UNION BANK OF INDIA. minimum 1000 branches; three financial years

Size: px
Start display at page:

Download "UNION BANK OF INDIA. minimum 1000 branches; three financial years"

Transcription

1 UNION BANK OF INDIA Central Audit & Inspection Department IS Audit Cell CORRIGENDUM RFP for Outsourcing of IS Audit for Modified Eligibility Criteria & response/clarification to vendor queries 1 Modifications to Eligibility criteria clauses Eligibility criteria RFP Clause Should have conducted two Information System audits of data centers and other IT Infrastructure of banks in India (including all the following aspects), connected with a minimum 1000 branches, in any of the past three years: a) Vulnerability assessment of servers/security equipment/ network equipment; b) External attack and penetration test of equipments exposed to outside world through internet; (Conduct of audit of any one activity will not make the bidder eligible to participate) c) should have conducted application audit of Core Banking Solution in at least one Bank with a minimum 1000 branches; Eligibility criteria Modified RFP clause Should have conducted two Information System audits of data centers and other IT Infrastructure of banks in India (including all the following aspects), connected with a minimum 1000 branches, in any of the past five years: a) Vulnerability assessment of servers/security equipment/ network equipment; b) External attack and penetration test of equipments exposed to outside world through internet; (Conduct of audit of any one activity will not make the bidder eligible to participate) c) should have conducted application audit of Core Banking Solution in at least one Bank with a minimum 1000 branches; 2 Vendor should be having an average annual turnover of Rs. 50 (fifty) crore or more for each of the last three financial years Vendor should be having an average annual turnover of Rs. 5 (five) crore or more for each of the last three financial years Sr.No RFP Clause No RFP Clause Bidder's Query Bank's Response/Clarification 1 Bank's response / clarifications to to vendor queries Application Audit/ Pg. 10 Application Audit As per our understanding bank will provide UAT environment similar to production setup for application audit. Bank will provide test environment as per requirement.

2 Application Audit/ Pg. 10 Application Audit Kindly provide us detail of all applications covered under application audit (i.e. Name of application, role, OS, Database etc.) Please refer to "Point No. 4.1 III. Application Audit " for details. Each application has multiple servers as per it's hardware architecture and the systems use different databases also. All the components of the systems are listed in the RFP under Point No.3 Section III Systems description Application Audit/ Pg. 10 Scope of Work Related to IS Audit/ Point VII/ Pg. 12 Annexure I/ Pg. 31 Annexure I/ Pg. 31 Annexure I/ Pg. 31 Annexure I/ Pg. 31 Application Audit Risk Analysis List of Assets / Processes to be covered for IS Audit under this RFP List of Assets / Processes to be covered for IS Audit under this RFP List of Assets / Processes to be covered for IS Audit under this RFP List of Assets / Processes to be covered for IS Audit under this RFP Such documents as per availability will be shared Will we be provided with the BRS / SRS / CR / with the finally selected vendor Application documentation for application audits. Kindly provide detail of location wide assets (i.e. People, Process, technology etc.) to be covered under this activity. Kindly provide detail of Hardware Assets (i.e. Application Servers, Database Servers, Network Devices, Router, Firewall etc. hosted in Primary Data Center, DR Site Datacenter, Near DR Site Data Center and Outside Data Center etc.) covered under IS Audit. Kindly provide details of Hardware assets with respective locations, detail for application /systems hosted outside datacenter to be covered under IS Audit. Do we need to conduct onsite audit for application/system located outside datacenter. For DR Site Bangalore and Near DR Site Mumbai, can we conduct application audit and VAPT remotely from Bank's location in Mumbai. Please refer to Point No. 3 Section III Systems Description This information will be shared with the finally selected vendor. Systems Description is given in Point No. 3 Section III Systems Description. Yes. The Vendor has to conduct onsite Audit for applications/ systems located outside Datacenter. It is proposed that while VA can be performed remotely from Bank's location, PT Should be done from outside.

3 Annexure I/ Pg. 31 Annexure I & II/ Pg. 31 & 32 Annexure I & II/ Pg. 31 & 32 Annexure I & II/ Pg. 31 & 32 Annexure I & II/ Pg. 31 & 32 Annexure I & II/ Pg. 31 & 32 List of Assets / Processes to be covered for IS Audit under this RFP VAPT VAPT Penetration Testing VAPT VAPT As per our understanding bank will provide dedicated Desktop/Laptop with preloaded applications (i.e. MS Office etc.) with access of resources (i.e. Application System, Internet etc.) required for IS Audit team members. Kindly provide total number of Internal and external/public IP addresses to be covered under VAPT. Also provide details of static/ dynamic web pages for each application covered under VAPT. Do we need to conduct configuration audit for network and security devices (i.e. Switches, Router and Firewall) also, kindly provide details of devices (i.e. location wide IP address detail) Kindly provide number of public IP address against which PT is to be conducted. Will bank allow us to conduct PT from our office via internet? (1.) Number of Cycle for VAPT, (2.) Type of testing required (i.e. Grey Box, Black Box) What will be the time slot within the day given to us to carrying VAPT? Bank will provide sitting space with telephone facility. The selected vendor has to bring their laptops with all the required applications like MS Office and other tools for conducting Audit. Internet Access will not be provided. Vendor has to make their own arrangements. Need based access to Banks applications may be given subject to Internal Security Clearance. Such information will be shared with the finally selected Vendor. Configuration Audit of devices should be conducted on test check basis. Details of the devices will be shared with the finally selected vendor. Such information will be shared with the finally selected Vendor. The PT should be conducted from outside. The VAPT has to be conducted once for all the systems in one audit cycle. PT includes, among other things, both Grey Box and Black Box testing. Such tests should be planned in consultations with Banks' team which needs to be conducted in specified slack hours like after midnight.

