Information Security Tips (January 2026) – Macau Vulnerability Management Regulation in Effect: Building a Compliant and Secure Campus Together
資訊安全貼士 (2026年1月號) - 澳門漏洞管理規範生效,共建合規安全校園

To: All Colleagues
Background Summary: The Macau Technical Specifications for Cybersecurity Vulnerability Management officially came into effect on January 1, 2026. As one of the “critical infrastructure operators,” the University must ensure that the management of campus information systems fully complies with legal requirements. To maintain a secure and compliant campus network environment, your cooperation is essential.
Impact on General Users: Although the regulation does not specifically target general users, your devices are a crucial part of the campus security ecosystem.
To strengthen overall protection, your support is important:
- Keep systems updated promptly: Updates are not only feature improvements but also essential security patches. Please install updates as soon as they become available.
- Use software from trusted sources: Avoid cracked or unverified software to prevent introducing security risks into the campus network.
- Enable two‑factor authentication (2FA): Strengthen your account protection to prevent unauthorized access.
Requirements for IT Technical Teams: To comply with the regulation, IT teams must implement a full lifecycle approach.
All technical personnel should follow the four‑stage cycle below to avoid management blind spots:
- Asset Identification (Identify): Conduct a comprehensive inventory of all hardware and software assets (including laboratory and testing equipment) to ensure the asset list is complete and accurate.
- Vulnerability Detection (Detect): Perform regular scans and continuous monitoring to shift from reactive responses to proactive detection.
- Risk Assessment (Assess): Evaluate vulnerability severity according to regulatory standards and prioritise high‑risk issues.
- Remediation and Mitigation (Remediate): Apply required patches within the stipulated timeframe. If updates cannot be applied due to research needs or legacy system constraints, implement compensating controls (such as network isolation) and keep proper records.
Effective vulnerability management requires everyone’s participation. Building a secure and compliant campus network depends on the joint efforts of all users and technical teams.
Should you have any enquiries or require assistance, please feel free to contact ICTO Help Desk.
ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5), eMap
Telephone : 8822 8600
email : icto.helpdesk@um.edu.mo
Related links:
- 《Macau Cybersecurity Law》(Chinese and Portuguese Versions Only)
- 《Regulation of Cybersecurity Management Standards》and《Regulation of Alert, Response and Communication of Cybersecurity Incidents》(Chinese and Portuguese Versions Only)
- 《Macau Vulnerability Management Regulations》(Chinese and Portuguese Versions Only)
Information and Communication Technology Office
各位用戶:
背景摘要:澳門《網絡安全漏洞管理技術規範》已於 2026 年 1 月 1 日正式生效。大學作為「關鍵基礎設施營運者」之一,這 意味著校園資訊系統的管理必須全面符合法定要求。為確保校園網絡安全合規,我們需要全體成員共同配合。
對一般用戶的影響:雖然規範並非直接針對一般用戶,但您的設備是校園防護網的重要一環。
為強化整體安全,您的配合至關重要:
- 系統更新要及時:更新不僅是功能升級,更是修補已知漏洞,請在可行範圍內第一時間完成更新。
- 軟體來源須可靠:避免安裝破解版或來歷不明的軟體,以免將潛在風險帶入校園網絡。
- 身份驗證須雙重:啟用 雙重認證(2FA),保護您的帳戶不被不法人士利用。
對 IT 技術團隊的要求:依循法規要求落實「全生命週期」管理。
請各單位技術人員根據新規範,執行以下四階段的持續循環,以避免管理盲區:
- 資產識別(Identify):全面清查轄下軟硬體(含實驗室及測試設備),確保資產清單完整且準確。
- 漏洞檢測(Detect):定期掃描並進行即時監測,由被動反應轉為主動偵測。
- 風險評估(Assess):依規範要求評估漏洞等級,優先處理高風險項目。
- 修補與緩解(Remediate):於規定時限內安裝必要補丁;若因科研需求或舊系統限制無法更新,須實施適當補償性措施(如隔離)並保留記錄。
漏洞管理需要 你我共同參與。打造安全、合規的校園網絡環境,有賴所有用戶與技術團隊齊心協力。
如有任何疑問,請聯絡資訊及通訊科技部服務中心。
參考資料:
服 務 中 心
位置 : 中央教學樓東5座(E5)二樓2085室 (電子地圖)
電話 : 8822 8600
電郵 : icto.helpdesk@um.edu.mo
資訊及通訊科技部