Service Organization Control (SOC) 3 Report

Size: px
Start display at page:

Download "Service Organization Control (SOC) 3 Report"

Transcription

1 Service Organization Control (SOC) 3 Report Trust Services Report on Management s Assertion about the Effectiveness of Controls Regarding the System for Hosting Client Data Through Cloud Services Related to the Security and Availability Principals ProCon Solutions, Inc., dba GoIWx For the Period May 1, 2013 to October 31, 2013

2 TABLE OF CONTENTS I. Management of GoIWx s Assertion Regarding Its System for Hosting Client Data Through Cloud Services throughout the Period May 1, 2013 to October 31, II. Independent Service Auditor s Report... 2 Page III. GoIWx s Description of Its System for Hosting Client Data Through Cloud Services throughout the Period May 1, 2013 to October 31, A. Overview of GoIWx Operations... 3 B. General Systems Controls... 9 C. User Control Considerations... 14

3 I. Management of GoIWx s Assertion Regarding Its System for Hosting Client Data Through Cloud Services throughout the Period May 1, 2013 to October 31, 2013

4 Management Assertion During the period May 1, 2013 through October 31, 2013, GoIWx, in all material respects: Maintained effective controls over the security and availability of the system for hosting client data through cloud services provided through our V2 network configuration to provide reasonable assurance that: 1) the System was protected against unauthorized access (both physical and logical) and 2) the System was available for operation and use, as committed or agreed, based on the trust services for security and availability criteria issued by the American Institute of Certified Public Accountants and CPA Canada. 1

5 II. Independent Service Auditor s Report

6 Independent Practitioner's Trust Services Report To Management of ProconSolutions, Inc., dba GoIWx, Inc. Maple Grove, Minnesota We have examined management's assertion that during the period May 1, 2013 through October 31, 2013, Procon Solutions, Inc., dba GoIWx, Inc. (GoIWx) maintained effective controls over the system for hosting data through cloud services related to the V2 network configuration (the System) based on the AICPA and CPA Canada trust services availability and security criteria to provide reasonable assurance that: the system was available for operation and use, as committed or agreed; the system was protected against unauthorized access (both physical and logical); based on the AICPA and CPA Canada trust services security and availability criteria. GoIWx s management is responsible for this assertion. Our responsibility is to express an opinion based on our examination. Management's description of the aspects of the System covered by its assertion is attached. We did not examine this description, and accordingly, we do not express an opinion on it. Our examination was conducted in accordance with attestation standards established by the American Institute of Certified Public Accountants and, accordingly, included (1) obtaining an understanding of GoIWx s relevant controls over the availability and security of the System; (2) testing and evaluating the operating effectiveness of the controls; and (3) performing such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion. Because of the nature and inherent limitations of controls, GoIWx's ability to meet the aforementioned criteria may be affected. For example, controls may not prevent or detect and correct error or fraud, unauthorized access to systems and information, or failure to comply with internal and external policies or requirements. Also, the projection of any conclusions based on our findings to future periods is subject to the risk that changes may alter the validity of such conclusions. In our opinion, management's assertion referred to above is fairly stated, in all material respects, based on the AICPA and CPA Canada trust services security and availability criteria. Minneapolis, Minnesota April 30, Nicollet Mall, Ste Minneapolis, MN T F EOE 2

7 GoIWx s Description of Its System for Hosting Client Data Through Cloud Services throughout the Period May 1, 2013 to October 31, 2013