4 NA NA What is timeline for execution of Audit? NA 4.2/ Pg. 12 NA 4.3/ Pg. 13 CAATs Section V: Term of Execution/ Pg. 13 Section V: Term of Execution/ Pg. 14 Automated Continuous 100% Transaction Audit The service provider should submit a detailed plan clearly indicating the tentative dates and estimated time for IS Audit of each phase/system. The assignment will be for conducting audit on time. Bank, at its option, will review and entrust the assignment either in full or in part subsequently. What lead time bank will allow to bidder for start of project from the date of PO/Work order. As per our understanding bidder has to prepare scope document and suggest tool for ACT, bank will be finally deciding on procurement and implementation of same. As per our understanding bidder has to prepare scope document and suggest tool for ACT, bank will be finally deciding on procurement and implementation of same. As per our understanding same need to be submitted by successful bidder before execution of project. As per our understanding first line to be read as "The assignment will be for conducting audit one time". NA NA Is there any restriction on running freeware tools The service provider will submit estimated time for IS Audit in their response. Ideally IS Audit (excluding compliance Audit) should be completed in 2 months time. The selected vendor should commence Audit within a week from the date of PO. Please be guided by the details given under point number 4.2. Procurement and implementation are excluded from the scope. Please be guided by the details given under point number 4.3. Procurement and implementation are excluded from the scope. Please refer to "Format V :Proposed methodology and work plan", which needs to be submitted by all the bidders giving timelines etc. The assignment will be for conducting one time Audit which should be done on time. The Compliance Audit should be performed after IS Audit. The selected vendor should procure and use only legally licensed tools without any recourse to Bank.

5 Annexure I/ Pg. 31 Annexure I/ Pg I (Scope of Work Related to IS Audit) 4.1 I (Scope of Work Related to IS Audit) 4.1 I (Scope of Work Related to IS Audit) III (Application Audit) Systems housed outside Data Centre/ MICR Centers and manages clearing houses at six centers viz., Pune, Jamshedpur, Salem, Anand, Belguam and Kota. MICR Pune to be audited on sample basis. Systems housed outside Data Centre/ Point Of Sale (POS) terminals As per our understanding we need to audit only Pune location on sample basis, audit and onsite visit to rest of locations is not required. Kindly clarify on scope of audit for POS terminals. We assume that the source code review will not exceed for more than 5 applications. Please confirm if our assumption is correct. We assume that the requirements for "Application Review" is similar to the requirements mentioned in Section 4.1 III Application Audit. Please clarify if our understanding is correct. Please list the total number of vendors in scope for performing the Review of Outsourced Activities The RFP mentions that "The scope further includes Audit of all the Applications used by the Bank". Please provide the indicative list of applications in scope for this activity. Bank's Information Systems located in Mumbai, Banagalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai should be audited onsite. POS teminals are connected to service providers switch. The switch and connectivity are under scope of Audit. The Audit of end terminals is to be done on sample basis, covering different models. Source Code Review is not within the scope of this tender. Hence the Vendor need not do any Source Code Review. Appication Review is nothing but Application Audit for which the scope is specified in 4.1 III. Details of the outsourced activities are given under point no 3 Section III : System Description which may please be referred. Please refer to point no 4.1 III for indicative list of Applications.

6 28 Scope of Planning for VAPT Scope of Planning for PT Application Penetration Testing Please provide the Number of units in scope w.r.t the following devices Networking devices, Operating System devices, Databases and Security and Management devices. Whether VA can be performed for a sample of 10% units mentioned in the above query.. Is authenticated (post login) testing expected? Bank is having approximately 20 IT Security devices, 50 Network devices, 195 servers and 16 public Ips. VA has to be conducted for all the Information Systems used by the Bank. PT will include authenticated testing as well as grey and black box testing 31 Application Penetration Testing 32 Application Penetration Testing 33 Application Penetration Testing 34 Application Penetration Testing 41 Internal Penetration Testing Number of pages (include sub modules if any) Number of privilege levels (include sub modules if any) Application available on Internet or Intranet Is application web based or installable? Please indicate whether you would like us to test the web applications also as part of this test. The selected vendor has to carry out Penetration Testing for all Applications, Operating systems,database systems, Security and Management systems to check for vulnerabilities like logical access, backdoor traps, guess passwords using password cracking tools, IP Spoofing, buffer overflows, session hijacks, accounts spoofing, frame spoofing, caching of webpages,cross site scripting, SQL injection,server authentication procedure etc. 35 Application Penetration Testing Application Protocol: http based / others 36 External Penetration Testing How many external IP addresses should be tested? 37 External Penetration Testing How many of the above IP addresses host a web application? Other details like IP addresses, application protocols will be shared with finally selected vendor. Please indicate whether you would like us to test 38 External Penetration Testing the web applications also as part of this test. Web applications are included for penetration test. 39 Internal Penetration Testing Number of internal IP addresses in scope 40 Internal Penetration Testing How many of the above IP addresses host a web application? Bank is using wireless LANs in DIT building at Powai, Mumbai and in Central Office building at Nariman Point, Mumbai.

