Information Technology Enterprise Architecture Standards
|
|
|
- Emmeline Sims
- 9 years ago
- Views:
Transcription
1 State of Colorado Information Technology Enterprise Architecture Standards July 16, 2004 Commission on Information Management (IMC) Governor s Office of Innovation and Technology (OIT)
2 Revision History Version 0.1 Draft Created Architecture Advisory Committee Version 1.0 Revised State CIO s Review Version 1.0r1 Approved Commission on Information Mgmt Version 1.1 Revised State CIO s Review Revised State CIO s Review Executive Summary The State of Colorado s Office of Innovation and Technology convened an advisory panel of industry experts in enterprise architecture to recommend a World-class enterprise architecture that would enable the State to provide services to the State s constituents and to manage it s applications and data independent of organizational structure. The advisory panel recommends a Web Services architecture for the State of Colorado. This architecture provides the independence of data and application management desired by the State. Further, the standards which support a Web Services architecture are mature and well supported by vendors and products. This ensures the State can leverage free market competition as it pursues construction of systems which conform with enterprise architecture and supporting standards. Architecture Advisory Board Members Bannon Bednarcyk Vasanthan Dasan Alan Grose Jeet Jagasia Rick Lebsack Gordon McGowan Marshall Presser Jeff Sherrard Steve Williams IBM Sun Microsystems Microsoft Microsoft IBM Sun Microsystems Oracle State of Colorado Cisco Systems Information Technology Standards 7/16/ of 17
3 Table of Contents 1.0 Purpose 2.0 Goals and Objectives 3.0 Scope 4.0 Relationship to Other Standards 5.0 Policy and Governance 6.0 Technical Architecture 6.1 Web Architecture 6.2 Network Architecture 7.0 Supporting Standards 7.1 Network 7.2 Datacenter 7.3 Web Access Identity Management 7.6 Database 7.7 Application 7.8 Security Information Technology Standards 7/16/ of 17
4 1.0 Purpose This document presents the Web Services architecture recommended by the Enterprise Architecture Industry Advisory Panel. This document also identifies the technical standards required to enable the architecture. 2.0 Goals and Objectives The State of Colorado s Office of Innovation and Technology convened an industry advisory panel of enterprise architecture experts to recommend a world-class enterprise architecture to support the future direction of the State of Colorado. This direction is to provide one-stop customer service, in person, over the phone, or via the web, 24 x 7. To support these enterprise objectives the enterprise architecture must provide: seamless data sharing across the enterprise, seamless application sharing across the enterprise, seamless, heterogeneous datacenter management, 24 x 7 service delivery, standards based vendor competition, and, stability over a 10-year period. The advisory panel was asked to leverage the work done in industry, in other states, and by the Federal Enterprise Architecture effort. 3.0 Scope The Enterprise Architecture Industry Advisory Panel was asked to identify the critical technical standards that must be present across all State departments, to support the State s future goals and objectives. This effort focused specifically on the technical architecture and did not address the business or information layers of the enterprise. The business layer of enterprise architecture typically addresses the organizations structure and the way in which it interacts with its customers. The information layer addresses the use of information within the enterprise, where information is created, stored, modified and destroyed. Business Layer Information Layer Technical Layer Figure 3.1 Enterprise Architecture Scope Information Technology Standards 7/16/ of 17
5 4.0 Relationship to Other Standards This document and the standards contained within this document, compliment the existing information technology standards that have been previously approved by the Commission on Information Management. If conflicts arise between this standard and a past standard, this document shall take precedence. If conflicts arise between this standard and federal standards, the federal standards shall take precedence. Nothing in this document shall excuse any State agency from meeting its security requirements established in the Health Information Portability and Accountability Act (HIPPA). This document coordinates with the following State standards: ADA Standards 1/12/ Policy and Governance These standards establish common criteria for the assessment of programs, projects, and initiatives within the departments, agencies, and divisions of the State of Colorado. It is not assumed or intended that all departments will be able to implement these standards at the same rate. It is the intent of these standards that every State agency: 1) Self assess compliance with these standards at least annually, 2) Assess all new programs, projects and initiatives, against these standards, 3) Use these standards in procurements, to the greatest extent possible. The Office of Innovation and Technology shall maintain the statewide scorecard showing the assessment results for each department. This scorecard will assist the Commission in its review and approval of information technology investments and progress towards compliance over time. Exceptions to these State standards require the prior written approval of the Commission on Information Management. 6.0 Technical Architecture The goals and objectives of the State are common in industry and government enterprises. A web services architecture is widely used by these enterprises. Web services are broadly supported by the standards community and the vendor community. This architecture is directly applicable to the goals and objectives for the State of Colorado. Information Technology Standards 7/16/ of 17