8 Overview of GoIWx Operations GoIWx, located in Minneapolis, Minnesota has been providing Managed Hosting solutions and ongoing maintenance services that focus on ERP applications for the clients (Clients) we serve. GoIWx has been in the IT industry since 1995, starting its hosting operation in November of GoIWx continues to enhance the expertise levels of our staff and adapt our services offerings to meet the changing business environment. GoIWx takes pride in the ability to design, deploy, and provide hosting services that are right for our Client s business needs. GoIWx offers single tenant, multi-tenant and hybrid hosting services tailored to meet the needs of our diverse Client base whether small, medium or enterprise businesses. From 1995 to 1999, GoIWx had (3) primary service offerings focused in the Manufacturing Industry; Enterprise Resource Planning (ERP) Software sales, Implementation and Training Services. In November of 1999, GoIWx started providing hosting operations. At that time GoIWx architected and built a dedicated network infrastructure in the ENT01-V1 network (hereinafter referred to as V1), comprised predominately of physical servers. In April of 2006 GoIWx recognized a shift in the market place with the acceptance of Cloud computing. GoIWx realigned its business to focus on hosting services only, which would be offered through multiple partner channels and or direct to the end Client. With the business focus aligned with cloud, GoIWx embraced virtual server technology. In 2007, GoIWx architected and built another network infrastructure, MM01-V2 (hereinafter referred to as V2). Both the V1 and V2 networks are built with Cisco firewalls and switching. The V1 network is a mix of Windows servers both physical and VMware virtual servers. The V2 network is a combination of Hyper-V nodes for virtualization and Physical SQL Server clusters for database management. The V1 network is being phased out as Clients upgrade their software or request higher levels of automation. GoIWx Clients communicate with one of these designated networks via secure Internet connections, VPN s and private MPLS. GoIWx does not currently process any data on behalf of our Clients. GoIWx services are available to our Clients on a 24/7/365 basis, notwithstanding planned scheduled outages. Clients of GoIWx utilize either V1 or V2 within their computer infrastructure. Clients that are operating within V1 are dependent on GoIWx for changes related to access and user management. V2 Clients have on-line control panels for self-service user management and accessibility. Clients added since January 2010 subscribe to the V2 service, except for previously existing V1 Clients that subsequently converted to V2. The accompanying description and testing of controls relates to V2, and excludes controls and processes related to V1. In 2008 GoIWx expanded beyond the Manufacturing industry and added Retail, Professional Services, Energy, Healthcare, Financial, Aviation, Entertainment and Non-Profit industries. Within all these industries GoIWx serves a diverse size of companies ranging from small to enterprise businesses. The vast majority of our Clients are located in the United States with Clients in Canada, Mexico, Hong Kong and the UAE. GoIWx has entered into a Master Services Agreement with TW Telecom for access and use of colocation facilities throughout the United States. Today GoIWx has infrastructure in two of the (80) available facilities, with plans to add (1) additional location in ERP application hosting is at the core of the GoIWx offering. The ERP packages hosted by GoIWx are developed in Windows, running on a SQL (relational) database backend. The employees of GoIWx have skills specifically in Windows and SQL that allow for best practices pertaining to security and availability. GoIWx has earned its Silver Partner status with Microsoft, specifically the Microsoft Hosting Competency. This competency requires GoIWx employees to obtain certifications on the different Microsoft platforms used to deliver the hosted services. 3

9 GoIWx provides a handful of hosted products/services to its Clients. Each of these products/services are offered to the Client to accomplish at least one, but typically several of the following; predictable IT spend, automation of IT processes, Information Technology Service Management (ITSM) based service requests, access to company data from anywhere at any time, consistent and repeatable IT services, more productivity, eliminate or reduce capital requirements, possible reduction of on staff IT, increased uptime, increased data security, reduce risk of malware, increase efficiencies, manage critical backup/restore functionality, patching and upgrading. These products/services, taken together or separately, allow our Clients to do business more productively, providing for more focus on their business core competencies. These products/services enables the Client to have more flexibility in its partner selection for ERP services and IT staffing. Clients expect more from a hosting provider than if they operated from their local premise. Security is a big concern for all companies. GoIWx takes extra steps to provide a much higher level of security than a Client could provide on their own. Through the creation and adoption of several internal/external policies, that cover passwords, physical security, remote access, out-sourcing and more, GoIWx has a firm control over security. On a routine basis, GoIWx performs vulnerability scans on its own networks. On an annual basis GoIWx uses a third party company to conduct a vulnerability scan against its network. The results of these scans are documented and if remediation is required it is addressed immediately. Beginning in 2013, on boarding of new Clients requires new users to participate in information security training. This training is designed to help the users maintain a high level of security with their login credentials and security protection on their local devices. Clients have the expectation of availability from anywhere, at any time from any device. GoIWx has architected and built their networks for high availability, and has taken pain staking measures to build redundancy in the event of an equipment or facility failure. The hardware design and colocation facilities are highly redundant to provide maximum availability. Testing is performed on a monthly basis for all generators and HVAC systems. The entire facilities have to run under full load while powered by diesel generators to test the systems. GoIWx uses storage area network (SAN) technology that allows for continual SAN to SAN replication between the two GoIWx facilities. These SAN s are tested on a routine basis to assure replications are succeeding as expected. Different aspects of the GoIWx network are purposely failed over to test the redundancy or the availability architecture. The testing is performed in compliance with specific test procedures, which determines the required testing plan and expected outcome. GoIWx anticipates and expects users will want support based on their company s needs. To best accommodate timely responses to our Clients, GoIWx provides a Service Level Agreement (SLA) which communicates what can be expected for response times. In additional to the SLA, GoIWx may assign a specific engineer, project manager, customer care representative and sales person to each Client. One of the specific roles of these team members is to attend regularly scheduled Client Advisory Board (CAB) meetings. During these meetings several areas are discussed, specifically open Incident Requests (IR), Service Requests (SR), Problem Reports (PR) and Requests for Change (RFC). GoIWx has experienced much success with our Client by setting up these CAB meetings. It is a way for the Clients and the GoIWx team to maintain a high degree of communication. On a day to day basis, GoIWx has a defined support and response time process which is provided to all end users. Support Level and Response Time. Initial Call or Incident request At any time, 24 hours a day, 7 days a week, a Client can create a new incident request using the Company Service Request Portal ( SRP ) located on the Company internet website or directly at The Company provides support for Services through the SRP, over the telephone, or remote screen share support. The following guideline process is used to review and respond to incidents: 4

