Cyber Security Supply Chain Risk Management Plans

Size: px
Start display at page:

Download "Cyber Security Supply Chain Risk Management Plans"

Transcription

1 ERO Enterprise-Endrsed Implementatin Guidance. Endrsement fr this implementatin guidance is based n the language f draft 2 f the CIP Reliability Standard dated April Any changes t the standard prir t the final ballt will require a reevaluatin f the implementatin guidance fr cntinued endrsement. Cyber Security Supply Chain Risk Management Plans Implementatin Guidance fr CIP NERC Reprt Title Reprt Date I

2 Table f Cntents Intrductin... iii Requirement R1...1 General Cnsideratins fr R1...1 Implementatin Guidance fr R1...2 Requirement R2...8 General Cnsideratins fr R2...8 Requirement R3...9 General Cnsideratins fr R3...9 Implementatin Guidance fr R3...9 References ii

3 Intrductin On July 21, 2016, the Federal Energy Regulatry Cmmissin (FERC) issued Order N. 829 directing the Nrth American Electric Reliability Crpratin (NERC) t develp a new r mdified Reliability Standard that addresses cyber security supply chain risk management fr industrial cntrl system hardware, sftware, and cmputing and netwrking services assciated with Bulk Electric System (BES) peratins as fllws: [The Cmmissin directs] NERC t develp a frward-lking, bjective-based Reliability Standard t require each affected entity t develp and implement a plan that includes security cntrls fr supply chain management fr industrial cntrl system hardware, sftware, and services assciated with bulk electric system peratins. The new r mdified Reliability Standard shuld address the fllwing security bjectives, [discussed in detail in the Order]: (1) sftware integrity and authenticity; (2) vendr remte access; (3) infrmatin system planning; and (4) vendr risk management and prcurement cntrls. Reliability Standard CIP Cyber Security Supply Chain Risk Management addresses the relevant cyber security supply chain risks in the planning, acquisitin, and deplyment phases f the system life cycle fr high and medium impact BES Cyber Systems 1. This implementatin guidance prvides cnsideratins fr implementing the requirements in CIP and examples f appraches that respnsible entities culd use t meet the requirements. The examples d nt cnstitute the nly apprach t cmplying with CIP Respnsible Entities may chse alternative appraches that better fit their situatin. 1 Respnsible Entities identify high and medium impact BES Cyber Systems accrding t the identificatin and categrizatin prcess required by CIP-002-5, r subsequent versin f that standard. iii

4 Requirement R1 R1. Each Respnsible Entity shall develp ne r mre dcumented supply chain cyber security risk management plan(s) fr high and medium impact BES Cyber Systems. The plan(s) shall include: 1.1. One r mre prcess(es) used in planning fr the prcurement f BES Cyber Systems t identify and assess cyber security risk(s) t the Bulk Electric System frm vendr prducts r services resulting frm: (i) prcuring and installing vendr equipment and sftware; and (ii) transitins frm ne vendr(s) t anther vendr(s) One r mre prcess(es) used in prcuring BES Cyber Systems that address the fllwing, as applicable: Ntificatin by the vendr f vendr-identified incidents related t the prducts r services prvided t the Respnsible Entity that pse cyber security risk t the Respnsible Entity; Crdinatin f respnses t vendr-identified incidents related t the prducts r services prvided t the Respnsible Entity that pse cyber security risk t the Respnsible Entity; Ntificatin by vendrs when remte r nsite access shuld n lnger be granted t vendr representatives; Disclsure by vendrs f knwn vulnerabilities; Verificatin f sftware integrity and authenticity f all sftware and patches prvided by the vendr fr use in the BES Cyber System; and Crdinatin f cntrls fr (i) vendr-initiated Interactive Remte Access, and (ii) system-t-system remte access with a vendr(s). General Cnsideratins fr R1 The fllwing are sme general cnsideratins fr Respnsible Entities as they implement Requirement R1: First, in develping their supply chain cyber security risk management plan(s), Respnsible entities shuld cnsider hw t leverage the varius cmpnents and phases f their prcesses (e.g. defined requirements, request fr prpsal, bid evaluatin, external vendr assessment tls and data, third party certificatins and audit reprts, etc.) t help them meet the bjective f Requirement R1 and give them flexibility t negtiate cntracts with vendrs t efficiently mitigate risks. Fcusing slely n the negtiatin f specific cntract terms culd have unintended cnsequences, including significant and unexpected cst increases fr the prduct r service r vendrs refusing t enter int cntracts. Additinally, a Respnsible Entity may nt have the ability t btain each f its desired cyber security cntrls in its cntract with each f its vendrs. Factrs such as cmpetitin, limited supply surces, expense, criticality f the prduct r service, and maturity f the vendr r prduct line culd affect the terms and cnditins ultimately negtiated by the parties and included in a cntract. This variatin in cntract terms is anticipated and, in turn, the nte in Requirement R2 prvides that the actual terms and cnditins f the cntract are utside the scpe f Reliability Standard CIP Nte: Implementatin f the plan des nt require the Respnsible Entity t renegtiate r abrgate existing cntracts (including amendments t master agreements and purchase rders). Additinally, the 1

