In this section find security requirements and best practices for Duke-developed, hosted, or acquired software, including web applications. Application security documents cover topics including maintaining the inventory, securing applications throughout their lifecycle, managing application access, and detecting and addressing threats and vulnerabilities.
Security Offices' Policies, Procedures, and Standards
Applicable Policies, Procedures, and Standards:
Selecting and Registering Domain Names at Duke
To find Duke Health (Am I Duke Health?) security policies and standards:
Go to Policy Tech at dukeuniversity.policytech.com. Select Duke Health enterprise and see a grouping of information security policies and standards.