10 First Level support Calls or Incident requests are acknowledged within (2) hours during standard business hours: Review or create an open incident request First level diagnosis o Determine if Client is able to connect o Determine if applications and databases are operational o Determine and quantify which application requires attention o Learn more if an error message is on the screen o Learn more if unable to print Escalation to Second Level support if applicable Close open incident if applicable Second Level support Upon completion of first level (if not resolved): Review open incident Gain further understanding of the open incident Second level diagnosis over the phone Application related (if applicable) o Contact developer to open log pertaining to open incident o Patch or upgrade software application if possible (see Application Software Patches, Bug Fixes and Upgrades) Local area network (if applicable) o Run quick diagnostics and troubleshooting on devices o Suggest calling the manufacturer of local or network printer o Contact ISP or communications carrier to open a trouble ticket o Down load drivers Escalation to Third Level support if applicable Close open incident if applicable Third Level support Upon completion of second level if incident not resolved: Review open incident Upgrade software at a scheduled time if applicable (see Application Software Patches, Bug Fixes and Upgrades) Run scripts against application software (see Application Software Patches, Bug Fixes and Upgrades) Apply patches immediate or at a scheduled time (see Application Software Patches, Bug Fixes and Upgrades) Work with application developer to resolve open issue At Client s request, work with ISP, communications carrier, web hosting or other outside services at a billable rate Close open incident Client Connection to GoIWx Network Unless the Client has a VPN configured to provide a connection to the GoIWx Network, the Client is responsible to maintain adequate monitoring to assure availability of their ISP s bandwidth. Upon request, GoIWx can provide a test site to the Client for testing bandwidth speed and its connection to the internet. A Client may also connect directly to the GoIWx network via a VPN connection or private circuit. 5

11 Application Software Patches, Bug Fixes and in place Upgrades As part of the monthly hosting fees, GoIWx will provide services to apply Software Patches ( Patches ), Software Bug Fixes ( Fixes ) and Version (in place) Upgrades ( Upgrades ), collectively known as RFC (Request for Change), submitted through the GoIWx Service Request Portal from the Client and/or the Software Developer to perform RFC Services. Under no circumstance will GoIWx apply Version in place Upgrades on its own, but will provide technical assistance to support the Client or Client agent. Client Request Action initiated by the Client The Client can request RFC Services as deemed necessary for continued acceptability of Client applications. The timing for applying the requested RFC Services are based on several factors: o The criticality of the RFC Service o The availability of resources at both GoIWx and the developer of the software o The availability of the hardware in which the software code resides o The level of proficiency of the Client with the use of the software o The availability of the Client to test the software after the RFC Service is performed o The Client is in good standing with respect to applicable licenses it is responsible for. The Client must submit all requests for RFC Services to GoIWx via to customercare@goiwx.com. If the Client deems immediate action is necessary, the Client can call for immediate assistance. However, the actual RFC Service will not be initiated until a written authorization is received and approved by GoIWx. GoIWx Action initiated by GoIWx GoIWx will apply Patches, Fixes or Version Upgrades based on the following: Based on a Client request that is already scheduled, anticipated date on GoIWx schedule; and the Client has performed all applicable testing as instructed by GoIWx; and the Client has authorized GoIWx to perform the RFC Services. GoIWx shall not be responsible for delays in implementing RFC if support from the software supplier is reasonably required but unavailable. Software Supplier Action initiated by the supplier of the software The Supplier can request RFC services on the behalf of the Client for the continued acceptability of the Client applications. The timing for applying the requested RFC Services are based on several factors: The criticality of the RFC Service The availability of resources at both GoIWx and the developer of the software The availability of the hardware in which the software code resides The written authorization from the Client to GoIWx to perform the RFC Service The availability of the Client to test the software after the RFC Service is performed 6

