SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

Size: px
Start display at page:

Download "SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2"

Transcription

1 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information, please contact your Client Manager. 2. SERVICE DEFINITION 2.1 Service Overview Safecom provides organisations with managed security services, which secure communications between them and the Internet, including web browsing, secure , and remote access. Safecom service comprises a suite of security focused in-cloud hosted solutions, delivered primary through Spark Digital s centralised security infrastructure, support and management systems. It provides effective, robust protection for the organisations around-the-clock, wherever in the world users are located. Safecom SecureWeb allows you to manage your people s access to websites by blocking viruses and malware, as well applying your business s acceptable use and other policies through flexible policy-enforcement options. Whether you want to block access to non-business sites or allow access with auditing for misuse, Safecom SecureWeb will protect your people and business from internet-borne threats. By analysing browsing and internet traffic, Safecom SecureWeb prevents people accessing disreputable sites and by scanning content, it prevents threats and viruses entering your network. The Safecom SecureWeb Custom offers a balanced range of standard and optional features, combining flexibility of active concurrent users and the scalability of malware protection. The service is able to optionally provide: Multisite Proxy Redundancy in Wellington and Auckland for clients wishing to have some geographic diversity with their upstream proxy connection, as well Content Caching, Own Access Logs and Unique IP Address Allocation for a better and safer end user experience. 2.2 Standard Service Features The key standard features of our SecureWeb Custom service are: Connection type to Spark Digital via Internet SecureWeb is accessed via the client Internet. Connection type to Spark Digital via WAN SecureWeb is accessed via the client WAN. Commercial in Confidence Page 1 of 8

2 2.3 Optional Service Features The key optional features of our SecureWeb Custom service to be selected from are: Content Caching Caching is enabled to ensure high performance of frequently accessed sites. Client-Initiated Failover Ability Provides the client with access to a secondary proxy platform in another geographic location. It offers an extra level of resilience achieved via the client s located & implemented, DNS-based failover. Own Access Logs Access logs will be filtered to exclusively contain the client s data, these are then made available via a secure download server for the client to download and manipulate at their leisure, with their reporting tool of choice. This is a chargeable option. Unique IP Address Allocation Ability to assign a unique Internet facing IP address to a particular client. 2.4 Service Management Safecom is managed and supported by the Security Operations Centre (SOC), 24 hours x 7 days per week, 365 days per year, and includes: A dedicated service support desk number 0800 SAFECOM ( ) is available to centralise all s. Requests may also be logged via Hosted.servicedesk@sparkdigital.co.nz Monitoring Safecom components to detect and monitor suspicious usage activity. Where required, managing any security events that occur by taking action such as blocking unauthorised traffic, tracing malicious activity and escalating illegal activity to the authorities. Configuring all Safecom components. Providing proactive support for alarm events. Providing second level support to clients. Providing access to online reports and any other monthly reports. Network management systems. Formal change control processes are used to manage changes. Problem management to ensure clients are aware of any current issues that may impact them. Commercial in Confidence Page 2 of 8

3 2.5 Service Implementation We will carry out the following implementation activities: Our Activities Technical Pre-Sales Client s Activities Scope pre-implementation work and estimate costs. Define contractual pre implementation fee. Additional design and consultation prior to implementation (client cost). Provide accurate information for Business and Technical requirements. Sign-off the Spark Digital s Safecom Service Schedule. Plan Work with the client to complete the Technical Specification for the required services. Complete Statement of Work. Provide input into the Technical Specification. Provide information relating to configuration to enable seamless access to Safecom services. Ensure skilled technical expertise available to assist the On Boarding team during the integration phases. Develop a test plan to set the criteria for successful implementation of all functionality. Agree and sign-off the Statement of Work. Configure and Test Provision Safecom network and firewall elements. Configure Safecom devices as per the agreed Technical Specification. Test with client to ensure all services and full connectivity is available. Configure any internal devices to allow required connectivity to Safecom services e.g. routers, servers, and workstations. Provide skills to diagnose integration issues that arise within the client s environment. Test all services according to test plan. Integration Completion Work with client to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. For any additional client requirements outside the contract, ensure a signed Contract Variation is received Handover to SOC (Security Operations Centre) Ensure client is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Commercial in Confidence Page 3 of 8

