Services offered by ITSO

Annual training

Duke’s IT security offices offer annual training for staff with access to sensitive Duke data.

Security liaisons group

Membership in Duke's Security Liaisons Group provides a forum for campus IT representatives to network with peers, discuss security issues, share leading practices and other information within the Duke community. Each Duke University school or department is expected to have representation in the group and actively participate in online discussions and monthly meetings. To join the security liaisons mailing list, send an email to or sign up through sympa list signup. See the SLG wiki for more information.

Data risk assessment

Duke's data risk assessment (DRA) process works to identify risks to Duke University’s sensitive and restricted data that could cause significant harm to individuals or to Duke. It is also a resource to assist data stewards in identifying additional opportunities for data protection.

Incident management

The IT Security Office responds to and manages computer security incidents, which includes determining scope of the incident, containing risk, preserving evidence, investigating via network and computer forensics and managing remediation  Submit any questions or potential incidents to

The IT Security Office Executive level incident management workflow is accessible by the Duke community.

Consulting and education

Duke's IT Security Office provides security consulting and educational materials, including presentations and other resources, for faculty, students, staff and researchers. In addition, Duke departments can access Duke's SANS Securing The Human Portal for online learning modules about IT security.

Network traffic security monitoring

The University IT Security Office runs intrusion detection and intrusion prevention systems to protect University assets and detect compromised machines on University networks. The systems are occasionally used to quarantine misbehaving machines. If you suspect your machine is quarantined, please contact the OIT Service Desk (684-2200) for assistance.

Vulnerability scanning

The IT Security Office will scan campus networks for known vulnerabilities and work with departments and schools to remediate them. Currently, vulnerability scanning occurs in three day increments. Please contact if you believe that one of our scans has caused an issue on your network or systems.

For more detailed information on our vulnerability scanning procedure, including scanning tools, scope, and exclusions, see

Vendor risk assessment

Duke data must be protected on our own systems and when stored with a vendor. Vendor risk assessments help you make an informed decision when selecting a vendor to handle Duke data. 

Find out about the process and get Duke's Service Provider Security Assessment.

Whole disk encryption

Laptops carrying sensitive data (as defined by the Duke University data classification standard) must be encrypted according to the Duke University ITSO Minimum Security Standard for Endpoints (NetID required). It is also our strong recommendation that all laptops be encrypted. Computers in Duke Health are subject to different policies regarding encryption; see the Duke Health encryption standard; the "Duke Medicine PGP User How-To" Duke KnowledgeBase article, and this explanatory video for details.

More about Whole Disk Encryption