12 Current hosted services offered in both a Software as a Service (SaaS) and Infrastructure as a Service (IaaS) offering: Microsoft Dynamics CRM Hosting Dedicated, single-tenant hosting, installed with or without an ERP application. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Microsoft Dynamics SL Hosting Dedicated, single-tenant hosting, installed with or without other Independent Software Vendor (ISV), third party or front office applications. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Microsoft Dynamics GP Hosting Dedicated, single-tenant hosting, installed with or without other ISV, third party or front office applications. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Microsoft Dynamics NAV Hosting Dedicated, single-tenant hosting, installed with or without other ISV, third party or front office applications. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Microsoft Dynamics AX Hosting Dedicated, single-tenant hosting, installed with or without other ISV, third party or front office applications. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Infor VISUAL ERP Hosting Dedicated, single-tenant hosting, installed with or without other ISV, third party or front office applications. Provide Windows and SQL patch management, backup and restore services, self-service user management and service portals. Microsoft Exchange Hosting Multi-tenant hosting, backup and restore services, self-service user management and service portals. Includes cloud SPAM and Anti-Virus filtering. Microsoft Office Hosting Dedicated, single-tenant hosting, installed with an ERP application. Provide patch management, backup and restore services. Physical or Virtual Servers (limited basis for partners or existing Clients) Dedicated, private/shared domain, power, bandwidth, patching for both physical/virtual servers. Recovery as a Service Dedicated, Single Tenant, cold site for Clients off site back-up. Other non-hosted services available to GoIWx Clients include ERP and CRM Consulting Services. Control Environment GoIWx is committed to operating at the highest level of integrity by adhering to our ethical values, providing effective management and ensuring processes and procedures exist to carry out management objectives. GoIWx invests in people, processes and tools to deliver this experience for its stakeholders. The general computer and operational control objectives establish a secure, efficient, and a quickly recoverable environment. These objectives include the following: Organization and Management IT Operations Network and Telecommunications Quality Assurance Physical and Environmental Security Logical Security System Software Maintenance and Change Control Disaster Recovery and Business Continuity 7

13 In addition to the above general control objectives, the following procedures, systems and policies are also in force at GoIWx. Control Activities Control activities are the policies and procedures that help ensure management directives are carried out. They help ensure that necessary actions are taken to address risks to achieve the entity s objectives. Control activities, whether automated or manual, have various objectives and are applied at various organizational and functional levels. GoIWx departments are required to implement control activities that help assure the achievement of business objectives associated with: (1) the reliability and security of services provided to its Clients, (2) the efficiency of operations, and (3) compliance with applicable laws and regulations. These control activities are designed to address the specific risks associated with the operations and are reviewed annually as part of the risk assessment process. GoIWx has developed formal policies and procedures covering various security and operational matters. Risk Assessment GoIWx management has incorporated risk management throughout its processes at the enterprise level. Management is responsible for implementing procedures to identify the risks inherent in the business s operations and to implement procedures to monitor and mitigate the risks. The foundation of this process is management s knowledge of its operations, its close working relationship with its user organizations and its understanding of the industries in which it operates. For any significant risks identified, management is responsible for implementing appropriate measures to monitor and manage these risks. GoIWx has placed into operation a risk assessment process to identify and manage risk that could impact our operations or the operations of our Clients. Regularly scheduled Change Advisory Board (CAB) meetings assist in the identification of new or evolving risks. This process requires management to evaluate risks inherent in new and on-going services and to implement measures to mitigate these risks. Monitoring Monitoring is a critical aspect of internal control in evaluating whether controls are operating as intended and whether they are modified as appropriate for changes in conditions. Management and supervisory personnel are responsible for monitoring the quality of internal control performance as a routine part of their activities. To complement these measures, all exceptions related to hardware, software, or procedural problems are logged, reported, and tracked until resolved. Key reports are reviewed by management to help ensure appropriate action is taken. GoIWx has implemented monitoring tools that provide immediate and on-going feedback based on the performance of these controls. Performance statistics are available to key management personnel and they can receive status reports via , text messaging or on line real time. GoIWx management reviews status reports generated by these tools to ensure that problems are logged, reviewed and resolved in a timely fashion. 8

