Toronto Public Library Disaster Recovery recommended safeguards and controls
|
|
|
- Sabrina Beasley
- 9 years ago
- Views:
Transcription
1 BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston Street, Suite 1100 Ottawa, Ontario, Canada, K1S 5N4 Document issue: Final Date of issue: March 2006 Copyright Bell Security Solutions Inc., 2006
2 Notices Liability limitation BSSI s liability for all claims and damages arising from this contract including any warranty liabilities will be limited to a maximum value not to exceed the value of the contract under which this work was delivered, and liability for all indirect and consequential damages will be excluded. This document is based upon information which cannot be consider current more than 30 days past collection date, an is obsolete past this date. 2
3 Table of Contents 1 Introduction MTTR cost estimates for TPL data centre Scope Risk Categories Likelihood (frequency) categories Severity categories Risk levels Risk Matrix Cost matrix
4 1 Introduction In December 2005, BSSI delivered a disaster recovery plan to Toronto Public Library (TPL) for the TPL data centre which addressed the following high-level threats to TPL information management systems and services: outage Phone Service Outage Network outage Security breach Power outage Virus outbreak TPL has requested information regarding the benefit of different safeguard options in terms of mean time to recovery from any one of the identified threats. The following section is an estimate of mean-time-to-recovery (MTTR) for the TPL data centre under 7 typical availability recovery safeguard options. Tape back-up Cold site Warm site Hot site High availability site Managed / outsourced high-availability site Generator at local site 4
5 2 MTTR cost estimates for TPL data centre 2.1 Scope These estimates make the following assumptions about the size of the TPL infrastructure under consideration Asset Critical Services (Records Management, Finance, HR, Inventory, ) Critical servers (hardware units) 100+ Number / Names All 2.2 Risk Categories Likelihood (frequency) categories Category Description 1 Expected to occur more than once in a year or chance of occurring is greater than 50% in current year. Will definitely occur at some time. 2 Expected to occur less than one time per year less than 50% chance in the current year. Will probably occur. 3 Expected to occur less than once every 20 years or chance of occurring is less than 5% in the current year. Low probability but could happen. 4 Expected to occur less than once every 100 years or less than 1% in current year. Not expected to occur. 5
6 2.2.2 Severity categories Level Severity 1 Severity 2 Severity 3 Severity 4 Definition Complete data centre outage or no access to building; or all services unavailable; or outage > 3 days Significant impact on data centre services. All services impacted but not total outage; or very slow services, transactions not completing; or User s productivity and client service levels cut by more than half; or outage < 3 days but > 1 day Multiple servers down, certain services unavailable - but not total outage; or user s productivity and client service levels cut by less than half; or outage < 1 day but > 4 hours Data loss but servers functional or single server down. User productivity and client serviced slowed; or outage < 4 hours Risk levels The following risk matrix and definitions are prescribed by the Falconbridge Risk Management Program Framework. 1 II I I 2 III II I Likelihood Category 3 III II 4 III Severity category Code Category Description I High Risk reduction required < 6 months or when required for project. II Medium Risk reduction required within appropriate specified period. III Low Verify that procedures or controls are in place. Very Low No mitigation required. 6
7 2.3 Risk Matrix Major triggering events: Natural event o Lighting Strike / Electrical storm / Power surge o Tornado Local Environment Impacted o Hazardous Chemical External o o External fire Human Continuity External explosion o Pandemic, o Labour unrest Local Infrastructure Loss o Power Outage External cause o HVAC outage o Infrastructure failure Local Physical Impact o Catastrophic fire o Localized in-building fire o Accidental water release Vandalism / Sabotage o Physical o Logical virus, worm hacker Risk Table definitions: Event: threat or incident description Likelihood: as described above Severity: as described above Risks: resulting combination of likelihood and severity Existing safeguards: the systems, applications and processes and procedures currently in place to mitigate risks. Residual risk: the reduced risk / remaining risk after the mitigating systems, applications processes and procedures are taken into account. Recommendations: additional mitigating systems, applications processes and procedures to further mitigate risks. Best View risk: the reduced risk / remaining risk after recommended systems applications and processes have been put in place relation to industry standard mitigation practices (best view) 7
