TECHNICAL SECURITY QUESTIONNAIRE

Size: px
Start display at page:

Download "TECHNICAL SECURITY QUESTIONNAIRE"

Transcription

1 TECHNICAL SECURITY QUESTIONNAIRE 2017 Complete and return by due date to: Crime Information Bureau, P.O. Box 2718, Madison, WI , or to Completion may require input by information technology personnel that maintain your terminals or network. Agency Name ORI Agency Address Date City / State Specific Location of Agency Badgernet Router Zip Router Serial Number After Hours Agency Information Technology Contact Name Phone Number LASO Every agency having access to CJIS data through their own network must designate someone as Local Agency Security Officer (LASO). The LASO for this agency has been designated as: LASO First Name MI Last Name Phone Number Fax Number address The Local Agency Security Officer is responsible for identifying who is using the hardware/software and ensuring that no unauthorized users have access to same, identifying and documenting how the equipment is connected to the state system in a topological drawing, ensuring that personnel security screening procedures are being followed, ensuring that appropriate security measures are in place, supporting policy compliance, and keeping the CIB Information Security Officer informed of security incidents. NETWORK DIAGRAM (CJIS Policy Section 5.7) Provide a topological drawing depicting the interconnectivity of the agency network to the TIME/CJIS systems. A sample is attached at the end of this questionnaire. The drawing must include: All communication paths, circuits and other components used for connection, beginning with the agency owned system(s) and traversing through all interconnected systems to Badgernet. Depict all entry points into the network including any hardware components that are used to isolate the network from other networks at the agency. The location of all components (e.g. firewalls, routers, switches, hubs, servers, encryption devices, and computer workstations). Do not show each workstation; the number of clients is sufficient. Depict the beginning point of data encryption and the point where data is decrypted. Identify each segment of the network that encrypted data passes through. Identify the transmission methods (data circuit, microwave, cellular technologies, fiber optics, copper wiring, etc.) being used to transmit or receive TIME/CJIS systems data. Clearly indicate the boundaries of your criminal justice facility in relation to the equipment illustrated on the diagram FOR OFFICIAL USE ONLY markings. The agency name and date (day, month, and year) drawing was created or updated. 1

2 SECURITY AWARENESS TRAINING (CJIS Policy Section 5.2) Does your agency require security awareness training within six months of access and biennially thereafter, for all personnel who have access to criminal justice information? All personnel who have access to criminal justice information would include users that have login access to the TIME System, users that have access to TIME System printouts, unescorted janitorial personnel, all IT personnel that maintain network hardware, terminals, servers, etc. that access the TIME and CJIS systems, etc. Security awareness training is part of standard TIME System certification level training. For those personnel that do not require TIME System certification, security awareness training is available as an online module via the TRAIN (Training Resources Available on the Internet) site or by using the Security Awareness Handout found on the CIB website PHYSICAL SECURITY (CJIS Policy Section 5.9) Are the boundaries of your physically secure location posted and secured? Does your agency control all physical access points to your secure facility including but not limited to access to the data center, telecommunication equipment and wiring closets? Does your agency maintain a list of individuals who have authorized access to the secure locations? Does your agency verify individuals have authorization before granting them access? Yes No Does your agency verify the identity of visitors before granting access to the secure location? Does your agency escort visitors at all times and monitor visitor activity? Is all TIME System hardware (workstations, servers, etc) located within your physically secure location? If yes, does your agency control access to the data center/equipment closets? If no, do you have a Management Control Agreement between your agency and the agency that maintains the hardware (City/County IT)? Please provide a copy of the agreement. Does your agency have written physical protection policies and procedures to ensure criminal justice information, hardware, and software are physically protected? MEDIA PROTECTION (CJIS Policy Section 5.8) Digital media means digital storage media including memory devices in laptops and computers (hard drives) and any removable, transportable digital memory media, such as magnetic tape or disk, optical disk, flash drives, external hard drives, digital memory card, etc. Physical media includes printouts, printed documents, printed imagery, etc. Does your agency securely store digital and physical media within the physically secure location? Does your agency restrict access to digital and physical media to authorized individuals? 2

