REQUEST FOR PROPOSAL (RFP) # HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014

Size: px
Start display at page:

Download "REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014"

Transcription

1 REQUEST FOR PROPOSAL (RFP) # HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 Q1) Page 2, Section A and Page 5, Section H --- Does the County desire only an assessment of compliance with the HIPAA Security Rule, or is assessment of compliance with the Privacy and Breach Notification Rules also included in the scope of services? (Note that the initial overview indicates compliance with security regulations"; however, Section H requests estimates for developing HIPAA Privacy and Security policies and procedures.") Yes, both. Q2) Page 2, Section A, c) --- Please provide the number of departments in Douglas County. 17 departments. Q3) Page 3, Section C --- To assist us in determining the level of effort and cost for completing the scope of services can you provide the following: a) The number and size of the network(s) in scope (i.e., the number of active IP addresses and/or network class). Single campus network with 3,000 IP endpoints. b) The number of web applications in scope. We have approximately 60 web-based apps exposed to the internet, and 50 that are intranet. c) The locations (i.e., each city and the number of locations/facilities in each city) at which wireless network assessment would need to be performed; and the number of wireless access points at each location. We have 17 locations that are wireless enabled. We will rely on the selected vendor to identify how many of those need to be evaluated. d) The number of host servers in scope for assessment and the operating system(s) type and version in use for the host servers. Approximately 17 physical hosts running approximately 600 virtual. e) The number of firewalls in scope. About 10. f) The number of databases in scope for assessing encryption. Those that the selected vendor identify that need to be encrypted; we anticipate at least 4. g) The nature of backups (i.e., are backups to tape, to disk/san, etc.) for assessing encryption. We have tape and disk. h) The number of IT employees (for accessing access to systems and data). 60 i) The number and location of facilities where physical access to servers and storage would be assessed. 3 j) The approximate number of security policies and procedures. We do not disclose this information. Q4) Page 3, Section C --- The scope of services includes assessing IT employee access to systems and data. Does the County desire that access for employees other than IT employees also be assessed? 1

2 Q5) Page 3, Section C --- The required deliverables (bullet 4) states that the vendor will provide a report that includes itemized costs for each recommendation provided, including consulting services costs. Does the County expect that the selected vendor will perform recommended remediation and that the costs provided would be for the vendor to perform that remediation? (Note that providing detailed costs for hardware, software, and consulting services that would be selected by the County and/or provided by other vendors would be difficult.) Not necessarily. Our goal is a map of what needs to be done, and which are critical and which we can have a plan for addressing at a later time. We would also like a cost estimate to make remediations when the gaps are understood. Q6) Page 4, Section D --- Does the County have desired or required dates for starting and/or completing the requested services? No. That will be negotiated with the selected vendor. Q7) Page 5, Section H --- What is the County s available budget for completing the services requested in the RFP? We do not have a pre-defined budget for this. We would create a budget request that conforms to the estimated costs of the evaluation provided by the selected vendor. Q8) Page 5, Section H --- Are travel costs reimbursable as separate expenses for the services requested, or should estimated travel costs be included within any proposed overall fixed costs? Estimated travel costs should be included, not to exceed "billed at actual." Q9) Requirements for corporate references found in section G.1.b on p. 5 state that performance of HIPAA Privacy and Security Gap Analyses for at least 5 entities Is this correctly interpreted to mean: HIPAA Gap Analyses and Privacy and Security Gap Analyses? Please elaborate on the type of experience required. Yes, both. Q10) Section F.1 on p. 4 states that respondents shall describe how a HIPAA Meaningful Use Security Risk Analysis obligation would be met with the proposal. This is the only mention of Meaningful Use in the RFP. Can the County please elaborate on the expectations to evaluated Meaningful Use in the county systems? By meaningful use, we are referring to that language in the HIPAA regulations themselves. Q11) The Overview section A and the entire RFP does not indicate how many systems would be reviewed for this engagement. Can the County state the number and size of the systems that are expected to be evaluated? 2