6 6.1 Web Architecture The State of Colorado will become a highly interconnected governmental enterprise. The constituents of the State will interact in person, over the phone and via the web. Services will be provided to the constituents independent of the internal organization of the departments, divisions and agencies. The State s Web Architecture, shown in Figure 6.1 below, fully supports this future vision. Web Access Portal Constituents individuals businesses Internet Public Portal Workers remote offices work from home remote partners Internet V P N Private Portal XML Agency A XML Agency B XML Agency C Applications Applications Applications Database Database Database Mainframe s390 Dell / Compaq Windows HP / Sun Unix Figure 6.1 State of Colorado Web Architecture The technology and standards necessary to realize this vision exist, are supported by products available from multiple vendors, and are in common use within industry. 6.2 Network Architecture A highly reliable, high bandwidth network is essential for the success of any technologyenabled enterprise. Users, whether they are constituents, employees, vendors or partners expect to be able to access services anytime. The network must be designed to provide not only the access, but also the security, reliability and response-time required by its users. Information Technology Standards 7/16/ of 17
7 7.0 Supporting Standards A stable body of industry standards support enterprise web services architectures. The critical standards necessary to enable this architecture are presented in this section. 7.1 Network A secure, well-organized network that provides reliable connectivity and performance, is required for a web services architecture. See section 7.8 Security, for additional security requirements IP Network All State computers (desktop, server, mainframe) must be accessible via an IP network IP Address Allocation IP address blocks must be centrally managed for the Enterprise. IP addresses must be allocated geographically following standard sub-netting rules. Each geographical region should aggregate to a single route Local Network Local, unroutable, internal IP addresses that conform with RFC 1918, shall be used on end user devices, to the greatest extent possible Routing State Networks must use a standards based Interior Gateway Routing protocol (IGP) to connect to the MNT. Acceptable protocols are OSPF, EIGRP and RIPv2. Multi-Protocol Label Switching (MPLS) must be used in the State WAN to provide logical separation of network traffic Domain Name Services (DNS) DNS names registration must be centrally managed and administered. Domain name servers must be redundant and geographically distributed. Machines will be accessed via DNS names to the greatest extent possible Reverse Proxy All State webservers must utilize reverse proxy servers or virtual IP load balancing technologies. See Figure Three Firewall DMZ for a graphical representation of the placement of a reverse proxy server Dynamic Host Control Protocol (DHCP) DHCP must be used for all desktop, laptop, and remote systems. Fixed IP addresses shall only be used for network devices and servers. Information Technology Standards 7/16/ of 17
8 7.1.8 VPN (Virtual Private Networking) Remote access to internal State computational resources must only be provided through secure VPN connections. These connections shall require three (3) element authentication, as a minimum (e.g. an identifier username, something you know password, something you have SecurID code). These connections must provide encrypted exchange of information through the entire life of the connection Remote Access VPN Access VPNs encompass analog, dial, ISDN, digital subscriber line (DSL), mobile IP, and cable. Access to internal State computational resources may only be provided through secure VPN connections Site-to-Site VPN Network nodes requiring secure connectivity between themselves and their organizational hub, or where secure connectivity over the Internet is more cost effective and efficient than private WAN connectivity Extranet VPN Links between customers, suppliers, partners, or communities of interest to the State Intranet over a shared infrastructure may be provided through secure VPN connections Firewall All State computers must be protected from public access through the use of stateful Firewalls. These firewalls must follow the philosophy to deny all access except those protocols, ports, and addresses that are explicitly permitted. Firewall policies shall be clearly documented, reviewed, and updated annually Wireless Access Points No wireless access points or bridges shall be allowed to connect to the State s network without providing: 802.1X authentication & authorization for access, WEP based encryption, and, a non-broadcast SSID. No wireless Access points are allowed to connect to Data Center network segments Network Administrator Security Default accounts that provide administrator or super user privileges on network equipment shall be protected Default Administrator Passwords Default administrator passwords shall be changed on installation. Information Technology Standards 7/16/ of 17