3 Does your agency protect criminal justice information during transport outside of the secure location? Is transport of criminal justice information outside the secured area restricted to authorized personnel? Does your agency prohibit users from ing criminal justice information? If no, is the encrypted to meet FIPS NIST standards? DIGITAL MEDIA DISPOSAL (CJIS Policy Section 5.8.3) Does your agency sanitize or degauss digital media (this would also include hard drives from leased or rented copiers and/or printers that scan, print or copy CJI or PII) prior to disposal or release for reuse? 2017 If yes, please explain in detail what product is used and how the digital media is sanitized or degaussed? Does your agency destroy inoperable digital media? If yes, please explain in detail what product (if applicable) is used and/or how the digital media is destroyed? Is the sanitization or destruction of digital media witnessed or carried out by authorized personnel? PHYSICAL MEDIA DISPOSAL (CJIS Policy Section 5.8.4) Does your agency securely dispose of physical (paper) media containing criminal justice information? If yes, please explain in detail how the physical media is disposed of? Is the disposal or destruction of physical (paper) media witnessed or carried out by authorized personnel? Does your agency have written policies and/or procedures related to the above media protection requirements? 3

4 IDENTIFICATION and AUTHENTICATION (CJIS Policy Section 5.6) These questions pertain to TIME/CJIS Systems access, not to the overall agency communications network. TIME/CJIS systems access includes direct access via Portal 100 or other software, mobile data computer (MDC) access, and access via records management or computer aided dispatch software (i.e. New World, ProPhoenix, Spillman, Visionair etc.). Does your agency require unique identification for all IT and/or vendor personnel who administer and/or maintain the TIME/CJIS systems network? Does your agency require unique identification for all personnel who access the TIME/CJIS Systems? Does your agency prevent users from sharing userids for the TIME/CJIS systems? Does your agency keep the list of authorized users current by adding new users and disabling or deleting former users? Does your agency validate the list of authorized TIME/CJIS system users and their access authorizations at least annually? If yes, is the validation process documented in your policies? Does your agency enforce the following password rules for TIME/CJIS system access? Minimum length of 8 characters Cannot be a dictionary word or proper name Cannot be the same as the userid Expire within a maximum of every 90 calendar days Cannot be identical to the previous 10 passwords Cannot be transmitted in the clear outside the secure domain Cannot be displayed when entered Cannot be shared Does your agency utilize a Personal Identification Number (PIN) in conjunction with a certificate or token for the purpose of Advanced Authentication? If yes does your agency enforce the following PIN attributes? Minimum of 6 digits Have no repeating digits i.e., Have no sequential patterns i.e., Not the same as the userid Expire within a maximum of 365 calendar days Cannot be identical to the previous 3 PINs Cannot be transmitted in the clear outside the secure location Cannot be displayed when entered Does your agency have written policies and/or procedures related to the above identification and authentication requirements? 4