3 Q12) There is no expectation set in the RFP for the date of delivery of the work products described. Does the County have a timetable in which it expects delivery of the written documentation and other work products as described in Section C. a-c? Please see the responses in Q6. Q13) When was the last time a vulnerability scan and penetration testing was performed? We don't release that information to the public. Q14) Are there any systems hosted by a third-party? If hosted is the hosting party aware of security testing? Though none contain HIPAA related data. If deemed necessary, we will work with our hosted databases to support the security testing. Q15) For internal/external penetration testing, Douglas County looking to test as follow? a) Physical security test to gain access to physical space by evading physical security controls b) Social Engineering test to gain sensitive information from one or more of your employees (to infer or solicit sensitive information) c) Client Side Exploits gain access to client systems through social engineering and targeted client exploits. d) Wireless Testing gain access to networks by bypassing wireless security controls. e) Server Side Exploits gain access to server systems We are looking to the selected vendor to recommend appropriate testing. Q16) Were the findings resolved and is the previous report available for review? No. Q17) How many IP addresses are in scope for the scan and test? A rough estimate of the number of IP end-points is 3,000. Q18) Is Douglas County requesting a black box or white box testing? We are looking to the selected vendor to recommend appropriate testing. Your suggestions will be evaluated for their potential risk. Q19) What is the extent of current Information Security Policies? Are they based/aligned on an industry standard, such as ISO, NIST, PCI? That will be discussed with the selected vendor. Q20) Does the County have data classification in place currently for PHI? No. 3

4 Q21) Are PHI data accessible for the entire Douglas County network? No. Q22) Will the penetration test be performed covertly or overtly? Overtly. Q23) Are IT operations centralized or de-centralized? Centralized. Q24) What is the policy for viewing or accessing confidential information? If viewing or accessing confidential information is required for the analysis (as opposed to reviewing descriptions of that data and the data types) then the vendor representatives and those doing the assessment would have to sign the appropriate related confidentiality agreements, and complete a national fingerprint background check. Q25) Do development or test environments exist for tested systems/applications? Q26) My question is related to Section G. Experience and References: b) The documentation must thoroughly describe how the Responder has supplied expertise for similar contracts and work related to HIPAA Privacy and Security compliance and the performance of HIPAA Privacy and Security Gap Analyses for at least five (5) entities within the past two (2) years, with a minimum of three (3) being State and/or Local Government clients. The Responder must provide Agency with reference names and contact numbers for these entities to include: The requirement states three entities must include State and Local Government clients. Would Alaska Native and American Native Organizations be considered a local or state government? For example, the Cook Inlet Tribal Council or the Ketchikan Indian Community (KIC) which consists of Tribal members? Q27) Fee Schedule Section item 2 refers to Developing HIPAA Privacy and Security policies and procedures. However, there is no mention of this in the body of the RFP and in the scope and deliverables sections. Are policies and procedures to be included? Is pricing for policies and procedures really required? If so, please provide a description of the requirements and scope. As stated in the RFP, we would expect the evaluation to include which policies and procedures are required for us to comply with HIPAA regulations, and we would appreciate a cost estimate included in the assessment results on remediation to produce said policy and procedures. 4

5 Q28) Fee Schedule Section Item 3 refers to reviewing existing HIPAA and IT Security Training program and proposing necessary enhancements. However, there is no mention of this in the body of the RFP and in the scope and deliverables sections. While the HIPAA and IT security training would be reviewed as part of this HIPAA assessment, is this meant to be a more in-depth analysis of the training program? If so, please provide more details on requirements and scope. No. We want our HIPAA and IT security-training program to be assessed and any gaps identified. Q29) Approximately how many total nodes (IP addresses) (all devices on network) internal, and many nodes for external that are in scope for the assessment? (Knowing this provides basis for pricing) Q30) How many web-based applications (internal and or external) are in scope? Are these large, medium or small in scale? (Knowing this provides basis for pricing) Q31) What departments or county divisions use or have access to HIPAA related, protected health information? Are there any hospitals, medical clinics included as part of scope? Q31A. We would anticipate the vendor would help discover that. We are aware of at least 4 departments that house or have access to HIPAA data. Q31b. Yes, 1 medical clinic. Q32) How many systems (servers, devices, etc.) do you want to have configuration analysis performed on? Q33) Has there been a HIPAA Assessment done previously and have any remediation actions been taken? (What is the baseline for this?) We don't provide that information. Q34) Has the HIPAA Data been classified? No. Q35) Is the scope of this limited to HIPAA Data and associated Systems? Q36) Is the County wanting a One time or One-time & On-going service o If yes: 8x5 or 24X7 Frequency of review? Length of Term? One time. Any future endeavors would be requested through a separate RFP. 5

