Security Whitepaper: ivvy Products
|
|
|
- Juliet Morton
- 10 years ago
- Views:
Transcription
1 Security Whitepaper: ivvy Products
2 Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security Operational Security Systems Development and Maintenance Security Feature Customisation Policy enforced security features Disaster Recovery and Business Continuity Conclusion Security Whitepaper: ivvy Products Introduction ivvy understands that the confidentiality, integrity and availability of our customers data is vital to their business operations and, as a result, security is an integral part of ivvy s cloud computing applications, as well as a core element of ivvy s development processes. This document will outline how the ivvy platform and infrastructure secures its customers data and is correct at the time of writing. Overview ivvy s security policy is designed to protect all of our clients data by constantly monitoring and improving our applications, systems and process to meet the ever-changing demands and challenges of security. The strategies that we employ include: Security policies Internet Protocol and Employee Education Physical and environmental security Operational security Systems development and maintenance Security Feature Customisation Policy enforced security features Disaster recovery and business continuity Security Policies The foundation of ivvy s commitment to security is its security policies that cover physical, account, network and computer systems, application services, system services, change management, incident response and data centre security. These policies are reviewed on a regular basis to help ensure their continued effectiveness. In addition to the requirement that all employees follow these policies, employees are educated on the important aspects of informational security, such as safe use of the Internet, working from remote locations safely and how to handle sensitive data. Internal Protocol and Employee Education All employees are required to conduct themselves in a manner consistent with ivvy s guidelines regarding confidentiality, business ethics, appropriate usage and professional standards.
3 Upon hire, each employee s individual education and previous employment is checked. ivvy may conduct criminal or other security checks dependant on the role of the individual. Employees are then required to execute a confidentiality agreement and to then read and understand the company s code of conduct. This document deals with ivvy s expectations that every employee will conduct themselves with ethics, integrity and within the law. Physical and Environmental Security The data centers that ivvy uses are state of the art, utilizing innovative architectural and engineering approaches. The data centers are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. Data center access is only given to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee. All physical access to data centers by is logged and audited routinely. Power ivvy s systems are accessible 4 hours a day, seven days a week. Power supply to the servers that run the ivvy operating system are maintained through a minimum N+1 redundancy, while the main power is supplied via two 33kV dedicated incomers, a diverse A&B power supply distributor at 11kV via a rotary UPS and multiple ring main circuits. In the event of utility outages, an on-site diesel power generator can support the centre at a full capacity for 4 hours. This generator is also backed up by 4 hours a day, seven days a week fuel delivery contracts to ensure the continued running of the generator in the event of a long, persistent power outage. Climate and temperature As with any hardware, heat is produced by operational servers and computing hardware. To maintain an optimum operating temperature for the hardware a sophisticated air cooling system is used. This system uses both normal and emergency electrical systems to power the air conditioning units. By maintaining an optimum climate and temperature for the hardware, ivvy is reducing the possibility of overheating and the consequential server outages. Fire detection and suppression In the event of fire in the ivvy server room, a sophisticated automatic fire detection 3
4 and suppression system will activate and minimise damage to the computing hardware. This system is comprised of fire detection units and flame suppressors in all areas as well as dry pipe sprinklers in technical areas, dry risers to all floors and a smoke and gas clearance system. Manually operated fire extinguishers are located throughout all the data centres and staff are regularly retrained in their use as well as other fire safety procedures. Storage Device Decommissioning When a storage device has reached the end of its useful life, they are decommissioned using processes that are designed to prevent customer data from being exposed to unauthorized individuals. The techniques are detailed in DoD 50.-M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ) to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices Operational Security Network Security ivvy uses a number of defence mechanisms to protect the network perimeter from external attacks. In order to traverse ivvy s internal and external networks, services and protocols must meet our stringent security requirements. The components that make up the network security are as follows: Access to servers via shell connections is not possible except to authorised locations and personnel. All traffic is routed and monitored through commercial grade redundant firewalls. Network segregation is enforced using private network switches. Operating System Security ivvy uses proprietary software, which means that is has been fully developed by ivvy s own team of programming experts. The team uses a hardened, enterprise version of Linux specifically designed to only use the features and functionalities required of the ivvy system. This means that all others funtionalities of the system are disabled, allowing ivvy to retain complete control over the system and what it is capable of performing. The ivvy security team are constantly researching new security measures and threats and updates are performed on a regular basis. Access and Authentication Each ivvy employee accesses the ivvy system using a two-factor authentication system comprised of a unique RFID key and a password. All passwords used comply with ivvy s strong password policy which requires a minimum password length, the inclusion of numbers and symbols, regular password resets and a Word Verification feature when multiple unsuccessful login attempts have been made. 4