5 ACCESS CONTROL / NETWORK / SYSTEMS (CJIS Policy Section 5.5) Does your agency manage (establish, modify, disable, etc.) TIME/CJIS system accounts? Yes No If yes, do you assign the most restrictive set of rights based on specific duties? If yes, do you maintain logs for at least 1 year of access privilege changes? Does your agency ensure only authorized personnel can add, change or remove component devices, and remove or alter programs? Does your agency limit users to no more than 5 consecutive invalid access attempts to the TIME/CJIS systems before automatically locking the account for at least 10 minutes? Does your agency enforce a session lock after a maximum of 30 minutes of inactivity on the TIME/CJIS systems? (Devices that are a part of a criminal justice conveyance or used to perform dispatch functions and located within a secure location, or terminals designated solely for the purpose of receiving alert notifications used within physically secured locations that remain staffed when in operation, are exempt.) Does your agency allow multiple concurrent sessions for users accessing TIME/CJIS systems? If yes, does your agency have documented procedures outlining the operational business need for the multiple concurrent active sessions? Does your agency have written policies and/or procedures related to the above access control requirements? Does your agency prohibit the use of publicly accessible computers to access, process, store or transmit criminal justice information? Publicly accessible computers include/are not limited to: hotel business center computers, convention center computers, public library computers, public kiosk computers, etc. Public Segments (CJIS Policy Section 5.10) Does your agency transmit criminal justice information outside the physically secure location (i.e., public segments such as leased circuits or circuits connecting two or more buildings)? If yes, is this data encrypted with a cryptographic module that meets FIPS standards? Does your agency utilize a telecommunication infrastructure that is shared by criminal justice and non-criminal justice users (i.e. same local area network used by police and fire department)? If yes, is the criminal justice information encrypted with a cryptographic module that meets FIPS standards? If no, is the criminal justice information logically separated (e.g. use of protected secure VLAN with access control lists) to prevent non-criminal justice users from accessing the data? 5

6 MOBILE DEVICES (CJIS Policy Section 5.13) Does your agency use wireless, Internet, dial-up, cellular, or any other non-hardwired methodologies, to access the TIME/CJIS systems or to transfer criminal justice information? (This includes mobile devices in police conveyances and handheld devices. i.e. cellular, Bluetooth, satellite, microwave, and land mobile radio (LMR).) If yes, is the criminal justice information transmitted using a wireless methodology encrypted with a cryptographic module that meets FIPS standards? If yes, are the devices that use this non-hardwired methodology to access the TIME/CJIS systems or to transfer criminal justice information located within a physically secure location (police vehicles as defined by the CJIS Security Policy are considered secure locations) If yes, can the mobile devices be removed from the secure location and still access the TIME/CJIS systems or transfer criminal justice information? o If no, please explain how your agency prohibits the device from being removed from the secure location/police vehicle? o If yes, has your agency deployed a form of advanced authentication as outlined in the CJIS Security policy (in additional to userid and password)? o If yes, describe what form of advanced authentication is used, how it is used, and where the advanced authentication has been deployed in your network. Does your agency enforce the following password rules for wireless system access? Minimum length of 8 characters Cannot be a dictionary word or proper name Cannot be the same as the userid Expire within a maximum of every 90 calendar days Cannot be identical to the previous 10 passwords Cannot be transmitted in the clear outside the secure domain Cannot be displayed when entered Cannot be shared Does your agency utilize a personal firewall on all devices used to access the TIME/CJIS systems that are mobile by design (i.e. MDC laptops)? Are procedures in place to disable wireless equipment if it is lost or stolen? 6

7 WIRELESS LAN (CJIS Policy Section 5.13) Does your agency use a wireless LAN to access criminal justice information? If no, skip to Smart Phones and Tablets section Are wireless links or server access points password protected to ensure protection from unauthorized system access? Does your agency use ALL of the below: Perform validation testing to ensure rogue APs (Access Points) do not exist in the Wireless Local Area Network (WLAN) and to fully understand the wireless network security posture? Maintain a complete inventory of all Access Points (APs) and wireless devices? Place APs in secured areas to prevent unauthorized physical access and user manipulation? Test AP range boundaries to determine the precise extent of the wireless coverage and design the AP wireless coverage to limit the coverage area to only what is needed for operational purposes: Enable user authentication and encryption mechanisms for the management interface of the AP? Ensure that all APs have strong administrative passwords and ensure that all passwords are changed in accordance with section ? Ensure that reset function on APs is used only when needed and is only invoked by authorized personnel. Restore the AP s to the latest security settings, when the reset functions are used, to ensure the factory default settings are not utilized? Change the default service set identified (SSID) in the APs. Disable the broadcast SSID feature so that the client SSID must match that of the AP. Validate that the SSID character string does not contain any agency identifiable information (division, department, street, etc) or services? Enable all security features of the wireless product, including the cryptographic authentication, firewall, and other privacy features? Ensure that encryption key sizes are at least 128-bits and the default shared keys are replaced by unique keys? Ensure that the ad hoc mode has been disabled? Disable all nonessential management protocols on the APs and disable hypertext transfer protocol (HTTP) when not needed or protect HTTP access with authentication and encryption? Enable logging (if supported) and review the logs on recurring basis per local policy. At a minimum logs shall be reviewed monthly? Insulate, virtually (e.g. virtual local area network (VLAN) and ACLs) or physically (e.g. firewalls), the wireless network from the operational wired infrastructure. Limit access between wireless networks and the wired network to only operational needs? When disposing of access points that will no longer be used by the agency, clear access point configuration to prevent disclosure of network configurations, keys, passwords, etc? 7

