Information Security Management System ISO/IEC 27001:2013
|
|
- Earl Hart
- 5 years ago
- Views:
Transcription
1 Information Security Management System ISO/IEC 27001:2013 CAPACITY MANAGEMENT POLICY For PTM Use Only Date: 25 th Feb 2015 Written By: Asiah Abu Samah Pengerusi Jawatankuasa Pengguna ISMS Verified By: Haslina Abd Hamid Wakil Pengurusan Keselamatan Maklumat (ISMR) Approved By: Dr David Pengarah Pusat Teknologi Maklumat
2 Revision History Date of No Change 1 1st October 2014 Description Page Version Approved By Remove MS from Front Page. Front 1.1 Dr David Page 2 25 th Nov 2014 Inserted TERHAD logo Header 1.2 Dr David 3 25 th Nov 2014 Updated policy statements 3, Dr David 4 25 th Feb 2015 Updated scope statement to include SAN storage Dr David 5 25 th Feb 2015 Updated section 4.0 to include SAN storage Dr David FOR DEPARTMENT USE ONLY Page 1 of 4
3 1.0 Purpose Capacity Management ensures that Capacity and Performance of the IT Infrastructure in UM Centre For Information Technology (PTM) matches the evolving demands of UM s business in the most cost-effective and timely manner. Capacity Management requires a solid understanding of the university s service needs, PTM s current service capability and the underlying IT Infrastructure (the means of service delivery), and is responsible for ensuring that all current and future capacity related requirements demanded by the university are provided by PTM in a timely and cost effective manner. Capacity management addresses the Availability component of Information Security Management Scope 1.1 Objectives The goal of capacity management is to ensure availability of services and it s performance. This applies to all core services provided by PTM which includes internet services, critical servers and core network equipment: 2.1 Critical Network Equipment (eg: supercore switches, firewalls, DHCP servers, network appliances, etc) 2.2 Monitoring systems (eg: RIIL, Nagios) 2.3 Critical servers 2.4 Backup system 2.5 SAN Storage This document is limited to those ICT equipment in PTM and does not cover other resources like People, Processes and Financials. FOR DEPARTMENT USE ONLY Page 2 of 4
4 3.0 Roles and Responsibilities 3.1 PTM Director Responsible in delivering & ensuring capacity management is in place PTM Director shall be the reviewer of PTM s Capacity Management. 3.2 Network Responsible in assessing network needs and provide the required resources to fulfill the capacity 3.3 Data Centre Responsible for assessing servers and backup capacity to fulfill UM ICT requirement. 3.4 Management Iiformation System (MIS) 4.0 Capacity Activities Provide requirement (input/feedback) as per plan to Network and Data centre heads to facilitate capacity planning. 4.1 Capacity Review Refer Capacity Review Procedure 4.2 Monitoring Capacity Management Planning shall be done on an annual basis. The utilization of each resource and service shall be monitored on monthly basis. FOR DEPARTMENT USE ONLY Page 3 of 4
5 4.3 Analyze While monitoring, the collected data is analyzed to determine whether threshold need to be readjusted, resources to be tuned or capacity to be increased/decreased. In the event capacity needs to be increased and results in financial implication, it needs to be escalated to head of division/ PTM Director. Sample of resources monitored and analyzed are: a) Memory usage ( AverageThreshold 70%) b) CPU (Average Threshold 70%) c) Hard disk usage (Average Threshold 70%) d) Network bandwidth (AverageThreshold 50%) Please find enclosed Appendix threshold for SAN storage 4.4 Change Initiation Once the threshold is reached (average for the month), analysis must be done & appropriate action must be taken. FOR DEPARTMENT USE ONLY Page 4 of 4
Information Security Management System ISO/IEC 27001:2013
Information Security Management System ISO/IEC 27 001:2013 Information Security Management System ISO/IEC 27001:2013 For PTM Use Only Date: 7 th June 2017 Written By: Dr Kanmani Munusamy, Marina Mansor
More informationInformation Security Management System ISO/IEC 27001:2013
Information Security Management System ISO/IEC 27001:2013 WEB HOSTING POLICY For PTM Use Only Date: 18 th Nov 2016 Written By: Junnaini Ismun Ketua Bahagian Pengurusan Pusat Data, PTM Verified By: Nor
More informationInformation Security Management System ISO/IEC 27001:2013
Information Security Management System ISO/IEC 27001:2013 OF ICT FACILITIES PENGGUNAAN KEMUDAHAN ICT For PTM Use Only Date: 7 th June Written By: Junnaini Ismun Pengerusi Jawatankuasa ISMS Verified By:
More informationInformation Security Management System ISO/IEC 27001:2013
Information Security Management System ISO/IEC 27001:2013 POLISI PEMINDAHAN & PELUPUSAN For PTM Use Only Date: 25 th Nov 2014 Written By: Nor ain Mohamed Ketua Bahagian Infrastruktur ICT Verified By: Haslina
More informationIM Misrouted Ticket Process
Purpose: The purpose of this document is to define the process and tasks associated when a Tier 2/3 team is assigned a ticket by the Service Desk that is not their responsibility. The goals of this process
More informationitsmf Annual Conference 2012
itsmf Annual Conference 2012 Applying ITIL to Cloud Computing Mr. HP Suen Director itsmf International Executive Board Agenda Definition of Cloud Computing On-demand self service Pool of resources Pre-production
More informationService Description CloudCore
CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service