9 Administrator Passwords Strongly Formed Administrator or super-user passwords shall be strongly formed. The password must contain at least one number, one lower case character and one uppercase character. The password cannot contain any dictionary word greater than or equal to four (4) characters. The password cannot be changed to any of the three (3) previous passwords. The password must be at least eight (8) characters long Administrator Passwords Changed Every 90 Days All administrative passwords shall be changed at least every ninety (90) days, and on departure of any person with knowledge of those passwords Administrator Password Storage Administrative passwords shall not be stored anywhere on the file system in text readable format; this includes operational batch scripts, application programs and password files Log Failed Admin Access Attempts All failed attempts to gain access to user accounts with administrative privileges shall be logged and reviewed at least weekly. Information Technology Standards 7/16/ of 17
10 7.2 Datacenter The State has a duty to secure the Public s data and provide for its availability to continually perform the State s business. All data of record stored by the State, must be contained in a clearly identified datacenter. Each datacenter must provide: a) Datacenter Operational Services b) Environmentals (Power, HVAC, Fire) c) Network (bandwidth, utilization, latency, redundancy) d) Security (physical, network) e) Backup / Restore Capabilities and Services f) Business Continuance Datacenter Operational Services Every State datacenter must provide a description of the datacenter operational services provided. On-site vs. off-site support must be clearly identified Datacenter Environmentals Every State datacenter must provide controlled environmentals to include: a) conditioned and/or uninterruptible power, b) heating and cooling, and c) fire suppression Datacenter Network Access Every State datacenter must provide network access for mission critical Enterprise data. Network access shall be characterized by bandwidth, utilization, latency and redundancy Datacenter Physical Security Every State datacenter must provide physical security that limits access. This must constitute the second layer of physical access between the public and State owned resources Datacenter Network Security Every State datacenter must provide network security as specified in Section Security Datacenter Backup All State computers (desktop, server, mainframe) must have system, application, and data backup plans and procedures documented. The plans and procedures shall be reviewed and updated annually. These plans must include: 1) periodic backups, 2) periodic movement of backups to offsite storage, 3) periodic recovery testing Datacenter Disaster Recovery or Business Continuance A disaster recovery plan or a business continuance plan must be created Information Technology Standards 7/16/ of 17
11 for each Department or Agency s computational resources (desktop, server, mainframes, network). The plan must include a business case showing the impact to the State and it s constituents. The plan shall be reviewed and updated annually. 7.3 Web Access A major goal for the State is to provide one-stop customer service. Internet standards provide a sound technical foundation for that goal. These originate in standards bodies and exist to ensure interoperability between different technologies and are supported by multiple vendors. Another goal of the State is 24 x 7 service availability. Technologies inherent in web infrastructure are commonplace in the web services market today. Web applications can be easily spread across multiple application servers. If one server fails, another server takes over for it. An edge server can dispatch the browser requests across as many servers as necessary. This provides for 24 x 7 availability. Browser HTTP/HTTPS HTML Internet Colorado.gov Figure 7.3 Web Access HyperText Markup Language (HTML) HTML (HyperText Mark-up Language) interface is the standard for user interfaces. All new development efforts are required to design an HTML interface as the systems primary user interface EXtensible Markup Language (XML) XML (Extensible Markup Language) is the standard format for server-toserver data interchange. All new development efforts are required to design XML interfaces, define data interchange documents via Document Type Definitions (DTD), and implement services to accept requests and provide replies to valid DTD s State systems must support the following standards: Simple Mail Transport Protocol (SMTP), Post Office Protocol (POP) and/or Internet Mail Access Protocol (IMAP), and, Multipurpose Internet Mail Extensions (MIME) Information Technology Standards 7/16/ of 17
12 Browser IMAP Internet Mail server SMTP Mail server Users Mail client POP Figure 7.4 Architecture Simple Mail Transport Protocol (SMTP) SMTP is the standard for exchange of between servers. All State servers must support SMTP Post Office Protocol (POP) and/or Internet Mail Access Protocol (IMAP) All State servers must support POP3 or IMAP4 for client access Multipurpose Internet Mail Extensions (MIME) All State servers must support MIME content. 7.5 Identity Management Large number of users, constituents, employees, partners and suppliers are allowed to access systems and information in the State s web enabled enterprise. Identity management is the capability to manage these varied identities and levels of access, across the enterprise s varied environments. An identity management system must include administrative and self-service interfaces that simplify and automate managing the addition (provisioning) and removal (deprovisioning) of users and their ability to access systems. Delegated administration allows multiple administrators to assist in the provisioning and management of users, allowing the main administration group to delegate some authority to departments or agencies, as necessary. This allows the large problem of user identity to be divided into manageable pieces Directory A solid directory foundation is required infrastructure necessary to enable mission-critical security and authentication Lightweight Directory Access Protocol (LDAP) All State directories must support the LDAP standard. Information Technology Standards 7/16/ of 17