7 42 Internal Penetration Testing 43 Wireless Penetration Testing Bidder should be in net profit in at least two years out of last three financial years. Are all the IP addresses mentioned accessible from a single location or do we have to travel to each location to perform the test? Provide the details of the buildings which have separate wireless network. Please give the physical location of the Wireless networks. We request Bank to change the net profit as operating profit as observed in many other Union Bank RFP the said clause as "The bidder should have operating profit at least during last three financial years i.e , and ". Request Bank to consider our request for operating profit. Regretted. Please be guided by RFP terms Regretted. Please be guided by RFP terms Bidder should have conducted two Information System audits of data centers and other IT Infrastructure of banks in India (including all the following aspects), connected with a minimum 1000 branches, in any of the past three years: Bidder should have conducted application audit of Core Banking Solution in at least one Bank with a minimum branches; We request Bank to amend the said clause as "2 reference customers in BFSI in last 5years". Sify also has inhouse expertise as we have done VA on servers, network and security devices. We request Bank to also include Internet Banking ( retail and corporate internet banking web applications) in last 5 years in the said clause. Regretted. Please be guided by RFP terms

8 48 Vulnerability Assessment : Application Security Test : Penetration Test Technical Audit (Configuration Review for Servers): Network Security Architecture Review (configuration Review for Devices and Network security Design) : Number of servers / Devices to be tested onsite / offsite. Number of locations need to be covered. Number of applications to be subjected to the audit. Number of Thick clients / thin clients subjected to the audit. Number of Dynamic and Static pages for each application. Number of input fields (approx.) for each application. Number of external IPs to be tested. (External Public IP addresses are expected) Number of Database servers /Web servers/ Application Servers /others servers to be audited Number of Network Devices to be audited VA has to be conducted for all the Information Systems used by the Bank. Bank's Information Systems located in Mumbai, Bangalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai. All applications that are in use by the bank as described under point no. 3 Section:III System Description Bank is not using any thin clients. Approximately 16 public Ips. All systems that are in use by the bank as described under point no. 3 Section:III System Description. The total number of servers are approximately 195. The descriptions of network is available under point no 3, section :III Systems Description. Approximate number is 50 network devices in DC and DR.

9 Mobile Application Security Test : Code Review : Number of locations to be covered Number of Mobile applications to be subjected to audit. Mobile Application platform to be audited. (Ex. Android, Symbian, java etc.) Number of applications to be subjected to audit. Number of lines of code for each application. Bank's Information Systems located in Mumbai, Bangalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai. Bank is using single Mobile Banking Solution outsourced to FSS tech, Chennai. The application server is Unix based. However the client application supports Symbian, Android, Java etc Source Code Review is not within the scope of this tender. Hence the Vendor need not do any Source Code Review Platform on which the applications have been built (dot net, java etc). What is the scope of the IS audit in terms of locations? How many outstation locations have been considered at each phase of the audit? Can we have more clarity on the number of locations in continuation to section 6.10? Bank's Information Systems located in Mumbai, Bangalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai. Bank's Information Systems located in Mumbai, Bangalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai.

10 Are we expected to audit any vendors and/or third parties as a part of this assessment? If yes, can we have a list of the same? As per section V, point 1, do we need to quote the approach an effort for all 3 phases of audits? Are the 3 phases broken up as per section 3 i.e. Phase 1: Core Banking related Systems, Phase 2: Important Systems housed in Data Centre, Phase 3: Systems housed outside Data Centre? Is the IS audit scope limited to the domains mentioned in section 4.1 (I)? Are we allowed to leverage on best practices to customize the checklist for audit? Is the DR site and Data Center a part of the IS audit? Is the risk assessment limited to information security or also extending to financial and market risks? Is the scope of CAAT primarily for financial controls? Outsourced activities are listed under point no 3.2 Outsourced Activities. In addition, Bank has outsourced monitoring of datacenter, network, IT security, mobile banking, ATM & ATM switch,and bank's website. The vendors quote should be strictly as per Format VI Commercial offer wherein the items to be quoted are mentioned. Yes Yes Selected Vendor is expected to use comprehensive checklists covering RBI guidelines, Govt of India guidelines and Industry standard best practices. Yes Please refer to point no 4. Section:IV Scope of Work Point VII Bank intends to purchase CAAT tools for carrying out information systems Audit, the scope of which is given under Point No. 4.3 CAATs

11 Vendor should have conducted application audit of Core Banking Solution in at least one Bank with a minimum 1000 branches. Does UBI also require a follow up audit? Are the training requirements as per Section 4 (VI) throughout the duration of the audit or just 1 single training program that will ensure knowledge transfer? Approximately how many information security policies, procedures and/or guidelines are we supposed to review? Are we expected to change/modify/re draft any new, missing or incorrect policies, procedures and/or guidelines? Will UBI allow sampling techniques to carry out the audit? Is there a specific time limit for each phase to get the audit done? MIEL has conducted the application audit of Core Banking Solution in Bank with a 320 branches The Selected Vendor has to carry out a Compliance Audit, the details of which are furnished under Point No. 5 Section V terms of execution of Work. The Training includes providing on the job training to Banks IS Audit team alongwith one structured classroom training for each Phase. Bank is having a Single information security policy which needs to be reviewed with other relevant policies and guidelines. The Selected vendor has to suggest improvements for policies Procedures Guidelines based on audit findings, guidelines of RBI & Govt. of India and industry best practices. Sampling techniques will be allowed wherever required except for VA. The service provider will submit estimated time for IS Audit in their response. It is expected that IS Audit (excluding compliance Audit) should be completed in 2 months time. Regretted. Please be guided by RFP terms