More informationEnd User Terminal Service
Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationMcGill University Virtualization Service Description and Service Level Agreement
McGill University Virtualization Service Description and Service Level Agreement Document Control Revision No. Document Control Date Description Approved By 1.0 January 19, 2007 Creation of the document
More informationKENYA ACCREDITATION SERVICE
KENAS-POL-004 02 06/08/2018 06/09/2018 POL 1 of 5 Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Document. Authored by ASSISTANT DIRECTOR
More informationISO & ISO & ISO Cloud Documentation Toolkit
ISO & ISO 27017 & ISO 27018 Cloud ation Toolkit Note: The documentation should preferably be implemented order in which it is listed here. The order of implementation of documentation related to Annex
More informationSERVICE DESCRIPTION ISO Lex. Certifications
SERVICE DESCRIPTION Lex ISO/IEC 20000-1 INFORMATION TECHNOLOGY - SERVICE MANAGEMENT SYSTEM Companies of any size rely on effective IT service management. No matter where you re based or what you do, your
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationVoluntary Product Accessibility Template (VPAT ) WCAG Edition. About This Document. Version 2.2 July 2018
This document is broken into two main sections: Voluntary Product Accessibility Template (VPAT ) WCAG Edition Version 2.2 July 2018 About This Document...1 Essential Requirements and Best Practices for
More informationOperating Level Agreement
IT Applications with Critical Service Levels Dispatch and Compliance Monitoring (DCM) Attachment B: Appendix B2.8 Document Change Management Version Date Short Description V1.0 Nov 18, 2005 Initial Draft
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationJoint Task Force District-Wide 40J Technology Program Monthly Status Update
Los Angeles Community College District PROGRAM MANAGEMENT SERVICES Joint Task Force District-Wide 40J Technology Program Monthly Status Update Build-LACCD IT PMO 01/31/2017 40J Technology Agenda 40J Technology
More informationTIMICO LIMITED SERVICE SPECIFIC SCHEDULES
TOTAL HOSTING DEFINITIONS In this Service Specific Schedule, the following expressions shall have the following meaning unless the context otherwise requires: Compute Data Centre Infrastructure Data Centre
More informationEuropean Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number:
EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Immigration Portal Development Case Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by:
More informationOperating Level Agreement
IT Application with Critical Service Level Distribution Analysis & Design (DAD) Attachment B: Appendix B 2.2 Document Change Management Version Date Short Description V1.0 Nov 18, 2005 Initial Draft V1.2
More informationEngineering Document Control
Division / Business Unit: Function: Document Type: Enterprise Services All Disciplines Procedure Engineering Document Control Applicability ARTC Network Wide SMS Publication Requirement Internal / External
More informationResearch of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)
Research of Personnel 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the coordination of interfaces in complex large scale
More informationASD CERTIFICATION REPORT
ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon
More informationHPE 3PAR Performance and Capacity Trending Service
Data sheet HPE 3PAR Performance and Capacity Trending Service HPE Lifecycle Event Services HPE 3PAR Performance and Capacity Trending Service provides data collection, analysis, and reports with key performance
More informationContinual Improvement of Data Centre Energy Performance
Continual Improvement of Data Centre Energy Performance Solutions for maintaining ISO 50001 certification Mike Gilmore, e-ready Building Limited Mike Gilmore Standards Activities Member - JTC1 SC25 WG3
More informationOracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018
Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationLeveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009
Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009
More informationUNECE DETA Deployment Feasibility Study
Document Date Department/Name 30/05/2011 ISU/HV UNECE DETA Deployment Feasibility Study Project Initiation Documentation Document Location The source of the document will be found in [TBD] Document History
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationAccreditation Criteria For Conformity Assessment Bodies
Page 1 of 8 Reviewed by: Getnet Tsigemalak Approved by: Araya Fesseha Position: Quality Manager Position: Director General Signature: Signature: Contents Page 1 Purpose and Scope... 2 2 References... 2
More informationAUDIT OF ICT STRATEGY IMPLEMENTATION
APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken
More informationThe Pursuit of ISO/IEC 27001:2005 Certification. Joan Ross, CISSP, NSA IEM Moss Adams LLP
The Pursuit of ISO/IEC 27001:2005 Certification Joan Ross, CISSP, NSA IEM Moss Adams LLP When you think of compliance, what comes to mind? The Compliance Paradigm Game...test your knowledge for fun and
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationCouncil, 26 March Information Technology Report. Executive summary and recommendations. Introduction
Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration
More informationCCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune.
