SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
|
|
- Maurice Booker
- 5 years ago
- Views:
Transcription
1 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information, please contact your Client Manager. 2. SERVICE DEFINITION 2.1 Service Overview Safecom provides organisations with managed security services, which secure communications between them and the Internet, including web browsing, secure , and remote access. Safecom service comprises a suite of security focused in-cloud hosted solutions, delivered primary through Spark Digital s centralised security infrastructure, support and management systems. It provides effective, robust protection for the organisations around-the-clock, wherever in the world users are located. Safecom SecureWeb allows you to manage your people s access to websites by blocking viruses and malware, as well applying your business s acceptable use and other policies through flexible policy-enforcement options. Whether you want to block access to non-business sites or allow access with auditing for misuse, Safecom SecureWeb will protect your people and business from internet-borne threats. By analysing browsing and internet traffic, Safecom SecureWeb prevents people accessing disreputable sites and by scanning content, it prevents threats and viruses entering your network. The Safecom SecureWeb Custom offers a balanced range of standard and optional features, combining flexibility of active concurrent users and the scalability of malware protection. The service is able to optionally provide: Multisite Proxy Redundancy in Wellington and Auckland for clients wishing to have some geographic diversity with their upstream proxy connection, as well Content Caching, Own Access Logs and Unique IP Address Allocation for a better and safer end user experience. 2.2 Standard Service Features The key standard features of our SecureWeb Custom service are: Connection type to Spark Digital via Internet SecureWeb is accessed via the client Internet. Connection type to Spark Digital via WAN SecureWeb is accessed via the client WAN. Commercial in Confidence Page 1 of 8
2 2.3 Optional Service Features The key optional features of our SecureWeb Custom service to be selected from are: Content Caching Caching is enabled to ensure high performance of frequently accessed sites. Client-Initiated Failover Ability Provides the client with access to a secondary proxy platform in another geographic location. It offers an extra level of resilience achieved via the client s located & implemented, DNS-based failover. Own Access Logs Access logs will be filtered to exclusively contain the client s data, these are then made available via a secure download server for the client to download and manipulate at their leisure, with their reporting tool of choice. This is a chargeable option. Unique IP Address Allocation Ability to assign a unique Internet facing IP address to a particular client. 2.4 Service Management Safecom is managed and supported by the Security Operations Centre (SOC), 24 hours x 7 days per week, 365 days per year, and includes: A dedicated service support desk number 0800 SAFECOM ( ) is available to centralise all s. Requests may also be logged via Hosted.servicedesk@sparkdigital.co.nz Monitoring Safecom components to detect and monitor suspicious usage activity. Where required, managing any security events that occur by taking action such as blocking unauthorised traffic, tracing malicious activity and escalating illegal activity to the authorities. Configuring all Safecom components. Providing proactive support for alarm events. Providing second level support to clients. Providing access to online reports and any other monthly reports. Network management systems. Formal change control processes are used to manage changes. Problem management to ensure clients are aware of any current issues that may impact them. Commercial in Confidence Page 2 of 8
3 2.5 Service Implementation We will carry out the following implementation activities: Our Activities Technical Pre-Sales Client s Activities Scope pre-implementation work and estimate costs. Define contractual pre implementation fee. Additional design and consultation prior to implementation (client cost). Provide accurate information for Business and Technical requirements. Sign-off the Spark Digital s Safecom Service Schedule. Plan Work with the client to complete the Technical Specification for the required services. Complete Statement of Work. Provide input into the Technical Specification. Provide information relating to configuration to enable seamless access to Safecom services. Ensure skilled technical expertise available to assist the On Boarding team during the integration phases. Develop a test plan to set the criteria for successful implementation of all functionality. Agree and sign-off the Statement of Work. Configure and Test Provision Safecom network and firewall elements. Configure Safecom devices as per the agreed Technical Specification. Test with client to ensure all services and full connectivity is available. Configure any internal devices to allow required connectivity to Safecom services e.g. routers, servers, and workstations. Provide skills to diagnose integration issues that arise within the client s environment. Test all services according to test plan. Integration Completion Work with client to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. For any additional client requirements outside the contract, ensure a signed Contract Variation is received Handover to SOC (Security Operations Centre) Ensure client is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Commercial in Confidence Page 3 of 8