5 Requirement R1 fllwing issues are beynd the scpe f Requirement R2: (1) the actual terms and cnditins f a prcurement cntract; and (2) vendr perfrmance and adherence t a cntract. The fcus f Requirement R1 is n the steps the Respnsibility Entity takes t cnsider cyber security risks frm vendr prducts r services during BES Cyber System planning and prcurement. In the event the vendr is unwilling t engage in the negtiatin prcess fr cyber security cntrls, the Respnsible Entity culd explre ther surces f supply r mitigating cntrls t reduce the risk t the BES cyber systems, as the Respnsible Entity s circumstances allw. In develping and implementing its supply chain cyber security risk management plan, a Respnsible Entity may cnsider identifying and priritizing security cntrls based n the cyber security risks presented by the vendr and the criticality f the prduct r service t reliable peratins. Fr instance, Respnsible Entities may establish a baseline set f cntrls fr given prducts r services that a vendr must meet prir t transacting with that vendr fr thse prducts and services (i.e., must-have cntrls ). As risks differ between prducts and services, the baseline security cntrls r must haves may differ fr the varius prducts and services the Respnsible Entities prcures fr its BES Cyber Systems. This risk-based apprach culd help create efficiencies in the Respnsible Entity s prcurement prcesses while meeting the security bjectives f Requirement R1. The bjective f addressing the verificatin f sftware integrity and authenticity during the prcurement phase f BES Cyber System(s) (Part 1.2.5) is t identify the capability f the vendr(s) t ensure that the sftware installed n BES Cyber System(s) is trustwrthy. Part is nt an peratinal requirement fr Respnsible Entities t perfrm the verificatin; instead, Part is aimed at identifying during the prcurement phase the vendr s capability t prvide sftware integrity and authenticity assurance and establish vendr perfrmance based n the vendr s capability in rder t implement CIP-010-3, Requirement R1, Part 1.6. Implementatin Guidance fr R1 Respnsible entities use varius prcesses as they plan t prcure BES Cyber Systems. Belw are sme examples f appraches t cmply with this requirement: R1. Each Respnsible Entity shall develp ne r mre dcumented supply chain cyber security risk management plan(s) fr high and medium impact BES Cyber Systems. The plan(s) shall include: The Respnsible Entity culd establish ne r mre dcuments explaining the prcess by which the Respnsible Entity will address supply chain cyber security risk management fr high and medium impact BES Cyber Systems. T achieve the flexibility needed fr supply chain cyber security risk management, Respnsible Entities can use a risk-based apprach. One element f, r apprach t, a risk-based cyber security risk management plan is system-based, fcusing n specific cntrls fr high and medium impact BES Cyber Systems t address the risks presented in prcuring thse systems r services fr thse systems. A risk-based apprach culd als be vendr-based, fcusing n the risks psed by varius vendrs f its BES Cyber Systems. Entities may cmbine bth f these appraches int their plans. This flexibility is imprtant t accunt fr the varying needs and characteristics f respnsible entities and the diversity f BES Cyber System envirnments, technlgies, and risk (FERC Order N. 829 P 44) One r mre prcess(es) used in planning fr the prcurement f BES Cyber Systems t identify and assess cyber security risk(s) t the Bulk Electric System frm vendr prducts r services resulting frm: (i) prcuring and installing vendr equipment and sftware; and (ii) transitins frm ne vendr(s) t anther vendr(s). 2

6 Requirement R1 A Respnsible Entity culd dcument in its supply chain cyber security risk management plan ne r mre prcesses that it will use when planning fr the prcurement f BES Cyber Systems t identify and assess cyber security risks t the Bulk Electric System frm vendr prducts r services as specified in the requirement. Examples f prcesses, r utcmes f these prcesses, fr cmplying with Part 1.1 are described belw. A Respnsible Entity culd cmply with Part 1.1 using either the first (team review) apprach, r the secnd (risk assessment prcess) apprach, a cmbinatin f the tw appraches, r anther apprach determined by the Respnsible Entity t cmply with Part 1.1. A Respnsible Entity can develp a prcess t frm a team f subject matter experts frm acrss the rganizatin t participate in the BES Cyber System planning and acquisitin prcess(es). The Respnsible Entity shuld cnsider the relevant subject matter expertise necessary t meet the bjective f Part 1.1 and include the apprpriate representatin f business peratins, security architecture, infrmatin cmmunicatins and technlgy, supply chain, cmpliance, and legal. Examples f factrs that this team culd cnsider in planning fr the prcurement f BES Cyber Systems as specified in Part 1.1 include: Cyber security risk(s) t the BES that culd be intrduced by a vendr in new r planned mdificatins t BES Cyber Systems. Vendr security prcesses and related prcedures, including: system architecture, change cntrl prcesses, remte access requirements, and security ntificatin prcesses. Peridic review prcesses that can be used with critical vendr(s) t review and assess any changes in vendr s security cntrls, prduct lifecycle management, supply chain, and radmap t identify pprtunities fr cntinuus imprvement. Vendr use f third party (e.g., prduct/persnnel certificatin prcesses) r independent review methds t verify prduct and/r service security practices. Third-party security assessments r penetratin testing prvided by the vendrs. Vendr supply chain channels and plans t mitigate ptential risks r disruptins. Knwn system vulnerabilities; knwn threat techniques, tactics, and prcedures; and related mitigatin measures that culd be intrduced by vendr s infrmatin systems, cmpnents, r infrmatin system services. Crprate gvernance and apprval prcesses. Methds t minimize netwrk expsure, e.g., prevent internet accessibility, use f firewalls, and use f secure remte access techniques. Methds t limit and/r cntrl remte access frm vendrs t Respnsible Entity s BES Cyber Systems. Vendr s risk assessments and mitigatin measures fr cyber security during the planning and prcurement prcess. Mitigating cntrls that can be implemented by the Respnsible Entity f the vendr. Examples include hardening the infrmatin system, minimizing the attack surface, ensuring nging supprt fr system cmpnents, identificatin f alternate surces fr critical cmpnents, etc. A Respnsible Entity can develp a risk assessment prcess t identify and assess ptential cyber security risks resulting frm (i) prcuring and installing vendr equipment and sftware and (ii) transitins frm ne vendr(s) t anther vendr(s). This prcess culd cnsider the fllwing: Ptential risks based n the vendr s infrmatin systems, system cmpnents, and/r infrmatin system services / integratrs. Examples f cnsideratins include: 3