4 3. RESPONSIBILITIES 3.1 Service Boundaries The following service boundaries apply to Safecom SecureWeb: Internal Boundary the internal boundary is defined as the client facing WAN port that is the interface between the Client Network and the Essentials border. External Boundary the external boundary is defined as the Internet facing port that is the interface between the Spark Digital Service Delivery Platform and the Internet. Some examples of functions that fall outside of these service boundaries include: Configuration and support of Client Network components including mail servers, workstations, and network systems (routers, switches etc.). Configuration and support of Internet systems external to the Spark Digital Service Delivery Platform such as web sites, servers, search engines etc. On-site support this is not provided as part of Safecom services, but can be provided if required through the Spark Digital professional services group. 3.2 Client Responsibilities a) It is the Client s responsibility to: (i) comply with our Acceptable Use Policy (AUP) as set out at Appendix 1, when using the services. We may change the AUP from time to time as required to protect the integrity of the service, or ensure services can continue to be delivered to all of our clients. (ii) provide first level support for their users, to diagnose problems and provide assistance where required. If further assistance is required from Safecom support, this should be coordinated and managed through the client s first level support help desk. Safecom support is not able to provide direct support for end-users. (iii) define a security border for the Client Network. This defines what components of the Client Network are trusted. The security border is the edge of the Client Network, where all external un-trusted communication, including communication to suppliers, partners, external organisations, remote access connections or the Internet would occur. All un-trusted connections should be controlled by Safecom. (iv) perform detailed configuration and testing of client components outside of the service boundaries that is for all components within the trusted Client Network. (v) provide security within your security border, including but not limited to: physical security, including physical access to premises and access to computer systems. security for trusted servers, applications, desktop computing devices, notebook and other mobile or remote computing devices, including: o o o securing configurations and user authentication to servers, applications and other devices. virus scanning of all servers and workstations (as well as regularly updating virus definitions). strong encryption and password access to laptop and other mobile or remote computing devices. (vi) secure disposal of sensitive material, including password lists, computer configurations etc. Commercial in Confidence Page 4 of 8

5 (vii) user acceptance policies that are given to end-users, clearly defining the user s responsibilities (such as not divulging usernames and passwords) and how the services are to be used. It is important to cover issues such as privacy of and web content, which can be inspected and monitored using Spark Digital s Safecom service. (viii) provide appropriate disaster recovery planning within the Client Network. (ix) provide Client Network support personnel, including: an administrator or support person to communicate promptly with the Safecom helpdesk when issues arise. a technical resource that is able to work with the Safecom Implementation engineer and who is capable of performing the necessary tasks on the client s site for service implementations. The technical resource will ideally be a system administrator, who is technically skilled and understands IP routing. If the client does not have a suitable resource available, then this will impact proposed costs and time frames for implementation of the solution. (x) the Safecom service permits traffic to enter through Safecom security systems but by-pass Safecom's well-secured proxies and authentication systems. Destination devices within the Client network are not hidden behind Safecom s shared global source IP address. Address translation to a public IP address is used, but the address is exclusively used for the client s host server, which could assist potential hackers to locate it. (xi) client s devices are protected by Safecom s stateful hardened security systems, restricted port and IP parameters, and expert central management of rules that govern which pinholes are created. Safecom s intrusion detection systems monitor for suspicious traffic on the associated port and the firewall restricts the type of traffic permitted. This lowers the client s risk of an attack; however, permitting inbound traffic exposes specific client devices and applications. It is therefore, recommended that the client keep abreast of current known security issues for exposed applications and servers through this service. An example could be a host server exposing a custom website through Microsoft Internet Information Server (IIS). A new security issue may arise that permits attacks through the HTTP protocol to the host server. Until a patch is released and applied by the client, their host server running IIS will be vulnerable. Safecom s internal security model requires all devices that communicate externally to be hardened and monitored. In the case of restricted inbound access, the exposed host servers belong to the client and are not in Safecom s administrative or service boundary. The client must therefore, take responsibility for securing these devices, for example, removal of services not in use. The client acknowledges that lock-down is not in Safecom s direct control and as such, risks exist. (xii) servers and host systems that are accessible from this service should: be configured with hardened operating systems (e.g. services not in use are removed and security patches loaded). If possible, the system should be dedicated to external access and should not be used for internal resources. be kept up to date with the latest vendor supplied security patches provided for the operating system and applications. If these systems are not kept up to date with security patches and updates, there is a significant risk that they could still be compromised through the Safecom Restricted Inbound service. be kept up to date with antivirus software and updates. be located in a separate network zone or segmented from the rest of the client s internal network. This is to ensure that the impact of any possible compromise of a server is limited and does not affect the rest of the client s internal network. A design engineer can assist if the client requires a Safecom DMZ port where the client s servers are isolated from their internal network by Safecom Firewalls. have server logs checked regularly for suspicious activity. Commercial in Confidence Page 5 of 8