14 Communication Systems and polices have been put in place that allow GoIWx employees and management to quickly and efficiently exchange information regarding problems, Client issues and resolutions. This includes new employee orientation, training and regular employee training updates and staff meetings. Employees are encouraged to use , voic , regularly scheduled meetings, the internal issue tracking system or other written methods to communicate important events and issues. A system is in place that records Client issues and resolutions that can be shared by other GoIWx employees, allowing for a more efficient flow of information. Information and communication systems support the identification, capture, and exchange of information in a form and timeframe that enable people to carry out their responsibilities. Communication involves providing an understanding of individual roles and responsibilities pertaining to internal control over everyday operations. Communication systems exist from the entity-level to the department-level. General System Controls Organization and Management Functional and administrative responsibilities at GoIWx are broadly defined and communicated via an organizational chart. All personnel are well informed regarding their job responsibilities and functions via job descriptions. Management has put into place policies and procedures that promote the hiring and retention of quality employees, including a formal hiring process, with background checks and a formal termination process. Logical and physical access to systems is provided to employees by management on an as-needed basis. If an employee s job responsibilities change, system access is modified to reflect that change. These changes are logged by management and documented. Standard employee documentation is collected and maintained in personnel records. All employees must read and sign off on an employee handbook and the sign off sheets are kept in each employee s personnel file by HR. The employee handbook summarizes GoIWx policies and procedures. Each employee must sign a non-disclosure agreement, network computer usage policy, usage and Internet usage guideline document. New employees receive orientation and training on GoIWx policies and procedures. A termination checklist is used to ensure that all GoIWx owned equipment and information is returned to GoIWx. The checklist is used to remove access to network systems, programs, and . Keys, security tokens, security badges and cell phones are returned at termination. Management maintains oversight of all business aspects of GoIWx and is responsible for policy development. Policies in place include computer usage, Internet usage, confidentiality agreements, usage and appropriate usage of all GoIWx systems. These policies are reviewed and modified by management on a regular basis. An organization chart is utilized for management leadership and accountability purposes. Employees have been trained in various aspects of the IT operation and can be utilized as back-up personnel to cover vacation, sick time or in times of a pandemic. Management is responsible for maintaining adequate insurance coverage to minimize the impact of business operations after a disaster. Insurance coverage includes personal property, money and security, valuable papers, utility services, equipment breakdown, personal/advertising, injury liability, tenant liability, and data storage. Management meets regularly to discuss items that might require attention. 9

15 IT Operations The hosted service offerings have been designed as much as possible to operate automatically with little or no employee intervention. This minimizes human error and adds efficiency to these operations. GoIWx management has put monitoring systems in place. In the event of a system malfunction, the monitoring system reports the event and is responded to in a timely fashion. These systems include monitoring for service interruptions, intrusion attempts, environmental incidents and hardware failures. All operation functions are formally documented and only properly authorized employees can access or operate computer systems. While outside vendors rarely need physical or virtual access to the facilities, they are adequately supervised while they are on-site or have system access. Access, performance and change logs are maintained for a reasonable period of time to assist in problem or issue forensics and resolution. A formal Incident Response Policy, Incident Response Team and Change Management process are in place to identify and resolve any requests or Client issues. All Client requests are logged and tracked by GoIWx Customer Care in the GoIWx Service Request Portal. All of the information is made available to management. All Client issues remain open until properly resolved. Formal resolution is reviewed routinely with an internal CAB utilizing GoIWx s standard protocols. System resource utilization reports are generated and evaluated by management to ensure maximum systems efficiency. GoIWx personnel and management meet regularly to discuss issues, problems and resolutions. Network and Telecommunications Uptime via redundancy and preventative maintenance is a cornerstone of the design of GoIWx s product offerings. GoIWx s infrastructure consists of servers, storage systems, switches, routers, firewalls and network cable that allow its Clients to connect to the appropriate server or servers. Client data is stored on both primary and secondary systems with a backup site in Minneapolis, Minnesota. Redundancy extends to data communication with Internet access provided from TW Telecom. These systems have been designed to failover to one another in the event of a mechanical or environmental problem. Firewalls, Intrusion Protection Systems (IPS) protect the systems and data from external threats. Security alerts are forwarded to GoIWx 24/7/365. Data circuits are monitored to detect abuse or network problems. A policy exists which documents the physical and logical security utilized for remote access at the data center. All critical components are maintained regularly by in-house staff or outside vendors as appropriate. A monitoring system exists that alerts for possible and actual network problems and issues. These incidents are logged and handled via an internal trouble issue tracking system. Data circuits are monitored to detect abuse and errors. All critical network components are located within a caged off area, limiting this equipment s exposure to accidental or malicious incidents. Network security procedures include physical and logical safeguards. Default access to the internal network is not allowed. Network controls restrict unauthorized access to open or access ports. External network access is filtered by a firewall. Standard vulnerability testing is conducted as well as monitoring of traffic by an intrusion prevention system. New devices are deployed using a checklist. GoIWx has a documented an issue escalation process that is managed by the GoIWx CAB. The purpose of this process is to ensure a high level quality of service to GoIWx s Client base. 10

