Enterprise Architecture Review Checklist
|
|
|
- Eric Young
- 10 years ago
- Views:
Transcription
1 Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish to do business with Informatica. This checklist contains questions from Informatica s Cloud Standards that cover the areas pertaining to Application, Data, Infrastructure, Integrations, Service and Support, Network / VPN, Security, and Legal. To potential Cloud Vendors, please answer the following list of questions and provide explanations for your answers. When completed, please return this completed EA Review Checklist to your Informatica contact, and please also include any and all architecture diagrams you may have that show how your solution is designed from an infrastructure perspective (web servers, app servers, database servers, load balancers, firewalls, data center locations, co-locations, physical servers, virtual servers, etc.) General Information Please answer the following general information questions for your Cloud solution. Please Explain 1. Name of solution: 2. Name of vendor: 3. Name of vendor contact: 4. Web URL of solution: 5. Description of the solution: 6. General Company information: Company Headquarters Company location(s) Founded date Number of current customers List of current customers 7. Is this solution an approved corporate standard? Informatica Enterprise Architecture Page 1
2 Vendor Viability Please Explain 1. Please provide a copy of your income statement, balance sheet, and cash flow for the past 3 years. In particular we are looking for: a. Total revenues and revenue growth for the past 3 years, broken down into license growth and support and services b. Cash position: Both the current cash position and your cash position trend over the past three years c. Profitability i. Level of profitability ii. Current burn rate and amount of cash flowing in and out of the company iii. If you are not profitable, what year are you projecting to become profitable? 2. What is your fiscal year period? 3. Please provide your recent key wins, customer count, and renewal rate. 4. What is your current employee count? 5. What is your current year s projected revenue growth? 6. Venture funding (if private): a. How much Venture Funding have you received to date (and which rounds)? b. Do you plan to take on more funding? If so, why? 7. If Public: a. Do you have any outstanding lawsuits that are of material value currently ongoing? b. Who audits your financials? Have they issued an unqualified opinion on your financials? Are there any ongoing audits due to financial irregularities identified? Informatica Enterprise Architecture Page 2
3 Service Level, Support and Certifications Please answer the following Support related questions for your Cloud solution. 1. Does the solution provide an SLA (Service Level Agreement) of 99.9% and above? Describe your SLAs and any penalties and credits. 2. Does the solution provide 365 x 24 x 7 support with a one-hour response time for critical issues? Describe your support model. 3. Does the solution provide advance notification as well as a list of scheduled maintenance windows where service may not be available? Describe your maintenance windows. 4. Does the solution provide pro-active notification within one hour of service disruption for any un-scheduled service outages where service may not be available? Describe the nature of your outages in the last 12 months. 5. Can the vendor provide independent 3rd party assessments of its infrastructure service compliance for last 12 months? (i.e., SOC 1 (SSAE 16), SOC 2, SOC 3, SYS Trust, WebTrust, ISAE 3042, Safe Harbor, PCI-DSS, HIPPA, ISO 27001, etc.) 6. Can the vendor provide a schedule of on-going independent 3 rd party assessments of its infrastructure and services compliance? Application Please answer the following Application related questions for your Cloud solution. 1. Does the solution have the five essential characteristics of cloud computing? (On demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured service) 2. Is the solution network accessible from mobile devices, laptops and workstations? List the mobile app platforms and major web browsers you support. 3. Is your solution multi-tenant? Describe the multi-tenancy architecture from the application and data perspectives. 4. Does the solution provide automatic upgrades for all users? Describe the release schedule. 5. Does the solution provide a staging or test environment for new features? 6. Does the solution use Java or.net as the development platform? 7. Does the solution use LAMP stack or open source platforms? 8. Does the solution require client software to be installed on client machines or devices? 9. Does the solution provide the ability to control both active and inactive session timeouts? Informatica Enterprise Architecture Page 3