12 Vendor should be having an average annual turnover of Rs. 50 (fifty) crore or more for each of the last three financial years Service provider should be in net profit in at least two years out of last three financial years. Service provider should be having an average annual turnover of Rs. 50 (fifty) core or more for each of the last three financial years Request to consider the Rs. 50 Crore turnover for last 2 years Please clarify which years , , , In B format II page 23 it is mentioned as , , The clause is modified as under. " Vendor should be having an average annual turnover of Rs. 5 (five) crore or more for each of the last three financial years " The years are , ,

13 I Should have conducted two Information System audits of data centers and other IT Infrastructure of banks in India (including all the following aspects), connected with a minimum 1000 branches, in any of the past three years: a) Vulnerability assessment of servers/security equipment/ network equipment; b) External attack and penetration test of equipments exposed to outside world through internet; (Conduct of audit of any one activity will not make the bidder eligible to participate) c) should have conducted application audit of Core Banking Solution in at least one k ih i i Source code review (wherever source code is available) Business process Review Request you to please revise the time period and make it for five (5) years instead of three (3) years Please provide number of application for code review, also we will require details of thos applications which are: 1. Name of applications 2. Application Technology and database 3. Number of modules and pages/ forms. Please clarify scope of work of Business process Review with all line of businesses. The clause is modified as under: " Should have conducted two Information System audits of data centers and other IT Infrastructure of banks in India (including all the following aspects), connected with a minimum 1000 branches, in any of the past five years: a) Vulnerability assessment of servers/security equipment/ network equipment; b) External attack and penetration test of equipments exposed to outside world through internet; (Conduct of audit of any one activity will not make the bidder eligible to participate) c) should have conducted application audit of Core Banking Solution in at least one Bank with a minimum 1000 branches ;" Source Code Review is not within the scope of this tender. Hence the Vendor need not do any Source Code Review. Business process review covers all the business process applicable to different systems in use at the Bank.

14 IV 4.1.IV 4.1.III Evaluating completeness of procedures/ guidelines documents Evaluation of Hardware procurement and Maintenance Process. Review of all controls including boundary controls, input controls, communication controls, database controls, output controls, interfaces controls from security perspectives. Vulnerability Assessment and Penetration Tests (VAPT) Please mention which all procedures/ guidelines and documents are under scope of work Please clarify that whether it is limited to IT only? Yes it is limited to IT only. Please provide the list of application, interfaces and type of interfaces. Please mention exact count of servers, routers, switches and etc other devices under VAPT. In annexure application names are mentioned but we need exact count of devices in each application which is not provided. All the procedures/ guidelines and documents that are related to information systems as described under" point no 3. Section III. System Description." Detailed description of Information Systems of the Bank is available "Point 3. Section III: Systems Description". Approximately there are about 20 IT Security devices, 50 Network devices in DC & DR, 195 servers. 4.1.II Will the bank provide remote connection from Mumbai in order to connect servers and other devices outside Mumbai? Remote connection will not be provided. 88 Please let us know the physical location of devices and servers also. Mumbai, Bangalore, Ernakulam, Pune, Chennai, Delhi.

15 Section 2.1.v requires the service provider to have conducted IS Audit of data center and other IT infrastucture of banks, connected with minimum of 1000 branches, in the past three years around the areas of vulnerability assessment, external attack & penetration test and application audit of Core Banking Solution. Regretted. Please be guided by RFP terms We understand the review of the core banking solution to be more functional and hence would request if the criteria for the minimum number of branches (1000) be waived for us to apply Please clarify the objective of the source code review. Please provide the details of the applications, including their names, size and span, that would fall under the scope of the source code review. We understand that Annexure I provides a broader category of applications used by the bank. Please provide the detailed list of application along with a brief note on their respective functionalities. Source Code Review is not within the scope of this tender. Hence the Vendor need not do any Source Code Review. Description of Information Systems of the Bank is available under "Point 3. Section III: Systems Description"of RFP.

16 Please provide the below mentioned details to facilitate appropriate effort estimation on our part Number of application and database servers for all the applications mentioned in Annexure I List and number of network devices for the Enterprise network Number of IPs to be covered as part of Network Penetration Testing Number of servers / network devices to be covered as part of Vulnerability Assessment List and locations of vendors to whom Information technology / Information Security related work has been outsourced We understand that Vulnerability Assessment / Penetration Testing will be conducted only once during this project. Please clarify whether our understanding is correct. We understand that the application audit will be done using a risk based audit approach. Please clarify if this understanding is correct. Does the bank have an existing checklist/template for conducting the IS Audit? If yes would it be correct to assume that this checklist with be shared with the selected vendor? Description of Information Systems of the Bank is available "Point 3. Section III: Systems Description" of RFP Other details will be shared with the finally selected vendor. 50 Nos. of Network devices in DC & DR 16 Public IPs Details of the outsourced activities are given under point no 3 Section III : System Defination which may please be referred. In addition, Bank has outsourced monitoring of datacenter, network, IT security, mobile banking, ATM & ATM switch,and bank's website. VAPT should be carried out once only for different Information Systems during one audit cycle. Application Audit is not based on Risk Based Audit approach. The vendor has to carry out application audit as per the details provided under " Point no 4.Section IV: Scope of Work". Checklists are not available with the bank. The vendor has to share, their formats, checklists, scoring sheets, scripts, Audit accelerators etc.with the Bank, that will be used during the process of IS Audit.