8 Does your agency require the cryptographic module NIST, CSE, certified to meet the FIPS requirements? (Are you using WEP, WPA or WPA2? If not WPA2, then you are not in compliance. WEP & WPA are NOT FIPS certified.) Does your agency allow mobile devices to be used as a wireless access point or WiFi hotspot? Does your agency only allow connection from agency authorized devices? SMART PHONES and TABLETS (CJIS Policy Section 5.13) Does your agency use any wireless devices (smartphones or tablets) to access, process, store, or transmit criminal justice information via the TIME/CJIS systems? 2017 If no, skip to Personally Device section. Does your agency assure that these devices have not been rooted, jail broken, or have had any unauthorized changes made to the device? Does the agency use a Mobile Device Manager (MDM) to control Smartphone / Tablet devices that access criminal justice information (CJI)? If yes, is the MDM capable of the following: Remote locking of device Remote wiping of device Setting and locking device configuration Detection of rooted and jail broken devices Enforce folder or disk level encryption Application of mandatory policy settings on the device Detection of unauthorized configurations or software/applications If yes, is CJI only transferred between authorized applications and storage areas of the device (CJIS sandbox where CJI cannot be copied or pasted from CJI app onto personal applications like Facebook, Twitter, or personal ing)? Does your agency protect Smartphone / Tablet devices with a personal firewall? If yes, does the personal firewall provide ALL of the following: Manage program access to the Internet Block unsolicited requests to connect to the PC Filter incoming traffic by IP address or protocol Filter incoming traffic by destination ports Maintain an IP traffic log If no, does your agency use a Mobile Device Management (MDM) system that facilitates the ability to provide firewall services from the agency level? Does your agency protect Smartphone / Tablet devices with virus protection? 8

9 If no, does your agency use a Mobile Device Management (MDM) system that facilitates the ability to provide antivirus services from the agency level? PERSONALLY OWNED DEVICES (CJIS Policy Section ) Does your agency allow personally owned devices to access, process, store or transmit criminal justice information via the TIME/CJIS systems? If no, skip to Temporary Remote Access section. If yes, has your agency established and documented in written policy the specific terms and conditions for such personally owned device usage? If yes, what type of advanced authentication (in addition to userid and password) is used? (i.e. biometrics, user-based public key infrastructure, smart or proximity cards, tokens, risk based authentication, etc.). If yes, is this access connection via a personally owned device encrypted with a cryptographic module that meets FIPS standards? TEMPORARY REMOTE ACCESS (CJIS Policy Section 5.5.6) Does your agency authorize, monitor, and control all methods of temporary remote access to your network/software/systems? (Remote access is any temporary access to an agency s information system by a user (or an information system) communicating temporarily through an external, non-agency-controlled network (e.g. the Internet.) If no, skip to System and Communications Protection section. Please indicate below, those that apply, regarding temporary remote access: BadgerTraCs (maintenance purposes) IT personnel (maintenance or troubleshooting purposes) Vendor personnel (software/hardware maintenance purposes) Others, please explain further: What product is used by the above users to obtain temporary remote access? Does your agency permit Virtual Escorting for remote access? 9

