Technical Proposition. Security
|
|
|
- Angelina Boyd
- 10 years ago
- Views:
Transcription
1 Technical Proposition
2 ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net
3 Why Read this Technical Proposition? When you turn on the personal computer that you have in your home office or family room, you re probably launching several software applications that are specifically designed to protect your system against malicious attacks. You almost certainly have anti-virus software, and you may also have firewall and anti-spyware software. If your computer is relatively new, you probably have to provide a password, even if you re the only person who uses your system. All of these programs exist to protect a single home computer. Now consider the marketing information system you use at work. You re probably one of hundreds or even thousands of people who access and use the system. If you work for a large organization with operations spread across the globe, your marketing software is probably used around-the-clock. Plus, your marketing information system contains data that is confidential and highly valuable to your company. Compared to your home computer, the security stakes are much higher. ADAM Software NV adamsoftware.net [email protected] iii
4 Read this Technical Proposition to learn: º º Why software security has become a strategic business issue º º What the four critical dimensions of information security are and why all are essential º º How the software solution provided by ADAM Software provides world-class information security ADAM Software NV adamsoftware.net [email protected] iv
5 Contents Why Software Matters? The continuing evolution of marketing software systems is elevating security from an administrative task to an issue with major strategic implications. Fundamentals of Information Information security can be defined as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. of the ADAM Software Platform The software solution provided by ADAM Software (the ADAM Platform) is designed to meet the demanding information security requirements of large enterprises, particularly those that operate internationally. ADAM Software NV adamsoftware.net [email protected]
6 Why Software Matters? The continuing evolution of marketing software systems is elevating security from an administrative task to an issue with major strategic implications. Until recently, the software tools used by most marketing organizations consisted primarily of stand-alone point solutions, each of which served a relatively small number of users with similar needs and job responsibilities. Today, software applications touch almost every aspect of the marketing function, and they have become as vital to effective marketing operations as ERP systems are to the overall enterprise. The growing importance of marketing software has driven changes, both in the nature of the software itself and in how marketers use software to maximize marketing performance. º º Many enterprises are transitioning from stand-alone applications to software platforms that include multiple distinct but integrated capabilities. º º To make software available across the entire enterprise, companies now routinely provide remote users access via the Internet. º º To streamline the entire marketing supply chain, enterprises are increasingly providing access to external business partners. Software applications are as vital to effective marketing operations as ERP systems are to the overall enterprise ADAM Software NV adamsoftware.net [email protected] 1
7 Why Software Matters? Continued These changes have produced conditions that make the security of software platforms both essential and challenging. º º More than ever before, software now contains information that is proprietary or confidential and highly valuable to the enterprise. º º The number of individuals who need access to software platforms is larger than ever before, and the access needs of users vary significantly. º º Remote access makes software platforms more vulnerable to external attacks. The consequences of flawed or inadequate security can be significant. Consider a few examples: 1 A global provider of computer games sells into a country that requires mature games to include a specific warning label on the packaging. The same game is sold elsewhere with no labeling requirement. The packaging designs are identical except for the warning label. A marketing employee in the affected country has access to all versions of the game s packaging designs and inadvertently orders packaging without the required label. As a result, the company sells thousands of copies of the game without the warning label, thus incurring significant legal liabilities. 2 A major manufacturer of telecom equipment sells primarily through wireless service providers. The manufacturer is involved in highly confidential negotiations to create a special version of one of its products for one of its resellers. The manufacturer s marketing department creates several content assets for the special product, but access to these marketing assets is not sufficiently restricted. As a result, other resellers learn about the special offering, and two of those resellers decide to end their relationship with the manufacturer. 3 An insurance company based in Paris licenses a photograph for use in its marketing materials. Under the terms of the license, the company obtains the right to use the photograph only in France. The photograph is included in the company s marketing asset database, but the image is not tagged with the use restriction. A marketing employee includes the image in marketing materials that are distributed in Italy and Spain, thus exposing the company to legal liabilities for violating the terms of the license. ADAM Software NV adamsoftware.net [email protected] 2
8 Why Software Matters? Continued 4 A global manufacturer of medical equipment based in the US introduces a new product that it intends to sell only in the US during a ramp-up period. Marketing assets and materials relating to this product are included in the company s marketing content database, but access to these assets/materials is not restricted to US employees. As a result, several salespeople based outside the US download product brochures and begin to include the product in their presentations to non-us prospective clients. These examples illustrate the importance of using secure marketing software solutions. When selecting such solutions, marketing leaders must understand what security capabilities are needed and how each prospective solution provides those capabilities. Remote access makes software platforms more vulnerable to external attacks ADAM Software NV adamsoftware.net [email protected] 3
