Certificate Certificate number:

Similar documents
Certificate. Certificate number: Certified by EY CertifyPoint since: February 28, 2017

Certificate. Certificate number: Certified by EY CertifyPoint since: November 20, 2015

Certificate. Certificate number: Certified by EY CertifyPoint since: July 10, 2018

Cloud Transformation and Significance of Security

Certificate. Certificate number: a. Certified by EY CertifyPoint since: May 11, 2012

Amazon Web Services. Foundational Services for Research Computing. April Mike Kuentz, WWPS Solutions Architect

Getting started with AWS security

AWS Security Overview. Bill Shinn Principal Security Solutions Architect

Netflix OSS Spinnaker on the AWS Cloud

Compliance and Security in a Cloud-First Era

Certificate of Registration

Security Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Expected Learning Outcomes Introduction To AWS

WHITEPAPER AMAZON ELB: Your Master Key to a Secure, Cost-Efficient and Scalable Cloud.

ASD CERTIFICATION REPORT

Amazon Web Services and Feb 28 outage. Overview presented by Divya

Srinath Vaddepally.

Title: Planning AWS Platform Security Assessment?

Getting started with AWS security

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

Security & Compliance in the AWS Cloud. Amazon Web Services

DocAve Online 3. Release Notes

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

BERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

MarkLogic Cloud Service Pricing & Billing Effective: October 1, 2018

EPAM Cloud Problem Resolution Consulting

Deep Freeze Cloud. Architecture and Security Overview

Engage with ESRI in the AWS Cloud. Teresa Carlson, VP of Global Public Sector

Certificate. Certificate number: b. Certified by EY CertifyPoint since: April 15, 2016

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Security and Compliance at Mavenlink

Azure Everywhere. Brandon Murray, Cami Williams, David Haver, Kevin Carter, Russ Henderson

Certificate. Certificate number: b. Certified by EY CertifyPoint since: May 11, 2012

Hosts have the top level of webinar control and can grant and revoke various privileges for participants.

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

AWS Direct Connect Deep Dive

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Tech Talk #11. Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11

Amit Panchal Enterprise Technology Strategist

CS15-319: Cloud Computing. Lecture 3 Course Project and Amazon AWS Majd Sakr and Mohammad Hammoud

Configuring AWS IAM Authentication for Informatica Cloud Amazon Redshift Connector

ISO/IEC overview

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

Enroll Now to Take online Course Contact: Demo video By Chandra sir

HOW TO PLAN & EXECUTE A SUCCESSFUL CLOUD MIGRATION

LINUX, WINDOWS(MCSE),

Training on Amazon AWS Cloud Computing. Course Content

Introduction to Cloud Computing

Amazon S3 Cloud-storage Service

CGI Group Inc - SBU Eastern, Central & Southern Europe

Introduction to Amazon Cloud & EC2 Overview

Integration Technologies Group, Inc. Uncompromising Performance

Get Ready for the Revival of Large Data Centers

Innovative Fastening Technologies

Custom hosting solutions orchastrated for your needs.

Introduction to Telx AWS Direct Connect

Private Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations

Advanced Techniques for DDoS Mitigation and Web Application Defense

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

TECHNICAL WORKBOOK. PCI Compliance in the AWS Cloud A NITIAN. Report Date: October 17, Jordan Wiseman, QSA

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

Rocket Steam Elastic SAP

Hyper scale Infrastructure is the enabler

Logicalis. Leon Bouwer Sales Specialist IM/ECM/Big Data

Managed Hosting Services

eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote

Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security

Protecting Your Data in AWS. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Avanade s Approach to Client Data Protection

Scaling on AWS. From 1 to 10 Million Users. Matthias Jung, Solutions Architect

ITG. Information Security Management System Manual

TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM

Certificate. Certificate number: a. Certified by EY CertifyPoint since: April 15, 2016

ITG. Information Security Management System Manual

Cloud Computing. Amazon Web Services (AWS)

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

t a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e foresightconsulting.com.

Megaport Limited ASX:MP1

Certificate. Certificate number: b. Certified by EY CertifyPoint since: April 15, 2016

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

Introduction to Amazon Cloud & EC2 Overview

Overview of International Standards for Cloud Computing

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure.

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

IIBA Enhanced Certification

Deploying Cisco SD-WAN on AWS

Pro PowerShell for Amazon Web Services What You ll Learn: SOURCE CODE ONLINE

THE WORLD S BEST- CONNECTED DATA CENTERS EQUINIX MIDDLE EAST & NORTH AFRICA (MENA) Equinix.com

Introduction to Amazon Lumberyard and GameLift

vcenter Operations Management Pack for AWS Installation and Configuration Guide

Managing Jurisdictional Risks for Public Cloud Services

Five Essential Capabilities for Airtight Cloud Security

Enterprise Infrastructure in the Amazon Web Services (AWS) Cloud. David Zych, Erik Coleman, Phil Winans

Custom cloud hosting for your Sitecore Experience Platform.