13 X.500 Directory Services Model All State directory structures must follow the x.500 standard. 7.6 Database At the heart of the enterprise architecture is data storage, manipulation, and retrieval. In order to provide a high quality and consistent level of data service within and between agencies, the State will mandate that all new database management system satisfy the following conditions. Database systems that do not meet such standard will at minimum provide gateways that enable their data to be shared by relational systems using SQL as the standard means of interaction Open Database Connection / Java Database Connectivity (ODBC/JDBC) ODBC/JDBC is the standard for database connectivity. All State database systems must provide for ODBC and/or JDBC connections Structured Query Language (SQL) Structured Query Language (SQL) is the standard for database queries. All State database systems must support SQL Relational Database Management System (RDBMS) All State databases must be relational database management systems RDBMS Administrator Security Default accounts that provide administrator or super user privileges in an RDBMS shall be protected Default Administrator Passwords Default administrator user passwords shall be changed on installation Administrator Passwords Strongly Formed Administrator or super-user passwords shall be strongly formed. The password must contain at least one number, one lower case character and one uppercase character. The password cannot contain any dictionary word greater than or equal to four (4) characters. The password cannot be changed to any of the three (3) previous passwords. The password must be at least eight (8) characters long Administrator Passwords Changed Every 90 Days All administrative passwords shall be changed at least every ninety (90) days, and on departure of any person with knowledge of those passwords Administrator Password Storage Administrative passwords shall not be stored anywhere on the file system in text readable format; this includes operational batch scripts, application programs and password files. Information Technology Standards 7/16/ of 17
14 Log Failed Admin Access Attempts All failed attempts to gain access to user accounts with administrative privileges shall be logged and reviewed at least weekly. 7.7 Application Common application development methodologies ensure consistency of application development and support. Tool-based development enables tool-based operations and support, which improves systems long-term maintainability, reducing total cost of ownership. Applications Architecture Presentation HTML XML Figure 7.7 Application Architecture Application Database ODBC SQL application (business logic), from the database n-tier Application Development All State web applications shall be developed following the n- tier development model to clearly separate presentation (look and feel), from the In addition to the advantages of distributing programming and data throughout a network, n-tier applications have the advantage that any one tier can run on an appropriate processor or operating system platform and independently of the other tiers Tool Supported Software Development All State applications development shall be supported by software engineering tools for the management of requirements, design, and software development. Information Technology Standards 7/16/ of 17
15 7.7.3 Analysis and Design All analysis and design must be performed using object oriented analysis (OOA) and object oriented design (OOD) tools and techniques Uniform Modeling Language (UML) In order to facilitate precise communication, an open source independent modeling language is required. UML is widely supported for this purpose. Every State application must have an accompanying Use Case models, Class Diagrams, Component models and Deployment Diagram Configuration Management Management of software assets (models, code, documentation, test cases, etc) shall be centralized in a configuration management repository. 7.8 Security The State has an obligation to its citizens, businesses, employees, and its agencies and departments to provide security of information residing in and traveling to or from state operated computers Encryption All State computational resources using encryption shall use approved encryption algorithms and key lengths. (112 or 168 bit 3DES, 128 bit SSL, or AES Advanced Encryption Standard) for data in transit as well as data in place. The use of proprietary encryption algorithms is not allowed for any purpose Intrusion Detection Service (IDS) Network Based All publicly accessible, State computers must have a network based intrusion detection service capable of combating unauthorized intrusions, malicious Internet worms, bandwidth attacks and e-business application attacks. The IDS must provide stateful pattern recognition, protocol analysis, traffic anomaly detection, and protocol anomaly detection. The IDS must monitor all IP protocols (e.g. TCP, UDP etc). The IDS must statefully decode application-layer protocols (e.g. FTP, SMTP, HTTP, DNS, RPC, Telnet etc). The IDS must interact with firewalls and other network devices to actively shunt attacks and provide event notification Virus Detection Information Technology Standards 7/16/ of 17
