Fujitsu A/S
|
|
|
- Elwin Gallagher
- 10 years ago
- Views:
Transcription
1 Fujitsu A/S Independent Service Auditor s Assurance Report on IT General Controls regarding IS CORE Services in Denmark in the period 1 November 2011 to 31 October November 2012
2 Content 1 Service Organisation s Assertion Fujitsu A/S description of IT General Controls for IS CORE Services in Denmark Scope for this report The IS CORE organisation Description of the IS CORE organization Infrastructure Services Solution Group & Project Management Customer Services Service Delivery Management Strategic Outsourcing and Service Sales Supply Management Financial Controlling Security Management Services Service Portfolio Procedures Governance Cooperation model Service Delivery Management Operational reporting Customer Solution Lifecycle (CSLC) The customer s responsibility Service Auditor s Assurance Report Control objectives, controls, tests and related findings Additional information Other information The Act on Processing of Personal Data Certification/Compliance level ITIL/ISO20000 implementation status Global/Nordic cooperation...21 PwC 2 of 21
3 1 Service Organisation s Assertion PwC 3 of 21
4 2 Fujitsu A/S description of IT General Controls for IS CORE Services in Denmark 2.1 Scope for this report The IT general controls which are covered by this report include the following operating systems and the network related to these: Windows Unix/Linux iseries For data centres in Ballerup and Hellerup. 2.2 The IS CORE organisation Description of the IS CORE organization IS CORE is one of three Fujitsu (Fujitsu) delivery organisations based in Denmark (the others are: Application Service and Product & Field Services). The IS CORE organisation is divided into five areas: Infrastructure Services, Solution Group, Customer Services, Service Delivery Management as well as Strategic Outsourcing and Service Sales. It also comprises related staff functions: Supply Management, Security and Financial Controlling. The primary services delivered by the IS CORE delivery organisation are: Hosting, data centre services (Windows/Linux/Unix), Network (WAN/LAN, mobility) and ServiceDesk. Fujitsu currently has two data centres, charged with monitoring and operating approx. 1,700 servers and delivering first level ServiceDesk services to approx. 500 users. As at September 2012, IS CORE had a total of 82 employees Infrastructure Services Infrastructure Services is divided into four departments: Remote Infrastructure Management (RIM), Network & DataCenter Management, System Management and Nordea Service Center. The primary function is to supply professional back office IT services covering a wide spectrum of IT operation and delivery services. RIM, Network & DataCenter Management and System Management operate as IT specialists in the realm of IT technical disciplines involving the delivery apparatus, serving as systems engineer in matters relating to Windows, UNIX, Linux, iseries, Data Management, Backup and Storage management, System management plus network infrastructure handling. They are also responsible for the physical data centre set-up. The individual departments' areas of responsibility are described in detail in the following sections. The Nordea Service Center department supports Nordea in a 24/7 set-up that supplements the IT specialist responsibility with an agreed 24-hour monitoring and operation service. The department is customer-specific and therefore not part of the current statement of warranties and representations. System Management The System Management department delivers backup/restore, desktop deployment, storage and asset management services. The Backup/Restore team is responsible for backing up our hosted servers, and its duties include day-to-day control and troubleshooting. Also, the team is part of a 24/7 shift. The Desktop Deployment team is responsible for customer infrastructure, including application packaging and maintenance, and caters to customers who have purchased this service. PwC 4 of 21
5 Storage is responsible for delivering storage services, including the allocation of storage and maintenance, and caters to customers who have purchased this service. Asset management is responsible for ensuring that our Configuration Management Database (CMDB) is up-todate and for monthly reporting to Service Delivery Management. Network & DataCenter Management The Network department is responsible for any operation and delivery that relate to our network infrastructure, for ensuring availability of the required capacity and that security measures comply with the audit standards for physical as well as logical network security. Data Center Management is responsible for the operation of our two data centres in Ballerup and Hellerup. This responsibility includes comprehensive physical equipment set-up as well as labelling and documenting the physical installation. It is also responsible for servicing and testing the data centre infrastructure (power, cooling, UPS, alarms etc.) and for availability of the required capacity. Remote Infrastructure Management RIM has overall responsibility for the operation, delivery and administration of the various server platforms handled by IS CORE. These include Windows/Intel, Linux, UNIX and iseries. In relation to the various platforms RIM is responsible for the operating system as well as related function areas. These include for instance VMware, Citrix, MS SQL, Oracle, Exchange, Patch Management and SAP Basis. This area comprises implementation, standardisation, optimisation and support in relation to new deliveries and sales, proactive service monitoring, second level support in connection with incident