SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open

Similar documents
SECURE CROSS DOMAIN GUARD

APPLICATION DELIVERY AS A SERVICE

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

Clearswift Managed Security Service for

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

UKCLOUD SECURE REMOTE ACCESS

Service Description Safecom Customer Connection Version 3.5

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

BT Compute Protect Schedule to the General Terms

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

Database as a Service (DBaaS) EnterpriseDB

Service Level Agreement Domain Registration Services

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

PEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels

e2e Managed Customer Cloud Infrastructure Service Service Definition Document

Secure Managed Firewall

General Data Protection Regulation

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

BT Assure Cloud Identity Annex to the General Service Schedule

Version 1/2018. GDPR Processor Security Controls

Data Protection and GDPR

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

CAPABILITY STATEMENT

ASD CERTIFICATION REPORT

UNCLASSIFIED. Mimecast UK Archiving Service Description

The Common Controls Framework BY ADOBE

MERAKI SERVICE DESCRIPTION

DHIS2 Hosting Proposal

IBM Security Intelligence on Cloud

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

WORKSHARE SECURITY OVERVIEW

Cloud Services. Infrastructure-as-a-Service

COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)

Service Description: CNS Federal High Touch Technical Support

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

Information Security Controls Policy

IBM Case Manager on Cloud

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

SERVICE SCHEDULE MANAGED DATABASE

Version v November 2015

TIBCO Nimbus Cloud Service. Software Release November 2016

Google Cloud & the General Data Protection Regulation (GDPR)

WHITE PAPER. Title. Managed Services for SAS Technology

TIBCO Nimbus Service

Contents. 1 General Terms. Page 1 of 8

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

IoT & SCADA Cyber Security Services

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

BT One Cloud Cisco UK Schedule to the General Terms

Service Description: Software Support

VMware vcloud Air Accelerator Service

HPE File Data Migration Service

1 Data Center Requirements

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

BT One Mobile Secure Devices (MobileIron) Schedule to the General Terms

Oracle Managed Cloud Services for Oracle Platform as a Service and Infrastructure as a Service - Service Descriptions

WAN/MPLS SLA Fault Reporting

External Supplier Control Obligations. Cyber Security

MyCloud Computing Business computing in the cloud, ready to go in minutes

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Tiscali Business Services Wholesale IPVPN Services Summary

Service Description: Solution Support for Service Provider Software - Preferred This document

Partner Premier Service Program

Managed Security Services - Endpoint Managed Security on Cloud

Services Summary. Deliverables. Location of Services. Services Assumptions & Exclusions. General Project Management

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.

Security Annex for Firewalls Additional Terms for Firewall Service

IBM Resilient Incident Response Platform On Cloud

Office 365. Claranet Service Description

Service Description: Identity Services Engine Implementation-Subscription Service

Version v November 2015

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

A s c e r t i a S u p p o r t S e r v i c e s G u i d e

JT DISASTER RECOVERY TELEPHONY DATA STORE and HOLD SERVICE

ISO27001 Preparing your business with Snare

SECURITY & PRIVACY DOCUMENTATION

What can the OnBase Cloud do for you? lbmctech.com

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

End User Terminal Service

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

ABOUT THIS SECTION...

SLA. Service Level Agreement v1.0. Published: September 2014

IBM Emptoris Managed Cloud Delivery

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

EX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Ethernet DIA SLA Fault Reporting

HPE Proactive 24 Service

locuz.com SOC Services

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

Maintel SIP Trunking Service Description

Transcription:

SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open

Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material may be reproduced or transmitted in any form, or by any means, electronic, mechanical, photocopied, recorded or otherwise or stored in any retrieval system of any nature without the written permission of MDS Technologies Ltd. MDS Technologies Ltd, 2 Methuen Park, Chippenham, Wiltshire, SN14 0GX Telephone: 01225 816220, Fax: 01225 816281 CONTENTS WHY MDS?... 3 SUMMARY OF SERVICE FEATURES... 3 PRODUCT OVERVIEW... 4 PRODUCT FEATURES... 5 BUSINESS BENEFITS... 5 TECHNICAL FEATURES... 6 EXAMPLE USE CASES... 7 INFORMATION ASSURANCE... 8 ON BOARDING AND OFF BOARDING PROCESSES... 8 PRICE MODEL... 10 SERVICE MANAGEMENT... 10 SERVICE CONSTRAINTS... 10 SERVICE LEVELS... 10 ORDERING AND INVOICE PROCESS... 13 SERVICE LEAD TIME... 13 TERMINATION COSTS... 13 BACKUP/RESTORE AND DISASTER RECOVERY... 13 DATA RESTORATION/SERVICE MIGRATION... 13 CUSTOMER RESPONSIBILITIES... 13 TECHNICAL REQUIREMENTS... 14

WHY MDS? A privately owned, UK sovereign company Connected to Internet, JANET, N3, PSN, RLI Public, community and private cloud available Security Cleared technical and customer service staff We are Agile, Flexible, Open, Honest and Transparent We deliver cost effective solutions on time and within budget We are your One-Stop-Shop for secure assured Cloud services A fully managed platform using our ITIL-aligned 24/7 Service Desk Experienced at delivering small, large and complex Cloud solutions We are an SME - large enough to deliver, small enough to care PROFESSIONAL, PERSONALISED SOLUTIONS SUMMARY OF SERVICE FEATURES Secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations without compromising your sensitive data Resilient secure zone gateway provides breach avoidance Content transformation technology protects against zero day attacks Complies with CESG s cross domain sharing architecture patterns AP4/AP14 Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Users held to account for their information sharing activities

PRODUCT OVERVIEW MDS provide a Secure Zone Gateway Service which provides information exchange control when data is moved between security domains. The service simplifies the ability to ensure files are safely transferred, whilst limiting the risk of data inappropriately flowing back in the opposite direction. The service is available to protect a range of file transfer use cases. The service can be tailored to meet an organisation s specific file sharing needs and the associated security accreditation requirements in accordance with its security risk appetite. This puts the organisation in control of what its staff can share and with whom they can share it, maintaining the necessary log data to hold users to account for their decisions/actions. The service also provides a range of optional utilities which facilitate automatic and manually controlled file sharing, through the service. This minimises integration activities and ensures consistent application of an organisation s information sharing policy. A service helpdesk enables the service user organisation to rapidly access policy configuration and operation experts to allow a swift response to any Incidents impacting your organisation s business information sharing. The core service covers the following scope: Provision of a Deep-Secure ix Guard licence for the period of the service Deployment of the software on customer or third party service infrastructure Integration of the Guard with High and Low side infrastructure Configuration of a standard templated Guard policy for permitted information exchanges Service test to ensure correct configuration and integration Service Helpdesk Guard software patch provision Guard software update provision The following additional service options may be chosen: Configuration of a tailored Guard policy for permitted information exchanges which meets the organisations specific information exchange needs Deployment of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Integration of file sharing applications and/or utilities software on High and Low side customer or third party service infrastructure Configuration of file sharing applications and/or utilities software File sharing applications and/or utilities software patch provision File sharing applications and/or utilities software update provision

Guard policy, application and utility configuration and management training Day-to-day Guard administration tasks MDS is a reseller of this Deep Secure service. PRODUCT FEATURES Our Secure Zone Gateway Service has the following key features: A robust security architecture which complies with CESG architecture patterns AP4 and AP14 Content threat removal renders traffic safe using content transformation Two-way configurations for request/response or pull/push exchanges as required Sharing of multiple business information types supported Files email with attachments XML data XMPP Chat SNMP and SYSLOG management information Self-defending security architecture Suitable for protecting Tier 1, Tier 2 and Tier 3 information Fully supports use of Government Security Classifications for information sharing policy Service helpdesk support Named Account Manager The following options may be purchased: File transfer utilities and applications to simplify file transfer capabilities BUSINESS BENEFITS The following business benefits may be achieved: Compliance with HMG Policy, Standards and Legislation Secure cross domain information sharing with customers, suppliers and partners Interact with less trusted organisations without compromising your sensitive data Resilient secure zone gateway provides breach avoidance Content transformation technology protects against zero day attacks Complies with CESG s cross domain sharing architecture patterns AP4 and AP14

