Research Security Threat Risk Assessment

Cyber threats are becoming more sophisticated, and research systems and research information are not immune to cyber-attacks. A Security Threat and Risk Assessment, or STRA, is an effective tool that is used to assess the security posture of a research environment. It also identifies compliance gaps and provides recommendations to improve cybersecurity. Below, we provide information about the UBC Research STRA process and what to expect before, during and after an STRA.

Question mark icon
What is a STRA

A Security Threat and Risk Assessment (STRA) analyzes the security posture of a research project or service. For UBC research, it includes reviewing how information is collected, processed, and stored with a focus on cybersecurity and compliance with UBC Information Security requirements. The assessment identifies potential threats, gaps, and associated risks.

 

Exclamation point icon
Why is it important

At UBC, researchers are responsible for securing research information against unauthorized access, disclosure, modification, or deletion. An STRA helps identify significant security gaps, supports compliance with UBC policies, and can help prevent cybersecurity incidents. 

 

document with shield stamp icon
When is it required?

STRAs may be required to meet institutional policies, regulations, funding agency requirements, ethics board expectations, or contractual obligations. Not sure if you need one? Check the use cases here under "Are research project treated differently" or contact us for help.

 


 

Want to learn more about the STRA process? 

Continue reading this page for more information about ARC's Research STRA process and how to prepare for it. 

 

 

Not sure if you need an STRA?

We can help! Contact us at arc.support@ubc.ca, provide information about your initiative, and one of our subject matter expert will be in touch. 

 

Ready to start?
 

Start the process by clicking  "Request an STRA" below!


What to Expect Before, During and After a UBC Research STRA 

Clipboard Indicating STRA

Planning for an STRA

Planning for an STRA is essential to ensure a smooth and efficient process. With proper planning, you can organize and streamline information collection, you can quickly and accurately complete the STRA intake form, and address technical questions proactively. Planning for an STRA also allow you to anticipate potential roadblocks early, reduce delays and enable a more effective and timely STRA outcome.

Do you have a technical resource available?

An STRA is a technical cybersecurity assessment. Someone with technical knowledge of the solution will need to provide information throughout the process (i.e.: Solution developer or provider).

 

Completing the Intake

During the STRA process, you’ll start by completing an intake form that captures key details about your initiative. The information you provide helps us determine the appropriate level of assessment for your research project or service—Levels 0, 1, or 2, which are defined in the next section. Completing the form can be challenging, so it’s important to set aside sufficient time. The more accurate and thorough your responses are, the better we can assess the security posture of your project/service, and ensure the process runs smoothly.

Computer screen with an STRA intake page opened

 

Watch indicating 10:10 and Reporting and expectation

Timeline, Expectations & Report

After you have completed the intake, our system will perform an initial assessment of your project/service and assign an STRA level. UBC Advanced Research Computing offers Research STRAs in 3 Levels that are defined below. The level required for an initiative is defined based on a number of elements including information classification, architecture design, security controls in place and potential risks associated with the initiative.

 

STRA Review and Risk Mitigation

Receiving the STRA report is not the end of the process. The report typically includes findings and compliance requirements that must be addressed. Acting on these findings is essential to ensure your initiative meets institutional and regulatory security and privacy requirements. Implementing the recommended mitigation plans promptly will help reduce risks and maintain compliance, thus ensuring your research is adequately protected.

Circuit board with a padlock on the chip in the middle

 

 

Ready to Start?

Start the process by clicking  "Request an STRA" below!

 

Need more help?

We can help! Contact us at arc.support@ubc.ca, provide information about your initiative, and one of our subject matter expert will be in touch. 

Do I need Privacy Impact Assessment?

A Privacy Impact Assessment (or PIA) is a risk-based analysis of personal information collection, use and disclosure, based on potential harm that could be caused by its loss, corruption, or disclosure. While research information is generally exempt from BC FIPPA, collection, use, sharing or disclosure for purpose other than research may require a PIA.

Learn More


Additional Resources

To learn more about UBC security requirements, visit:

Office of the Chief Information Officer

To learn more about UBC legal requirements, visit:
 

Office of the University Counsel

To learn more about UBC information privacy and security, visit:

UBC Privacy Matters

To learn more about UBC information classification, visit:

UBC Research Information Classification


Can’t find what you are looking for? 

Send us an email at arc.support@ubc.ca to talk to one of our subject matter experts.  


UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Bluesky The logo for the Bluesky social media service. Chats Two speech clouds. Facebook The logo for the Facebook social media service. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. External Link An arrow entering a square. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Telephone An antique telephone. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service.