Transcription:

Certificate Certificate number: 2017-009 Based on certification examination in conformity with defined requirements in ISO/IEC 17021:2015 and ISO/IEC 27006:2015, the Information Security Management System (ISMS) as defined and implemented by TASER International, Inc.* headquartered in Scottsdale, Arizona, United States of America, certified under certification number [2015-020], is also compliant with the requirements as stated in the standard: ISO/IEC 27018:2014 Issue date of certificate: February 28, 2017 Expiration date of certificate: October 21, 2018 EY CertifyPoint will, according to the certification agreement dated August 12, 2015, perform surveillance audits and acknowledge the certificate until the expiration date of this certificate or the expiration of the related ISMS certificate with number [2015-020]. *This certification is applicable for the assets, services and locations as described in the scoping section on the back of this certificate, with regard to the specific requirements for information security and related specific cloud security controls as stated in the Statement of Applicability approved on October 25, 2016. 1/5 Drs. R. Toppen RA Director EY CertifyPoint Copyrights with regard to this document reside with Ernst & Young CertifyPoint B.V. headquartered at Antonio Vivaldistraat 150, 1083 HP Amsterdam, The Netherlands. All rights reserved.

The scope of this ISO/IEC 27018:2014 certification is bounded by specified services of TASER International, Inc. and specified facilities. The ISMS is centrally managed out of TASER International, Inc. headquarters in Scottsdale, Arizona, United States of America. The in-scope applications, systems, people, and processes are globally implemented and operated by teams out of an explicit set of facilities that comprise TASER International, Inc. and are specifically defined in the scope and bounds. The TASER International, Inc. ISMS scope includes the following services: General The following statement defines the scope of services for the Taser ISMS of Evidence.com: An Information Security Management System that governs all customer data that resides in the Evidence.com application. The scope of the ISMS includes the assets, technologies and processes employed by Taser within its facilities for processing, management and delivery of the Evidence.com service to its customers. People The following departments are in-scope for the ISMS: Evidence.com System Management Evidence.com System Administration Evidence.com Developers/Engineers Evidence.com Security Operations Evidence.com Contractors Taser Human Resources Taser Information Security 2/5

Sites (Virtual Assets) The following are the list of IaaS provider processing regions, which align to the instances of Evidence.com in scope for the ISMS. United States (US) Evidence.com Amazon Web Services ( AWS ) US East (Northern Virginia) Region: AWS provides the physical data center building and servers, physical security, environment controls and IaaS offerings which Taser utilizes to create and manage dedicated a virtual network via Amazon Virtual Private Cloud ( VPC ), virtual machines via Amazon Elastic Compute Cloud ( EC2 ) instances, Elastic Load Balancing ( ELB ) load balancers, customer evidence data object storage via Amazon Simple Storage Service ( S3 ), user roles and access via AWS Identity & Access Management ( IAM ), and network connectivity. The EC2 instances host both Evidence.com application servers and database servers (Cassandra Database Management System and SQL Australia (AU) Evidence.com AWS Asia Pacific (Sydney) Region: AWS provides the physical data center building and servers, physical security, environment controls and IaaS offerings which Taser utilizes to create and manage dedicated a virtual network via Amazon VPC, virtual machines via Amazon EC2 instances, ELB load balancers, customer Europe (EU) Evidence.com AWS EU (Ireland) Region: AWS provides the physical data center building and servers, physical security, environment controls and IaaS offerings which Taser utilizes to create and manage dedicated a virtual network via Amazon VPC, virtual machines via Amazon EC2 instances, ELB load balancers, customer evidence data object storage via Amazon S3, user roles and access via AWS IAM, and network connectivity. The EC2 instances host both Evidence.com application servers and database servers (Cassandra Database Management System and SQL Server databases). 3/5

Sites (Virtual Assets) Brazil (BR) Evidence.com AWS South America (São Paulo) Region: AWS provides the physical data center building and servers, physical security, environment controls and IaaS offerings which Taser utilizes to create and manage dedicated a virtual network via Amazon VPC, virtual machines via Amazon EC2 instances, ELB load balancers, customer United Kingdom (UK) Evidence.com Skyscape Cloud Services (England) data centers: Skyscape provides the physical data center building and servers, physical security, environment controls IaaS offerings which Taser utilizes to create and manage dedicated a virtual private cloud network, virtual machines, load balancers, customer evidence data object storage, user roles and access, and network connectivity. The virtual machines host both Evidence.com application servers and database servers (Cassandra Database Management System and SQL Global Development, QA, and supporting tools AWS US West (Oregon) Region: AWS provides the physical data center building and servers, physical security, environment controls and IaaS offerings which Taser utilizes to create and manage dedicated a virtual network via Amazon VPC, virtual machines via Amazon EC2 instances, ELB load balancers, customer 4/5

Sites (Physical Locations) The Evidence.com application service is hosted solely on virtual infrastructure sitting on physical infrastructure located at IaaS provider facilities. Workstations used to manage the Evidence.com connect to the environments remotely from Taser office locations. The primary locations used to access IaaS provider infrastructure are Taser s offices in Scottsdale, Arizona, United States and Seattle, Washington, United States for the Evidence.com instances in the AWS environments. For the UK Evidence.com instance hosted in the Skyscape environment, access is from the Taser offices. The ISMS mentioned in the above scope is restricted as defined in the ISMS Scope and Boundaries document, version 1.4, approved on July 20, 2016 by the Vice President of Information Security, TASER International, Inc. 5/5