4 Integrations Please answer the following Integrations related questions for your Cloud solution. 1. Does the solution provide the ability to integrate with SAML 2.0, for Single Sign-On? List the identity providers your solution integrates with. 2. Does the solution have account management capabilities? Describe the user provisioning & de-provisioning and role modification & permissions, single user additions and bulk loads. 3. Does the solution provide integration with Web Services APIs? (i.e. SOAP, REST) Please describe and provide documentation for the APIs. 4. Does the solution provide the transfer of Informatica s data via a secure transfer method?.(i.e. secure FTP, https, etc.). Describe the various secure integration methods. 5. Does the solution provide the ability to filter data retrieval via web services by attributes? 6. Does the solution provide the ability to retrieve data as single records or as batches via web services for those solutions that contain high volumes (1M plus) of data? Data Please answer the following Data related questions for your Cloud solution. 1. Will the solution contain employee user data? 2. Will the solution contain customer data? 3. Will the solution contain confidential or sensitive information? 4. Will the solution contain financial data? 5. Will the solution contain personally identifiable information (PII)? 6. Does the solution provide the ability to enforce data retention policies? 7. Does the solution provide the ability to encrypt data in transit? 8. Does the solution provide the ability to encrypt data at rest? 9. Does the solution provide the ability to view or export historical data? 10. Does the solution provide the ability to extract our data? Describe the various methods. 11. Does the solution provide the ability to bulk load data? Describe the various methods. 12. Can the solution generate reports? What reporting does this solution provide? 13. Does the solution provide any segregation of data from other customers? Describe what data and how the data is or is not segregated. Informatica Enterprise Architecture Page 4
5 Infrastructure Please answer the following Infrastructure related questions for your Cloud solution. 1. Does the solution provide high-availability and fault-tolerance that can recover from events within a datacenter? Please describe. (Events to include: High load, hardware, software or network failure) 2. What capacity of infrastructure is currently available? Describe in terms of Compute, Storage and Network capacities. 3. Does the solution provide a backup and recovery plan that at a minimum must include full weekly backups and daily incremental backups? 4. Do you have a business continuity and disaster recovery plan? Describe how you would recover from a natural disaster. 5. Does the solution provide a fail-over or disaster recovery with a one-hour response time in the event of a disaster, such as an alternate recovery site, co-location, datacenter, etc.? Describe your Recovery Time Objectives and Recovery Point Objectives (RTO/RPO). 6. Does the solution provide documentation on the segregation of infrastructure from other customers or other environments? Please provide and describe. 7. Does the solution provide additional development, testing, and/or staging environments in addition to the production environments? Network Please answer the following Network related questions for your Cloud solution. 1. Can the vendor provide estimates of average bandwidth usage requirements per user? 2. Does the solution provide network metrics to determine impact to Informatica s corporate network bandwidth? 3. Does the solution have the ability to throttle bandwidth usage? 4. Does the solution use a CDN (Content Delivery Network) such as Akamai? Informatica Enterprise Architecture Page 5
6 Security Please answer the following Security related questions for your Cloud solution. 1. Does the solution have appropriate security best practices in place? 2. What security solutions do you employ? (e.g. Anti-Virus, Perimeter Firewalls, Web Application Firewalls, Intrusion Detection/Prevention Systems, etc.) 3. Do you notify Informatica of any breaches of our data? 4. Does the solution support multi-factor authentication? Describe what methods are available. 5. Does the solution provide the ability to control network access to the application by named IPs or IP ranges, also referred to as restricting access by IP, or control network access to the application by device? 6. Does the solution provide the ability to enforce Informatica specified password policies? 7. Does the solution provide the ability to control application functionality access by roles for all users, also referred to as Roles Based Access Control (RBAC), via methods such as by attribute or based on a hierarchy? 4. Does the solution provide the ability to audit and export user accounts and historical user activity? 5. What type and level of encryption does the solution support? 6. Does the solution support the generation of pre-shared key values by Informatica? 7. Does the solution use the same pre-shared key for multiple customers? 8. Can the vendor provide evidence of segregation of customer deployments? VPN Connectivity Standards Please answer the following VPN related questions for your Cloud solution ONLY if the solution requires access to Informatica s resources for integration purposes, such as for the following: Active Directory integration Integration with an on-premise Informatica application Site to site VPN tunnel 1. Does the solution require VPN connectivity to internal application, infrastructure or resources? 2. Does the solution support the IP Sec protocol? 3. Does the solution provide the ability to limit it s connectivity and access to only the ports and IPs necessary for integration? 4. Does the solution use the RFC x internal address spacing convention? 5. Can the solution provide named IPs or IP ranges so as to be able to distinguish the solution s network traffic? 6. Can the solution limit all network connectivity from the solution to Informatica resources through secure channels? (i.e. secure file transfer, ssh, https, etc.). 7. What type and level of encryption does the VPN solution support? Informatica Enterprise Architecture Page 6
