Texas A&M University | Technology Services

1. Secure by Design

Security isn't an afterthought or something bolted on at the end; it must be woven into the fabric of everything we do.

Democratize Security

Creating a secure environment is everyone's responsibility, fostering a culture where security and privacy are valued by all.

Zero Trust

As much as possible, we want to be moving towards more explicit access authorization, and less implicit access to resources. This is true across all domains: identity, networking, data, devices.

Shift Left

Security considerations must be integrated early in the lifecycle of any project, system, or service – not saved for the final stages. Getting security involved from the start prevents costly rework and results in more robust solutions.

2. Focus on Risk

Compliance with regulations is necessary, but it doesn't automatically equal security. Our focus is on effectively managing risk.

Beyond the Checklist

We strive to avoid "checklist security" by understanding the intent behind requirements and implementing controls that genuinely reduce risk, rather than just fulfilling a mandate.

Prioritize Efforts

Resources are finite. We weigh risks appropriately, investing time and effort where it provides the strongest return in protecting the university's mission and assets.

Continuous Monitoring

Threats and systems constantly evolve. We aim for continuous monitoring and automated compliance checks rather than relying solely on point-in-time snapshots or annual audits to understand our risk posture.

3. Trust Users (and Get Telemetry)

This principle guides our relationship with the university community – our colleagues, faculty, staff, and students. It reframes the traditional "trust but verify" adage.

Digital Trust

Assume Positive Intent

We start with the assumption that our users–faculty, staff, and students–are capable colleagues who generally want to do the right thing and make good decisions regarding security when properly informed and treated with respect. We believe that most users are competent and responsible, even if occasional mistakes are made.

Telemetry as a Safety Net

The data and logs (telemetry) we collect from systems are primarily intended as a safety net; not to be a tool for surveillance or proving bad faith. Our focus is on guarding against external threats, not monitoring our users as adversaries.

Streamline Necessary Tasks

Building on the trust we place in our users, we work to enable faculty and researchers to perform common tasks without unnecessary roadblocks.

4. Approach Everything with Automation in Mind

In the face of fast-moving threats, manual responses are often too slow. Automation is key to effective and efficient security operations.

Automate Key Processes

We look for opportunities to automate repetitive tasks, threat detection, and response actions. Humans are slow; automated systems can react much faster.

Enable Focus

Automating simpler, routine tasks frees up valuable human time and expertise to focus on more complex problems, analysis, and strategic improvements.

Embrace Experimentation

Implementing automation often requires experimentation. We view failures not as setbacks, but as learning opportunities integral to process improvement.

5. Reduce Complexity

Complexity is often the enemy of security and efficiency. We strive for simplicity in our systems and processes.

Consolidate Data Silos

Security analysis often requires correlating information from many sources. Breaking down data silos makes security monitoring and incident response more effective (Security is a Big Data problem).

Simplify Processes

Streamlining and simplifying business workflows related to security not only improves user experience but also reduces opportunities for error or oversight.

Design Simple Systems

When designing or implementing security solutions, we favor simplicity over unnecessary complexity. As the saying goes, "Simple is better than complex; Complex is better than complicated".

Last Modified: August 22, 2025