Sanjay Kumar Swami Email: Sanjay.swami@hotmail.com Cell +91-8105959777 Pune OBJECTIVE: IT NETWORK Professional Summary OBJECTIVE Intend to build a challenging career in a professionally managed, progressive
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationData Governance Framework
Data Governance Framework Purpose This document describes the data governance framework for University of Saskatchewan (U of S) institutional data. It identifies designated roles within the university
More informationService Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)
Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service
More informationUsing ITIL to Measure Your BCP
Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP
More informationDetermining Best Fit for ITIL Implementation
Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationSC27 WG4 Mission. Security controls and services
copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial
More informationITIL Capacity Management Deep Dive
ITIL Capacity Management Deep Dive Chris Molloy IBM Distinguished Engineer International Business Machines Agenda IBM Global Services ITIL Business Model ITIL Architecture ITIL Capacity Management Introduction
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationWeb Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012
Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2
More informationTitle: CAPACITY PLANNING - SERVER/HOST INFORMATION FORM
POLICY: In order to accurately compute capacity of each mainframe/midrange/server for the Capacity Plan, a Server/Host Information Form is to be filled out for each existing server or host managed by MS.
More informationREPORT 2015/186 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective
More informationTiscali Business Services Wholesale IPVPN Services Summary
Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.
More informationFedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide. Version 1.2
FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide Version 1.2 October 21, 2016 FedRAMP POA&M Template Completion Guide v1.1 September 1, 2015 Document Revision History Date Description
More informationHostname System Configuration Documentation
Hostname System Configuration Documentation Version 0.0 25-Jan-18 Delivered January 25, 2018 Version 0.0 By: Gary Neshanian (consultant) Nish Consulting 2336 Elden Ave., Suite G Costa Mesa, CA 92627 Phone
More informationI. Tariff language for Transmission Losses Applied to Monthly Reported Network Loads: (for tariff)
I. Tariff language for Transmission Losses Applied to Monthly Reported Network Loads: (for tariff) * MISO will add the underlined text provided by the Owners Committee to Section 34.2 of the Tariff with
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationUse of Mobile Devices on Voice and Data Networks Policy
World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by
More informationHetch Hetchy Water and Power of the City and County of San Francisco. Joint Transmission Planning Base Case Preparation Process
California Independent System Operator & Hetch Hetchy Water and Power of the City and County of San Francisco Joint Transmission Planning Base Case Preparation Process This is a living document. Please
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY POLICY
BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...
More information1 SAP HANA Remote Monitoring
Page 1 of 5 Service Description: Cisco Managed for Data Center: SAP HANA Technology Addendum to Cisco Managed for Enterprise Common Service Description This document referred to as a Technology Addendum
More informationInformation technology Security techniques Information security controls for the energy utility industry
INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques
More informationOn the EGI Operational Level Agreement Framework
EGI-InSPIRE On the EGI Operational Level Agreement Framework Tiziana Ferrari, EGI.eu EGI Chief Operations Officer 1 Outline EGI and its ecosystem EGI Service Infrastructure Operational level agreements
More informationEU Code of Conduct on Data Centre Energy Efficiency
EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all
More informationSupervisory Control and Data Acquisition (SCADA) Performance Criteria Transmission Maintenance Procedure No. 6
Supervisory Control and Data Acquisition (SCADA) Performance Criteria Transmission Maintenance Procedure No. 6 Version 3 Effective Date 10/17/2017 Approved by: Transmission Maintenance Coordination Committee
More informationNorthwestern University Collaboration Services
Information Technology Northwestern University Collaboration Services Project Has Been Completed Status Period Period Start Date: 2/13/2012 Period End Date: 5/04/2012 Cost performance 0% under budget Schedule
More informationDATA BACKUP AND RECOVERY POLICY
DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...
More informationStruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits
- 1 - StruxureWare TM DC Operation Periodic Maintenance Service Integration Service Statement Of Work 1. Executive summary StruxureWare TM Data Center Operation Periodic Maintenance Table of Contents 1.0
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More informationAndrew Durant/Ellen Sullivan
AGENDA ITEM: 3.5 INFORMATION MANAGEMENT, TECHNOLOGY AND GOVERNANCE COMMITTEE DATE OF MEETING: 2 OCTOBER 2018 Subject : Approved and Presented by: Prepared by: Other Committees and meetings considered at:
More informationVMware vcloud Air SOC 1 Control Matrix
VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a
More informationUniversity of Hawaii Hosted Website Service
University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationCABINET PLANNING SYSTEM PROCUREMENT
Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt
More informationTurn-key Vulnerability Management
Turn-key Vulnerability Management Security Manager The solution for IT security in your organisation Security issues: How many? Where are they? How can I correct them? Compliance: Has it been achieved
More informationCompany X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.
Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...
More informationPolicies and Procedures Date: February 28, 2012
No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...
More informationFedRAMP JAB P-ATO Vulnerability Scan Requirements Guide. Version 1.0
FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide Version 1.0 May 27, 2015 Document Revision History Date Version Page(s) Description Author May 27, 2015 1.0 All Initial Version C. Andersen June
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationAGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE
AGENDA ITEM: 3.4 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE DATE OF MEETING: 3 MAY 2018 Subject: Approved and Presented by: Prepared by: Other Committees and meetings considered at: Considered
More informationVMware vsphere 6.5/6.0 Ultimate Bootcamp
VMware vsphere 6.5/6.0 Ultimate Bootcamp Class Duration 5 Days Introduction This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter
More informationIntermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership
CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that
More informationPassword Standard. Suzanne Baker Version Effective Date 7/12/2013 Last Updated 7/12/2013
Password Standard Responsible Parties Prepared By Document Version Number Phone Number Suzanne Baker Version 1.1 314-977-4185 Effective Date 7/12/2013 Last Updated 7/12/2013 Department(s) Responsible ITGS:IT
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F
ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:
More informationICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
More informationSecurity Driven Compliance
Security Driven Compliance Using the FFIEC Cybersecurity Assessment Effectively Presented by Bryan Boam Azureity, Inc. Agenda Who is Azureity? Compliance Driven Security - Traditional Security Model Azureity
More informationNHS WALES INFORMATICS SERVICE DATA QUALITY ASSURANCE NATIONAL STATISTICS
NHS WALES INFORMATICS SERVICE DATA QUALITY ASSURANCE NATIONAL STATISTICS Version: 2.0 Date: 3 rd November 2016 Document History Document Location The source of the document will be found on the Programme
More informationITD SERVER MANAGEMENT PROCEDURE
ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update
More informationHITSP/T16. October 15, 2007 Version 1.1. Healthcare Information Technology Standards Panel. Security and Privacy Technical Committee.
October 15, 2007 Version 1.1 HITSP/T16 Submitted to: Healthcare Information Technology Standards Panel Submitted by: Security and Privacy Technical Committee 20071015 V1.1 D O C U M E N T C H A N G E H
More informationSMO Appendix 1: Terms of Reference (22 March 2018)
SMO 2017-06 Appendix 1: Terms of Reference (22 March 2018) ABOUT SCA The Swedish Committee for Afghanistan (SCA) is an aid organisation that has worked in Afghanistan since 1982. We carry out development
More informationAustralian Standard. Industrial automation systems and integration Open systems application integration framework
AS ISO 15745.2 2004 ISO 15745-2:2003 AS ISO 15745.2 Australian Standard Industrial automation systems and integration Open systems application integration framework Part 2: Reference description for ISO
More informationLOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU
LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE Loughborough University (LU) Research Office SOP 1027 LU Process for Writing Study Protocols for NHS Research Sponsored by Loughborough
More informationSOUTH AFRICAN NATIONAL STANDARD
ISBN 978-0-626-34280-7 ISO 9004:2009 SOUTH AFRICAN NATIONAL STANDARD Managing for the sustained success of an organization A quality management approach This national standard is the identical implementation
More informationAccreditation programme for management systems certification bodies NAR IRT Edition 2
Accreditation programme for management systems certification bodies NAR-01-04-IRT Edition 2 Approved by: Csaba Bodroghelyi Deputy Director General Responsible for preparation: Consistency of content reviewed
More informationVoluntary Product Accessibility Template (VPAT ) Revised Section 508 Edition. About This Document. Version 2.2 July 2018
Voluntary Product Accessibility Template (VPAT ) Edition Version 2.2 July 2018 About This Document...1 Essential Requirements and Best Practices for Information & Communications Technology (ICT) Vendors...3
More information2014 Bond Technology Update Progress of the Technology Network Infrastructure Upgrades Long Range Planning Committee March 4, 2015
2014 Bond Technology Update Progress of the Technology Network Infrastructure Upgrades Long Range Planning Committee March 4, 2015 2014 Bond Technology Update Progress of the Technology Network Infrastructure
More informationSOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)
Name of Institution SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Bid Number SALB 2019/01/01 A Description ICT Disaster Recovery and ICT Business Continuity Services to SALB Date Published 20/03/2019 Closing
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More information