System Administrator & Application Administrator Training
The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner and/or Data Custodian. The System Administrator is responsible for the following:
- Assists University management in the day-to-day administration of IT systems.
- Implements security controls and other requirements of the University’s information security program on IT systems for which the System Administrator has been assigned responsibility.
- Each system should have at least two System Administrators (one primary, one secondary).
- Monitor system logs for anomalous activity and notify IT Security of any potential threats or compromises of the system.
- Ensure system and security updates are applied in a timely manner.
- Complete annual, role-based training.
The Application Administrator is the University manager responsible for the operations and maintenance of the application, at the direction of the System Owner, Data Owner, and/or Data Custodian, and is responsible for the following:
- Implement security baseline, controls and other requirements of the University’s information security program on IT applications for which the Application Administrator has been assigned responsibility.
- If the application requires communication with other University systems, work with the Division of Information Technology to update or implement firewall rules and integrations with other systems.
- Assign access and accounts, adhering to Section 5: Logical Access Control. Promptly remove access of those who no longer need access and maintain principle of least privilege.
- Each system should have at least two Application Administrators (one primary, one secondary).
- Monitor application logs for anomalous activity and notify IT Security of any potential threats or compromises of the application or accounts.
- Ensure application and security updates are applied in a timely manner.
- Complete annual role-based training.
The Radford University IT Security Standard 5003s requires all System Owners and Data Owners to complete training annually. The IT Security Office provides this training via Desire 2 Learn throughout the year, but an individual assigned to these positions can request one-on-one training.
How to Request This Service
Send an email to itsecurity@radford.edu to request training. Please include your contact information so we can setup a session with you.