16 The Customer Care team and CAB are alerted whenever a suspicious activity or incident is uncovered. GoIWx management is part of this team. Incidents may include actual or suspected security compromises or service interruptions caused by unauthorized access attempts by employees, partners, or other agents. These incidents are logged, investigated, escalated to local police or FBI if warranted, and resolved. Network Security Company leverages multiple firewall platforms to ensure perimeter security. The firewalls are utilized to prevent unauthorized access and to ensure that access is only utilized for business purposes. A third party external penetration test is performed annually to validate our configurations and ensure our required level of security is attained. Logical Access Logical access to GoIWx s IT resources is effectively managed. As part of our normal procedure new employees are granted least privileged access and when staff is no longer employed we execute a termination checklist to ensure access is removed immediately. In addition, all systems require unique user accounts and complex passwords that are changed on a regular basis. Logical Security Ensuring data security is a priority at GoIWx. Firewalls, Intrusion Prevention Systems, network segmentation and data encryption are the foundations of GoIWx s data security environment. In addition to securing access from external threats, employee access to systems and data is restricted by Windows passwords and file access limitations. Appropriate procedures including software and operating system patching, password complexity, account lock out after five unsuccessful attempts and other industry best practices are in place, enforced and monitored. Automated timeouts are set up on remote access sessions and on individual workstation. Managers authorize system access for users by completing an Access Request Form for all new employees and any changes in access rights need to be approved by data owner and properly documented. Application controls are applied to limit employee access to data on an "as needed" basis. Employee access to the network, domain and key systems is based on their job role and is approved by an appropriate level of management. Applications with Client information require users to logon with an authorized ID and password. Operating system and program security updates are applied in a scheduled planned Client outage or when server downtime does not affect Client access. A corporate Information Security Program has been developed and approved by management and documents GoIWx s responsibilities to safeguard our Client s data and to provide system availability. This policy includes both physical and logical security, from internal and external threats. The policy also outlines each employee s responsibilities regarding system access and requires each employee to sign an acknowledgement document that outlines their responsibilities. To ensure that management is aware of and following up on attempted access violations, policies and procedures have been created that require security logs to be reviewed by management as needed. Automated monitoring systems are in place to notify staff members of intrusion attempts, environmental incidents, and hardware failures and these incidents are logged and responded to in a timely fashion. GoIWx administrators research alerts, determine root cause, and resolve the issues in a timely fashion. 11

