Network Security Guidelines. e-governance
|
|
|
- Bartholomew Kelley
- 10 years ago
- Views:
Transcription
1 Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.
2 Document Control S/L Type of Information Document Data 1. Document Title e-gov Network Security Guidelines 2. Document Code GL_eGov_NS 3. Date of Release 4. Next Review Date 5. Document Revision Number 6. Document Owner DietY 7. Document Author(s) 8. Document Reference Document Approval Sr. No. Document Approver Approver Designation Approver ID Document Change History Version No. Revision Date Nature of Change Date of Approval For Internal Use Only Page 2 of 17
3 Table of Contents 1. INTRODUCTIO N SCOPE PURPO SE NETWORK M ANAGEM NT NETWORK CONNECTIVITY NETWORK SERVICES NETWORK ARC HITEC TURE & DESIG N LOCAL AREA NETWORK LOCAL AREA NETWORK PHYSIC AL S ECURITY PERIMETER SEC URITY FIEWALL ADMINISTRATION ROUTER INTRUSION DETECTION / PREVENTION SYSTEM INTRANET SECURITY SWITCH SECURITY DESKTOP AND SERVER SECURITY VIRTUAL PRIVATE NETWORK SAN REMO TE ACCESS S ECURI TY REMOTE DESKTOP ACCESS THIRD PARTY ACCESS For Internal Use Only Page 3 of 17
4 10. WIREL ESS ACC ESS ENCRYPTION NETWORK MO NITO RING A ND TROUBL ESHO OTING REF ERENCE INTRODUCTION For Internal Use Only Page 4 of 17
5 The increasingly important role of automated information system networks in organizations has fuelled the need for more secure systems. Any intrusion or network failure would affect confidentiality, availability and integrity of the organization information assets. 2. SCOPE This guideline is applicable to all Network devices such as routers, switches, and firewalls etc. used in e-gov service delivery. 3. PURPOSE The purpose of these guidelines is to guide network administrators of e-gov information systems on appropriate use of its assets & facilities deployed for providing e-gov services. It also helps to implement Network Segmentation (I.AC-5), Network Routing Control (I.AC-6), and Network Connection Control mentioned (I.AC-7) in esafe GD NETWORK MANAGEMNT Network services and servers should be controlled to ensure that connected users or computer services do not compromise the security of any other networked services. Network design / architecture of the organization should be formally documented, approved and periodically reviewed by the CISO. Any change initiated in the network design should undergo proper change management process; with appropriate testing and formal approvals for implementation should be sought from CISO, along with any compensating controls if required. The changes should be reflected in an updated network diagram. For Internal Use Only Page 5 of 17
6 The network administrator should ensure that the network diagram is current. Number of entry points and single point of failures should be minimized to ensure a stable network. Servers / Systems which need to be placed in the DMZ should be identified. The firewall and other filtering devices to control the external traffic will be deployed, configured and managed by Network Administrator. Antivirus software should be deployed and managed by Network Team. 4.1 NETWORK CONNECTIVITY All network connections from the untrusted network (internet) should pass through the firewall and router prior to accessing the trusted network. All connections from the internet to the internal network should be through SSL VPN communication channel. 4.2 NETWORK SERVICES The network services and ports, required for business function operations, should be identified, documented and updated periodically or whenever any change is observed The Security team should conduct periodic reviews to ensure no unnecessary services are active on the servers. In case any noncompliance is found during such reviews, CISO should be informed who should take an appropriate action. For Internal Use Only Page 6 of 17
7 Other than the maintained standard list of services and ports if any other service or port needs to be enabled on the server as per the business requirement; must follow a change management process and must be properly authorized, tested and implemented along with the compensating controls if required. The details of this test and approval process should be documented. A network server should be dedicated to a single service; this simplifies configuration thereby reducing the risk of configuration errors. In some cases however, it may be appropriate to offer more than one service on a single host computer. Any remote access or VPN request should go through proper authorization process. 5. NETWORK ARCHITECTURE & DESIGN 5.1 LOCAL AREA NETWORK The network design should clearly demarcate the Local area Network (LAN) of the organization. The LAN should cover the desktops, servers and other devices which are supposed to be placed so as to be protected from the un-trusted network. VLANs configured within the LAN should be highlighted in the design to segregate access to any critical server. Communication between different segments of LAN should be restricted if not required. 5.2 LOCAL AREA NETWORK For Internal Use Only Page 7 of 17
8 The network design should reflect the connections made to the external (i.e. SWAN) networks WAN communication controls will be managed and controlled by network administrator Proper segregation of LAN, WAN, SWAN and Internet connection should be depicted in the network diagram 6. PHYSICAL SECURITY All Devices should be hosted inside secure environment like server room. Devices should be installed inside rack locked with lock & key. Proper environmental condition should be maintained to protect the devices. Every quarter review of physical & environmental condition should be carried out. 7. PERIMETER SECURITY The perimeter security should be managed with the implementation of adequate filtering and monitoring devices such as firewall, Router, Intrusion detection or prevention systems. For Internal Use Only Page 8 of 17