and problem management, regular optimisation, change management and participation in 24/7 day-to-day operation shifts. All these activities are focused on compliance with the contractual terms of the SLA. Within each area, a technical lead has been appointed with primary responsibility for the relevant area, including, e.g., optimisation and ensuring that the area s development plans are adhered to, and participation in new sales activities and additional sales to existing customers. Global Delivery Centre Fujitsu owns 9 Global Delivery Centres (GDC), placed around the world. From these GDC s offerings as Monitoring and Management, SAP Management and Service Desk are delivered. Fujitsu Danmark uses resources from the global Fujitsu-organization Global Delivery Center (GDC) in conjunction with these specific offerings. Fujitsu have since January 2012 started a project, where a number of the service offering, delivered to customers in Denmark, will be delivered using GDC as subcontractor. Before a GDC is used as subcontractor in Fujitsu Denmark, a risk assessment of GDC and the actual delivery have been performed. Fujitsu Denmark customer will continue to have Fujitsu Denmark as primary contact, and will be informed before the transformation of the delivery, as well, as there will be signed a data transfer agreement, according to guidelines from Datatilsynet. If the service covers tasks, that are covered by the European Parlament and of the Council of 25 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, this is handled by Fujitsu and Datatilsynet, se more in section In accordance with increased use of GDC-delivery organization, the Danish organization and department structure have been adjusted. Nordic organization To support and strengthen Fujitsu Global setup, a Nordic organization have been implemented as of 1 st of September 2012, and thereby created a common Nordic business unit. Hereby is secured an increased utilization of resources and knowledge cross the Nordic borders. PwC 5 of 21
6 2.2.3 Solution Group & Project Management Solution Group Solution Group operates as a presales function in relation to Strategic Outsourcing and Service Sales and Service Delivery Management. Solution Group handles the following tasks: Preparation of technical design for existing as well as new customers Preparation of quotations (technical) for customers Preparation of contractual appendices Advice on technical design Service description maintenance Cost calculation Project Management Project Management is responsible for implementing transition projects in accordance with the signed contract. The project plan is the task description for the project manager and the project group. The project manager is authorised to change time schedules for the individual tasks and the persons performing them as long as the master plan is not affected. Changes to the completion of the total project and its phases must be approved by the steering group. The project manager prepares detailed specifications for the tasks to be performed. Content, objectives and time schedules are agreed with the persons performing the individual tasks. The project manager regularly monitors the project development in relation to the approved time schedule. Any deviations from the plan will trigger the required corrective measures. The project manager is responsible for ongoing reporting of progress and identified risks as well as clarifying any required changes Customer Services Customer Services is divided into four departments, ServiceDesk, On-site, Change and Problem Management. The primary function is to deliver professional services covering a wide spectrum of IT operation and delivery services. ServiceDesk operates as a single point of contact (SPOC) for all our customers users. The service may cover specific ServiceDesk services, correcting end-user errors and resolving incidents, or function as an error message point for customers own IT function. On-site operates as an extension to ServiceDesk, performing work tasks that can only be performed directly at the users locations. Task examples include: local troubleshooting or software installation, installation or dismantling of new hardware and general user support. Change Management handles change tasks in IS CORE, and Problem Management handles problems in IS CORE. Both departments use ITIL processes Service Delivery Management Service Delivery Management has the day-to-day responsibility vis-à-vis operating customers to ensure that operations generally follow the agreed processes, that the agreed services are delivered and that the operating status is regularly reported. The ongoing reporting generally follows Fujitsu s standard reporting procedures and contains, e.g., information on SLA compliance, capacity status and financial reporting. Service Delivery Management holds regular status meetings with the customer, clarifying any deviations from the agreement and following up on the project status, among other issues. Service Delivery Management has also the responsibility for ongoing invoicing and performing customer satisfaction interviews. Service Delivery has together with Strategic Outsourcing and Service Sales focus on optimization and growth of existing contracts. PwC 6 of 21