10 If yes, is the session monitored at all times by an authorized escort? If yes, is the escort familiar with the systems/area in which the work is being performed? If yes, does the escort have the ability to end the session at any time? If yes, is the connection that is used by the remote administrative personnel encrypted and the encryption is FIPS NIST Certified? If yes, is the remote administrative personnel identified prior to access and authenticated prior to or during the session (authentication may be accomplished prior to the session via an Advanced Authentication (AA) solution or during the session via active teleconference with the escort throughout the session)? If you do not meet all of the above conditions for Virtual Escorting, what form of advanced authentication (in addition to userid and password) is used? Biometrics (authentication at the local agency level not the local device) Smart Cards Proximity Cards Tokens (One time passwords) User-Based Public Key Infrastructure Risked-Based Authentication Other: Please provide detailed explanation. Is the connection used for temporary remote access encrypted with a cryptographic module that meets FIPS standards? Does your agency require unique identification for all persons authorized for remote access to the information system? Does your agency enforce the following password rules for remote access to the information system? Minimum length of 8 characters Cannot be a dictionary word or proper name Cannot be the same as the userid Expire within a maximum of every 90 calendar days Cannot be identical to the previous 10 passwords Cannot be transmitted in the clear outside the secure domain Cannot be displayed when entered Cannot be shared Does your agency have written policies and/or procedures related to the above network system requirements?

11 SYSTEM/COMMUNICATION PROTECTION/INFO INTEGRITY (CJIS Policy Section 5.10) Has your agency implemented network-based and/or host-based intrusion detection tools? If yes, does your agency monitor inbound and outbound communications for unusual or unauthorized activities? If yes, does your agency send individual intrusion detection logs to a central logging facility where correlation and analysis will be accomplished as a system wide instruction detection effort? If yes, does your agency employ automated tools to support near-real-time analysis of events in support of detecting system level attacks? Does your agency utilize a firewall to prevent unauthorized access to criminal justice information and all network components providing access to the TIME/CJIS systems? Does your agency ensure connections to the Internet, other external networks, or systems occur through controlled interfaces? (e.g. proxies, gateways, routers, firewalls, encrypted tunnels) Does your agency ensure that boundary protection devices do not release unauthorized information if a failure occurs? (The device should fail closed versus fail open.) Are all publicly accessible information system components (e.g. public Web servers) divided into separate sub-networks with separate network interfaces? Does your agency electronically store CJI at rest (i.e. stored digitally) outside the physically secure location? If yes, is the data encrypted to the FIPS standards? If yes, does your agency use a passphrase to unlock the cipher? If yes, does the passphrase meet the following requirements? o Is at least 10 characters? o Cannot be a dictionary word? o Include at least 1 upper case letter, 1 lower case letter, 1 number or 1 special character? o Can be changed when previously authorized personnel no longer require access? Does your agency host criminal justice information related systems or applications in a virtualized environment? If yes, are these systems/applications separate from non-criminal justice and/or internet facing systems/applications (hosted on a different physical machine)? If yes, do these systems/applications reside on the same host as non-criminal justice systems/applications (same physical machine but on different blades)? If yes, is the source location for installers for critical software drivers, contained on a separate quest or physical host? If yes, are user privileges in the virtual systems/applications limited to prevent unauthorized operators from performing administrative functions or accessing host files? 11