8 ll Security Solutions Inc. Event Likelihood Severity Risk Existing Safeguards Residual risk Site-survival events 1 Recommended safeguards Best view risk Natural event ice storm 4 1 Applies to all site-survival incidents III III 1. patch management and change management 2. maintenance SLAs for IM equipment to be tested and validated Storage Area Network back-up 3. creation of restore-from-back-up procedures Human Continuity labour 3 2 III III unrest Infra loss power outage external cause 1 1 Infra loss HVAC failure 2 1 equipment labelled (not all) Applies to external and internal infrastructure incidents Local Infra loss network failure 2 1 I II facility on-call procedures for normalized maintenance after-hours (untested and un-updated) Vandalism / Sabotage - physical 3 1 I partial outside lighting I partial outside camera coverage Vandalism / Sabotage logical virus/worm Vandalism / Sabotage logical hacker 4. security awareness training for DC staff 2 x battery UPS with max 1 hour (80KW, 35KW) - 5. disaster recovery procedures allows for soft shutdown of key applications in a. centralization of recovery procedures and documentation person on site - hard copy and softcopy** disaster recovery plan b. emergency communications management systems I II automated call-out systems shutdown procedures (untested) 6. auto-shutdown scripting 7. certification, accreditation and testing of procedures and processes start-up (untested) a. shutdown and start-up procedures I back-up procedures (untested) with off site b. back-up and restore processes I rotation monitoring of access points (untested) 2 2 II personnel identification passes issued III perimeter firewalls 8. diesel generator 1 day fuel supply 9. add second HVAC to DC for redundancy** 10. water monitoring above DC 11. fire monitoring above and below DC 12. zoned waterless suppression 13. add second door to DC Applies to Vandalism / sabotage physical incidents 14. visitor enrolment and tracking 15. physical access controls (proximity cards) on DC and secondary server-based anti-virus controls on UPS systems 2 1 I II 16. video monitoring in DC network maintenance contracts for network 17. cover over the outside windows into DC devices (SLAs untested and un-validated) Local Infra loss localized accidental water release 3 1 I waterless fire suppression for DC (FM 200) I Applies to Vandalism / sabotage logical 2 incidents 18. intrusion detection systems (IDS) for network** 19. vulnerability assessment (ethical hacking) 20. telephony VA for illicit modems and faxes 1 Events which will leave the data centre accessible to staff 2 Logical events are network-based or software-based. 8
9 ll Security Solutions Inc. Event Likelihood Severity Risk Existing Safeguards Residual risk Site abandonment events 3 Recommended safeguards Best view risk Natural event - tornado 4 1 III III Storage Area Network back-up 2 x battery UPS with max 1 hour (80KW, 35KW) - allows for soft shutdown of key Local environment chemical spill 3 1 II II applications in person on site disaster recovery plan shutdown procedures (untested) Local environment external fire 3 1 II start-up (untested) II back-up procedures (untested) with off site rotation Local environment external explosion equipment labelled (not all) 3 1 II facility on-call procedures for normalized maintenance after-hours (untested and unupdated) II 1. Disaster recovery site partial outside lighting Human Continuity - pandemic 2 1 I partial outside camera coverage I monitoring of access points (untested) personnel identification passes issued Local Infra loss catastrophic fire 4 1 III perimeter firewalls III server-based anti-virus network maintenance contracts for network devices (SLAs untested and un-validated) Local Infra loss localized inbuilding fire 3 2 III waterless fire suppression for DC (FM 200) III 3 Events resulting in prolonged site abandonment and therefore site-specific safeguards and controls are mooted. 9
10 ll Security Solutions Inc. 2.4 Cost matrix The following costs are un-validated estimates for major upgrades. Precise cost estimates will depend upon proper requirements definitions, project planning and systems engineering. Safeguard name Description MTTR Set-up Cost Yearly ongoing Tape back-up A magnetic tape back-up system or DVD back-up systems. Back-up media managed with formalized controls and rotated off-site 2+ weeks existing existing Generator at local site Upgrade of local site with generator Site-survivable: major upgrade options Development of maintenance and testing procedures and plans Assumes that building can support generator with minor structural modifications on the ground floor (possibly located within the TPL photo room ) immediate $350,000 (procurement of generator systems and install of fuel and fire suppression systems, electrical design and implementation services, staff training, training simulations table top and functional, certification and accreditation services) $50,000 (equipment maintenance, staff training, additional rent, annual training simulations table top and functional) Site-abandonment: major upgrade options Cold stand-by A magnetic tape back-up system or DVD back-up systems. Back-up media managed with formalized controls and rotated off-site Physical recovery facilities maintained with necessary space, power, heating/cooling and telecom. No systems present. 1 week (critical applications) $500,000 (includes improvements to leased site and furniture, development of procurement checklist and vendor $250,000 (includes rent and minimum telecom subscription charges, annual training simulation table top) 10