7 2.2.6 Strategic Outsourcing and Service Sales The focus for Strategic Outsourcing and Service Sales is to build Service sales pipeline and expanding the customer portfolio by winning IT service contracts involving outsourcing. The primary focus is on infrastructure services (IS). Our primary segment is customers with more than 250 IT-employees in private and public sector. The main focus of infrastructure services contracts is data centres and desktop-managed service contracts and ServiceDesk offerings to first and second level support. Strategic Outsourcing and Service Sales has together with Service Delivery Management focus on optimization and growth of existing contracts as well as building pipeline for new customers Supply Management Supply Management is the primary accountability for the partnership with the Offshore Supplier and thereby all of the service provided by the Offshore Supplier to FSDK. The responsibility covers meetings, follow up on KPI s and the agreed economic figures in contract Financial Controlling Financial Controlling collects and records accounting data and prepares and delivers accounting and analysis material to the entire IS CORE organisation. Financial Controlling is primarily responsible for presenting budgets and forecasts. Input is collected by cooperating with the management and the persons responsible for customer relations at IS CORE Security Management Internal administrative security function, that ensures the implementation and updating of security and quality procedures. The responsibility for the technical security is placed within the line organisation. Ensuring that security and quality procedures are implemented and updated Primary contact to auditors Monthly/quarterly Self-Assessment Ensuring that risk assessments are performed Assistance in the preparation, updating and testing of contingency plans. IS CORE s security manager represents IS CORE in Fujitsu s information security committee. 2.3 Services Service Portfolio IS CORE has a service portfolio forum called: Service Portfolio Management Forum. IS CORE s Service Portfolio Management Forum comprises the following areas: New services Approved services, part of the service catalogue Discontinued services Regular meetings are held to review IS CORE s service portfolio, including the following points: Launch of the preparation of new service descriptions based on, e.g., input from IS CORE s strategy, sales input and customer requirements Follow-up on launched service design and implementation Review of the service catalogue and an assessment of whether services should be phased out. PwC 7 of 21
8 Service catalogue The service catalogue includes a general overview of all IS CORE service descriptions, including: An overview of all applicable service descriptions An overview of the service description history An overview of coming services The primary and most commonly used standard services are: UK_Server_Management_Service UK_Server_Capacity_Service UK_Hosting_Service UK_SAN_Service UK_NAS_Service UK_Backup_Service UK_AD_Management_Service UK_Database_Management_Service UK_Exchange_Management_Service UK_Firewall_Service UK_Internet_Service UK_Wan_avaliability_service DK_Servicedesk DK_ _Spam_and_Anti-virus_service. UK_Citrix_and_Terminal_Management_Service UK_iSeries_Server_Management_Service For customers, a customer-specific service catalogue can be prepared that includes a brief overview of services as well as sales prices Procedures IS CORE delivers the services specified above using control measurements and control activities as described in Section Governance Cooperation model With a view to ensuring the best possible cooperation relations between the customer and Fujitsu in connection with the delivery of the agreed services, a cooperation organisation is set up that includes a joint meeting structure: Cooperation organisation The cooperation organisation comprises the following levels/groups: Strategic level Steering group The steering group handles overall steering matters such as: Overall contractual matters Follow-up on service objectives as well as financial objectives Cooperation relations, including any conflict resolution Strategic and political plans as well as initiatives Overall proactive advisory services Overall objectives and visions In special cases working groups The steering group comprises responsible decision-makers from the customer as well as Fujitsu Operational level Follow-up on operations Follow-up on projects The operations and project follow-up group has the responsibility for handling general operational and projectrelated issues in relation to services. PwC 8 of 21
9 2.4.2 Service Delivery Management In connection with its taking over of operations, Fujitsu appoints a Service Delivery Manager. Throughout the operation period, the Service Delivery Manager will handle all ongoing tasks mentioned in section and have an escalation responsibility vis-à-vis the customer so that all measures are taken in accordance with the agreed SLA. The Service Delivery Manager is Fujitsu s representative vis-à-vis the customer as concerns contractual aspects and, hence, responsible for compliance in all dealings with the customer. The Service Delivery Manager has the following areas of responsibility: The customer s point of contact in all matters relating to the contract Fujitsu s ambassador vis-à-vis the customer Holding steering group meetings with the customer Holding operating meetings with the customer Holding internal operating meetings Preparing operational reports Asset management Internal escalation Launching new projects Solving problems inside the Fujitsu organisation as well as in relation to the customer Annual customer opinion survey Reporting The Service Delivery Manager is responsible for ensuring regular reporting on recent operational performance Operational reporting Operational reporting is performed at regular intervals as agreed in the contract. Operational reporting is performed in accordance with Fujitsu s standard template and most often contains information on: Status on