12 If yes, does your agency maintain audit logs for all virtual machines and hosts and store the logs outside the host s virtual environment? Is malicious code (virus) protection implemented on all information technology systems that transmit and/or store criminal justice information? If yes, is the protection enabled at start-up? If yes, is automatic resident scanning employed? If yes, does that include automatic updates for systems with Internet access? If yes, are systems without Internet access regularly updated manually? Does your agency employ spam and spyware protection at critical information system entry points, workstations, servers and mobile devices? Does your agency apply routine patches to all software and components in a timely manner? Does your agency have written policies and/or procedures related to the above communications protection requirements? CLOUD COMPUTING (CJIS Policy Section ) Does your agency utilize a Cloud Provider to host or store related information systems, applications, or criminal justice (CJI) information? If no, skip to INCIDENT RESPONSE section. Is the CJI encrypted (FIPS 140-2) prior to entering the cloud? If CJI is stored unencrypted within a 3 rd party cloud, are the following requirements met? Security Addendums have been signed by all unescorted private contractor personnel? Personnel Security requirements have been completed by all unescorted private contractor personnel? Security Awareness Training has been completed by all unescorted private contractor personnel? Criminal justice agency (CJA) maintains management control of all CJI? All CJI is stored within a physically secure location or encrypted (This means that CJA knows where their CJI is physically being stored and has verified the location is secure from unauthorized personnel)? Media Disposal is carried out by authorized personnel or witnessed by authorized personnel? CJA can provide a network diagram that depicts CJI in the cloud environment? Private Contractors with access are uniquely identified? Remote access is determined by CJA administration and requires Advanced Authentication from non secure locations? Audit logs are maintained and can be accessed following security incidents? 12

13 All technical security measures should be met in cloud adequate boundary protection, information flow enforcement/cji is separated from non-crim applications/information systems, malicious code/spam/spyware on critical access points? Does your agency prevent the Cloud Provider from using metadata derived from CJI for any purpose? Does your agency prevent the Cloud Provider from scanning or data files for the purpose of building analytics, data mining, advertising, or improving the services provided? INCIDENT RESPONSE (CJIS Policy Section 5.3) Does your agency receive information system security alerts and/or advisories on a regular basis? If yes, do you issue these alerts and advisories to appropriate personnel? If yes, does your agency document the types of actions to be taken in response to security alerts and/or advisories? If yes, does your agency take appropriate actions in response? Does your agency employ automated mechanisms to make security alert and advisory information available throughout the agency as appropriate? If your agency has not experienced a possible information security incident, please answer the questions in this section based on your anticipated response if such an incident were to occur. Does your agency have an information security incident response policy/procedure? If yes, does the policy include the following: o Adequate preparation o Detection o Analysis o Containment o Eradication o Recovery o User response activities o Tracking of information security incidents o Documentation of information security incidents o Automated mechanisms to support the incident handling process Are all agency employees, contractors and third party users aware of the agency incident reporting procedures? Does your agency promptly report possible security incidents to the Crime Information Bureau? Yes No 13

14

MAIL AUDIT QUESTIONNAIRE

MAIL AUDIT QUESTIONNAIRE MAIL AUDIT QUESTIONNAIRE Complete and return by due date to: Crime Information Bureau, P.O. Box 2718, Madison, WI 53701-2718, or email to cibtrain@doj.state.wi.us. Completion may require input by information

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Computerized Central Records System

Computerized Central Records System POLICY 111.2 Computerized Central Records System REVISED: 02/07, 09/11, 07/17 RELATED POLICIES: CFA STANDARDS: 34.13 REVIEWED: AS NEEDED A. PURPOSE The purpose of this policy is to establish procedures

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to DoD Guidance for Reviewing System Security Plans and the s Not Yet Implemented This guidance was developed to facilitate the consistent review and understanding of System Security Plans and Plans of Action,

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

NLETS & CLOUD SECURITY. Bill Phillips, Information Security Officer

NLETS & CLOUD SECURITY. Bill Phillips, Information Security Officer NLETS & CLOUD SECURITY Bill Phillips, Information Security Officer Overview Enhancing Nlets Audit Capabilities Nova Architecture Nova Security Services Audit Enhancing Nlets Audits Revising the existing