7 Requirement R1 Critical systems, cmpnents, r services that impact the peratins r reliability f BES Cyber Systems. Prduct cmpnents that are nt wned and managed by the vendr that may intrduce additinal risks, such as pen surce cde r cmpnents frm third party develpers and manufacturers. Ptential risks based n the vendr s risk management cntrls. Examples f vendr risk management cntrls t cnsider include 2 : Persnnel backgrund and screening practices by vendrs. Training prgrams and assessments f vendr persnnel n cyber security. Frmal vendr security prgrams which include their technical, rganizatinal, and security management practices. Vendr s physical and cyber security access cntrls t prtect the facilities and prduct lifecycle. Vendr s security engineering principles in (i) develping layered prtectins; (ii) establishing sund security plicy, architecture, and cntrls as the fundatin fr design; (iii) incrprating security requirements int the system develpment lifecycle; (iv) delineating physical and lgical security bundaries; (v) ensuring that system develpers are training n hw t build security sftware; (vi) tailring security cntrls t meet rganizatinal and peratinal needs; (vii) perfrming threat mdeling t identify use cases, threat agents, attack vectrs, and attack patterns as well as cmpensating cntrls and design patterns needed t mitigate risk; and (viii) reducing risk t acceptable levels, thus enabling infrmed risk management decisins. (NIST SP SA-8 Security Engineering Principles). System Develpment Life Cycle prgram (SDLC) methdlgy frm design thrugh patch management t understand hw cyber security is incrprated thrughut the vendr s prcesses. Vendr certificatins and their alignment with recgnized industry and regulatry cntrls. Summary f any internal r independent cyber security testing perfrmed n the vendr prducts t ensure secure and reliable peratins. 3 Vendr prduct radmap describing vendr supprt f sftware patches, firmware updates, replacement parts and nging maintenance supprt. Identify prcesses and cntrls fr nging management f Respnsible Entity and vendr s intellectual prperty wnership and respnsibilities, if applicable. Examples include use f encryptin algrithms fr securing sftware cde, data and infrmatin, designs, and prprietary prcesses while at rest r in transit. Based n risk assessment, identify mitigating cntrls that can be implemented by the Respnsible Entity r the vendr. Examples include hardening the infrmatin system, minimizing the attack surface, ensuring nging supprt fr system cmpnents, identificatin f alternate surces fr critical cmpnents, etc. 2 Tls such as the Standardized Infrmatin Gathering (SIG) Questinnaire frm the Shared Assessments Prgram can aid in assessing vendr risk. 3 Fr example, a Respnsible Entity can request that the vendr prvide a Standards fr Attestatin Engagements (SSAE) N. 18 SOC 2 audit reprt. 4