6 Q37) Is there a current and up to date network diagram? Q38) Has the County completed a current Inventory: o # IP addresses o # Firewalls, Target hosts, Aggregate web pages Are any targets owned by other entities/orgs o # Desktops, Devices, Servers? o # Registered Domains o # of ISP s o Are there any Load balancers? o Is there currently and IDS/IPS solution in place? o Operating Systems being used? (Windows XP, 7 or 8; Linux; Oracle; etc.) Q39) Section 1 C mentions Common Infrastructure Assessment (VMWare, SAN, etc.). Can the County provide further details? That is meant to encompass the underlying technical infrastructure as managed by DC IT. Q40) Is there currently any encryption/authentication being used? Can you provide details? We do not provide this information to the public. Q41) What existing applications will be come into contact with HIPAA Data? o Future Applications planned? We have four current applications that use HIPAA data and we have plans for future applications as well. We anticipate the analysis will help us identify any and all document and data types that fall under HIPAA. Q42) Has the County identified what departments are in-scope for HIPAA as either a Covered Entity/Component or Internal Business Associate? If so, can you please provide how many and the names of each? This is anticipated to be part of the evaluation. Q43) Can you please provide details on the number and location of the offices for the identified County departments that may be in-scope for the assessment? The max number of county facilities is 17, but we anticipate only a subset of 3 will be in scope. Exact identification is anticipated to be part of the evaluation. Q44) Can you please provide details about the County s Information Technology department including the number of employees and whether the department is centralized or decentralized? Centralized, with approximately 60 IT employees. 6

7 Q45) How many and what types of functions are outsourced within IT? No functions are outsourced within IT. However, IT does make use of consultants and contractors. Q46) To help quantify the scope and level of effort to perform the activities identified in section C, Scope of Services, can you please provide a current application/system inventory or the number of in-scope systems? If possible, please include the types of databases supporting these applications/systems. We do not provide this information to the public. Q47) Does the County utilize virtualization technology and if so, please provide some additional details? Beyond that, we don't provide that information. Q48) Can you please provide details around the number of data centers, server rooms, and physical locations of each? Beyond that, we don't provide that information. Q49) Can you please provide details about how comprehensive the HIPAA security policies and procedures documentation is (i.e., number of policies, procedures, etc.)? We do not want to disclose amounts of policies and procedures that we currently have. Please provide your estimate to review documentation, identify gaps, and propose remediation to any of the gaps. Q50) Regarding the External penetration testing and vulnerability assessment, (1) How large are the ranges to be tested (example: 2 /24 s or 512 IPs)? (2) Approximately how many IPs are active within the ranges above? 2/24. Q51) Regarding the Internal penetration testing and vulnerability assessment, (1) How large are the ranges to be tested (example: 2 /24 s or 512 IPs)? (2) Approximately how many IPs are active within the ranges above? 3,000 endpoints (approximately). Q52) Regarding the web application assessment, how many web applications are to be tested? For each application, please answer the following: a) How many pages of the application are to be tested? b) Will the application be tested in an authenticated way? (will you provide the testing team with application credentials?) c) How many application roles will be tested? d) How many authenticated pages will be tested? 7