4 3. RESPONSIBILITIES 3.1 Service Boundaries The following service boundaries apply to Safecom SecureWeb: Internal Boundary the internal boundary is defined as the client facing WAN port that is the interface between the Client Network and the Essentials border. External Boundary the external boundary is defined as the Internet facing port that is the interface between the Spark Digital Service Delivery Platform and the Internet. Some examples of functions that fall outside of these service boundaries include: Configuration and support of Client Network components including mail servers, workstations, and network systems (routers, switches etc.). Configuration and support of Internet systems external to the Spark Digital Service Delivery Platform such as web sites, servers, search engines etc. On-site support this is not provided as part of Safecom services, but can be provided if required through the Spark Digital professional services group. 3.2 Client Responsibilities a) It is the Client s responsibility to: (i) comply with our Acceptable Use Policy (AUP) as set out at Appendix 1, when using the services. We may change the AUP from time to time as required to protect the integrity of the service, or ensure services can continue to be delivered to all of our clients. (ii) provide first level support for their users, to diagnose problems and provide assistance where required. If further assistance is required from Safecom support, this should be coordinated and managed through the client s first level support help desk. Safecom support is not able to provide direct support for end-users. (iii) define a security border for the Client Network. This defines what components of the Client Network are trusted. The security border is the edge of the Client Network, where all external un-trusted communication, including communication to suppliers, partners, external organisations, remote access connections or the Internet would occur. All un-trusted connections should be controlled by Safecom. (iv) perform detailed configuration and testing of client components outside of the service boundaries that is for all components within the trusted Client Network. (v) provide security within your security border, including but not limited to: physical security, including physical access to premises and access to computer systems. security for trusted servers, applications, desktop computing devices, notebook and other mobile or remote computing devices, including: o o o securing configurations and user authentication to servers, applications and other devices. virus scanning of all servers and workstations (as well as regularly updating virus definitions). strong encryption and password access to laptop and other mobile or remote computing devices. (vi) secure disposal of sensitive material, including password lists, computer configurations etc. Commercial in Confidence Page 4 of 8
5 (vii) user acceptance policies that are given to end-users, clearly defining the user s responsibilities (such as not divulging usernames and passwords) and how the services are to be used. It is important to cover issues such as privacy of and web content, which can be inspected and monitored using Spark Digital s Safecom service. (viii) provide appropriate disaster recovery planning within the Client Network. (ix) provide Client Network support personnel, including: an administrator or support person to communicate promptly with the Safecom helpdesk when issues arise. a technical resource that is able to work with the Safecom Implementation engineer and who is capable of performing the necessary tasks on the client s site for service implementations. The technical resource will ideally be a system administrator, who is technically skilled and understands IP routing. If the client does not have a suitable resource available, then this will impact proposed costs and time frames for implementation of the solution. (x) the Safecom service permits traffic to enter through Safecom security systems but by-pass Safecom's well-secured proxies and authentication systems. Destination devices within the Client network are not hidden behind Safecom s shared global source IP address. Address translation to a public IP address is used, but the address is exclusively used for the client s host server, which could assist potential hackers to locate it. (xi) client s devices are protected by Safecom s stateful hardened security systems, restricted port and IP parameters, and expert central management of rules that govern which pinholes are created. Safecom s intrusion detection systems monitor for suspicious traffic on the associated port and the firewall restricts the type of traffic permitted. This lowers the client s risk of an attack; however, permitting inbound traffic exposes specific client devices and applications. It is therefore, recommended that the client keep abreast of current known security issues for exposed applications and servers through this service. An example could be a host server exposing a custom website through Microsoft Internet Information Server (IIS). A new security issue may arise that permits attacks through the HTTP protocol to the host server. Until a patch is released and applied by the client, their host server running IIS will be vulnerable. Safecom s internal security model requires all devices that communicate externally to be hardened and monitored. In the case of restricted inbound access, the exposed host servers belong to the client and are not in Safecom s administrative or service boundary. The client must therefore, take responsibility for securing these devices, for example, removal of services not in use. The client acknowledges that lock-down is not in Safecom s direct control and as such, risks exist. (xii) servers and host systems that are accessible from this service should: be configured with hardened operating systems (e.g. services not in use are removed and security patches loaded). If possible, the system should be dedicated to external access and should not be used for internal resources. be kept up to date with the latest vendor supplied security patches provided for the operating system and applications. If these systems are not kept up to date with security patches and updates, there is a significant risk that they could still be compromised through the Safecom Restricted Inbound service. be kept up to date with antivirus software and updates. be located in a separate network zone or segmented from the rest of the client s internal network. This is to ensure that the impact of any possible compromise of a server is limited and does not affect the rest of the client s internal network. A design engineer can assist if the client requires a Safecom DMZ port where the client s servers are isolated from their internal network by Safecom Firewalls. have server logs checked regularly for suspicious activity. Commercial in Confidence Page 5 of 8