8 Requirement R One r mre prcess(es) used in prcuring BES Cyber Systems that address the fllwing, as applicable: A Respnsible Entity culd dcument in its supply chain cyber security risk management plan ne r mre prcesses that it will use when prcuring BES Cyber Systems t address Parts thrugh The fllwing are examples f prcesses, r utcmes f these prcesses, fr cmplying with Part 1.2. Request cyber security terms relevant t applicable Parts thrugh in the prcurement prcess (request fr prpsal (RFP) r cntract negtiatin) fr BES Cyber Systems t ensure that vendrs understand the cyber security expectatins fr implementing prper security cntrls thrughut the design, develpment, testing, manufacturing, delivery, installatin, supprt, and dispsitin f the prduct lifecycle 4. During negtiatins f prcurement cntracts r prcesses with vendrs, the Respnsible Entity can dcument the ratinale, mitigating cntrls, r acceptance f deviatins frm the Respnsible Entity s standard cyber security prcurement language that is applicable t the vendr s system cmpnent, system integratrs, r external service prviders. Examples f ways that a Respnsible Entity culd, thrugh prcess(es) fr prcuring BES Cyber Systems required by Part 1.2, cmply with Parts thrugh are described belw Ntificatin by the vendr f vendr-identified incidents related t the prducts r services prvided t the Respnsible Entity that pse cyber security risk t the Respnsible Entity; In an RFP r during cntract negtiatins, request that the vendr include in the cntract prvisins an bligatin fr the vendr t prvide ntificatin f any identified, threatened, attempted r successful breach f vendr s cmpnents, sftware r systems (e.g., security event ) that have ptential adverse impacts t the availability r reliability f BES Cyber Systems. Security event ntificatins t the Respnsible Entity shuld be sent t designated pint f cntact as determined by the Respnsible Entity and vendr. Examples f infrmatin t request that vendr s include in ntificatins t the Respnsible Entity are(i) mitigating cntrls that the Respnsible Entity can implement, if applicable (ii) availability f patch r crrective cmpnents, if applicable Crdinatin f respnses t vendr-identified incidents related t the prducts r services prvided t the Respnsible Entity that pse cyber security risk t the Respnsible Entity; A Respnsible Entity and vendr can agree n service level agreements fr respnse t cyber security incidents and cmmitment frm vendr t cllabrate with the Respnsible Entity in implement mitigating cntrls and prduct crrectins. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr such that, in the event the vendr identifies a vulnerability that has resulted 4 An example set f baseline supply chain cyber security prcurement language fr use by BES wners, peratrs, and vendrs during the prcurement prcess can be btained frm the Cybersecurity Prcurement Language fr Energy Delivery Systems develped by the Energy Sectr Cntrl Systems Wrking Grup (ESCSWG). 5

9 Requirement R1 in a cyber security incident related t the prducts r services prvided t the Respnsible Entity, the vendr shuld prvide ntificatin t Respnsible Entity. The cntract culd specify that the vendr prvide defined infrmatin regarding the prducts r services at risk and apprpriate precautins available t minimize risks. Until the cyber security incident has been crrected, the vendr culd be requested t perfrm analysis f infrmatin available r btainable, prvide an actin plan, prvide nging status reprts, mitigating cntrls, and final reslutin within reasnable perids as agreed n by vendr and Respnsible Entity Ntificatin by vendrs when remte r nsite access shuld n lnger be granted t vendr representatives; In an RFP r during cntract negtiatins, request that the vendr include in the cntract prvisins an bligatin fr the vendr t prvide ntificatin t the Respnsible Entity when vendr emplyee remte r nsite access shuld n lnger be granted. This des nt require the vendr t share sensitive infrmatin abut vendr emplyees. Circumstances fr n lnger granting access t vendr emplyees include: (i) vendr determines that any f the persns permitted access is n lnger required, (ii) persns permitted access are n lnger qualified t maintain access, r (iii) vendr s emplyment f any f the persns permitted access is terminated fr any reasn. Request vendr cperatin in btaining Respnsible Entity ntificatin within a negtiated perid f time f such determinatin. The vendr and Respnsible Entity shuld define alternative methds that will be implemented in rder t cntinue nging peratins r services as needed. If vendr utilizes third parties (r subcntractrs) t perfrm services t Respnsible Entity, require vendrs t btain Respnsible Entity s prir apprval and require third party s adherence t the requirements and access terminatin rights impsed n the vendr directly Disclsure by vendrs f knwn vulnerabilities; In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr fr cperatin in btaining access t summary dcumentatin within a negtiated perid f any identified security breaches invlving the prcured prduct r its supply chain that impact the availability r reliability f the Respnsible Entity s BES Cyber System. Dcumentatin shuld include a summary descriptin f the breach, its ptential security impact, its rt cause, and recmmended crrective actins invlving the prcured prduct. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr fr cperatin in btaining, within a negtiated time perid after establishing apprpriate cnfidentiality agreement, access t summary dcumentatin f uncrrected security vulnerabilities in the prcured prduct that have nt been publicly disclsed. The summary dcumentatin shuld include a descriptin f each vulnerability and its ptential impact, rt cause, and recmmended cmpensating security cntrls, mitigatins, and/r prcedural wrkarunds. During prcurement, review with the vendr summary dcumentatin f publicly disclsed vulnerabilities in the prduct being prcured and the status f the vendr s dispsitin f thse publicly disclsed vulnerabilities Verificatin f sftware integrity and authenticity f all sftware and patches prvided by the vendr fr use in the BES Cyber System; and 6