meeting service objectives SLA and service quality in general Evaluation and follow-up on ongoing tasks and cases Change management Project portfolio overview portfolio management Proactive advisory services, primarily on an operational level Use of capacity, licences and disk space Future and ongoing activities and implementation tasks, including project related long term tasks Status and progress reports on current projects 2.5 Customer Solution Lifecycle (CSLC) Fujitsu uses the international Fujitsu CSLC model in connection with the sale, implementation and delivery of contracts/services. CSLC is a 10-phased model that defines Fujitsu s management of the lifecycle process. It includes the phases from the time when: Opportunities (solutions or services) arise/are identified Via sales, ending with a contract Via implementation/transition To the subsequent operation/maintenance of the solution/services. The model is completed when the contract is terminated. The model is used by everyone involved in the sale, implementation and operation/maintenance, the focus being on approving the individual phases. 2.6 The customer s responsibility The customer is responsible for the preparation of risk assessments and contingency plans to ensure that the customer s business activities can be carried on in a disaster situation. PwC 9 of 21
10 The customer is responsible for the physical safety at its own location, including access and protection of server rooms (such as emergency power and fire detection). Other responsibilities are distributed as agreed between Fujitsu and the customer in contracts/operation manuals. Such responsibilities may include: Hardware Licences User administration Applications Third-party suppliers PwC 10 of 21
11 3 Service Auditor s Assurance Report To the Management of Fujitsu A/S (Fujitsu), Fujitsu s customers of IS CORE Services and their auditors Scope We have been engaged to report on Fujitsu s description in section 2 of IS CORE Services in Denmark throughout the period 1 November 2011 to 31 October 2012 and on the design and operation of controls related to the control objectives stated in the description. Fujitsu A/S responsibilities Fujitsu A/S is responsible for: preparing the description and accompanying assertion in section 2, including the completeness, accuracy and method of presentation of the description and assertion; providing the services covered by the description; stating the control objectives; and designing, implementing and effectively operating controls to achieve the stated control objectives. Service Auditor s responsibilities Our responsibility is to express an opinion on Fujitsu s description and on the design and operation of controls related to the control objectives stated in the description, based on our procedures. We conducted our engagement in accordance with International Standard on Assurance Engagements 3402, Assurance Reports on Controls at a Service Organisation, issued by the International Auditing and Assurance Standards Board. This standard requires that we comply with ethical requirements and plan and perform our procedures to obtain reasonable assurance about whether, in all material respects, the description is fairly presented and the controls are suitably designed and operating effectively. An assurance engagement to report on the description, design and operating effectiveness of controls at a service organisation involves performing procedures to obtain evidence about the disclosures in the service organisation s description of its system, and the design and operating effectiveness of controls. The procedures selected depend on the service auditor s judgment, including the assessment of the risks that the description is not fairly presented, and that controls are not suitably designed or operating effectively. Our procedures included testing the operating effectiveness of those controls that we consider necessary to provide reasonable assurance that the control objectives stated in the description were achieved. An assurance engagement of this type also includes evaluating the overall presentation of the description, the suitability of the objectives stated therein and the suitability of the criteria specified by the service organisation. We believe that the evidence we have obtained is sufficient and appropriate to provide a basis for our opinion. Limitations of controls at a service organisation Fujitsu s description is prepared to meet the common needs of a broad range of customers and their auditors and may not, therefore, include every aspect of the IT General Controls that each individual customer may consider important in its own particular environment. Also, because of their nature, controls at a service organisation may not prevent or detect all errors or omissions in processing or reporting transactions. Also, the projection of any evaluation of effectiveness to future periods is subject to the risk that controls at a service organisation may become inadequate or fail. PricewaterhouseCoopers Statsautoriseret Revisionspartnerselskab, CVR-nr Strandvejen 44, 2900 Hellerup T: , F: , 11 of 21
12 PricewaterhouseCoopers Statsautoriseret Revisionspartnerselskab, CVR-nr Strandvejen 44, 2900 Hellerup T: , F: , 12 of 21
