit logs must be conducted on a regular basis. (General)
Control#28. Protect: Network Access and Perimeter Controls
Next-gen Firewall must be implemented at all network ingress and egress points for access control and threat prevention. (General)
The network must be segmented by function and sensitivity to limit threat lateral movement and reduce the impact of security incidents. (General)
Control#29. Protect: Internet Content Filtering
The District's System will only be used for learning, teaching, and administrative purposes consistent with the District's mission and goals. Commercial use of the District's System is strictly prohibited. (Acceptable Use)
Control#30. Protect: Data Loss Prevention
Users may not store Confidential District Data with an unauthorized third-party storage service (often referred to as "cloud" storage) or on their personal devices. (Data Security)
Control#31. Protect: Identification & Authentication
Users must create password(s) that meet the District's password complexity requirements. Users should protect their password(s) and should not disclose their passwords to any other person to help ensure the security and integrity of the System. (Access Control)
Control#32. Protect: Spam Filtering
Email security solutions must be in place to provide protection from phishing and spam emails. (General)
Control#33. Protect: Portable & Remote Computing
Users may not store Confidential District Data with an unauthorized third-party storage service (often referred to as "cloud" storage) or on their personal devices. (Data Security)
Control#34. Protect: System Communications Protection
The district will use a layered approach of security controls, hardware/software inventory, secure baseline configuration, patching, monitoring, protection, detection, and authentication to ensure overall security of the System. (General)
Sensitive and protected district data must be encrypted, using secure protocols/algorithms, at-rest and in transport. (Data Security)
Control#42. Protect: Systems Currency
The district will use a layered approach of security controls, hardware/software inventory, secure baseline configuration, patching, monitoring, protection, detection, and authentication to ensure overall security of the System. (General)
DETECT Function
Control#35. Detect: Vulnerability Assessment
Vulnerability and risk assessment tests of the System must be conducted on a regular basis. (General)
Control#36. Detect: Malware Protection
Anti-malware software must be installed on all servers and user devices where appropriate for malware defense. (General)
Control#37. Detect: Security Monitoring and Event Analysis
Centralized logging and monitoring via a Security Information and Event Management (SIEM) system must be implemented to detect and respond to potential threats in real-time. (General)
Control#41. Detect: Audit Logging
Security reviews of servers, firewalls, routers, monitoring platforms, backups, and audit logs must be conducted on a regular basis. (General)
RESPOND Function
Control#38. Respond: Cyber-Security Incident Response
Incident response plan must be maintained, and regular tabletop exercises must be conducted. (General)
Report any cybersecurity issues/incidents to Plano ISD Help Desk helpdesk@pisd.edu 469-752-8767. (Reporting an Incident)
Control#39. Respond: Privacy Incident Response
Incident response plan must be maintained, and regular tabletop exercises must be conducted. (General)
Report any cybersecurity issues/incidents to Plano ISD Help Desk helpdesk@pisd.edu 469-752-8767. (Reporting an Incident)
RECOVER Function
Control#40. Recover: Disaster Recovery Procedures
Disaster recovery plan, recovery prioritization, and the security of backup data must be maintained. (General)
Routine system and data backups must be performed. Backups must be periodically tested to ensure functionality. (General)
Last updated on 04/17/2025
-