8 Most of our approximately 60 external web and 50 internal applications are comprised of 2 to 4 pages/forms. Typically 3 roles on the internal applications. External, typically 1 or 2 roles. We expect both unauthenticated and authenticated testing. We will provide credentials. Q53) Regarding the wireless assessment, is the wireless assessment a vulnerability assessment or a penetration test? How many physical locations will be assessed? For each physical location: a) How large is each building in sq. feet to be assessed? b) How many wireless networks are deployed? c) What encryption and authentication methods are deployed on each network? We have 17 facilities with 100 access points. Beyond that, we don't provide that information. Q54) Within Section H, Fee Schedule, you have requested a fee estimate for assisting the County in developing HIPAA Privacy and Security policies and procedures. Can you please provide some additional details about the current state of these policies? Have they been revised to address the HIPAA Omnibus Final Rule requirements? How many policies support the current HIPAA compliance program at the County? We do not want to disclose amounts of policies and procedures that we currently have. Please provide your estimate to review documentation, identify gaps, and propose remediation to any of the gaps. Q55) Within Section H, Fee Schedule, you have requested a fee estimate for assisting the County in reviewing the County's existing HIPAA and IT Security Training program. Can you please provide some additional details about the current training programs at the County? When was the last time the training content was updated? Does the County currently utilize a Learning Management System (LMS) to delivery and manage the training content? We do not want to disclose training that we currently have. Please provide your estimate to review current process, identify gaps, and propose remediation to any of the gaps. Q56) Should any anticipated travel expenses be included in the overall fee estimate or included as a separate line item? Estimated travel costs should be included, not to exceed "billed at actual." Q57) Has a budget been defined for this project and if so, would you be able to share those details? Please see the response in Q7. Q58) How large is the internal network? How many workstations & servers? Q59) How large is the external network? How many IP addresses? 8

9 Q60) How many physical locations will be tested? We have 17 facilities with 100 access points. Q61) Can the internal networks of each physical location be tested from one central location? Q62) Will user credentials be provided for the internal network testing? Q63) Should the wireless assessment include all physical locations, or just a representative subset? We will rely on the selected vendor to identify how many of those need to be evaluated. Q64) Should the wireless and physical assessments include penetration tests? Q65) How many web applications are there and what is the primary function of each? The function of each app is varied, but beyond that, we don't provide that information. Q66) Will credentials be provided for the web applications? If so, how many different roles for each application should be tested? Yes, we will provide credentials. Please see the responses in Q52. Q67) For the proposal, is each of the requested scopes on page 3 of the RFP required to be a separate task, or can they be combined? For example, can the Host Diagnostic Assessment, VPN Assessment, and Firewall Diagnostic Assessment all be included in an overall penetration test of the internal network? Please propose whatever you feel would give us the best result. Q68) The RFP does provide an option to list "EXCEPTIONS TO PROPOSAL QUALIFICATIONS AND/OR REQUIREMENTS (page 4, E. General Requirements). Would it be appropriate to exclude the itemized costs and the suggested timelines for remediation? The section is up to you to provide your exceptions. END OF VENDOR QUESTIONS & ANSWERS 9

HIPAA SECURITY RISK ANALYSIS FORMAL RFP

HIPAA SECURITY RISK ANALYSIS FORMAL RFP HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,

More information

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0 Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004 Addendum 1.0 ISSUE DATE: February 23, 2012 Receipt of this addendum should be acknowledged on the Proposal Form. Inquiries

More information

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,

More information

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,

More information

About This Document. Response to Questions. Security Sytems Assessment RFQ

About This Document. Response to Questions. Security Sytems Assessment RFQ Response to Questions Security Sytems Assessment RFQ Posted October 1, 2015 Q: Which specific security assessment processes are sought for this engagement? The RFQ mentions several kinds of analysis and

More information

HIPAA Compliance Evaluation Report

HIPAA Compliance Evaluation Report Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL [email protected] PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions

Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review s to Vendor Questions Questions as Submitted by Vendors (Duplicates omitted) 1. Have controls

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Request for Proposals (RFP) for PCI DSS COMPLIANCE SERVICES Project # 15-49-9999-016 Addendum #1 - Q&A May 29,

More information

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014 QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