13 4 Control objectives, controls, tests and related findings Control objective: Information security policy and risk management Management has prepared an information security policy which sets out clear objectives for IT security, including choice of frame of reference and allocation of resources. The information security policy is maintained with regard to an actual risk assessment. Fujitsu control PwC test Finding Information security policy Fujitsu A/S (Fujitsu) has prepared an information security policy that reflects the enterprise s business areas. This policy is based on the standards that Fujitsu follows: ISO27001:2007/DS484:2005 compliance PCI DSS rel. 2.0 (October 2012) certified. Fujitsu s policy is supported by a detailed set of rules and a set of procedures that are included in Fujitsu s Information Management System. Risk assessment Fujitsu carries out risk assessments of IS CORE s information assets. The risk assessment is carried out systematically using tools. Risk assessments are carried out at least once a year. The risk assessment responsibility is placed with system and data owners who launch the assessment in cooperation with a person responsible for assessment. Change management Change management is planned to ensure stable operations via planning and control so that any addition, removal and modification of equipment/applications are made with the least possible risk of errors and interruptions. Change management is handled via standard methods and procedures to ensure a clear allocation of responsibilities and coordination of all changes. The change management procedure comprises the following steps: registration, assessment, planning, build/testing, performance and approval. We have moreover reviewed the information security policy and inspected that the policy is updated and approved. We have moreover reviewed the risk assessment and inspected that the assessment is made within the latest year. We have moreover verified that the procedure is supported by a system and that the system contains functionality which is necessary to gain an overview of open and closed changes. Using judgemental samples, we have also inspected that changes performed comply with the change management procedure. PwC 13 of 21
14 Control objective: Physical security Operation takes place from rooms which are protected against damage, caused by physical conditions such as fire, water damage, power failure, breaking and entering or vandalism. Fujitsu control PwC test Findings Server room/secure areas All server rooms are provided with raised access computer flooring and are protected against the inflow of water and moisture from the outside. Moisture detectors are installed in all server rooms. Three-phase power supply is provided, and all servers are supplied from two different phases (if possible). To ensure uninterrupted power supply, UPS and emergency power generators have been installed to take over in the event of supply failure. For fire protection purposes, four detector and argonite/inergen fire extinguishing systems have been installed, and an alarm has been connected to an external supplier. Manual fire extinguishers are placed strategically. All server rooms and secure areas are videomonitored. UPS, generators and inergen pressure are controlled on a monthly basis and all installed moisture and temperature sensors are tested. Access to server rooms/secure areas Access to server rooms/secure areas is given based on an assessment of the need for access. IS CORE employees primarily have server room access. We have moreover inspected that preventive systems are present in the server room, including: Raised floor Safeguard against moisture Moisture detectors Servers power supply are redundant UPS and emergency generator Fire fighting system Video surveillance We have also reviewed documentation of continuous maintenance and test of equipment and alerts. During a visit to the server room, we have moreover observed that access to secure areas is restricted through the use of an access system. Using judgemental samples, we have also reviewed the procedures for physical security in secure areas to assess whether access to these areas requires approval from Management. PwC 14 of 21
15 Control objective: Access control Operation takes place from rooms which are protected by physical access controls, limiting the risk of unauthorized access. Fujitsu control PwC test Findings Access control In Fujitsu s buildings, all exterior doors (apart from the main entrance) and the most central interior doors remain locked at all times and can only be opened using the electronic ID card issued to all employees to be worn visibly. Access rights are unique and are allocated to the individual cardholders as agreed with the employees superior officers. Access to secure areas always requires the use of a personal PIN code, and access to other areas requires a personal PIN code outside normal opening hours. All use of access cards to doors and lifts is logged. This log is kept for three months. Logs are regularly reviewed for suspicious activities or events, with particular focus on access outside normal working hours, repeated failed attempts to gain access and sabotage. We have moreover reviewed the access log. In connection with our review performed in the buildings, we have observed that: Indoor locks are locked Access to secure areas requires a PIN code Employees carry a visible ID Access rights are individual PwC 15 of 21