6 4. SERVICE TARGETS This section lists the following: Incident Priority Matrix impact and urgency criterion tables. Functional performance targets performance targets of the service itself. Service delivery performance targets performance targets for Spark Digital s delivery of the service. Provisioning/change performance targets performance targets for Spark Digital s implementation of and changes to the service. 4.1 Incident Priority Matrix Incident priority is determined from a combination of Impact and Urgency, as described below. Impact is the effect of the Incident on the client s business, measured by the number of the client s users and the extent of the Client s ICT Infrastructure that is affected. Urgency indicates the speed of action required, the degree to which the business can bear a delay in resolution and the availability of a Workaround or Fix. Priority considers impact and urgency. Priority = Impact & Urgency Impact Urgency P1 P1 P2 P2 2 P1 P2 P2 P3 3 P2 P2 P3 P3 4 P2 P3 P3 P4 Impact Description 1 - Enterprise Impact to all users at multiple client sites Impact to a critical site, system or service 2 - Site/Dept Impact to all users at a single client site Impact to all users in one department 3 - Multiple Users Impact to multiple users at several sites Impact to multiple users at one site 4 - One User Impact to a single user Impact occurred once only Urgency Description 1 - Critical Will have serious impact on client business if not resolved within P1 target timeframe 2 - High Will have serious impact on client business if not resolved within P2 target timeframe 3 - Average Will have serious impact on client business if not resolved within P3 target timeframe 4 - Low Will not have serious impact on client business Commercial in Confidence Page 6 of 8

7 4.2 Functional Performance Targets Service Attribute Attribute Definition Performance Target Maintenance Window The period when routine maintenance can be undertaken on the Service Delivery Platform. The weekly maintenance window for the platform is between 2:00 a.m. to 7:00 a.m. Sunday (NZST). Note: Service Delivery Platform (SDP) is the Spark Digital s cloud delivery fabric comprising a set of components that provide a services delivery architecture, such as service creation, session control, and protocols for cloud-enabled services. 4.3 Service Delivery Performance Targets Service Attribute Attribute Definition Performance Target Alarm Notification Billing Enquiry Response Call Reception Planned Outage Notification Initial Restoration Update Service Restoration Progress Update The elapsed time between a serviceimpacting alarm occurrence and the client being notified that it has occurred and is being investigated or has been resolved. The elapsed time between Spark Digital receiving a billing enquiry and Spark Digital providing a response to the enquiry. The elapsed time for the Safecom helpdesk to answer incoming telephone calls from clients to 0800 SAFECOM ( ). Elapsed time between advising client of a planned outage and the planned outage commencement. The elapsed time between Call Reception or alarm occurrence and the client being notified that initial diagnosis is completed. Frequency of updates to the client on the status of service restoration activity. Within 30 minutes of alarm occurrence. Single account, with account arrears less than 90 days: Within 48 hours. Multiple accounts, or account arrears more than 90 days: By agreement. 80% of calls are answered within 20 seconds during Call Reception Hours. Planned outages during Maintenance Window: within 5 Business Days. Planned outages outside of Maintenance Window: within 10 Business Days. Emergency planned outages: as much notice as possible. Within 60 minutes. An estimated restore time will be provided, if known. Priority 1: hourly during Service Restoration Hours unless otherwise agreed. Commercial in Confidence Page 7 of 8

8 Service Attribute Attribute Definition Performance Target Return to Operation (Remote) The elapsed time between call reception or alarm occurrence and confirmation to the client that service has been restored where service restoration is able to effected remotely. Priority 1: within 4 Service Restoration Hours. Priority 2: within 8 Service Restoration Hours. Priority 3: within 48 Service Restoration Hours. Priority 4: as agreed with client. Notes: 1. Call Reception Hours are 24x7 incl. public holidays. 2. Service Restoration Hours are 24x7 incl. public holidays. 3. Business Day Hours are 7am 7pm Mon to Fri, excl. public holidays. 4.4 Provisioning/Change Targets Service Attribute Attribute Definition Performance Target Assessment of initial Assessment Completion Advice of Delivery Timeframe Advice of Ready for Testing Closure Provisioning Targets Change to Scope / Add Service Notes: The elapsed time from receipt of a and confirmation of the class of to the client. The elapsed time between a Service Request being received and advice of an initial assessment. If possible, an expected delivery date/time for the change will be confirmed. The elapsed time between a Change Request being received and assessed as being Simple, Complex or a Project, and advising the expected delivery date for the change. The elapsed time between the change being completed and advising that it is ready for testing by the client. The elapsed time between advising that a change is ready for testing by the client and the change request being closed. The deliverables and timeframes are to be agreed between both parties and written into the Statement of Work. Adjust and agree timeframes and deliverables in the Statement of Work, or initiate a Contract Variation and new Statement of Work where required. 1. Call Reception Hours are 24x7 incl. public holidays. 2. Service Fulfilment Hours are 24x7 incl. public holidays. Within 2 Service Fulfilment Hours. Within 48 hours. As agreed in discussion with requestor. Within 24 hours. After 5 days. Meet timeframes for deliverables as agreed in the Statement of Work. Meet timeframes for deliverables as agreed in the Statement of Work. Commercial in Confidence Page 8 of 8