RFP # 15-74 Provide Information Security Assessment and Penetration Testing Due August 11, 2015 at 2:00PM (CST)

RFP # 15-74 Provide Information Security Assessment and Penetration Testing Due August 11, 2015 at 2:00PM (CST) August 6, 2015 McHenry County Government Center Purchasing Department Donald Gray, CPPB, Director of Purchasing 2200 N Seminary Avenue Administration Building Room 200 Woodstock, IL 60098 Phone: 815-334-4818

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Specific observations and recommendations that were discussed with campus management are presented in detail below. CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following

More information

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Put into test the security of an environment and qualify its resistance to a certain level of attack. Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

STATE OF NEW JERSEY Security Controls Assessment Checklist

STATE OF NEW JERSEY Security Controls Assessment Checklist STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response

More information

CITY OF CORONA RFP 15-005SB. ADDENDUM No. 2

CITY OF CORONA RFP 15-005SB. ADDENDUM No. 2 CITY OF CORONA ADDENDUM No. 2 Purchasing Division (951) 736-2272 400 S. Vicentia Ave., Ste. 320 [email protected] Corona, CA 92882 09/22/2014 Scott Briggs Addendum No. 2 for the Evaluation

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

Vulnerability Management Policy

Vulnerability Management Policy Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance

More information

1. How many user roles are to be tested in Web Application Penetration testing? 1. 2. Provide the approx. no. of input fields in the web application?

1. How many user roles are to be tested in Web Application Penetration testing? 1. 2. Provide the approx. no. of input fields in the web application? Below are all the questions that were submitted. This is the District s first security assessments and the District is looking to qualified firms to assess our systems. As it states in the RFQ, technical

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

PCI DATA SECURITY STANDARD OVERVIEW

PCI DATA SECURITY STANDARD OVERVIEW PCI DATA SECURITY STANDARD OVERVIEW According to Visa, All members, merchants and service providers must adhere to the Payment Card Industry (PCI) Data Security Standard. In order to be PCI compliant,

More information

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Enterprise Information Technology Security Assessment RFP Answers to Questions

Enterprise Information Technology Security Assessment RFP Answers to Questions Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy: Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

FedRAMP Penetration Test Guidance. Version 1.0.1

FedRAMP Penetration Test Guidance. Version 1.0.1 FedRAMP Penetration Test Guidance Version 1.0.1 July 6, 2015 Revision History Date Version Page(s) Author 06/30/2015 1.0 All First Release FedRAMP PMO 07/06/2015 1.0.1 All Minor corrections and edits FedRAMP

More information

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014 MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014 COMPLIANCE SCHEDULE REQUIREMENT PERIOD DESCRIPTION REQUIREMENT PERIOD DESCRIPTION 8.5.6 As Needed 11.1 Monthly 1.3 Quarterly 1.1.6 Semi-Annually

More information

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments

More information

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS to provide INFORMATION TECHNOLOGY SUPPORT SERVICES Issued: November 2, 2009 Submit completed application to: City of Milton 1000 Laurel Street Milton, WA

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Integrated Threat & Security Management.

Integrated Threat & Security Management. Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate

More information

PCI DSS v3.0 Vulnerability & Penetration Testing

PCI DSS v3.0 Vulnerability & Penetration Testing 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by either of the following methods:

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Virtualization Impact on Compliance and Audit

Virtualization Impact on Compliance and Audit 2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance

More information

Cybersecurity Strategy

Cybersecurity Strategy SYSTEM SOFT TECHNOLOGIES Cybersecurity Strategy Overview With the exponential growth of cyberspace over the past two decades has come increasing risk of data security breaches involving sensitive and private

More information

Security Controls in Service Management

Security Controls in Service Management Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security

More information

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company

More information

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique

More information

Vendor Audit Questionnaire

Vendor Audit Questionnaire Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 What s New in PCI DSS 2.0 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 Agenda PCI Overview PCI 2.0 Changes PCI Advanced Technology Update PCI Solutions 2010 Cisco and/or

More information

Four Top Emagined Security Services

Four Top Emagined Security Services Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna

More information