17 Financial Controls All Clients sign an agreement which outlines the terms and rates. GoIWx s billing policy is provided to each new Client to set clear expectations. In order to ensure billing is timely and accurate GoIWx has segregated duties between operations and finance. At the end of the month, our operations team will run monthly reports of users and/or devices as per the agreement done in collaboration with our Clients. Once confirmed this information is sent to finance for billing purposes. System Software Maintenance and Change Control Hosted services include Client owned and GoIWx owned third-party software applications. GoIWx does not own the source code for these applications. No modifications are made to the source code of these applications by GoIWx. Having the most recent and up to date system software minimizes security breaches and resolves issues uncovered during the life of the software. Changes to application software are reviewed and evaluated by GoIWx s CAB prior to being installed on production servers and systems to determine the impact that these changes will have to operations and to our Clients. These changes are logged and available for review by management as needed. A patch management policy includes Windows Server Update Services server for Windows updates. Network scans are performed to verify that patches are properly applied. Service applications are upgraded, reviewed and applied as needed by management per the policy. Personnel validate access to Client data as part of the upgrade implementation process. Server based applications are tested on lab equipment prior to implementation in the production environment when possible. Disaster Recovery and Business Continuity GoIWx recognizes that our Clients are relying on our services to provide high quality and reliable data access for their users. The GoIWx Business Continuity Plan (BCP) includes risk assessments, risk mitigation, impact analysis and procedures. The Disaster Recovery Plan (DRP) ensures that GoIWx can indeed meet these recovery objectives and requirements. The Disaster Recovery/Business Continuity Planning is an on-going, coordinated program of strategies, plans and procedures that provide guidance to manage and ensure the availability of the company s resources in the event of a disruption to any part of the business operations. It prepares GoIWx to respond to a disruption event and to continue critical business processes to ensure the survivability of the organization. GoIWx has created a Disaster Recovery Plan that requires procedures for creating snap shots and back up s of critical applications and data to redundant systems within the primary data center, and to the contingency facility located in Minnesota. Snap shots and backups are facilitated with the use of SSD and hard disks. No tape drives or other media are utilized. SAN to SAN replication is faster, less expensive and more reliable than tape based backups. All back up data is stored on SAN in encrypted format of the SAN manufacturer. Test restores of virtual machines, databases, etc. are performed as required by policy or requested by a Client. In addition, critical lists containing employee, vendor, and Client contact information are stored at the off-site contingency location. Access to the off-site backups is restricted by physical and logical security. 12

18 TW Telecom Colocation Facilities As mentioned earlier, GoIWx has entered into a Master Services Agreement with TW Telecom for access and use of colocation facilities through the United States. Today GoIWx has infrastructure in two of their locations, both of which are located in the state of Minnesota. TW Telecom is considered as a number one provider and possibly the largest colocation provider in the United States, with 80 locations to choose from. TW specializes in providing secure and available colocation facilities by following stringent guidelines that govern the architecture, build and on-going management of these facilities. TW provides a myriad of services such as colocation services, bandwidth services and much more. GoIWx has used TW services since In that time GoIWx has not experienced any security issue or loss of availability. Security, Surveillance and External Accesses The colocation facilities have on site security personnel 24/7/365. All unmanned entrances have card access with biometrics which logs all entrance and exit activities. Entrances also have card access mantraps, along with digital surveillance cameras through out the facilities. The Minnetonka facility is a single level building with natural wind protection by earth embankments with lightening suppression mounted on top of the building. The Minneapolis facility is a shared location with personnel monitoring the doors from 7:00AM to 11:00PM requiring a signature and picture ID to access. After-hours access is granted by card access with biometrics. There are digital cameras monitoring the facility with video feeds back to the Minnetonka facility that are viewed and recorded digitally. The Minneapolis facility is a multi-story building with the physical colocation space located on the second floor. Bandwidth All services such as Internet, Data, Ethernet, DS1, DS3 and OCn are directly connected to the TW Telecom network via secure and redundant SONET technology. Transport There are (3) redundant Fiber Optic routes into the facilities that do not cross at any point. Fire Suppression VESDA Zoned dry pipe fire suppression is installed in the facilities. It is a two part detection system that identifies which zone has an issue. During phase I of detection, the system will flood the pipe in the affected zone. In phase II of detection the system will send a release signal to the zones with the flooded pipes. Only the zones identified with issues will be released. Diesel Generators The facilities have multiple 2 Megawatt generators. Each diesel generator has a 3000 gallon fuel tank. Winter mix is run year round in all diesel generators which is supplied by (2) suppliers. The diesel generators can run both GoIWx s power needs along with all environmental systems required to maintain a constant temperature and humidity level at the facilities. Under full load the system could run for a minimum of 36 hours. 13