Enhanced security operations for remediation and response to attack/compromise Enhanced defence for your critical systems and sensitive information Demonstrable compliance with policy, standards and legislation Simple integration with existing capabilities improves efficiency Users held to account for their information sharing actions TECHNICAL FEATURES The Secure Zone Gateway Service has the following technical features: Protocol Whitelisting HTTP/HTTP(S) SMTP SFTP SYSLOG SNMP XMPP Two way configuration with asymmetric policies for inbound and outbound data for bidirectional application exchanges Integrated data transformation to enhance assurance where file content control is required XML schema validation Handling of encrypted content to enable controlled flow where required e.g. HTTP(S) Information protected in transit between the user and the service infrastructure utilising: TLS for HTTP(S) SNMP V3 encryption for network management Government Security Classification label support for informal (e.g. header, footer, first line of text, XML field) security labels Logging is configurable for both successful and unsuccessful attempts to move data across the Secure Zone Gateway Service The following technical features are available depending on options purchased: File sharing web application Automated file sharing utilities

Figure 1: Secure Zone Gateway Service showing ix Guard EXAMPLE USE CASES This service supports the following information sharing use cases: Controlled flows for asymmetric two-way transfers Tightly flow controlled configurations to support pull/push, request/response or get/set application exchanges where each directional flow is separately configured Cross domain email Verification of email message and any attached files to ensure policy compliance TransGap Personal Quarantine provides repository for original messages on Low side of Gateway Cross domain file transfer Verification of files transferred to ensure policy compliance to include highly assurable data transformation Cross domain Chat services Inspection of simple XMPP-based chat traffic to ensure policy compliance Validated XML schema based application information sharing XML schema validation to protect applications and services from malformed or out of range XML content File import utilising Personal Exchange (PX) Web Service Holding users to account for what they import or export Windows Server Update Services (WSUS) transfer Securing the ability to update Windows platforms within sensitive systems Sophos AV signature update transfer

Securing the ability to update AV signatures for Sophos AV checkers within sensitive systems Controlling software updates Securing the ability to update platforms within sensitive systems with software updates from untrusted domains Secure sharing policy compliance enforcement INFORMATION ASSURANCE The Secure Zone Gateway Service is suitable to meet the requirements for all sensitivity levels within the GSC Scheme subject to the considerations of accreditation best practice and specific use case considerations. Deep-Secure are ISO 27001 aligned for the Secure Zone Gateway Service and certified to CES/IASME. The service can be hosted within an assured Cloud platform, which is aligned to the CESG Cloud Security Principles and Pan Government Accredited at IL2 and IL3 (e.g. Skyscape s Self-managed Cross Domain Solution) or on an appropriately accredited customer platform. ON BOARDING AND OFF BOARDING PROCESSES On-boarding As part of on-boarding we will: Deploy the Guard software, and work with your organisation to set up and configure the service Test the service to ensure information exchange is correctly configured and that reports and alerts are working as expected We offer two methods of on-boarding, based on the service needs: A standard templated configuration based on a fixed application in line with the use cases outlined in the preceding section An optional tailored configuration of file sharing requirements which meet your specific risk profile We work with your organisation to determine your specific cross domain information exchange policy requirements as they differ from the standard templated configuration including any specific associated logging and compliance requirements All service on-boarding is delivered in line with the Deep-Secure ISO9001 Certified Quality Management System processes for the implementation of the Secure Zone Gateway Service product.