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

GreenTec Broderick Drive, Suite 155 Sterling, VA

GreenTec Broderick Drive, Suite 155 Sterling, VA Media and Systems Protection, Integrity and Accountability Whitepaper GreenTec 22375 Broderick Drive, Suite 155 Sterling, VA 20166 www.greentec-usa.com www.greentec-usa.com CJIS Compliance Whitepaper Table

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 3 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls High Baseline Includes updates through 04-22-2005 AC-1 ACCESS CONTROL

More information

Ready Theatre Systems RTS POS

Ready Theatre Systems RTS POS Ready Theatre Systems RTS POS PCI PA-DSS Implementation Guide Revision: 2.0 September, 2010 Ready Theatre Systems, LLC - www.rts-solutions.com Table of Contents: Introduction to PCI PA DSS Compliance 2

More information

Security policy 8/24/2012

Security policy 8/24/2012 SLED Overview of the FBI Criminal Justice Information Services (CJIS) Security Policy Version 5.1 8/09/2012 CJISD-ITS-DOC-08140-5.0 SLEDISO@SLED.SC.GOV ForOfficialUse Only 1 This session will be an overview

More information

Total Security Management PCI DSS Compliance Guide

Total Security Management PCI DSS Compliance Guide Total Security Management PCI DSS Guide The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations to help protect the security of credit card holders. These regulations apply to

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

PA-DSS Implementation Guide For

PA-DSS Implementation Guide For PA-DSS Implementation Guide For, CAGE (Card Authorization Gateway Engine), Version 4.0 PCI PADSS Certification 2.0 December 10, 2013. Table of Contents 1. Purpose... 4 2. Delete sensitive authentication

More information

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 1 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls Low Baseline AC-1 ACCESS CONTROL POLICY AND PROCEDURES The organization

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Cyber Security Guidelines for Public Wi-Fi Networks

Cyber Security Guidelines for Public Wi-Fi Networks Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016 National Identity Exchange Federation Trustmark Signing Certificate Policy Version 1.0 Published October 3, 2014 Revised March 30, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

CompTIA Security+(2008 Edition) Exam

CompTIA Security+(2008 Edition) Exam http://www.51- pass.com Exam : SY0-201 Title : CompTIA Security+(2008 Edition) Exam Version : Demo 1 / 7 1.An administrator is explaining the conditions under which penetration testing is preferred over

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 1 The PCI Data Security

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Physical Safeguards Policy July 19, 2016

Physical Safeguards Policy July 19, 2016 Physical Safeguards Policy July 19, 2016 SCOPE This policy applies to Florida Atlantic University s Covered Components and those working on behalf of the Covered Components (collectively FAU ) for purposes

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department HIPAA Assessment Prepared For: ABC Medical Center Prepared By: Compliance Department Agenda Environment Assessment Overview Risk and Issue Score Next Steps Environment NETWORK ASSESSMENT (changes) Domain

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

MINIMUM SECURITY CONTROLS SUMMARY

MINIMUM SECURITY CONTROLS SUMMARY APPENDIX D MINIMUM SECURITY CONTROLS SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS The following table lists the minimum security controls, or security control baselines, for

More information

PART 5: INFORMATION TECHNOLOGY RECORDS

PART 5: INFORMATION TECHNOLOGY RECORDS PART 5: INFORMATION TECHNOLOGY RECORDS SECTION 5 1: RECORDS OF AUTOMATED APPLICATIONS GR5800 01 AUDIT TRAIL RECORDS Files needed for electronic data audits such as files or reports showing transactions

More information

Requirements and Tiering Document FBI CJIS Security Policy Version /01/2016

Requirements and Tiering Document FBI CJIS Security Policy Version /01/2016 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division s and Tiering Document FBI CJIS Security Policy Version 5.5 06/0/06 Recommended changes to version