9 Fundamentals of Information Information security can be defined as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. There are three core dimensions of information security - Confidentiality, Integrity, and Availability. professionals refer to these three essential elements as the CIA Triad. Confidentiality In the information security context, confidentiality means that only authorized individuals or systems can access an information system or the data it contains. To use a phrase often found in spy novels, confidentiality means that only those with an authorized need to know can obtain access to an information system or the data it houses. Confidentiality requires data to be protected while in use, in storage, and in transit. The primary mechanisms for protecting confidentiality are user access controls and data encryption. ADAM Software NV adamsoftware.net [email protected] 4
10 Fundamentals of Information Continued Integrity Integrity refers to the correctness of information and the prevention of unauthorized modification of data or other system components. There are three basic requirements for achieving integrity. º º Unauthorized individuals or systems must be prevented from making any modifications. º º Authorized individuals or systems must be prevented from making unauthorized modifications (whether intentional or accidental). º º Data and other system components must be maintained in a consistent state. For example, a power outage should not cause a change in either data or other system components. The primary mechanism for protecting integrity is an access control system that prevents unauthorized modifications. Availability Availability means that an information system and the data it contains are readily accessible to authorized users. Systems and data can become unavailable because of accidental occurrences (natural disasters, power outages, etc.) and because of intentional attacks. Malicious attacks against availability are known as denial of service attacks. Maintaining availability requires a wide variety of measures. For example, using redundant hardware components and having an effective disaster recovery plan can minimize the effects of hardware failures and natural disasters. The primary mechanisms for dealing with denial of service attacks typically include a combination of attack detection, traffic classification, and response tools. Accountability Some security professionals add the concept of accountability to the CIA Triad. In this context, accountability refers to the ability to trace the events, actions, and activities that occur in an information system back in time to the users, systems, or processes that performed them. The objective is to establish responsibility for actions or omissions that impair information security. The primary mechanisms for providing accountability are the system and application log files created and maintained by the information system. ADAM Software NV adamsoftware.net [email protected] 5
11 Fundamentals of Information Continued Built-In An important key to protecting information security is to use software whose programming code and architecture are free of vulnerabilities. IT security professionals now recognize that it is far more effective to design and engineer software with built-in security than it is to protect vulnerable software after it is in use. Developing secure software applications requires software providers to use a development process that encourages and supports the consideration and evaluation of security issues at every step of the development life cycle. The field of software security defined as the process of designing, building, and testing software for security is still relatively new, but best practices have begun to emerge. When evaluating software applications, you should always insist that prospective vendors provide detailed information regarding the processes they use to assure the security of their software solution. Below are some of the more important questions you should ask potential vendors: º º Do you review security issues at each phase of the software development life cycle? º º What methodologies do you use for security testing? More specifically, do you use automated tools for security testing and/or code review? º º What training does your development team receive specifically regarding application security? Information security can be defined as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. ADAM Software NV adamsoftware.net [email protected] 6
12 of the ADAM Software Platform The software solution provided by ADAM Software (the ADAM Platform) is designed to meet the demanding information security requirements of large enterprises, particularly those that operate internationally. The ADAM Platform utilizes a variety of architectural features and functional capabilities to enhance confidentiality, integrity, availability, and accountability, including: º º A highly configurable identity and access management system º º A multi-tier architecture that prevents direct user access to system data º º Extensive data encryption capabilities º º Robust capabilities for monitoring activity in the ADAM Platform º º Scalability capabilities that support software and hardware redundancy and enhance availability In addition to these architectural features and capabilities, the security of the ADAM Platform is supported by a software development process that places information security at the forefront during each stage of the software development life cycle. ADAM Software NV adamsoftware.net [email protected] 7
13 of the ADAM Software Platform Continued Granular Access Control The ADAM Platform provides a highly configurable role-based access control system for managing user access and privileges. With a role-based access control approach, access to a software system is based on roles defined in the system that align to actual job functions. Specific permissions or privileges are assigned to these roles, and individual users are also assigned to these roles. Role-based access control systems enable access to be managed at the necessary level of granularity, while simultaneously reducing the time required to administer the identity and access management system. The diagram below depicts a high-level view of the identity and access management system used in the ADAM Platform. General Sites Individual User Organizations Roles Languages Field Group Permissions Filetype Permissions User Groups Classification Permissions Record Permissions As this diagram shows, user groups provide the primary basis for managing user access and privileges. ADAM Software NV adamsoftware.net [email protected] 8