16 Control objective: Networks/Logical security Logical access controls are established, limiting the risk of unauthorised access to networks and servers. Suitable business procedures and controls are also established regarding granting of, following up on and maintenance of access rights to systems and networks. Fujitsu control PwC test Findings Network setup Fujitsu uses 802.1x on the internal administration network, which means that only approved computers with installed certificates will be permitted access to the internal administration network. Only Fujitsu employees who require access to the customer network can gain such access via a VPN client and an RSA token (two-factor authentication). Customers external suppliers will be permitted access via VPN, provided that this has been preordered and approved by the customer. Customer-Fujitsu relations For each customer account it is agreed which type of communication should be used between the customer s location and Fujitsu. In each customer contract it should be specified whether the customer wants a redundant installation in the customer s junction point. Password control Fujitsu s standards do not allow the use of default supplier passwords such passwords must be changed in connection with the installation. A specific procedure is used that describes password requirements, including combination, length and periodic shifts. Server passwords are kept in a separate database, to which access is limited and requires management approval and in which all changes are logged. External access External access to Fujitsu s network requires a VPN connection. Validation of access requires two-factor authentication in the form of an RSA token and a personal code. After three failed log-in attempts, the user is denied access. The used token must then be reset and opened via Fujitsu s ServiceDesk. We have moreover inspected that VPN access and certificate are used to obtain access to the internal administration network. We have also reviewed extractions from relevant network components. We have moreover reviewed contracts with respect to operational deliveries and security level. We have also reviewed regular status reporting to customers concerning performance and security issues. Through analysis of configuration extractions, we have moreover reviewed password settings in Windows, Unix and iseries. We have also observed that the password database is used to store special passwords and that the use of the database is logged. We have moreover observed that the VPN access works via a token and that the user is excluded if a wrong password is entered three times. We have observed that several contracts exist with an incomplete description of the agreed security level. We have also observed that the procedure subsequently has been adjusted. Management has informed that the process is expected implemented by 31 December No further exceptions noted. We have observed weaknesses in relation to the continuous review of users and passwords on specific servers which do not comply with Fujitsu s requirements. We have subsequently been shown a demonstration of an access control system, which will strengthen the validation of users. Management has informed that the implementation of the access control system is due 31 December No further exceptions noted. PwC 16 of 21
17 Control objective: Networks/Logical security Logical access controls are established, limiting the risk of unauthorised access to networks and servers. Suitable business procedures and controls are also established regarding granting of, following up on and maintenance of access rights to systems and networks. Fujitsu control PwC test Findings User access All Fujitsu employees have access to the administrative network. Access to the required customer networks, subject to management approval, is only available to employees working at IS CORE and who have the required password. User access and rights are subject to monthly random checks. Antivirus Fujitsu uses a leading antivirus product for protection against harmful software in all Windows-based workstations and servers. Servers use an adapted policy that matches the relevant system and its role. Incidents are reported via agents to a central log server, which is controlled regularly Firewall Fujitsu uses market-leading products for the firewalls used in the network. Only trusted employees from the network group have access to administer these systems. All access logins are accumulated in an access history log. When implementing a new firewall, the initial set-up is defined in a set of rules. As a starting point, the primary rule is Deny All. All firewalls are documented in an internal system to which only trusted persons have access. Configuration files are regularly backed up. All changes to the set of rules are implemented based solely on an approved request for change (RFC). This procedure applies irrespective of whether the change is requested by Fujitsu, a customer or an application supplier. Firewall changes are subject to monthly Self- Assessment where the approved RFC is matched against the relevant set of rules. Any deviations are recorded and corrective action initiated. We have moreover reviewed the approval procedures for access to customers networks. We have also inspected that Self- Assessment is performed on the basis of judgemental samples. Using random samples, we have observed that antivirus is installed on Windows-based work stations and servers. We have moreover reviewed the anti-virus procedures. Through review of firewall extractions, we have inspected that: Only trusted employees have access to administration of these systems In the implementation of new firewalls, specific rules are applied which as a minimum include the Deny All rule All firewalls are documented in a secure system Changes are implemented on the basis of an approved request for change (RFC) Monthly, review is performed of any changes to the firewall rules We have observed that there is no regular review of users (Fujitsu users) on customers platforms. We have been informed that the implementation of the new access control system, which is due 31 December 2012, will improve the user review. No further exceptions noted. PwC 17 of 21