11 ll Security Solutions Inc. Safeguard name Description MTTR Set-up Cost Yearly ongoing Warm stand-by Hot Stand-by Systems and software procured according to pre-defined list with pre-defined vendors. Assumes short-term occupancy (2 to 8 weeks) before main site is restored. Assumes dedicated site not shared facility. A magnetic tape back-up system or DVD back-up systems. Back-up media managed with formalized controls and rotated off-site Physical recovery facilities maintained with necessary space, power, heating/cooling, raised flooring and telecom. Servers and workstations are in place and available, but are not loaded with services, systems or data. Systems built according to existing build documentation and procedures. Tests performed on recovery procedures and systems on at least an annual basis. Assumes long-term occupancy (8 weeks 1 year) before main site is restored. Assumes dedicated site not shared facility. A magnetic tape back-up system or DVD back-up systems. Back-up media managed with formalized controls and rotated off-site Physical recovery facilities maintained with necessary space, power, heating/cooling, raised flooring and telecom. Servers are built and fully loaded with software and have identical configurations to operational units. Systems need to be powered up and loaded with back-up data according to documented procedures. 1 to 3 days (critical applications) 4 hours $4.5M qualification, development of recovery procedures, training simulation table top) $3M (includes physical site improvements, procurement of systems, development of recovery procedures / build documents, training simulation table top) (includes physical site improvements, procurement of systems and software, development recovery procedures / build documents, training simulations table top and functional, certification and accreditation Cost does not include activation costs during recovery add $1.5M) $750,000 (includes rent, minimum telecom subscription, hardware maintenance, update and management of procedures, annual training simulation table top) Cost includes amortization of equipment. $1M (includes rent, full telecom subscription, hardware/software maintenance, update and management of procedures, annual training simulations table top and functional, 1 maintenance FTE) 11
12 ll Security Solutions Inc. Safeguard name Description MTTR Set-up Cost Yearly ongoing Tests performed on recovery procedures and systems on at least an annual basis. Assumes long-term occupancy (8 weeks 1 year) before main site is restored. Assumes dedicated site not shared facility. services) High availability / mirrored facility Physical recovery facilities maintained with necessary space, power, heating/cooling, raised flooring and telecom. Servers are built and fully loaded with software and have identical configurations to operational units, including RAID drives and back-up capabilities. Back-up systems are synchronized over network with operational systems. (Mirrored) Routers and DNS configured to automatically re-route traffic to HA site Tests performed on recovery procedures and systems on at least an quarterly basis Multiple power sources including on-site generators Assumes long-term occupancy (8 weeks 1 year) before main site is restored. Assumes dedicated site not shared facility. immediate $5M (includes physical site improvements, procurement of systems and software, development of recovery procedures / build documents, integration services, training simulations table top and functional, certification and accreditation services) $2M (includes rent, full telecom subscription, hardware/software maintenance, update and management of procedures, annual training simulations table top and functional, 1 maintenance FTE) Managed / outsourced high-availability capability Same as High Availability but costs will reflect a managed services with a 12 month contract. Costs will assume the same size infrastructure is outsourced outsourcing few/selected components will reduce costs. Multiple power sources including on-site generators within SLA Assumes out-sourcing of day-to-day operational and Disaster sites and management immediate $0 (procurement of systems and software, development of recovery procedures / build documents, integration, training simulations table top and functional, certification and accreditation services) $9M (managed service fees + hardware/software maintenance update and management of procedures, annual training simulations table top and functional) 12
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)
Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
Disaster Recovery & Business Continuity Dell IT Executive Learning Series
Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY
Itron Cloud Services Offering
Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com
Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com 1 1.1 Introduction 1.2 Purpose 1.3 Priorities 2.1 About your business 2.1.1 Business