6 4. SERVICE TARGETS This section lists the following: Incident Priority Matrix impact and urgency criterion tables. Functional performance targets performance targets of the service itself. Service delivery performance targets performance targets for Spark Digital s delivery of the service. Provisioning/change performance targets performance targets for Spark Digital s implementation of and changes to the service. 4.1 Incident Priority Matrix Incident priority is determined from a combination of Impact and Urgency, as described below. Impact is the effect of the Incident on the client s business, measured by the number of the client s users and the extent of the Client s ICT Infrastructure that is affected. Urgency indicates the speed of action required, the degree to which the business can bear a delay in resolution and the availability of a Workaround or Fix. Priority considers impact and urgency. Priority = Impact & Urgency Impact Urgency P1 P1 P2 P2 2 P1 P2 P2 P3 3 P2 P2 P3 P3 4 P2 P3 P3 P4 Impact Description 1 - Enterprise Impact to all users at multiple client sites Impact to a critical site, system or service 2 - Site/Dept Impact to all users at a single client site Impact to all users in one department 3 - Multiple Users Impact to multiple users at several sites Impact to multiple users at one site 4 - One User Impact to a single user Impact occurred once only Urgency Description 1 - Critical Will have serious impact on client business if not resolved within P1 target timeframe 2 - High Will have serious impact on client business if not resolved within P2 target timeframe 3 - Average Will have serious impact on client business if not resolved within P3 target timeframe 4 - Low Will not have serious impact on client business Commercial in Confidence Page 6 of 8
7 4.2 Functional Performance Targets Service Attribute Attribute Definition Performance Target Maintenance Window The period when routine maintenance can be undertaken on the Service Delivery Platform. The weekly maintenance window for the platform is between 2:00 a.m. to 7:00 a.m. Sunday (NZST). Note: Service Delivery Platform (SDP) is the Spark Digital s cloud delivery fabric comprising a set of components that provide a services delivery architecture, such as service creation, session control, and protocols for cloud-enabled services. 4.3 Service Delivery Performance Targets Service Attribute Attribute Definition Performance Target Alarm Notification Billing Enquiry Response Call Reception Planned Outage Notification Initial Restoration Update Service Restoration Progress Update The elapsed time between a serviceimpacting alarm occurrence and the client being notified that it has occurred and is being investigated or has been resolved. The elapsed time between Spark Digital receiving a billing enquiry and Spark Digital providing a response to the enquiry. The elapsed time for the Safecom helpdesk to answer incoming telephone calls from clients to 0800 SAFECOM ( ). Elapsed time between advising client of a planned outage and the planned outage commencement. The elapsed time between Call Reception or alarm occurrence and the client being notified that initial diagnosis is completed. Frequency of updates to the client on the status of service restoration activity. Within 30 minutes of alarm occurrence. Single account, with account arrears less than 90 days: Within 48 hours. Multiple accounts, or account arrears more than 90 days: By agreement. 80% of calls are answered within 20 seconds during Call Reception Hours. Planned outages during Maintenance Window: within 5 Business Days. Planned outages outside of Maintenance Window: within 10 Business Days. Emergency planned outages: as much notice as possible. Within 60 minutes. An estimated restore time will be provided, if known. Priority 1: hourly during Service Restoration Hours unless otherwise agreed. Commercial in Confidence Page 7 of 8
8 Service Attribute Attribute Definition Performance Target Return to Operation (Remote) The elapsed time between call reception or alarm occurrence and confirmation to the client that service has been restored where service restoration is able to effected remotely. Priority 1: within 4 Service Restoration Hours. Priority 2: within 8 Service Restoration Hours. Priority 3: within 48 Service Restoration Hours. Priority 4: as agreed with client. Notes: 1. Call Reception Hours are 24x7 incl. public holidays. 2. Service Restoration Hours are 24x7 incl. public holidays. 3. Business Day Hours are 7am 7pm Mon to Fri, excl. public holidays. 4.4 Provisioning/Change Targets Service Attribute Attribute Definition Performance Target Assessment of initial Assessment Completion Advice of Delivery Timeframe Advice of Ready for Testing Closure Provisioning Targets Change to Scope / Add Service Notes: The elapsed time from receipt of a and confirmation of the class of to the client. The elapsed time between a Service Request being received and advice of an initial assessment. If possible, an expected delivery date/time for the change will be confirmed. The elapsed time between a Change Request being received and assessed as being Simple, Complex or a Project, and advising the expected delivery date for the change. The elapsed time between the change being completed and advising that it is ready for testing by the client. The elapsed time between advising that a change is ready for testing by the client and the change request being closed. The deliverables and timeframes are to be agreed between both parties and written into the Statement of Work. Adjust and agree timeframes and deliverables in the Statement of Work, or initiate a Contract Variation and new Statement of Work where required. 1. Call Reception Hours are 24x7 incl. public holidays. 2. Service Fulfilment Hours are 24x7 incl. public holidays. Within 2 Service Fulfilment Hours. Within 48 hours. As agreed in discussion with requestor. Within 24 hours. After 5 days. Meet timeframes for deliverables as agreed in the Statement of Work. Meet timeframes for deliverables as agreed in the Statement of Work. Commercial in Confidence Page 8 of 8