18 Control objective: Logging Incidents and problems are identified and dealt with. Fujitsu control PwC test Findings Logging If agreed between Fujitsu and the customer, transactions on agreed servers are logged and analyzed. Transactions are logged, with primary focus on events such as failed login, invalid username and failed authentications. Fujitsu is using a centralized logging platform. We have moreover reviewed log settings based on system extractions from platforms and systems. We have observed that the security logging is not activated on all servers. We have subsequently been informed that Fujitsu has initiated corrective action; equipment has been procured and installed, and a project plan for implementation has been prepared. Management has informed that the implementation is due 31 December No further exceptions noted. Control objective: Server management Appropriate business procedures and controls are established regarding operations. Fujitsu control PwC test Findings Installation Servers that must meet ISO27001/DS484 requirements and comply with the PCI standard will be installed in accordance with standards based on best practice so that, e.g., all unnecessary services will be disabled. Server management All installed servers are subject to monthly health checks in accordance with the applicable procedures. Health check output is handled by the Service Delivery Manager, who reports this information to the customer, cf. the standard reporting agreement. procedures/control activities which We have moreover reviewed system extractions from relevant servers. procedures/control activities which We have moreover inspected that health checks are performed, including follow-up thereon. We have observed that the prepared security baselines for Unix and Windows have been incomplete and not implemented. We have subsequently received updated security baselines. Management has informed that baselines initially are implemented when new servers are installed. Additionally a Self- Assessment control is performed to remedy the weakness. No further exceptions noted. We have on Unix servers observed that the SSH protocol allows unauthorized admin access to the network. Management has informed that corrective actions have been initiated. We have observed that security health checks on Unix platforms are not being performed. Management has informed that corrective actions are being implemented by 31 December No further exceptions noted. PwC 18 of 21
19 Server patching Patching is performed in accordance with applicable procedures. In connection with the implementation, it has been agreed with the customer whether patching requires any application supplier s approval. Monitoring Monitoring services cover the monitoring of hardware and operating system, and if additional module monitoring has been purchased, such as SQL or Exchange, special knowledge modules have been installed to handle this. Alarms are generated at different levels, e.g. information, warnings and alarms based on a baseline. procedures/control activities which Based on system extractions from platforms and systems, we have moreover reviewed the patch level. We have also reviewed the patch procedure. procedures/control activities which We have moreover verified that monitoring and necessary alert systems are implemented on all critical systems. We have observed Windows and Unix servers, which did not have the newest patch-level. Management has informed that corrective actions are being implemented by 31 December No further exceptions noted. Backup All equipment handled by Fujitsu, according to specific customer contracts and according to service description is included in backup setup. Backups are controlled on a daily basis, and failed groups will be restarted. Backup tapes are stored in firesafe in separate rooms. Monthly Self-Assessment controls are performed to ensure that restore tests are performed and documented. procedures/control activities which We have moreover observed a sample of system level backup procedures for evidence that they are formally documented. We have observed the physical security features (e.g., restricted physical access) for the off-site storage facilities for evidence that system level backups are stored securely. We have furthermore inspected a sample of backup logs associated with system level backups for evidence that backups have executed successfully or if not, that remedial action was taken. PwC 19 of 21
20 Control objective: Disaster recovery plan Fujitsu is able to continue serving customers in a disaster situation. Fujitsu control PwC test Findings Structure of Fujitsu s disaster recovery The overall disaster recovery plan comprises a disaster management procedure and operational disaster recovery plans for specific disaster areas. The operational disaster recovery plan defines the disaster organisation, including management functions, contact information, warning lists and task force instructions. Detailed task force instructions have been prepared for the individual platforms in the event of reestablishment in an emergency operation situation. procedures/control activities which We have moreover reviewed material concerning the disaster recovery and verified that the organizational and operational IT disaster recovery plan contains managerial function descriptions, contact information, alert lists and instructions. We have observed a lack of restoration plans for both production platforms and client environments. Management has informed that this is expected remedied due Q No further exceptions noted. PwC 20 of 21