17 What is the banks expectation around the following scope items Adherence to legal and statutory requirements Business process review All the legal and statutory requirements that are relevant to information systems are within the scope of Audit. Business process review covers all the business process applicable to different systems in use at the Bank review effectiveness and effficiency of the applications We understand that we are expected to visit various locations for the IS audit. Request you to please provide the list of bank offices and their respective locations which will fall under the scope of the IS Audit. Are the vendors who provide outsourced services to the bank working within the bank environment and control? If not please provide details on the list of vendors, their locations and specific service provided relevant from the IS audit scope We understand that we are not required to visit vendor location for the purpose of the IS Audit for outsourced activities. Please clarify if this understanding is correct. We understand that the overseas branch at Hong Kong that is hosted from the bank's datacenter and is also under CBS. Is this a separate instance of the core banking solution? The Vendor has to review the effectiveness and efficiency of applications with referrence to Bank's Business goals. Bank's Information Systems located in Mumbai, Banagalore,Ernakulam, MICR Centre at Pune, Cheque Truncation system at Delhi and outsourced Mobile banking systems at Chennai. Details of the outsourced activities are given under point no 3 Section III : System Description which may please be referred. In addition, Bank has outsourced monitoring of datacenter, network, IT security, mobile banking, ATM & ATM switch,and bank's website. No. The selected vendor has to visit outsourced vendor locations for conducting IS Audit. Yes, It is a separate instance.

18 Page 6, Section III Page 7, As a part of providing Value added services (VAS), Bank has tied up with some broking companies where by the customers can do online trading of their shares and also with many other service providers to facilitate online utility bill payment, tax payments, e commerce, etc. IT Security Setup, consisting of multiple layered firewalls, Network based and Host based intruder detection systems, Network Intrusion Prevention System, two factor authentication systems, antivirus systems, Patch Management system, Network Access Control systems etc. Bank has also created VLANs, Please tell us more about your technical evaluation methodology. Since Core banking has Value added Services applicatons running. As part of IS Audit, does these application also be involved. If so, does third party devices present in DC, DR and Near site premises? For IS Audit and VA/PT on Servers and devices involved in DC and DR, do we have plan on Scheduled Assessment and testing period. Since the devices involved in VA/PT will be involved in production environment. If there is any performance degrade during the Assessment. Do we have any options in place to resolve the thresholds? Evaluation of technical proposals will be carried out as per the details given under Point No Evaluation Procedure. The value added services mentioned are part of Internet Banking. Value added services in core banking application are also under the scope of IS Audit. There are no connected third party devices in DC, DR and Near site except for Network connectivity. Such tests have to be planned in specified slack hours and in consultation with the user department, so that the tests cause least inconvinience.

19 Page 7, II. Important Systems housed in Data Centre: Page 8, Matched Fund Transfer Price (MFTP) Bank has implemented an Enterprise Application Integration system (middleware) to seamlessly integrate Core Banking system with other applications like, Union Parivar, SWIFT, Treasury package etc. DR site for EAI is under development and is Matched Fund Transfer Price (MFTP) : Bank has purchased three modules of Oracle Financial Services Analytical Application (OFSAA) viz. Fund Transfer Pricing, Profitability Management and Asset Liability Management and the same is under implementation. The FTP module enables scientific transfer pricing of internal movement of funds and the Profitability Management module would enable computation of profitability under various dimensions after cost / income allocation. This ld f ilit t f Since DR site EAI is under development, What is the expectation for DR site Assessment on Under development tools and apps in context with IS Audit and VA PT? If the MFTP is involved in VAPT and IS Audit, do we have buffer or Schedule for production Oracle servers It is expected that the DR site will be fully operational by December Hence the selected vendor has to conduct IS Audit of fully operational DR after December, Currently MFTP solution is under implementation and is expected to go live by December,2012. Hence the vendor has to carry out IS Audit of MFTP solutions which includes VAPT of live servers.

20 106 Page 8, III. Systems housed outside Data Centre: Page 9, Outsouced Activities Bank has established MICR Centres and manages clearing houses at six centres viz., Pune, Jamshedpur, Salem, Anand, Belguam and Kota. Bank established a web based system for distribution of the clearing and ECS data to the member banks. Bank has a Credit Card system, which is outsourced to VIGPL for providing end to end services. The services mainly include issuance & maintenance of cards, maintaining credit card host for controlling 9 transactions, providing VAP and MIP connectivity and complying with the VISA and Master mandates, PIN Security, Billing and reconciliation thereof, providing interfaces with Bank for facilitating interaction through Bank s Call centre and also for facilitating withdrawal of Cash through ATMs. Any plan of including the sites outside the DC which process MICR? What will the scope of outsourced devices such as Card processing, POS (Point of Sale ) terminals of under Audit and VAPT? The vendor has to Audit one of the MICR centers i.e. Pune center, on test check basis. The vendor has to review various services provided by the Outsourced vendors.pos terminals are connected to switch. As such, the switch and network are under the scope of work. The end terminals have to be audited on as sample basis, covering different models. 107

21 Page 11, Application Audit Page 31, Annexure I, Page 11 IV SOW also includes.. The scope further includes Audit of all the Applications used by the Bank (FINACLE, KASTLE, LAS, MIS, etc., Systems housed outside Data Centre: Procedure / guidelines document Application audit involves Parameter Checks, SQL injection test, etc. may involve buffer overflow and application instability during testing. Do we have Schedule and backup of the apps involved in Application audit? What is the scope of the systems housed outside DC in this IS Audit List of documents and number of pages for each document is required for efforts estimation To carry out various tests the time lines have to be fixed in consultation with the user department, so that the test causes least inconvenience. The scope will be as mentioned in Point 4. Section IV : Scope of Work. All the procedures/ guidelines and documents that are related to information systems as detailed under " point no 3.Section.III : System Description" of RFP have to be reviewed. 110 Page 12 VI Training for IS Audit Team Total number of IS Audit team and number of training required. The IS Audit team consists of five officers. The Training includes providing on the job training to Banks IS Audit team alongwith one structured classroom training for each Phase Page 13 Section V Previous audit findings verification Compliance Audit for verification / confirmation How many observations were reported in 2010 & 2011? What is the maximum defined period by which bank will communicate to carry out compliance audit observations observations The user departments are expected to rectify and close the observations within 45 days, after which the compliance audit will start immediately.