Service Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationONE OFFICE LITE - PRODUCT SPECIFICATION
1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your
More informationService Description Safecom Simple Mail Relay Version 3.5
Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationNEN The Education Network
NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationOnline Services Security v2.1
Online Services Security v2.1 Contents 1 Introduction... 2 2... 2 2.1... 2 2.2... 2 2.3... 3 3... 4 3.1... 4 3.2... 5 3.3... 6 4... 7 4.1... 7 4.2... 7 4.3... 7 4.4... 7 4.5... 8 4.6... 8 1 Introduction
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationMETRO LAN EXTENSION - PRODUCT SPECIFICATION
METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationBusiness Continuity and Disaster Recovery
Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationSEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy
Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationTrust Services Principles and Criteria
Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationSecure Managed Firewall
Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION
ENTERPRISE IP TELEPHONY - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Equipment IP Telephony Service. If you require more detailed technical information, please contact
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationInformation backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013
Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal
More informationIT Service Level Agreement
The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationControls Electronic messaging Information involved in electronic messaging shall be appropriately protected.
I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationRADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE
ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationQUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS
QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS WORKING TOGETHER FOR THE COMMUNITY// F1 Solutions is committed to providing positive change in our community. That is why we offer more than a service, it
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)
ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access
More informationSecurity. ITM Platform
Security ITM Platform Contents Contents... 0 1. SaaS and On-Demand Environments... 1 1.1. ITM Platform configuration modes... 1 1.2. Server... 1 1.3. Application and Database... 2 1.4. Domain... 3 1.5.
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationDISCLOSURE STATEMENT PREPARED BY
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationVirtual Server Service
ITS Service Level Agreement February 2016 Virtual Server Service What is a Virtual Server? A virtual server (also known as a virtual machine ) is a server that runs on shared physical equipment. Usually,
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationE FAX - PRODUCT SPECIFICATION
E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationSecure Access & SWIFT Customer Security Controls Framework
Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationRequirements for IT Infrastructure
Requirements for IT Infrastructure This information contained in this document is taken from the NCSC Website directly via: https://www.cyberessentials.ncsc.gov.uk/requirements-for-it-infrastructure.html
More informationSCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017
SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationService Level Agreement (SLA) and Service Level Objectives (SLO)
Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3
More informationInformation Security Controls Policy
Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes
More informationGuide to cyber security/cip specifications and requirements for suppliers. September 2016
Guide to cyber security/cip specifications and requirements for suppliers September 2016 Introduction and context The AltaLink cyber security/cip specification and requirements for suppliers (the standard)
More informationPTS Customer Protection Agreement
PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationCyber Essentials. Requirements for IT Infrastructure. QG Adaption Publication 25 th July 17
Cyber Essentials Requirements for IT Infrastructure NCSC Publication 6 th February 17 QG Adaption Publication 25 th July 17 Document No. BIS 14/696/1.2 Requirements for IT Infrastructure Specifying the
More informationICT Security Policy. ~ 1 od 21 ~
ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationMigrationWiz Security Overview
MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationSecurity Principles for Stratos. Part no. 667/UE/31701/004
Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED
More information2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines
2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 D 13 B 14 C
More informationSecurity Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management
Seven Habits of Cyber Security for SMEs Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Security Policy is an important
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationWAN/MPLS SLA Fault Reporting
WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationLOGmanager and PCI Data Security Standard v3.2 compliance
LOGmanager and PCI Data Security Standard v3.2 compliance Whitepaper how deploying LOGmanager helps to maintain PCI DSS regulation requirements Many organizations struggle to understand what and where
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationPayment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationI. PURPOSE III. PROCEDURE
A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks
More informationTECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT
TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More information