21 5 Additional information 5.1 Other information The Act on Processing of Personal Data The Danish Act on Processing of Personal Data (Act no. 429 of 31 May 2000) Guidance to Executive Order no. 528 of 15 June 2000 on Security Measures for the Protection of Personal Data that is Processed for the Public Administration Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Certification/Compliance level Fujitsu has implemented the following process standards Fujitsu has a Business Management System and is certified in accordance with ISO9001:2008 Fujitsu has an Information Management System, which is compliant with DS484:2005 /ISO27001:2007 within the areas in which a risk assessment indicates that its use is relevant and profitable for Fujitsu Fujitsu is certified in accordance with PCI DSS rel 2.0 within the areas in which Fujitsu operates Credit Card Data Each year, Fujitsu publishes an auditor s statement in accordance with RS3402 type 2 Fujitsu has an IT Service Management System, which is compliant with ISO20000:2011 within the areas in which a risk assessment indicates that its use is relevant and profitable for Fujitsu ITIL/ISO20000 implementation status Fujitsu signs two general types of outsourcing contracts. These are: 1. Outsourcing contracts that cover only IS CORE (Infrastructure Outsourcing) 2. Outsourcing contracts that cover IS CORE and AS/AM CORE (Infrastructure og Application Outsourcing) For ITIL processes, this means that Fujitsu works with general ITIL processes in relation to the customers and internal ITIL processes in IS CORE and AS CORE. As of 1 October 2012, the following ITIL procedures will be implemented in IS CORE: Incident management Problem management Change management Configuration management Service portfolio and catalogue management Release management Continuity management Global/Nordic cooperation Fujitsu Global In relation to processes, Fujitsu Denmark is subject to the applicable guidelines issued from time to time by the global Fujitsu organisation. Fujitsu Global Business Group sets out general guidelines to be implemented by the individual regions to the extent that this is relevant for the individual business areas. Fujitsu Denmark is placed under the Nordic Region. Fujitsu Denmark cooperates with the other Nordic countries in the process area. Procedures Fujitsu Denmark s process system will always reflect the set of rules to be followed by Danish employees, irrespective of whether the rules are initialled globally, from the Nordic Region or locally from Denmark. PwC 21 of 21
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
Roles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
N e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
Managed Desktop Support Services
managed enterprise technologies Managed Desktop Support Services MET Managed Desktop Support Service Most organisations spend lots of time and money trying to manage complex desktop environments and worrying
Managing service delivery
This White Paper describes how service delivery is managed: obtaining the required service levels and quality within agreed costs, managing performance and managing risks. The customer organization must
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Information Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
Version 1.0. IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process
Version 1.0 IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process Table of Contents 1 Planning and Organization... 6 1.1 Executive Overview... 6 1.1.1 ITSM & ITAM
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
ITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
Adlib Hosting - Service Level Agreement
Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
ITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015
SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation
With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.
Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
END-USER REMOTE SUPPORT AND HELPDESK SERVICES SERVICE DEFINITION
END-USER REMOTE SUPPORT AND HELPDESK SERVICES Complete IT Support for Business Westgate IT End-User Remote Support and Helpdesk Services: Service Definition Service Name End-User Remote Support and Helpdesk
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
End-User Remote Support and Helpdesk Services
End-User Remote Support and Helpdesk Services A single contact point for support needs G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Contacting the Service Desk... 3 Management Reports...
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
1 Why should monitoring and measuring be used when trying to improve services?
1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
E f f e c t i v e p r o c e s s - d r i v e n
E f f e c t i v e p r o c e s s - d r i v e n S e r v i c e S u p p o r t Frontier Business Systems has over a decade of experience in design, delivery, deployment and support of complex IT infrastructure
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
Technical Overview N2EX
25.09.2014 Espen Døvle Technical Overview N2EX Nord Pool Spot AS Tel +47 6710 9100 Fax +47 6710 9101 PO Box 121, NO-1325 Lysaker, Norway Org nr. NO 984 058 098 MVA [email protected] www.nordpoolspot.com
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT CHANGE HISTORY Version Date Remarks 4.7 2-2-2016 Changed the URL to the editions on the website. Table of contents 1 INTRODUCTION... 3 1.1 AGREEMENT AND PARTIES... 3 1.2 OBJECT
ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
whitepaper 4 Best Practices for Building PCI DSS Compliant Networks
4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
HP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
Firewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
G-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