9 7.1 FIEWALL ADMINISTRATION For any systems hosting e-gov applications, or providing access to sensitive or confidential information, internal firewalls or filtering routers must be used to provide strong access control and support for auditing and logging. Physical access to the firewall terminal is limited to authorize people only. Only the firewall administrator and backup administrator must be given user accounts on the firewall. The firewall administrator or backup administrator must only do any modification of the firewall system after raising a proper change request. Before an upgrade of any firewall component, the firewall administrator must verify with the vendor that an upgrade is required. After any upgrade the firewall must be tested to verify proper operation prior to going operational. All security patches recommended by the firewall vendor must be implemented in a timely manner. Firewall Logs: The firewall must be configured to log all reports. Firewall logs will be reviewed on a daily basis by the network security team if any attacks have been detected Firewall backup The firewall (systems software, configuration data, etc.) must be backed up and a copy of current configuration/last configuration would be available with Security team. For Internal Use Only Page 9 of 17
10 Firewall backup files must be stored securely offsite to recover during a disaster. 7.2 ROUTER All default passwords used for administrative or otherwise authorization must be changed. Router must have the latest vendor-supplied security patches installed. Relevant security patches shall be installed within one month of release. Configuration files of the router must be protected properly. Passwords must be changed as per password security policy. Routers must have appropriate login banners. All router operating system upgrades from vendors must be scanned for viruses before using in the production environment. All maintenance fixes must be applied on the routers during non-peak or off businesshour times. Latest configuration of all the routers must be backed up as per the backup policy. Router configuration and rule set should be reviewed after every quarter. Default SNMP community strings must be replaced with complex strings and this strings will be known to only authorized personnel in Data centre. Access rules must be added as business needs arise. Telnet should never be used across any network to manage a router, unless there is a secure tunnel protecting the entire communication path. SSH is the preferred management protocol. For Internal Use Only Page 10 of 17
11 7.3 INTRUSION DETECTION / PREVENTION SYSTEM All default passwords used for administrative or otherwise authorization must be changed IDS / IPS signatures must be updated on regular basis Configuration files of the IDS / IPS must be protected properly and should be backed up as per back up policy Vendor-supplied security patches must be installed on IDS / IPS. All changes must be followed by change management procedure. IDS / IPS rule set must be reviewed after every quarter. Access to IDS / IPS for management purpose must be restricted to authorized personnel and it should be a secure means of access like SSH or HTTPS. 8. INTRANET SECURITY 8.1 SWITCH SECURITY The core switches should be physically located in the Server Room with adequate physical access control and favourable environmental controls. Adequate segregation of internal network should be implemented by configuring VLANs. Inter VLAN based policies and policy based routing should be implemented on the switches. For Internal Use Only Page 11 of 17
12 Only Network Administrators should have user accounts on the switch. Passwords should be changed as per the password policy. Remote access management should only be implemented over VPN or SSH. Configuration files of the switch should be protected by appropriate file permissions/authentication. The switch operating system upgrades from vendors should be scanned for viruses prior to deployment in the production environment. Latest configuration of all the switches should be backed up as per the backup policy. All maintenance fixes shall be applied on the switches during non-peak or off businesshour times. All switches should be configured as per the defined secured guidelines document. 8.2 DESKTOP AND SERVER SECURITY All desktops should be equipped with an updated version of antivirus software. The desktops should be updated with the latest security patch released by the vendor. Access to system utilities should be limited to administrators only. The desktops and servers should be managed and maintained by the system administrator. The desktops and servers should be hardened as per the respective hardening or baseline documents. For Internal Use Only Page 12 of 17
13 8.3 VIRTUAL PRIVATE NETWORK The Organization will be using a Virtual Private Network (VPN) service as a mechanism for its users to access network resources from remote locations. All employees/third parties/contractors requiring VPN access to the organizational network should seek formal approval from the CISO and their Departmental Head highlighting the business need for the access. A list of users granted VPN access should be maintained by the Network Security team All VPN users should authenticate to the VPN server using their network account user ID and password. IPSEC or SSL mode for VPN communication channel should be implemented All users using VPN service should ensure that firewall and virus protection software is installed and maintained on their machine. Software updates should be applied regularly and other standard practices must be followed to keep their VPN client system secure against unauthorized access. Users should not share their VPN account or password with others. Administrative access to VPN should controlled using two factor authentication. 8.4 SAN SAN storage box must be protected from unauthorized access. Only authorized users will have access to the SAN boxes. Changes on SAN storage box should adhere to change management process SAN configuration files should be backed up and copied to secure place For Internal Use Only Page 13 of 17