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC
Assessing Your Disaster Recovery Plans Gregory H. Soule, CPA, CISA, CISSP, CFE Andrews Hooper Pavlik PLC Andrews Hooper Pavlik PLC Agenda Business Continuity Concepts Impact Analysis Risk Assessment Risk
Information Systems Security Assessment
Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect
Birkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
CISSP Common Body of Knowledge: Business Continuity & Disaster Recovery Planning Domain Version: 5.9.2
CISSP Common Body of Knowledge: Business Continuity & Disaster Recovery Planning Domain Version: 5.9.2 CISSP Common Body of Knowledge Review by Alfred Ouyang is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
DISASTER RECOVERY AND BUSINESS CONTINUITY
DISASTER RECOVERY AND BUSINESS CONTINUITY ISO 9001/27001 PARTNER ONLY NODE4 LIMITED 03/01/2014 DISASTER RECOVERY PLAN This plan will be held at Node4 s premises located at Pride Park in Derby and also
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
How to Design and Implement a Successful Disaster Recovery Plan
How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions
BUSINESS CONTINUITY PLAN OVERVIEW
BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
ITMF Disaster Recovery and Business Continuity Committee Report for the UGA IT Master Plan
ITMF Disaster Recovery and Business Continuity Committee Report for the UGA IT Master Plan I. Executive Summary Planning for continued operation during unforeseen catastrophic events, and for returning
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
IT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
Disaster Recovery for Small Businesses
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
Contact us for a free consultation today! 630-936-4045 [email protected]
IT Relocation Schedule Moving offices? Often, relocating your IT infrastructure can be one of the most daunting aspects of the move, and it s also the most critical to business continuity. Servers, PCs,
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Business Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Disaster Recovery Plan Checklist
Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information
RL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
DRAFT Disaster Recovery Policy Template
DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...
IT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
Prepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement
Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au [email protected]
Introduction to WatServ & Cloud Computing for Microsoft Dynamics
By 2012, at least 14% of the infrastructure and operations of Fortune 1000 companies will be managed and delivered in a cloud-like environment Gartner Group Cloud computing is dramatically changing the
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Perceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
Interactive-Network Disaster Recovery
Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan
Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information
Tailored Technologies LLC
685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations
APPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian
Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
Business Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Planning and Implementing Disaster Recovery for DICOM Medical Images
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 [email protected]
Connecting To The Cloud Is Easier Than You Think Audcomp Cloud Services can bring your organization into the cloud. We provide a secure reliable medium to maximize your uptime, allowing you to focus on
Business Continuity Management and The Extended Enterprise
WHITE PAPER Business Continuity Business Continuity Management and The Extended Enterprise Continuous Availability in a Real-Time Economy Business Continuity is receiving a great deal of attention in the
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Building and Maintaining a Business Continuity Program
Building and Maintaining a Business Continuity Program Successful strategies for financial institutions for effective preparation and recovery Table of Contents Introduction...3 This white paper was written
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Business Impact Analysis (BIA) and Risk Mitigation
Texas Emergency Management Conference 2015 Business Impact Analysis (BIA) and Risk Mitigation Alan Sowell, COOP Unit Supervisor Paul Morado, COOP Unit Planner BIA Implementation Process BIA Private Sector
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Qvidian Hosted Customer Technical Portfolio
Introduction The presents a description of Qvidian s Software as a Service (SaaS) deployment model, providing information on the Qvidian architecture and security practices. This document includes descriptions
Disaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop [email protected] (866) 796-0310 www.os33.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering from a disaster
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