Order Acknowledgement QF17 Form Sales Order Form (approved and uploaded to CRM) Plan PSO Deployment Plan Product Delivery Engage Finance Training Dates Agreed dates with External Trainer and Customer Tailored Deployment Statement of Work Tailored policy specification Standard Deployment Agreed dates with Customer Invoice Schedule Training (QF12 issued) PSO (QF14 issued) Support (QF16 issued) Product (QF11 issued) Customer Review Order 3 rd party SW QF21 Purchase Request 3 rd Party SW Licences Customer Acceptance Email Document Allocate SW Licences & Create CD Perform Training Training Materials Presentations Deployment Activities & Test Licence Allocation QF20 Licence Number Register QF19 Licence Record Deployment CD Training Feedback QF12 External Training Feedback Form Completion Document QF14 Customer Feedback Questionnaire Deliver Product to Customer Delivery Documentation QF11 Delivery Note QF25 Certificate of Conformance (optional) Figure 2: Service deployment process Off-boarding As part of off-boarding we will: Provide you with access to the logs held within the service at the point of decommissioning, if required Decommission the Deep-Secure Guard software Delete all accounts and data Recover all licensed software

We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. PRICE MODEL Our core Secure Zone Gateway Service is based on a monthly charge per Guard instance required by the customer. In addition, there is a service on-boarding charge that covers installation, configuration of the standard (templated) Guard policy and testing. Optional service elements include: File sharing utilities based on an on-boarding charge and a monthly charge File sharing applications based on an on-boarding charge and a monthly charge per 10 users enabled Training based on a charge per course per attendee Full details of pricing are contained in the service pricing document. Pricing excludes costs associated with the provision of compute and storage infrastructure required to host the Secure Zone Gateway Service. This will vary depending on the nature of the information exchange requirements that are part of a customer s specific solution. Pricing excludes day-to-day Guard administration tasks. This can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. SERVICE MANAGEMENT The Secure Zone Gateway Service includes full software maintenance and support for the sustainment of the deployed instances and the associated resources required. This excludes day to day administration tasks. This can be provided at our professional services rates (see Pricing), or through third party service management offerings. The support offered is covered under a comprehensive service management pack as detailed in the subsequent sections. SERVICE CONSTRAINTS None. SERVICE LEVELS The service support desk is available: Monday-Friday, 08.30-17.30, local UK time, excluding bank & public holidays. Support is provided by experienced Deep-Secure technical engineers who are specifically trained to perform in-depth diagnostic and troubleshooting activities in order to resolve product issues as quickly as possible along with carrying out any product execution tasks included within the Secure Zone Gateway Service. All Customer interaction details will be recorded and a Case Reference Number (CRN) assigned. Engineers work in small flexible multi-skilled units. This facilitates a team approach to service provision and ensures that more than one engineer is aware and able to discuss and resolve your service requests.

Service Request Categories The following table sets out the categories that will be assigned to each Service Request. Table SL1 Category Description 1 Total service failure of (operational) system or failure of a component of a critical process 2 Failure of one or more system functions making use of the system difficult (e.g. service still running and operational but not to full capacity) 3 Failure of a non-critical function having no significant effect on the system operation (e.g. failure of a sub-component such as a new version of an AV product) 4 Any incident having minimal impact on the system operation, requests for information or requests for enhancements. Service Levels The times indicated in table SL2 below are the target times for the Service Provider to respond to or provide a workaround for incidents as set forth in the Agreement. All periods of time commence from when the Service Provider first receives notification of a new incident. Table SL2 Response and Workaround Times Category Target Response Time Target Workaround Time 1 Less than 1 Working Hour Less than 1 Working Day 2 Less than 1 Working Hour Less than 3 Working Days 3 Less than 1 Working Hour Less than 10 Working Days 4 Less than 1 Working Hour As Appropriate Escalation In the event that a Service Request is not provided within the relevant target time indicated in table SL3 above then the following escalation timings shall apply. For the purposes of this agreement, escalation shall mean the customer shall have the right to communicate with that person in relation to the provision of the Service Request. In the event that the identified individual is not available then the Service Provider shall use their reasonable endeavours to provide the customer with an alternate contact person.