14 SAN should support cloning (create copy of production disks) onto less expensive disks from which the backup would be performed without affecting the performance of the production disks. 9. REMOTE ACCESS SECURITY The following procedures should be followed to secure IT systems of when they are accessed remotely. 9.1 REMOTE DESKTOP ACCESS All users requiring access to RDP (Remote Desktop Connectivity) services should seek formal approval from their departmental Head and CISO highlighting the business requirement for the same. The list of users granted access to the RDP service should be maintained and updated following changes along with the respective expiration time period. Periodic review of desktop/server should be conducted to ensure adherence to authorized access of RDP service. 9.2 THIRD PARTY ACCESS All connectivity established must be based on the least-access principle, in accordance with the approved business requirements and the security review. Third party or vendor must follow e-gov Security Policy. All changes in the third party connections must be approved and authorized by the Organization. For Internal Use Only Page 14 of 17
15 Third party access privileges should be reviewed at regular intervals. Third party access should be deactivated as per the proper procedure if not required 10. WIRELESS ACCESS Implementation of wireless devices should be approved by authorized personnel. Wireless LAN Access should be over encrypted channel using stronger encryption methods. It should be ensured that wireless access points are secured properly. SSID (Service Set Identifier) of the wireless network should be unique and must not be broadcasted. 11. ENCRYPTION Encryption must be used when information of Confidential and Proprietary classification is passed over the network. Network security team should evaluate the different protocols and implement strong cryptographic controls to safeguard information. Critical information, such as passwords in Database should be encrypted using strong encryption algorithm. For Internal Use Only Page 15 of 17
16 Encryption and decryption keys should be securely stored in a sealed envelope or in a system. 12. NETWORK MONITORING AND TROUBLESHOOTING All network devices should be monitored regularly to identify any link/component failures. The network should also be monitored to ensure legitimate use of the allocated network bandwidth. Appropriate corrective actions and preventive actions should be implemented and documented for any network failures. 13. REFERENCE Network Segmentation (I.AC-5) in esafe-gd200 The network architecture and segmentation should be based on different security level (depending on the nature of the information asset and anticipated security threats). Network Routing Control (I.AC-6) in esafe-gd200 The organization should adopt a policy in respect of controlling the information flow within the system and between interconnected systems. The For Internal Use Only Page 16 of 17
17 information system should enforce such policy wherever there is a difference in the level of trust. Network Connection Control mentioned (I.AC-7) in esafe-gd200 For shared networks, especially those extending across the organization s boundaries, the capability of users to connect to the network should be restricted, in line with the access control policy and requirements of the business applications For Internal Use Only Page 17 of 17
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Remote Access Procedure. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Enforcing PCI Data Security Standard Compliance
Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Network and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
IT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Wired Network Security: Hospital Best Practices. Jody Barnes. East Carolina University
Wired Network Security 1 Running Head: Wired Network Security: Hospital Best Practices Wired Network Security: Hospital Best Practices Jody Barnes East Carolina University Wired Network Security 2 Abstract
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
E Security Assurance Framework:
Version: 1.0 January, 2010 E Security Assurance Framework: Baseline Security Controls for Medium Impact Information Systems esafe GD202 Government of India Department of Information Technology Ministry
PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard
CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard (Approved by the Information Strategy and Governance Committee in December 2013) INTERNAL Date of Issue: 2013-12-24 Document Control
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Standard: Network Security
Standard: Network Security Page 1 Executive Summary Network security is important in the protection of our network and services from unauthorized modification, destruction, or disclosure. It is essential
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
General Standards for Payment Card Environments at Miami University
General Standards for Payment Card Environments at Miami University 1. Install and maintain a firewall configuration to protect cardholder data and its environment Cardholder databases, applications, servers,
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited
Firewall Audit Techniques K.S.Narayanan HCL Technologies Limited Firewall Management Technology Network Security Architecture Firewall Placement Firewall Appliance Rule base compliance with security policy