22 Page 31 System placed outside DC Should we have to visit each location or connectivity will be provided to conduct system audit? What about physical security audit for these systems? The eligibility criteria does not state that the service provider should be CERT In empanelled auditing organisation (We may mention here that CERT In is the nodal agency for Cyber Security in India under Information Technology Act and has empanelled auditing organisation for rendering such services.) The turnover criteria is Rs. 50 Crore. It seems that this would favour only specific parties which may not specialise in IS Audit and their major activities (including turnover) is from areas other than IS Audit. We recommend that the turnover should be kept as Rs. 5 Crore in area of Information Security Banks systems are located at Mumbai, Bangalore, Ernakulam, Chennai, Delhi and Pune. The vendor has to visit these places to conduct IS Audit which includes Auditing of physical controls also. CERT In empanellment is desirable for this tender. The clause is modified as under. " Vendor should be having an average annual turnover of Rs. 5 (five) crore or more for each of the last three financial years " All the componenets of the systems are listed in the RFP under Point No.3 Section III Systems Description. The servers are located across Mumbai, Bangalore, Chennai, Ernakulam, Pune and Delhi. 117 List of location wise servers

23 Operating system and Database platforms used by the bank across Data centre/disaster Recovery sites are they owned by the bank or outsourced to some vendor? List of applications(along with brief functionality of the applications) for which code review is needed We have listed various applications and systems used by the Bank in RFP under Point No.3. Section III Systems Description. Each application has multiple servers as per its Hardware Architecture. Each of the systems uses different databases too. All the systems listed are under scope of IS Audit. While Data Center at Mumbai is owned by the Bank, The Disaster Recovery is located in Reliance Data Center at Bangalore. Source Code Review is not within the scope of this tender. Hence the Vendor need not do any Source Code Review.

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

Amendment 1 - Annexure 5 (C) Technical Criteria

Amendment 1 - Annexure 5 (C) Technical Criteria 1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical

More information

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05 Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

Expression of Interest (EOI) For. End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank

Expression of Interest (EOI) For. End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank Expression of Interest (EOI) For End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank PUNJAB NATIONAL BANK INFORMATION TECHNOLOGY DIVISION HEAD OFFICE, 5 SANSAD MARG, NEW

More information

Empanelment of Vendors for Load Testing

Empanelment of Vendors for Load Testing Expression of Interest (EOI) Empanelment of Vendors for Load Testing IDBI Bank proposes to invite response to EOI for the empanelment of vendors for Load Testing of Bank s various applications. The last

More information

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption." appliance/hardware and should be upgrade to 15 Gbps

IDBI Bank Ltd. value which should be sized on this appliance second for 2048 Bit SSL encryption. appliance/hardware and should be upgrade to 15 Gbps 1 2 3 4 Point 1-Hardware Specifications Setup A: Point C 1-Hardware Specifications Setup A: Point E 2-Hardware Specifications Setup B: point B 2-Hardware Specifications Setup B: point E The Solution should

More information

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server

Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Response of bidders' queries for RFP for Hosting of Website(s) of PNB on Dedicated Server Srno 1 Current RFP clause Clause Details Bidder Query Our Response 2.2 (Eligibilty Criteria), Page Parent company

More information

EOI - Empanelment of Vendors for Load Testing. Expression of Interest (EOI) Empanelment of Vendors for Load Testing

EOI - Empanelment of Vendors for Load Testing. Expression of Interest (EOI) Empanelment of Vendors for Load Testing Expression of Interest (EOI) Empanelment of Vendors for Load Testing IDBI Bank proposes to invite response to EOI for the empanelment of vendors for Load Testing of Bank s various applications. The last

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

Security Testing and Vulnerability Management Process. e-governance

Security Testing and Vulnerability Management Process. e-governance Security Testing and Vulnerability Management Process for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.

More information

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,

More information

ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1

ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 PREFACE The Rubber Board a statutory Body under the Ministry of Commerce & Industry, Govt. of India, for the development

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Expression of Interest (EOI) For. Enterprise Content Management Solution (ECM)

Expression of Interest (EOI) For. Enterprise Content Management Solution (ECM) Expression of Interest (EOI) For Enterprise Content Management Solution (ECM) The last date for submission : August 8, 2014 by 03:00 PM. For details please visit Bank's website at www.idbi.com Page 1 of

More information

Request for Proposal Scanning of Policy and non policy documents at SBI Life HO

Request for Proposal Scanning of Policy and non policy documents at SBI Life HO Request for Proposal Scanning of Policy and non policy documents at SBI Life HO SBI Life Insurance Co Ltd RFP for Centralized Scanning Services Page 1 1. INTRODUCTION AND BACKGROUND SBI Life is a joint

More information

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing //Vulnerability Assessment //Remedy A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising

More information

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.

Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here. Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes

More information

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES RECOMMENDATION Geneva April 2016 R 143 Cybersecurity Rec. for media vendors systems, software & services Cybersecurity

More information

1 ST CORRIGENDUM - RFP For Procurement Of Web Application Firewall (Subscription Model) RFP No. IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015

1 ST CORRIGENDUM - RFP For Procurement Of Web Application Firewall (Subscription Model) RFP No. IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015 RFP IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015 1. - - Document 2. - - Document 3. - - Document 4. - - Document 6 A Bid Security of Rs.50,000/- (Rupees Fifty thousand Only)by way of demand draft

More information

Security Testing & Load Testing for Online Document Management system

Security Testing & Load Testing for Online Document Management system 1 Security Testing & Load Testing for Online Document Management system Abstract The client is a leading provider of online technical documentation solutions in UK, they wanted to protect their documents

More information

Inviting Tender from Cert-In empanelled agencies for Conducting Load and Security Testing of Web application of UPSDM

Inviting Tender from Cert-In empanelled agencies for Conducting Load and Security Testing of Web application of UPSDM Inviting Tender from Cert-In empanelled agencies for Conducting Load and Security Testing of Web application of UPSDM [Reference No. 19 UPSDM/Portal/Dated: 19 th April, 2015] Last Date & Time of Submission

More information

School of Open Learning University of Delhi

School of Open Learning University of Delhi School of Open Learning University of Delhi LIMITED TENDER FOR CONFIGURATION & MAINTENANCE OF ORACLE RAC SERVICES Tender No. Dated: Cost: Rs.500/- Submission of tender 25/06/2015 (extended date) Limited

More information

RFP# 917-051-020115-05 CONSULTING SERVICES FOR ORACLE E-BUSINESS SUITE R12 UPGRADE QUESTION AND ANSWER RFP Reference Question GSFA Response

RFP# 917-051-020115-05 CONSULTING SERVICES FOR ORACLE E-BUSINESS SUITE R12 UPGRADE QUESTION AND ANSWER RFP Reference Question GSFA Response RFP# 917-051-020115-05 CONSULTING SERVICES FOR ORACLE E-BUSINESS SUITE R12 UPGRADE QUESTION AND ANSWER RFP Reference Question GSFA Response 1 Section 1.1.2, Pg. 1 Does GSFA plan to have a dedicated DBA

More information

CorporateGuard Comprehensive Crime Insurance

CorporateGuard Comprehensive Crime Insurance AIG Australia Limited Comprehensive Crime Insurance 1 of 13 Page Page 1 of 13 An Important Notice Your Duty of Disclosure Before you enter into an insurance contract, you have a duty to tell us anything

More information

Tender for Procurement of -2- Nos of GeoTrust SSL Certificate (Secure Site with EV) Tender Ref. No. - BCC:IT:PROC:108:26 Tender Date - 10 th June 2016

Tender for Procurement of -2- Nos of GeoTrust SSL Certificate (Secure Site with EV) Tender Ref. No. - BCC:IT:PROC:108:26 Tender Date - 10 th June 2016 Tender for Procurement of -2- Nos of GeoTrust SSL Certificate (Secure Site with EV) Tender Ref. No. - BCC:IT:PROC:108:26 Tender Date - 10 th June 2016 A. BRIEF PROJECT REQUIREMENT Bank of Baroda has a

More information

Network Security Audit. Vulnerability Assessment (VA)

Network Security Audit. Vulnerability Assessment (VA) Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.

More information

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements

More information

SBI FUNDS MANAGEMENT PRIVATE LIMITED REQUEST FOR PROPOSAL FOR WEB SECURITY SOLUTION

SBI FUNDS MANAGEMENT PRIVATE LIMITED REQUEST FOR PROPOSAL FOR WEB SECURITY SOLUTION SBI FUNDS MANAGEMENT PRIVATE LIMITED REQUEST FOR PROPOSAL FOR WEB SECURITY SOLUTION SBI Funds Management Pvt. Ltd. Page 1 26/03/2013 1. Introduction: An Overview of SBI Funds Management Private Limited

More information

State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14

State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14 fcgkj ljdkj lllllljdkj State Health Society, Bihar Pariwar Kalyan Bhawan, Sheikhpura, Patna-14 NOTICE INVITING TENDER From Companies/Agencies for Hiring Four Dedicated Servers (1 Linux Application Server

More information

UNION BANK OF INDIA REQUEST FOR PROPOSAL (RFP) For. Implementation of Oracle General Ledger System

UNION BANK OF INDIA REQUEST FOR PROPOSAL (RFP) For. Implementation of Oracle General Ledger System UNION BANK OF INDIA REQUEST FOR PROPOSAL (RFP) For Implementation of Oracle General Ledger System NOTE: This document contains 87 pages including this cover page. Page 1 of 87 TENDER NOTICE Union Bank

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

JOB DESCRIPTION. Core competency, experience, qualification and other skills required are as under :

JOB DESCRIPTION. Core competency, experience, qualification and other skills required are as under : JOB DESCRIPTION To ensure the overall functionality, security and other compliance of the Project following core personnel shall be repaired to exercise dual key, supervise, monitor and put into effect

More information

Request For Proposal (RFP) for Empanelment of IT Consultants for Bank

Request For Proposal (RFP) for Empanelment of IT Consultants for Bank RFP Reference No : OBC/HO/DIT/RFP-CONS/03 / 2010-11 Request For Proposal (RFP) for Empanelment of IT Consultants for Bank Oriental Bank of Commerce Department of Information Technology Head Office New

More information

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?

Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System? Frequently Asked Questions (FAQ) Guidelines for quality compliance of eprocurement System 1. What is eprocurement? Electronic Procurement (eprocurement) is the use of Information and Communication Technology

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS Punjab National Bank HO: Information Technology Division 5, Sansad Marg, New Delhi-01 Information Technology Division

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

REQUEST FOR PROPOSAL FOR DATA CENTRE CO-LOCATION AND NETWORK CONNECTIVITY SOLUTION Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs

REQUEST FOR PROPOSAL FOR DATA CENTRE CO-LOCATION AND NETWORK CONNECTIVITY SOLUTION Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs REQUEST FOR PROPOSAL FOR DATA CETRE CO-LOCATIO AD ETWORK COECTIVITY SOLUTIO Pre-Bid Meeting Held On : May 18, 2010, 15:30 Hrs S. Section o Description 1 Present Setup 2.2.1 The servers are under AMC with

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Company Name Query Response. Systems Pvt. Ltd. the Bid in spite of neither being an ISO 9001:2008 nor a CMMI L3 certified company with a valid

Company Name Query Response. Systems Pvt. Ltd. the Bid in spite of neither being an ISO 9001:2008 nor a CMMI L3 certified company with a valid Following are the queries received from different companies with regard to the RFP for School Quality Assessment and Accreditation Management Solution : Company Name Query Response Orion India 1. Can Orion

More information

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN Draft for discussion April 2007 Department of Information Technology (DIT) Government of India, New Delhi 1. Introduction

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh

RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh MAP_IT Madhya Pradesh Agency for Promotion of Information Technology Corrigendum 2 RFP for Case Management & Tracking System for the Office of Advocate General, Madhya Pradesh Sr.No. RFP Reference Existing

More information

Network Support. Request for Proposals

Network Support. Request for Proposals Request for Proposals Network Support Worksystems is seeking one or more qualified and experienced organizations to provide back-up network support, develop system documentation, and develop a Disaster

More information

F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India

F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India (A Statutory Authority established under the Food Safety & Standards Act, 2006) Establishment Division FDA Bhawan, Kotla Road, Near

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

Notification pertaining to Request for Proposal for setting up of Private Cloud at NPCI. RFP Reference No: NPCI/RFP/2015-16/IT/0003 dated 12.05.

Notification pertaining to Request for Proposal for setting up of Private Cloud at NPCI. RFP Reference No: NPCI/RFP/2015-16/IT/0003 dated 12.05. Notification pertaining to Request for Proposal for setting up of Private Cloud at NPCI RFP Reference No: NPCI/RFP/2015-16/IT/0003 dated 12.05.2015 1. About NPCI National Payments Corporation of India

More information

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt. TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of

More information

C. La Plata County is exempt from all state taxation including state sales and use tax.

C. La Plata County is exempt from all state taxation including state sales and use tax. Informal Bid (Request for Quotes) Drupal Hosting and Development Service Project Number 12-062-2201 Let Date: August 17, 2012 Bid Deadline: 2:00 p.m. August 30, 2012 I. Administrative Information A. La

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,

More information

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview

More information

More than 6 years of experience in IT Projects/Networking /Systems

More than 6 years of experience in IT Projects/Networking /Systems Mohammed Riyas. V.P Email: [email protected] [email protected] Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional

More information

SCOPE OF WORK. The scope of work of Implementation Partner (IP) shall include the following:

SCOPE OF WORK. The scope of work of Implementation Partner (IP) shall include the following: SCOPE OF WORK 1. Brief Scope of work The scope of work of Implementation Partner (IP) shall include the following: Supply and installation of ERP licenses including ATS ERP system implementation, Project

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Digital Advisory Services Professional Service Description Network Assessment

Digital Advisory Services Professional Service Description Network Assessment Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

COM(106)/AMC-Server/50/2011/NCRB Government of India Ministry of Home Affairs National Crime Records Bureau. Limited Tender Notice

COM(106)/AMC-Server/50/2011/NCRB Government of India Ministry of Home Affairs National Crime Records Bureau. Limited Tender Notice Limited Tender Notice Date: 24/04/202 Sealed quotations are invited from reputed vendors for Comprehensive Annual Maintenance Contract (CAMC) of high-end server machines and local area network along with

More information

Oriental Bank of Commerce

Oriental Bank of Commerce Tender Number: OBC/HO/DIT/RFP-ITMSP/74/2015 Date: 08.12.2015 Request for Proposal For Outsourcing of IT Infrastructure Managed Services Oriental Bank of Commerce Department of Information Technology, Plot

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

IDBI Bank Ltd. RFP for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries

IDBI Bank Ltd. RFP for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries IDBI Bank Ltd. for Setting up of a captive Security Operation Centre(SOC) Responses to Bidder Queries (IDBI/Pcell//2014-15/24) dated 24th March, 2015 Sr. Clause 1 6 - Document Control Sheet Schedule for

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

ERP For Small & Medium Enterprises. The most effective and efficient way to run your business. Version 2.0

ERP For Small & Medium Enterprises. The most effective and efficient way to run your business. Version 2.0 ERP For Small & Medium Enterprises The most effective and efficient way to run your business. Version 2.0 AUTOMAT ERP - INTRODUCTION A SIMPLE YET COMPREHENSIVE BUSINESS TOOL FOR SMALL AND MEDIUM ENTERPRISES

More information

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Document Control Sheet

Document Control Sheet Document Control Sheet S.No DESCRIPTION PARTICULARS 1 EOI- Document Ref. Number IDBI /PCELL / EOI/ 2015-16/020 2 Date of Issue of EOI 20 October 2015 3 Last date of receipt of pre bid queries. 26 October

More information

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015 UPDATE HISTORY: 10/21/2015 10/30/2015 11/5/2015 Questions submitted by Proposers All proposers should reference the following

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the

More information

QuickBooks Online: Security & Infrastructure

QuickBooks Online: Security & Infrastructure QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information