14 of the ADAM Software Platform Continued The user hierarchy in the ADAM Platform has four primary components. º º Individual Users Each individual user has a unique user account for the ADAM Platform. The user account contains basic identity credentials (user name and password) as well as user profile information such as an address, a photo, and the language that will be used for the individual s user interface. For enterprises that use Microsoft s Active Directory for user authentication, the ADAM Platform can be configured to integrate with Active Directory. With integration, Activity Directory will be used as a central datastore for user authentication and authorization, and user roles from Active Directory are mapped to user groups in the ADAM Platform. The ADAM Platform user repository can be used in combination with Active Directory integration if an organization has external users that it does not want to store in its domain repository. º º User Groups Each individual user is assigned to one or more user groups. A user group is composed of individuals who have the same or similar job functions and require the same level of access to the ADAM Platform to effectively perform their job responsibilities. Therefore, user groups in the ADAM Platform will typically reflect the functional organization of the enterprise. º º Organizations Each user group is assigned to an organization. Many enterprises will only require one organization in their ADAM Platform. However, the ADAM Platform enables an enterprise to define multiple organizations, which can be useful when the enterprise operates through subsidiaries or independent business units. Multiple organizations allow enterprises to manage user groups on a per organization basis and to delegate security management responsibilities to administrators in each organization. º º Sites The ADAM Platform also enables an enterprise to create multiple sites within one ADAM environment. Sites allow an enterprise to have different settings for each ADAM application server that uses the same database. For example, if an enterprise has an internal website and a website outside its firewall and both websites connect to the same ADAM database, these websites may need to connect with different SMTP servers for sending out notifications. To address this issue, the enterprise can create two sites in the ADAM Platform and assign each to a different SMTP server. The ability to create and use multiple sites is particularly useful for enterprises that use the ADAM Platform to provide SaaS solutions to their customers. ADAM Software NV adamsoftware.net [email protected] 9
15 of the ADAM Software Platform Continued In the ADAM Platform, access rights and permissions are usually granted to user groups. Individual users inherit their access rights and permissions by virtue of their membership in one or more user groups. There is no limit to the number of user groups that can be created in the ADAM Platform, which enables an enterprise to manage user access and privileges at a granular level. This approach also significantly streamlines access management by eliminating the need for administrators to assign permissions to individual users. For example, the ADAM Platform in a large enterprise might have 10,000 individual users, but only 50 user groups. As the above diagram shows, the ADAM Platform does enable access rights and permissions to be granted directly to individual users, but we suggest that this capability should be used sparingly in order to gain the administrative benefits of a role-based access system. The access rights and permissions granted to user groups fall into two categories. º º Roles Roles give or deny the right to perform specific actions in the ADAM Platform. For example, roles are used to grant access to specific application Studios (Asset Studio, DocMaker, etc.) and to allow or prohibit actions such as changing passwords, accessing previews, and managing maintenance jobs. The ADAM Platform provides up to 150+ specific roles (depending on the Platform components installed), and it enables enterprises to create additional roles. The ability to utilize highly specific permissions is another feature of the ADAM Platform that enables enterprises to manage user privileges at a granular level. º º Record-based permissions Record-based permissions control who can do what to the marketing assets (images, documents, etc.) contained in the records that are managed in the ADAM Platform. Individual asset records are linked to freely-configurable asset classifications, and access rights are granted to user groups on a per classification basis. Administrators can grant access rights to the classification itself and/or the asset records linked to that classification. The ADAM Platform further supports granular access control by enabling administrators to choose from eleven different access levels for each asset classification. (See the following page for a description of these eleven access levels.) The ADAM Platform provides extensive watermarking and metadata capabilities, as well as release and expiry dates ADAM Software NV adamsoftware.net [email protected] 10
16 of the ADAM Software Platform Continued ADAM Permissions None No access specified. The access level is determined via inheritance, using the security of the Parent Classification Read The user is only allowed to see the Classification or its Records and open the details page. He cannot modify or delete it. Classify Read + the user can link and unlink the Record in this Classification Modify Classify + the user can modify the Classification or its Record details and is allowed to create new sub-classifications in this Classification Delete Modify + the user can delete the Classification and/or its Records Full Control Delete + the user can change the Classification s security settings Delete + Deny Full Control Delete access with explicit denial of the rights to change security Modify + Deny Delete Modify access with explicit denial of the rights to delete Classifications or Records Classify + Deny Modify Classify access with explicit denial of the rights to modify Classification or Record details Read + Deny Classify Read access with explicit denial of the rights to classify Records in this Classification Deny Read The user is explicitly denied access to this Classification and/or its Records In addition to the primary access control system, the ADAM Platform provides a variety of other mechanisms that enable and support robust access management. º º Metadata fields can be used to set both release and expiration dates at the individual asset level, and these dates can be used in conjunction with the primary access control system to manage access rights. º º Metadata fields can also be used to describe any use limitations associated with rights managed marketing assets. For example, if a photographic image is licensed under terms that permit use only in specified geographic areas or types of media, or with ADAM Software NV adamsoftware.net [email protected] 11