16 All State computers shall have software capable of detecting known viruses and worms and informing system administration personnel which files are infected. This software must allow for periodic update of its virus list from an external source Wireless Security Access to State of Colorado networks via unsecured wireless communication mechanisms is prohibited. Only wireless systems that meet the following criteria are approved for connectivity to State networks. This standard covers all wireless data communication devices connected to any State internal network. This includes any form of wireless communication device capable of transmitting data. State wireless connections must: Maintain point-to-point hardware encryption of at least 128 bits. Support strong user authentication which checks against an external database such as TACACS+, or RADIUS b (Wi-Fi) devices must be LEAP/EAP/PEAP compliant DMZ A DMZ protects internal networks from the public network. A DMZ shall be part of all State systems that allow for access to or from the Public Internet. The DMZ must be hosted in a datacenter (see Section 5.2). DMZ Presentation Logic Data Public Internet Firewall Reverse Proxy Firewall Web Server Application Server Firewall Database Server Storage Global Load Balancer Local Load Balancer Figure Three Firewall DMZ Authentication/Authorization/Accounting TACACS+, Radius, or Kerberos authentication must be used for access to all State network resources and devices. Access to systems will require 3- element authentication (e.g. an identifier username, something you know password, something you have SecurID code). Roles and privileges must be maintained in an LDAP compliant data store. Access to State computing & networking facilities and devices will be audited by a combination of hardware and software components that determine which persons are using the system System Administrator Security Information Technology Standards 7/16/ of 17
17 Default accounts that provide administrator, root, or super user privileges on computer equipment shall be protected Default Administrator Passwords Default administrator passwords shall be changed on installation Administrator Passwords Strongly Formed Administrator passwords shall be strongly formed. The password must contain at least one number, one lower case character and one uppercase character. The password cannot contain any dictionary word greater than or equal to four (4) characters. The password cannot be changed to any of the three (3) previous passwords. The password must be at least eight (8) characters long Administrator Passwords Changed Every 90 Days All administrative passwords shall be changed at least every ninety (90) days, and on departure of any person with knowledge of those passwords Administrator Password Storage Administrative passwords shall not be stored anywhere on the file system in text readable format; this includes operational batch scripts, application programs and password files Log Failed Admin Access Attempts All failed attempts to gain access to user accounts with administrative privileges shall be logged and reviewed at least weekly Web Security The State shall us HTTPS (SSL) and WS-Security to ensure secure transmission of information to and from the public Internet. SSL provides transport level security. WS-Security provides message level security for web services. WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. Information Technology Standards 7/16/ of 17
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Access control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
Resonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture
23082011 An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture TABLE OF CONTENTS The SaskTel Hosted Contact Centre Solution... 3 Benefits of the
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Service Descriptions
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Experiment # 6 Remote Access Services
Experiment # 6 Remote Access Services 7-1 : Introduction Businesses today want access to their information anywhere, at any time. Whether on the road with customers or working from home, employees need
Cherwell Software Hosted Environment. www.creekpointe.com [email protected] 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
10605164 Medical Networks and Operating Systems
Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
A Model Design of Network Security for Private and Public Data Transmission
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List
FEAT891 Medium Recoverable using backup The solution shall be recoverable from backup storage media storage media. FEAT893 Desired Medium Support Load Sharing High Availability The solution should utilize
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Network Security. Mike Trice, Network Engineer [email protected]. Richard Trice, Systems Specialist [email protected]. Alabama Supercomputer Authority
Network Security Mike Trice, Network Engineer [email protected] Richard Trice, Systems Specialist [email protected] Alabama Supercomputer Authority What is Network Security Network security consists of the provisions
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
Requirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
IBM enetwork VPN Solutions
IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business
Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.
Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION Date: April 22,2013 Prepared by: Sainath K.E.V Microsoft Most Valuable Professional Introduction: SKV Consulting is a Premier Consulting
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