More information

SECURITY PLAN DRAFT For Major Applications and General Support Systems

SECURITY PLAN DRAFT For Major Applications and General Support Systems SECURITY PLAN For Major Applications and General Support Systems TABLE OF CONTENTS EXECUTIVE SUMMARY A. APPLICATION/SYSTEM IDENTIFICATION A.1 Application/System Category Indicate whether the application/system

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

Monthly Cyber Threat Briefing

Monthly Cyber Threat Briefing Monthly Cyber Threat Briefing January 2016 1 Presenters David Link, PM Risk and Vulnerability Assessments, NCATS Ed Cabrera: VP Cybersecurity Strategy, Trend Micro Jason Trost: VP Threat Research, ThreatStream

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan

Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan Attachment 1 to Appendix 2 Risk Assessment Security Report for the Networx Security Plan DRAFT December 13, 2006 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203

More information

Rev.1 Solution Brief

Rev.1 Solution Brief FISMA-NIST SP 800-171 Rev.1 Solution Brief New York FISMA Cybersecurity NIST SP 800-171 EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical

More information

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

3 rd Party Certification of Compliance with MA: 201 CMR 17.00 3 rd Party Certification of Compliance with MA: 201 CMR 17.00 The purpose of this document is to certify the compliance of Strategic Information Resources with 201 CMR 17.00. This law protects the sensitive

More information

Wireless Security Access Policy and Agreement

Wireless Security Access Policy and Agreement Wireless Security Access Policy and Agreement Purpose The purpose of this policy is to define standards, procedures, and restrictions for connecting to Fort Valley State University s internal network(s)

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

Application for connection to YJS CUG and Hub (v6.0)

Application for connection to YJS CUG and Hub (v6.0) Application for connection to YJS CUG and Hub (v6.0) Name of Local Authority / Applicant organisation Contact Name Position Address Telephone: E-Mail I/We wish to apply for connectivity to the Youth Justice

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

Part 11 Compliance SOP

Part 11 Compliance SOP 1.0 Commercial in Confidence 16-Aug-2006 1 of 14 Part 11 Compliance SOP Document No: SOP_0130 Prepared by: David Brown Date: 16-Aug-2006 Version: 1.0 1.0 Commercial in Confidence 16-Aug-2006 2 of 14 Document

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE Aeronautical Telecommunication Network Implementation Coordination Group (ATNICG) ASIA/PAC RECOMMENDED SECURITY CHECKLIST September 2009

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم بنام خدا تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم امنیت بخشی به سیستمهای فناوری اطالعات Securing Information Systems 1 Learning Objectives Describe the business value of security and control.

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved. Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

PA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite

PA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite for Sage MAS 90 and 200 ERP Versions 4.30.0.18 and 4.40.0.1 and Sage MAS 90 and 200 Extended Enterprise Suite Versions 1.3 with Sage MAS 90 and 200 ERP 4.30.0.18 and 1.4 with Sage MAS 90 and 200 ERP 4.40.0.1

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard Systems Security Standard ( v3.2) Page 1 of 11 Version and Ownership Version Date Author(s) Comments 0.01 26/9/2016

More information

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

Payment Card Industry Internal Security Assessor: Quick Reference V1.0 PCI SSC by formed by: 1. AMEX 2. Discover 3. JCB 4. MasterCard 5. Visa Inc. PCI SSC consists of: 1. PCI DSS Standards 2. PA DSS Standards 3. P2PE - Standards 4. PTS (P01,HSM and PIN) Standards 5. PCI Card

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,

More information

5. Execute the attack and obtain unauthorized access to the system.

5. Execute the attack and obtain unauthorized access to the system. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

Remote Access Policy

Remote Access Policy Remote Consulting Group Policy 1.0 1234 Main Street Version 1.0 Philadelphia, PA 19000 1213 www.rcg.com 1. Overview Remote Access Policy Remote Access allows Remote Consulting Group (RCG) to leverage the

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information