Infrastructure
Scope
- Servers (physical and virtual)
- Storage
- Network equipment (routers, switches, access points)
- VoIP
- UPSes
- Appliances
Request & procure
All University IT Assets procurement must first be validated and approved by IITS before ordering
All University IT Assets must be purchased through a Purchase Request.
Receive
The equipment delivery location is determined by the IITS Infrastructure team in consultation with other departments if needed.
Deploy
All Assets will be configured following standard practices as designed for each type of device. This includes but is not limited to:
- Inventory
- Updated firmware
- Updated OS and software
- Configurations required for particular use
- Management software
- Malware protection software
- All required assets integrated to event monitoring
No infrastructure equipment can be connected to the Concordia network without specific approval from IITS.
Servers must have the following installed:
- Management software (BigFix)
- Malware/virus protection solution (SentinelOne)
All Cisco devices should be integrated into Cisco SNTC and Prime
Maintain
It is prohibited to uninstall, disable, or change the University’s management and security software including:
- SentinelOne Antivirus
- BigFix
- Other management tools
No changes in configuration, connectivity, power, physical location should be done without the approval and supervision of IITS or the IT owner of the equipment. This includes software installation.
Decommission
As part of Concordia’s sustainability commitment, Infrastructure equipment and other technical components are evaluated and distributed for internal reuse, donation, or external recycling.
Infrastructure equipment, and their components contain toxic materials which can leach into soil and water when discarded in landfills. Reuse and recycling of electronics also reduces the need for unnecessary environmentally harmful mining operations.
Components are never to be discarded in trash bins. Before a University IT Asset is decommissioned, all configuration information and settings should be wiped or reset to factory default
IT Support shall erase any configuration information to ensure that no information can be recovered, using a standardized sanitizing secure method
IT Support shall erase the hard disk(s) to ensure that no information can be recovered, using a standardized sanitizing secure method.
Audit and verification
Government mandates that the University conduct regular ongoing asset inventory and security audits in conjunction with departments. It is the responsibility of all employees to ensure that irregularities identified in IT Asset Management audits are corrected in a timely manner.