10 Requirement R1 During prcurement, request access t vendr dcumentatin detailing the vendr patch management prgram and update prcess fr all system cmpnents being prcured (including third-party hardware, sftware, and firmware). This dcumentatin shuld include the vendr s methd r recmmendatin fr hw the integrity f the patch is validated by Respnsible Entity. Ask vendrs t describe the prcesses they use fr delivering sftware and the methds that can be used t verify the integrity and authenticity f the sftware upn receipt, including systems with preinstalled sftware. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr t prvide access t vendr dcumentatin fr the prcured prducts (including third-party hardware, sftware, firmware, and services) regarding the release schedule and availability f updates and patches that shuld be cnsidered r applied. Dcumentatin shuld include instructins fr securely applying, validating and testing the updates and patches. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr t prvide apprpriate sftware and firmware updates t remediate newly discvered vulnerabilities r weaknesses within a reasnable perid fr duratin f the prduct life cycle. Cnsideratin regarding service level agreements fr updates and patches t remediate critical vulnerabilities shuld be a shrter perid than ther updates. If updates cannt be made available by the vendr within a reasnable perid, the vendr shuld be required t prvide mitigatins and/r wrkarunds. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr t prvide fingerprints r cipher hashes fr all sftware s that the Respnsible Entity can verify the values prir t installatin n the BES Cyber System t verify the integrity f the sftware. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr such that when third-party sftware cmpnents are prvided by the vendr, the vendrs prvide apprpriate updates and patches t remediate newly discvered vulnerabilities r weaknesses f the third-party sftware cmpnents Crdinatin f cntrls fr (i) vendr-initiated Interactive Remte Access, and (ii) system-t-system remte access with a vendr(s). During prcurement, request vendrs specify specific IP addresses, prts, and minimum privileges required t perfrm remte access services. Request vendrs use individual user accunts that can be cnfigured t limit access and permissins. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr t maintain their IT assets (hardware, sftware and firmware) cnnecting t Respnsible Entity netwrk with current updates t remediate security vulnerabilities r weaknesses identified by the riginal OEM r Respnsible Entity. During prcurement, request vendrs dcument their prcesses fr restricting cnnectins frm unauthrized persnnel. Vendr persnnel are nt authrized t disclse r share accunt credentials, passwrds r established cnnectins. In an RFP r during cntract negtiatins, request that the vendr include in cntract prvisins a cmmitment frm the vendr such that fr vendr system-t-system cnnectins that may limit the Respnsible Entity s capability t authenticate the persnnel cnnecting frm the vendr s systems, the vendr will maintain cmplete and accurate bks, user lgs, access credential data, recrds, and ther infrmatin applicable t cnnectin access activities fr a negtiated time perid. 7

11 Requirement R2 R2. Each Respnsible Entity shall implement its supply chain cyber security risk management plan(s) specified in Requirement R1. Nte: Implementatin f the plan des nt require the Respnsible Entity t renegtiate r abrgate existing cntracts (including amendments t master agreements and purchase rders). Additinally, the fllwing issues are beynd the scpe f Requirement R2: (1) the actual terms and cnditins f a prcurement cntract; and (2) vendr perfrmance and adherence t a cntract. General Cnsideratins fr R2 Implementatin f the supply chain cyber security risk management plan(s) des nt require the Respnsible Entity t renegtiate r abrgate existing cntracts (including amendments t master agreements and purchase rders), cnsistent with Order N. 829 (P. 36). Cntracts entering the Respnsible Entity's prcurement prcess (e.g. thrugh Request fr Prpsals) n r after the effective date are within scpe f CIP Cntract effective date, cmmencement date, r ther activatin dates specified in the cntract d nt determine whether the cntract is within scpe f CIP

12 Requirement R3 Requirement R3 R3. Each Respnsible Entity shall review and btain CIP Senir Manager r delegate apprval f its supply chain cyber security risk management plan(s) specified in Requirement R1 at least nce every 15 calendar mnths. General Cnsideratins fr R3 In the Requirement R3 review, respnsible entities shuld cnsider new risks and available mitigatin measures, which culd cme frm a variety f surces that include NERC, DHS, and ther surces. Implementatin Guidance fr R3 Respnsible entities use varius prcesses t address this requirement. Belw are sme examples f appraches t cmply with this requirement: A team f subject matter experts frm acrss the rganizatin representing apprpriate business peratins, security architecture, infrmatin cmmunicatins and technlgy, supply chain, cmpliance, legal, etc. reviews the supply chain cyber security risk management plan at least nce every 15 calendar mnths t reassess fr any changes needed. Surces f infrmatin fr changes include, but are nt limited t: Requirements r guidelines frm regulatry agencies Industry best practices and guidance that imprve supply chain cyber security risk management cntrls (e.g. NERC, DOE, DHS, ICS-CERT, Canadian Cyber Incident Respnse Center (CCIRC), and NIST). Mitigating cntrls t address new and emerging supply chain-related cyber security cncerns and vulnerabilities Internal rganizatinal cntinuus imprvement feedback regarding identified deficiencies, pprtunities fr imprvement, and lessns learned. The CIP Senir Manager, r apprved delegate, reviews any changes t the supply chain cyber security risk management plan at least nce every 15 calendar mnths. Reviews may be mre frequent based n the timing and scpe f changes t the supply chain cyber security risk management plan(s). Upn apprval f changes t the supply chain cyber security risk management plan(s), the CIP Senir Manager r apprved delegate shuld prvide apprpriate cmmunicatins t the affected rganizatins r individuals. Additinally, cmmunicatins r training material may be develped t ensure any rganizatinal areas affected by revisins are infrmed. 9

13 References Utilities Technlgy Cuncil (UTC) Cyber Supply Chain Risk management fr Utilities Radmap fr Implementatin ISO/IEC Infrmatin Security in Supplier Relatinships NIST SP Security and Privacy Cntrls fr Federal Infrmatin Systems and Organizatins System and Services Acquisitin SA-3, SA-8 and SA-22 NIST SP Supply Chain Risk Management Practices fr Federal Infrmatin Systems and Organizatins; Energy Sectr Cntrl Systems Wrking Grup (ESCSWG) - Cybersecurity Prcurement Language fr Energy Delivery Systems 10

