Enterprise security consists of policies, network hardware and software provisions monitoring and preventing unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources; traffic going both in and out of the network with a host of protective features including intrusion detection and prevention (vulnerability monitoring), anti-bot, anti-malware, application and URL filtering and VPN services. Major categories of service include:
Firewall security is the first line of perimeter defense for the State network. Protection exists from the Internet and between the distinct customer base of State government, K-12 education, and political subdivisions. Agency required changes to the firewall configuration will require the agency security contact to submit a Firewall Configuration Request.
Intrusion Detection and Prevention Systems (IDS/IPS) (attack mitigations) are in place to proactively monitor and detect inappropriate activity on the network.
Monitoring (security logging) of statewide WAN is systematically conducted, managed, and supported on a 24/7 basis.
Virtual Private Network (VPN) solutions exist for both client-based and point-to-point (site-to-site) solutions. This solution does require a VPN Configuration Request. Remediation assistance is provided by training personnel whenever a security issue is discovered.
Through various layers of security every system on the network is protected with minimal end-user intervention required. Agency cost savings is realized through reduced expenses for personnel, equipment and software associated with monitoring and maintaining the service.
This service offers network security, able to detect and block sophisticated attacks by enforcing security policies, stopping threats at the network perimeter, and supporting rapid detection and resolution of security problems. These services strive to protect the network infrastructure from damages and security breaches.
Additionally, the practices and security posture within the state are leveraged to meet the security demands on agencies through their system audit requirements. Support for this service is provided by ETS staff skilled and experienced in planning, provisioning, maintaining and troubleshooting the service.
How to Request Help with This Service
For general inquiries, please contact your Customer Advocate (CA) or ETS-CustomerService@wyo.gov. The CA will work with the agency to answer questions, and arrange with ETS service teams to fulfill specific security requests.
Customers should submit a request to the Customer Portal or contact the Service Desk at 307-777-5000 for any network reconfiguration or to add or remove filters based on changed conditions due to threats or business needs.
Agencies will provide appropriate staff resource(s) to collaborate with the Security Team to ensure appropriate system access. In some circumstances, the agency will need to configure resources to provide proper logs to the enterprise Security Information and Event Management (SIEM) solution.
ETS will manage and maintain an authorized internal security contact list of individuals within the agency, able to authorize any and all security changes for their agency (excluding “Security Exception Requests, this is agency director approval only). This list should be up-to-date, regularly audited for changes, and shared with ETS to ensure consistency.
Only an agency’s Security Contact may submit a Firewall Configuration Request.
For VPN access, all users need valid State network credentials and an Active Directory (AD) account. The agency will also need to provide and maintain a list of sites needing VPN access and a VPN Configuration Request.