- Information and Communication Technology Office (ICTO) - https://icto.um.edu.mo -

Information Security Tips (January 2026) – Macau Vulnerability Management Regulation in Effect: Building a Compliant and Secure Campus Together

Background Summary: The Macau Technical Specifications for Cybersecurity Vulnerability Management officially came into effect on January 1, 2026. As one of the “critical infrastructure operators,” the University must ensure that the management of campus information systems fully complies with legal requirements. To maintain a secure and compliant campus network environment, your cooperation is essential.

Impact on General Users: Although the regulation does not specifically target general users, your devices are a crucial part of the campus security ecosystem.

To strengthen overall protection, your support is important:

Requirements for IT Technical Teams: To comply with the regulation, IT teams must implement a full lifecycle approach.

All technical personnel should follow the four‑stage cycle below to avoid management blind spots:

  1. Asset Identification (Identify): Conduct a comprehensive inventory of all hardware and software assets (including laboratory and testing equipment) to ensure the asset list is complete and accurate.
  2. Vulnerability Detection (Detect): Perform regular scans and continuous monitoring to shift from reactive responses to proactive detection.
  3. Risk Assessment (Assess): Evaluate vulnerability severity according to regulatory standards and prioritise high‑risk issues.
  4. Remediation and Mitigation (Remediate): Apply required patches within the stipulated timeframe. If updates cannot be applied due to research needs or legacy system constraints, implement compensating controls (such as network isolation) and keep proper records.

Effective vulnerability management requires everyone’s participation. Building a secure and compliant campus network depends on the joint efforts of all users and technical teams.