19 UPS Systems In the event of a full commercial power loss, the UPS Systems are designed to operate for a minimum of 15 minutes under full load. While under UPS Systems power, the diesel generators are designed to automatically transfer the power, the transfer happens in 45 to 120 seconds. Facility Preventative Maintenance Inspections Generator, UPS, ATS and HVAC preventative maintenances (PM) are performed at regular intervals with different levels of maintenance at each scheduled interval. The different levels are Monthly/Quarterly/Semi-annual/Annual. All PMs are captured in a task assigned work flow web portal. All task completions are metric reported and visible to Colocation management. They are visible manually at all times and a full report is sent to multiple levels of Colocation management monthly to ensure completion and compliance. Inventory control activities have been implemented to control the GoIWx s assets and to prevent unauthorized removal of GoIWx owned equipment or property. User Control Considerations GoIWx s control objectives and their related controls were designed with the assumption that certain controls would be in place at our Client s organizations. It is not feasible for all of the control objectives related to GoIWx s services to be solely achieved by GoIWx control procedures. Accordingly, user organizations, in conjunction with the services provided by GoIWx, should establish their own internal controls or procedures to complement those of GoIWx. This section describes additional controls that should be in operation at our Client s locations and their users. The following complementary user organization controls should be implemented by user organizations to provide additional assurance that the control objectives described in this report are met. As these items represent only a part of the control considerations that might be pertinent at the user organizations locations, users should exercise judgment in selecting and reviewing these complementary user organization controls. Provide Information Security Training of users on an annual basis. Assure all devices connected to the GoIWx services have the most up to date Anti-Virus and Anti-Malware software subscriptions as possible, and set to full scan at least weekly. Assure all devices connected to the GoIWx services have the most up to date patching for windows and other third party software. The ability to remotely wipe any device at any time in the case of theft or loss by the Client. Passwords are changed every 90 days or less and follow strong password guidelines. End users screen locks require passwords and engage after 15 minutes of inactivity. The Client does not allow the use of shared accounts. third Party access to their systems should be monitored routinely and only allow access to third parties during active projects/support. Formal Information Security Program and/or policies to provide guidance on acceptable use of network, systems and data. Have a policy to provide guidance on the disposition past employee s company data. Copies of passwords and encryption keys are securely stored off-site. Passwords and encryption keys are not shared with others not authorized to have access to them. 14

20 ERP Clients do periodic test restores of data being stored at GoIWx to ensure data and encryption key validity. Client issues with contracted services from GoIWx are reported promptly and in writing to GoIWx for remediation and resolution. Actual or suspected security breaches uncovered by the Client organization that may impact services being provided by GoIWx will be promptly reported to GoIWx. GoIWx Clients should regularly review their Business Continuity Plans (BCP) to ensure that GoIWx provided services continue to meet the organization s needs as outlined in their plans Clients have procedures to address risk and or removal of dormant GoIWx user accounts. This list of user control considerations is not comprehensive and other user controls not listed above may be required. 15

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

CoreSite A Carlyle Company. 70 Innerbelt Colocation Services

CoreSite A Carlyle Company. 70 Innerbelt Colocation Services CoreSite A Carlyle Company 70 Innerbelt Colocation Services Independent Service Auditor s Report on s Placed in Operation and Tests of Operating Effectiveness For the Period of October 1, 2009, to March

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability Service Organization Controls 3 Report Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability for the period May 1, 2015 through October 31, 2015 Ernst &

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

SOC 2 Report Seattle, WA (SEF)

SOC 2 Report Seattle, WA (SEF) SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 Report on FORTRUST s Enterprise Data Center and Colocation Services System Relevant to Security and Availability For the Period October

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

INDEPENDENT PRACTITIONER S TRUST SERVICES REPORT LIQUID WEB, INC.

INDEPENDENT PRACTITIONER S TRUST SERVICES REPORT LIQUID WEB, INC. INDEPENDENT PRACTITIONER S TRUST SERVICES REPORT LIQUID WEB, INC. Web Hosting Services Trust Services Report on Management s Assertion (SOC 3) As Of June 30, 2014 LIQUID WEB, INC. Trust Services Report

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

Spyders Managed Security Services

Spyders Managed Security Services Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012

System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Independent Service Auditor s Report

Independent Service Auditor s Report Independent Service Auditor s Report Microsoft Corporation Global Foundation Services Independent SOC 3 Report for the Security and Availability Trust Principle for Microsoft GFS 1 Independent Service

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

Security and Managed Services

Security and Managed Services iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors

Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com To the Management of NTT America, Inc.: Report of Independent Auditors We have

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Toronto Public Library Disaster Recovery recommended safeguards and controls

Toronto Public Library Disaster Recovery recommended safeguards and controls BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1 Agenda Audits Articles/Examples Classify Your Data IT Control

More information

Security Policy for External Customers

Security Policy for External Customers 1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 sales@i2cinc.com www.i2cinc.com Table of

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability

Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability 15301 Dallas Parkway, Suite 960, Addison, TX 75001 MAIN 214 545 3965 FAX 214 545 3966 www.bkmsh.com Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information