Table SL3 Category Service Delivery Manager Product Manager 1 Immediate Notification 1 Working Day 2 2 Working Days 5 Working Days 3 10 Working Days N/A 4 N/A N/A Security Flaws In the event that the Service Provider identifies security flaws in the software, the Service Provider shall categorise the security flaw in accordance with table SL4. Table SL4 Severity Description 1 Security vulnerability that allows Service Provider guard or administration system to be compromised (e.g. attacker gains control of the guard's host operating system). 2 Security vulnerability which means the Service Provider guard fails to block data that should be blocked according to the configured policy (e.g. data type configured to be blocked is allowed to pass). 3 Security vulnerability which means the guard fails to correctly identify the source or destination of data when applying policy (e.g. identity of originator of a signed message incorrectly identified resulting in loss of accountability). After categorising any emerging security flaw, the Service Provider shall follow the alerting and remediation process timings of table SL5. Alerting shall be to a customer nominated point of contact, using an agreed customer nominated communication means (e.g. secure email address). Table SL5 Alerting and Remediation Times Severity Target Alert Time Target Remediation Time 1 Less than 2 Working Days Less than 2 Working Days 2 Less than 2 Working Days Less than 5 Working Days

3 Less than 2 Working Days Less than 7 Working Days Should we fail to meet SLA terms within the defined timescales we will credit 1 days worth of Secure Cross Domain Guard Service charge. ORDERING AND INVOICE PROCESS Ordering can be carried out using the Framework Agreement Call Off Contract. Invoicing is monthly in arrears. Payment can be via the following methods: BACS or Cheque. SERVICE LEAD TIME We will initiate on-boarding on receipt of purchase order in line with the Service Deployment Process identified in the On-Boarding section of this Service Definition Document. Timescales for implementation of the service will vary, depending on the size and complexity of the service deployment. Once a Secure Zone Gateway Service platform has been deployed, configured and tested under the scope of the initial charge, the live service will commence under the recurring service charge model. The service is based on a one month initial implementation period followed into live service from month 2 onwards. TERMINATION COSTS We will charge a single day at our professional services rates (see Pricing) for off-boarding activities. BACKUP/RESTORE AND DISASTER RECOVERY With the exception of configuration and syslog data the Secure Zone Gateway Service is stateless. Back-up of configuration and syslog data is a consumer responsibility. If required this can be provided at our professional services rates (see Pricing) or through third party service management offerings. DATA RESTORATION/SERVICE MIGRATION Data restoration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. Service migration is not included in the service. If required this can be provided at our professional services rates (see Pricing), or through the MDS Managed Guard service. CUSTOMER RESPONSIBILITIES The consumer is responsible for: Provision of compute and storage infrastructure required to host the Secure Zone Gateway Service Responding to policy conflict alerts raised by the Guard service and considering if the set policy is correctly aligned to the business needs Completion of the Sales Order Form in line with the G-Cloud procurement process

For tailored policy configuration services: Approval of the Statement of Work and System Design Document Engaging with, and specifying requirements for, the detailed configuration of the information exchange policy and reports that are required Providing appropriate and empowered attendees for scoping and review meetings The control and management of access and responsibilities for end users Ensuring that only appropriate data in line with the GSC Scheme (e.g. OFFICIAL or OFFICIAL- SENSITIVE) is accessible and presented to the platform. Where the consumer chooses not to take up a third party day-to-day management service, or professional services management, they are also responsible for: Guard configuration back-up Syslog back-up Recovery from back-up TECHNICAL REQUIREMENTS Appropriately specified host server and client devices where required to include associated licence provision.