ASSETs is a program for identifying and assessing risks to sensitive/critical computer systems at UGA.
For 2013, Unit Security Liaisons (USLs) be required to report critical systems as part of UGA’s implementation of the BOR User Account Management Standard.
USLs will be required to inventory all of the servers in their unit(s) that store or process confidential or sensitive information, such as Social Security Numbers, annually. To complete this requirement, USLs will need to login to ASSETs and complete the following steps:
ASSETs access is limited to UGA IP addresses only. Off-campus users will need to use the Remote Access VPN to log in to ASSETs.
Connect to the Remote Access VPN client.
Use the information in the table below to guide your troubleshooting.
|Error Message||Potential Cause||Remedy|
|Authentication Failed||Incorrect password for MyID.||Try again with correct password.|
|Authentication Failed||You are putting "@uga.edu" in the MyID field.||Remove the "@uga.edu" from the MyId field.|
|You are not authorized.||Your MyID is not allowed to access ASSETs.||Email firstname.lastname@example.org or call 706-542-3106 for help.|
Unit Security Liaisons were appointed by each College/Department/Unit and reported to the Office of Information Security. Please discuss your appointment as a Unit Security Liaison with your immediate supervisor.
As defined by the University System of Georgia (USG), confidential information is information whose improper use or disclosure could adversely affect the ability of the institution to accomplish its mission, records about individuals protected under the Family Educational Rights and Privacy Act of 1974 (FERPA) and other applicable laws, or data not releasable under the Georgia Open Records Act or the Georgia Open Meetings Act.
Sensitive Information is information maintained by USG institutions, the University System Office (USO), and the Georgia Public Library System (GPLS) that requires special precautions, as determined by institution standards and risk management decisions, to ensure its accuracy and integrity by using integrity, verification, and access controls to protect it from unauthorized modification or deletions.
Users are appointed in different roles to a department, which is known as a unit in ASSETs. If you do not see your unit, then you have not been assigned as a Security Liaison, or in any other role, for that unit. To get assigned for that unit, contact the unit's Primary Security Liaison. If you do not know who the Primary Security Liaison is for your unit, please contact the Office of Information Security, via the EITS HelpDesk, at 706-542-3106 or e-mail email@example.com.
Classify your system using the Data Classification and Protection Standard.
To add systems to your ASSETS inventory from the Welcome screen:
There are three ways to add new systems from the Inventory Management page.
The different roles that users can have in ASSETS are:
To assign Roles:
Sensitive and Critical system inventory was imported into ASSETs 2.0 from the 2008 ASSETs 1.1 inventory. If there are systems in the inventory that are no longer sensitive or critical, are there by mistake, or otherwise do not belong you can delete them by selecting the check box next to the system and clicking the "Delete Selected" button.