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

ONE OFFICE LITE - PRODUCT SPECIFICATION

ONE OFFICE LITE - PRODUCT SPECIFICATION 1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your

More information

Service Description Safecom Simple Mail Relay Version 3.5

Service Description Safecom Simple Mail Relay Version 3.5 Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Online Services Security v2.1

Online Services Security v2.1 Online Services Security v2.1 Contents 1 Introduction... 2 2... 2 2.1... 2 2.2... 2 2.3... 3 3... 4 3.1... 4 3.2... 5 3.3... 6 4... 7 4.1... 7 4.2... 7 4.3... 7 4.4... 7 4.5... 8 4.6... 8 1 Introduction

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

METRO LAN EXTENSION - PRODUCT SPECIFICATION

METRO LAN EXTENSION - PRODUCT SPECIFICATION METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Secure Managed Firewall

Secure Managed Firewall Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION

ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Equipment IP Telephony Service. If you require more detailed technical information, please contact

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013 Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal

More information

IT Service Level Agreement

IT Service Level Agreement The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS WORKING TOGETHER FOR THE COMMUNITY// F1 Solutions is committed to providing positive change in our community. That is why we offer more than a service, it

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information

Security. ITM Platform

Security. ITM Platform Security ITM Platform Contents Contents... 0 1. SaaS and On-Demand Environments... 1 1.1. ITM Platform configuration modes... 1 1.2. Server... 1 1.3. Application and Database... 2 1.4. Domain... 3 1.5.

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

DISCLOSURE STATEMENT PREPARED BY

DISCLOSURE STATEMENT PREPARED BY DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Virtual Server Service

Virtual Server Service ITS Service Level Agreement February 2016 Virtual Server Service What is a Virtual Server? A virtual server (also known as a virtual machine ) is a server that runs on shared physical equipment. Usually,

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

E FAX - PRODUCT SPECIFICATION

E FAX - PRODUCT SPECIFICATION E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Requirements for IT Infrastructure

Requirements for IT Infrastructure Requirements for IT Infrastructure This information contained in this document is taken from the NCSC Website directly via: https://www.cyberessentials.ncsc.gov.uk/requirements-for-it-infrastructure.html

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes

More information

Guide to cyber security/cip specifications and requirements for suppliers. September 2016

Guide to cyber security/cip specifications and requirements for suppliers. September 2016 Guide to cyber security/cip specifications and requirements for suppliers September 2016 Introduction and context The AltaLink cyber security/cip specification and requirements for suppliers (the standard)

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

Cyber Essentials. Requirements for IT Infrastructure. QG Adaption Publication 25 th July 17

Cyber Essentials. Requirements for IT Infrastructure. QG Adaption Publication 25 th July 17 Cyber Essentials Requirements for IT Infrastructure NCSC Publication 6 th February 17 QG Adaption Publication 25 th July 17 Document No. BIS 14/696/1.2 Requirements for IT Infrastructure Specifying the

More information

ICT Security Policy. ~ 1 od 21 ~

ICT Security Policy. ~ 1 od 21 ~ ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

MigrationWiz Security Overview

MigrationWiz Security Overview MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

DHIS2 Hosting Proposal

DHIS2 Hosting Proposal www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines

2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines 2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 D 13 B 14 C

More information

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Seven Habits of Cyber Security for SMEs Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Security Policy is an important

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

WAN/MPLS SLA Fault Reporting

WAN/MPLS SLA Fault Reporting WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name

More information

TRACKVIA SECURITY OVERVIEW

TRACKVIA SECURITY OVERVIEW TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

LOGmanager and PCI Data Security Standard v3.2 compliance

LOGmanager and PCI Data Security Standard v3.2 compliance LOGmanager and PCI Data Security Standard v3.2 compliance Whitepaper how deploying LOGmanager helps to maintain PCI DSS regulation requirements Many organizations struggle to understand what and where

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information