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

ITIL 2011 Service Offerings and Agreements (SOA)

ITIL 2011 Service Offerings and Agreements (SOA) IT SERVICE MANAGEMENT ITIL 2011 Service Offerings and Agreements (SOA) CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Service Offerings and Agreements (SOA) 5 Days Classrm, Live Virtual Classrm

More information

OBSERVATIONS FROM CYBERSECURITY EXAMINATIONS

OBSERVATIONS FROM CYBERSECURITY EXAMINATIONS By the Office f Cmpliance Inspectins and Examinatins ( OCIE ) 1 This Risk Alert prvides a summary f bservatins Vlume VI, Issue 5 August 7, 2017 frm OCIE s examinatins OBSERVATIONS FROM f registered brkerdealers,

More information

App Center User Experience Guidelines for Apps for Me

App Center User Experience Guidelines for Apps for Me App Center User Experience Guidelines fr Apps fr Me TABLE OF CONTENTS A WORD ON ACCESSIBILITY...3 DESIGN GUIDELINES...3 Accunt Linking Prcess... 3 Cnnect... 5 Accept Terms... 6 Landing Page... 6 Verificatin...

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

John R. Robles CISA, CISM, CRISC

John R. Robles CISA, CISM, CRISC Jhn R. Rbles CISA, CISM, CRISC www.jhnrrbles.cm jrbles@cqui.net 787-647-3961 What is Security as a Service (SecaaS)? Security as a Service is a clud cmputing mdel that Delivers Managed Security Services

More information

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples Quality Excellence fr Suppliers f Telecmmunicatins Frum (QuEST Frum) TL 9000 Quality Management System Measurements Handbk Cpyright QuEST Frum Sftware Fix Quality (SFQ) Examples 8.1 8.1.1 SFQ Example The

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

DELL EMC PERSONALIZED SUPPORT SERVICES

DELL EMC PERSONALIZED SUPPORT SERVICES DELL EMC PERSONALIZED SUPPORT SERVICES Optimize yur Dell EMC investment based n yur unique requirements ESSENTIALS Dell EMC Persnalized Supprt Services: Custmize and enhance yur Dell EMC Custmer Service

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

Rapid Implementation Package

Rapid Implementation Package Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package

More information

UPGRADING TO DISCOVERY 2005

UPGRADING TO DISCOVERY 2005 Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.

More information

McGill University Firewall Sharing Services Service Description and Service Level Agreement. Prepared by Network and Communications Services

McGill University Firewall Sharing Services Service Description and Service Level Agreement. Prepared by Network and Communications Services McGill University Firewall Sharing Services Service Descriptin and Service Level Agreement Prepared by Netwrk and Cmmunicatins Services Revisin Histry Versin Date Summary f changes Apprved by 1.0 February

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

Service Description: Advanced Services Fixed Price

Service Description: Advanced Services Fixed Price Page 1 f 6 Service Descriptin: Advanced Services Fixed Price Cisc WLAN Advise and Implement Services Fixed (ASF-CORE-WLAN) This dcument describes Advanced Services Fixed Price: Cisc WLAN Advise and Implement

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

Digital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles

Digital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles Digital Imaging and Cmmunicatins in Medicine (DICOM) Supplement 204 TLS Security Prfiles Prepared by: DICOM Standards Cmmittee, Wrking Grup 6 1300 N. 17th Street Rsslyn, Virginia 22209 USA VERSION: Public

More information

CA CMDB Connector for z/os

CA CMDB Connector for z/os PRODUCT SHEET: CA CMDB CONNECTOR FOR Z/OS CA CMDB Cnnectr fr z/os CA CMDB Cnnectr fr z/os discvers mainframe cnfiguratin items (CIs) and enables ppulatin f that infrmatin int the CA CMDB repsitry. Designed

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Operational Interaction Forum Terms of Operation. July 2012

Operational Interaction Forum Terms of Operation. July 2012 Operatinal Interactin Frum Terms f Operatin July 2012 NBN C Limited Operatinal Interactin Frum Terms f Operatin July 2012 Versin: 3.0 Dcument Number: NBN-NO-GDE-0022 Cpyright: This dcument is subject t

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

Release Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018

Release Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018 Release Ntes Versin: - v18.13 Fr ClickSftware StreetSmart September 22, 2018 Cpyright Ntice Cpyright 2018 ClickSftware Technlgies Ltd. All rights reserved. N part f this publicatin may be cpied withut

More information

IS315T IS Risk Management and Intrusion Detection [Onsite]

IS315T IS Risk Management and Intrusion Detection [Onsite] IS315T IS Risk Management and Intrusin Detectin [Onsite] Curse Descriptin: This curse addresses cncepts f risk management and intrusin detectin. Areas f instructin include hw t assess and manage risks

More information

Child Care Services Association Request for Proposal Durham PreK Website

Child Care Services Association Request for Proposal Durham PreK Website Child Care Services Assciatin Request fr Prpsal Durham PreK Website Prject Summary Child Care Services Assciatin (CCSA) (Agency) is seeking prpsals frm a firm r individual designer/develper (Vendr) t develp

More information

WELMEC Guide on evaluation of Purely Digital Parts

WELMEC Guide on evaluation of Purely Digital Parts WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides

More information

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY

MHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in

More information

My Performance Management User Guide

My Performance Management User Guide My Perfrmance Management User Guide Overview The accesshr website huses perfrmance management. As an emplyee, yu have the ability t review and acknwledge perfrmance plans and perfrmance evaluatins that

More information

Performance of usage of MindSphere depends on the bandwidth of your internet connection.