17 of the ADAM Software Platform Continued certain attribution requirements, metadata fields can be used to tag the image with these restrictions. º º The ADAM Platform provides extensive watermarking capabilities. A watermark assures that users only see a corrupted version of a marketing asset (an image, a document, etc.). Watermarks can be assigned globally, per user group, per individual user, and even per file or file version. Therefore, watermarking provides a practical way to discourage the improper use of marketing assets. Multi-Tier Architecture The ADAM Platform uses a multi-tier architecture to support and enhance both performance and security. In the ADAM Platform, presentation, application processing, and data management are logically separate processes, and they exist on three distinct architectural tiers. From a security perspective, the use of a multi-tier architecture means that end users do not and cannot directly access the records residing in the ADAM database or the asset files associated with those records. Access to database records and asset files is provided only by way of a specific ADAM application Studio. This approach supports and enhances information confidentiality and integrity by enabling user identity and permissions to the authenticated and validated before access is provided. Data Encryption The ADAM Platform enables and supports robust data encryption. Because the ADAM Platform uses FTP and HTTP protocols, it can also use SFTP and HTTPS protocols for encrypting datastreams. Therefore, sensitive data can be stored in the ADAM Platform database in encrypted form, and all communications between users and the ADAM Platform and between applications within the ADAM Platform can also be encrypted. Robust Activity Monitoring As noted earlier, accountability is a key element of information security. The primary mechanism for providing accountability is the activity logs created and maintained in a software application. The ADAM Platform automatically generates and maintains detailed logs of all application and database activity that occurs in the Platform. These log files capture and store all actions taken by ADAM Software NV adamsoftware.net [email protected] 12
18 of the ADAM Software Platform Continued users within the Platform. Therefore, enterprise managers can audit these activity logs to identify the source of any events, actions, or activities that impact information security. Availability Through Scalability The ADAM Platform is highly scalable, and this scalability can be used to provide authorized users reliable access to Platform resources. The various components of the ADAM Platform can be separated and hosted on multiple hardware servers, which enables an enterprise to construct an environment that contains both hardware and software redundancy. For more information regarding the scalability of the ADAM Platform, please refer to our Technical Proposition titled, Scalability. You can download Scalability at: Built-In The software development process used by ADAM Software is designed to ensure that the ADAM Platform has security built-in to its architecture and programming code. ADAM Software applies the same rigorous security process to all development activities related to the ADAM Platform, including major Platform updates (new releases) and the addition of new application features and functionality. -related aspects of the ADAM Platform software development process include, but are not limited to: º º requirements are identified and documented and are included in the specifications for all development projects. º º Risk analysis (threat assessment) is an integral part of the design stage of all development projects. º º Programming languages, components, and development tools are evaluated for their ability to avoid software vulnerabilities. º º Code review and code testing are performed at multiple stages of the development process. ADAM Software NV adamsoftware.net 13
19 of the ADAM Software Platform Continued The security of the ADAM Platform has been recognized in two ways by Microsoft: º º ADAM Software has earned the Certified for Windows Server 2008 R2 certification, and Microsoft audited the security aspects of the ADAM Platform in connection with awarding this certification. º º Because Microsoft is an ADAM Software customer, the ADAM Platform underwent a rigorous security evaluation (and was approved) by Microsoft s Application Consulting & Engineering (ACE) team. The ADAM Platform is designed with enterprise-level security built-in to its architecture and programming code ADAM Software NV adamsoftware.net [email protected] 14
20 ADAM Software Technical Proposition Contact ADAM Software Kortrijksesteenweg 1108A 9051 Gent Belgium P: F: ADAM Software US Inc 1515 Broadway New York, NY United States P: [email protected] Web: adamsoftware.net About ADAM Software ADAM Software is a global provider of media workflow and marketing technology software. We offer enterprises the ability to manage, structure and deliver media between people, processes and systems. Working with our partners enables us to implement our software globally while providing workflow solutions to all types of enterprises. What drives us is a passion to organize media intelligently, making it easier and more accessible to everyone. ADAM Software NV adamsoftware.net [email protected] 15
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Business Proposition. Digital Asset Management. Media Intelligent
Business Proposition Digital Asset Management Executive Summary º º The Changing Face of Digital Asset Management Today, a true enterprise-class DAM solution must be the core component of an integrated
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
INFORMATION SECURITY PROGRAM
Approved 1/30/15 by Dr. MaryLou Apple, President MSCC Policy No. 1:08:00:02 MSCC Gramm-Leach-Bliley INFORMATION SECURITY PROGRAM January, 2015 Version 1 Table of Contents A. Introduction Page 1 B. Security
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges
Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Board Portal Security: How to keep one step ahead in an ever-evolving game
Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Ohio Supercomputer Center
Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0
October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
AD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging
Log Management Standard Effective Date: 7/28/2015 1.0 INTRODUCTION The California State University, Chico system/application log management standard identifies event logging requirements, log review frequency,
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
Adobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