7 Compliance and Legal Please answer the following Legal related questions for your Cloud solution. 1. Does the solution comply with United States federal and (fifty) states data privacy laws? (i.e. SB1386, MA201, Nevada597) 2. Does the solution comply with international data privacy laws? (i.e. European Privacy Laws, Safe Harbor, bi-lateral agreements between countries) 3. Does the vendor promptly notify Informatica of any non-compliance by solution with such laws (in 1. and 2. above) related to Informatica s data? 4. Can the vendor provide supporting documentation / information regarding compliance with such laws (in 1. and 2. above)? 5. Does the vendor notify Informatica of any 3rd Party requests for our data or information, including but not limited to, those related to legal or other administrative proceedings? 6. Does the vendor obtain Informatica s authorization for any release of our data or information to any 3rd Party? 7. Does the solution provide the ability for Informatica to acquire/retain vendor s data based on legally-related requests from Informatica? 8. Can the vendor provide their policies on customer s rights for request to audit and audit rights? 9. Does the solution provide options for opting out of secondary use of Informatica s data to 3rd parties, partners, etc? 10. Does the solution provide options for opting out of storage of Informatica s data outside of the United States border in particular countries deemed unsafe by Informatica? 11. Does the solution provide the ability to retrieve or export Informatica s data upon termination of service? 12. Does the solution provide the ability / requirement to destroy all Informatica data upon termination of service after retrieval / export, including data stored on backups? 13. Does the solution provide remedies for breach of SLA compliance and other requirements? 14. Does the vendor use any 3 rd party OEM embedded in the product? Can the vendor provide a list of all 3rd party vendors and their relationships? Informatica Enterprise Architecture Page 7
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
NET ACCESS HIPAA COMPLIANT FLEXCloud
Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. [email protected]
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
Time to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Clarizen Security White Paper
WHITE PAPER Clarizen Security White Paper Standards and Practices UNITED STATES 1.866.502.9813 UNITED KINGDOM +44.0.20.3411.2345 ISRAEL +972.9.794.4300 FRANCE +33.18.28839.66 www.clarizen.com Table of
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.
THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application
Table of Contents. CSC CloudCompute Service Description Summary CSC 1
Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
CSC BizCloud VPE Service Offering Summary. CSC i
Table of Contents OVERVIEW... 1 BIZCLOUD VPE SOLUTION SUMMARY... 1 BIZCLOUD VPE INFRASTRUCTURE... 1 Hardware and Virtualization Layer... 2 Compute Components... 2 Storage 2 CSC SUPPORT FOR THE BIZCLOUD
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Cloud Security: The Grand Challenge
Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and
Private vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5
Oracle Cloud Enterprise Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Unless otherwise stated, these Oracle Cloud Hosting and Delivery Policies (the Delivery Policies ) describe
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting
Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions
A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
HC3 Draft Cloud Security Assessment
HC3 Draft Cloud Security Assessment Respondent Contact Information First Name: Grant Company: Ostendio Email: [email protected] Last Name: Elliott Company Address: Ostendio Date: 01/27/2015 Information
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
SAAS MADE EASY: SERVICE LEVEL AGREEMENT
SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined
Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Georgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
The Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Software as a Service (SaaS) Requirements
Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
CLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015
SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation
Cherwell Software Hosted Environment. www.creekpointe.com [email protected] 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments
Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Remote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