Performance of usage of MindSphere depends on the bandwidth of your internet connection. MindSphere MindAccess User Data Sheet MindAccess User prvides yu with an Accunt in rder t access the MindSphere Platfrm. This allws yu t cnfigure Assets and Users, access Applicatins and stre data. Such

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

Wide Area Network (WAN)

Wide Area Network (WAN) Office f Infrmatin Technlgy Services Service Level Agreement Wide Area Netwrk (WAN) January 16, 2014 v2.2 Service Descriptin Wide Area Netwrk (WAN) Service Descriptin The Wide Area Netwrk (WAN) service

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT NetApp Clustered Data ONTAP 8.3.1 28 June 2016 Gvernment f Canada. This dcument is the prperty f the Gvernment f Canada. It shall nt be altered, distributed beynd its

More information

BME Smart-Colo. Smart-Colo is a solution optimized for the colocation of trading applications, built and managed by BME.

BME Smart-Colo. Smart-Colo is a solution optimized for the colocation of trading applications, built and managed by BME. BME Smart-Cl 1. Intrductin The aim f this dcument is t describe the BME Smart-Cl service fr accessing BME Cash, BME Derivative markets and market data feeds. Smart-Cl service prvides at the BME Data Center

More information

Information Security Policy

Information Security Policy Infrmatin Security Plicy Versin: 2.4 Dcument ID: 3541 Cpyright Ntice Cpyright 2015, ehealth Ontari All rights reserved N part f this dcument may be reprduced in any frm, including phtcpying r transmissin

More information

CSPN Security Target. PLC Simatic S range

CSPN Security Target. PLC Simatic S range CSPN Security Target PLC Simatic S7 1500 range Categry Industrial systems: prgrammable lgic cntrller Reference: CSPN-ST-Simatic-S7-1500-Range-1.01 Date: 2017/10/03 Internal cde: SIE009 Cpyright AMOSSYS

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

Request for Proposals (RFP) Bid Reference RFP 2016/DAF/ICT/001 UN CITY ICT BASIC SUPPORT AND OUTSOURCING SERVICES. Annex 1: Terms of Reference

Request for Proposals (RFP) Bid Reference RFP 2016/DAF/ICT/001 UN CITY ICT BASIC SUPPORT AND OUTSOURCING SERVICES. Annex 1: Terms of Reference Request fr Prpsals (RFP) Bid Reference RFP 2016/DAF/ICT/001 UN CITY ICT BASIC SUPPORT AND OUTSOURCING SERVICES Annex 1: Terms f Reference 1 UN CITY ICT BASIC SUPPORT AND OUTSOURCING SERVICES Annex 1 Terms

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

TPCH Data Sharing Policies and Procedures

TPCH Data Sharing Policies and Procedures TPCH Data Sharing Plicies and Prcedures Intrductin: The TPCH Data Sharing Plicies and Prcedures were created based n the CC apprved Pima Cunty: HMIS Data Sharing Plan apprved by TPCH bard n February 24,

More information

A Purchaser s Guide to CondoCerts

A Purchaser s Guide to CondoCerts Lgin t CndCerts - T submit a request with CndCerts, lg n t www.cndcerts.cm. First time users will fllw the New Users link t register. Dcument r print screen the User ID and Passwrd prvided. New accunts

More information

ITIL and ISO20000 Pick One or Use Both? Track: Business Services

ITIL and ISO20000 Pick One or Use Both? Track: Business Services ITIL and ISO20000 Pick One r Use Bth? Track: Business Services Presenter: Mark Thmas Synpsis With the explsive grwth f ITIL as the de fact framewrk fr IT Service, there is still little knwn abut the ISO20000

More information

Universal CMDB. Software Version: Backup and Recovery Guide

Universal CMDB. Software Version: Backup and Recovery Guide Universal CMDB Sftware Versin: 10.32 Backup and Recvery Guide Dcument Release Date: April 2017 Sftware Release Date: April 2017 Backup and Recvery Guide Legal Ntices Warranty The nly warranties fr Hewlett

More information

Service Description: Cisco Preemptive Service

Service Description: Cisco Preemptive Service Page 1 f 6 Service Descriptin: Cisc Preemptive Service This dcument describes the Cisc Preemptive Service fr fllwing technlgies: - Brderless/NGN - Cllabratin - DC clud and VXI - SP Vide - Mbility Related

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

ITD Information Security October 19, 2015

ITD Information Security October 19, 2015 ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office

More information

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website. Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2

More information

Reporting Requirements Specification

Reporting Requirements Specification Cmmunity Mental Health Cmmn Assessment Prject OCAN 2.0 - ing Requirements Specificatin May 4, 2010 Versin 2.0.2 SECURITY NOTICE This material and the infrmatin cntained herein are prprietary t Cmmunity

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

BlackBerry Server Installation and Upgrade Service

BlackBerry Server Installation and Upgrade Service Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute

More information

UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES

UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES PREPARED BY: Market Develpment DOCUMENT REF: VERSION: 1.0 DATE: Nvember 2013 STATUS Draft

More information

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017

EMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017 EMV Terminal Type Apprval Cntactless Prduct Administrative Prcess Versin 2.6 February 2017 Legal Ntice Page i / v Legal Ntice This dcument summarizes EMVC s present plans fr evaluatin services and related

More information

Contingency Planning Template

Contingency Planning Template Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

Service Level Agreement

Service Level Agreement P.O. Bx 4 7 02 La Luc ia Ridge, 4 051 T el: (2 7-31) 5 66 1 525 Fax: (2 7-31) 5 6 6 1 560 Servic e Desk: 0 86 1 10 1061 Service Level Agreement Uniteam Investments 101 (Pty) Ltd Reg N. 2010/009455/07 Lu

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API

More information

What is ITIL and why you should be interested in it

What is ITIL and why you should be interested in it Cnsulting What is ITIL and why yu shuld be interested in it The IT Infrastructure Library explained Authred by Alan Pickering, Tech Partners Cnsulting September, 2003 Intrductin Mst rganisatins that use

More information

Quick Guide on implementing SQL Manage for SAP Business One

Quick Guide on implementing SQL Manage for SAP Business One Quick Guide n implementing SQL Manage fr SAP Business One The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage fr SAP B1 SQL Server databases. SQL Manage is a ttal

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

Custodial Integrator. Release Notes. Version 3.11 (TLM)

Custodial Integrator. Release Notes. Version 3.11 (TLM) Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform Ckbk Qermid Defibrillatr web service Versin 1.01 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument

More information

DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE

DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE WHITE PAPER - DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE ABSTRACT This planning guide discusses guidance fr the varius vcenter Server deplyment ptins supprted n VxRail Appliances. Nvember 2017 TABLE

More information

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE Net1 Mbile Slutins (Pty) Ltd Name: Cmplaint Handling Prcedure Net1 Mbile Slutins (Pty) Ltd COMPLAINT HANDLING PROCEDURE I. General Purpse It is the prcedure f Net1 Mbile Slutins (Pty) Ltd (the Cmpany )

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

Frequently Asked Questions Read and follow all instructions for success!

Frequently Asked Questions Read and follow all instructions for success! Frequently Asked Questins Read and fllw all instructins fr success! Last Updated December 2016. Visit mccartheydressman.rg and click HELP fr updates Apr 16 Jan 14 PREPARE Jan 15 - Apr 15 SUBMIT READ all

More information

What guidelines are available for Sub-editors and Referees?

What guidelines are available for Sub-editors and Referees? What guidelines are available fr Sub-editrs and Referees? A Cmbustin File dwnladed frm the IFRF Online Cmbustin Handbk ISSN 1607-9116 Cmbustin File N: 34 Versin N: 4 Date: 26-01-2004 Authr(s): Surce(s):

More information

S4S Support Services. Audit4 version 14+ Aug Copyright 2017 S4S Pty Ltd. S4S Pty Ltd. Phone: Web:

S4S Support Services. Audit4 version 14+ Aug Copyright 2017 S4S Pty Ltd. S4S Pty Ltd. Phone: Web: S4S Pty Ltd ABN: 26 104 845 909 Phne: 1300 133 308 Web: http://www.s4s.cm.au Audit4 versin 14+ Aug 2018 Cpyright S4S Pty Ltd S4S Supprt prvides cmprehensive services s that yu can get the maximum benefit

More information

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

Iowa State University

Iowa State University Iwa State University Cyber Security Smart Grid Testbed Senir Design, Design Dcument Dec 13-11 Derek Reiser Cle Hven Jared Pixley Rick Suttn Faculty Advisr: Prfessr Manimaran Gvindarasu Table f Cntents

More information

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

NIH Distributed Research Network

NIH Distributed Research Network NIH Distributed Research Netwrk POLICIES AND PROCEDURES 10/23/2013 Table f Cntents 1. Intrductin... 1 1.1 Purpse f this dcument... 1 1.2 Backgrund... 1 2. Organizatinal Structure... 1 3. Rles and Respnsibilities...

More information

Integration Framework for SAP Business One

Integration Framework for SAP Business One Integratin Framewrk fr SAP Business One DIPrxy Cnfiguratin PUBLIC Glbal Rll-ut Octber 2018, B Zha TABLE OF CONTENTS 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 CONFIGURATION... 5 3.1 Services in Service

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

eprocurement Requisition Services Special Request Amount Only

eprocurement Requisition Services Special Request Amount Only Finance and Prcurement Services eprcurement Requisitin Services Special Request Amunt Only Intrductin Fllw this guide t create a requisitin fr a service r cnsultancy frm a supplier where the service r

More information

HP Universal CMDB. Software Version: Backup and Recovery Guide

HP Universal CMDB. Software Version: Backup and Recovery Guide HP Universal CMDB Sftware Versin: 10.21 Backup and Recvery Guide Dcument Release Date: July 2015 Sftware Release Date: July 2015 Backup and Recvery Guide Legal Ntices Warranty The nly warranties fr HP

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

App Orchestration 2.6

App Orchestration 2.6 App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation. CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information