5 Individuals are not aware of any of the passwords required to access ivvy s systems. At the end of a person s employment, their unique RFID key is returned to the employer and their access is fully disabled. Authorisation Controls Employees of differing roles are given different access rights based on their job inclusions and responsibilities. In the event that an employee requires additional access rights for a duration, a formal request for extended access permissions needs to be made by the employee, approved by ivvy Security Management and then disabled when the access right is no longer required by the employee. ivvy employees are only granted a limited set of permissions to access client data. If the employee requires further access to client data, the client must approve this access prior to the employee accessing the client s data. Access rights to the client s data will be terminated when the employee no longer requires the client s data to perform their role. Audit Logging ivvy logs all access to the ivvy production system and data in order to monitor any unauthorised access of the system. These logs are reviewable by ivvy security staff on an as-need basis. Physical Security The ivvy datacentre is one of the most sophisticated in the world and employs a range of strategies to ensure that ivvy s systems are keep at high security. These strategies include: Management and patrolling of the building by highly trained control staff 4 hours a day, seven days a week. Multiple closed circuit TV points. Secure entries and exits to the building in addition to limited access areas. All access to the facility is logged and recorded. Systems Development and Maintenance Multi layered Development Most of the ivvy system is engineered to be run off a central set of core functionality that has been designed to avoid certain classes of vulnerabilities. For instance, the database access layers of ivvy are designed to be inherently robust against query language injection vulnerabilities, or HTML template frameworks with built-in defences against cross-site scripting vulnerabilities. Some of the security risks solved with this approach include; Injection Attacks (SQL, XSS, Command, Remote Code) XSRF Attacks 5
6 Session Security Secure File Uploads Creating Secure Configurations Password Security Sandboxes & Tarpits Security through Obscurity Security Implications for AJAX Filtering for Charsets Revision Control To reduce the probability of human error or oversight in our development process, developers are required to use revision control systems to maintain current and historical versions of their source code. Once an engineer has completed code, it is submitted to a test server where the quality assurance team test the code. Coding Reviews ivvy s engineering team are required to partake in a peer-review process on a scheduled basis. These reviews are driven by ivvy s culture of quality engineering and integrity and are used to identify possible quality issues of individuals that may result in future security compromises. The reviews focus on several aspects of an engineer s skills and performance including: Adherence to coding standards Adherence to style guidelines Quality control Multi-layered security testing Security Feature Customisation One of the inherent challenges with security is that as you start to tighten the security of an application, you also start to remove some of its flexibility. As a result the software is written with certain features that allows a customer s domain administrator to dictate their level of security. Password Strength and Length Administrators can set password length requirements for their users. They can also visibly determine the strength of a password using a colour coded indicator when entering in their proposed password. Login Location Restrictions Administrators can restrict access to the system to certain IP addresses, such as the IP address associated with their office. This will help prevent login from unauthorised locations that may compromise the system security. 6
7 Maximum Login Attempts In order to restrict the success of a brute-force-attack (where a script is designed to try all possible password combinations for a user), administrators can tell the system to lockout users for a predetermined period of time after a designated number of failed login attempts. In addition to this, users can activate Captcha (otherwise known as Word Verification) which prevents scripts from logging into a user s account. Captcha can be activated after a set number of failed login attempts have been made against a user name. Sessions Timeouts Administrators can set the system to automatically log a user out if they have not been active on the system for a set amount of time. This helps prevents the hijacking of a user account if someone has left their computer for a duration of time without logging out of the ivvy system. Support Access Administrators can dictate if and when ivvy support personnel can login to a user s account. A setting is also available whereby ivvy personnel must log a request for access which requires approval from the Account Administrator. Session Identity In order to restrict session hijacking, users can indicate the level of security that indicates that their session has not been hijacked. This can be checked against their IP address and their web browser headers. Two-Factor Authentication It is recommended that users in ivvy setup multi-factor Authentication to restrict access to users that both know their access credentials and also has physical access to their second authentication method. ivvy currently supports Yubico keys, and Google Authenticator. Policy enforced security features Secure Browser Connections ivvy users are required to use Hypertext Transfer Protocol Secure when accessing the system. Information is then encrypted from the moment it leaves the user s computer until it reaches ivvy. Disaster Recovery and Business Continuity ivvy has developed a multi-layered disaster recovery program in the event of service interruption due to a security breach, hardware failure, or natural disaster. The main principle of this system is that there be no single point of failure so that, in the event that a single server or entire data centre stops operating, there will be little to no service interruption to any individual using the ivvy system. 7
8 To this end, the ivvy software is hosted in two separate data centres, with each one acting as a failover zone for the other one. This means that data centres are physically separated and are located in lower risk flood plains. In addition to discrete uninterruptable power supply (UPS) and onsite backup generation facilities, they are each fed via different grids from independent utilities to further reduce single points of failure. Data Centres are all redundantly connected to multiple tier-1 transit providers. Data is routinely backed-up to a minimum of two separate data-centres. Conclusion ivvy is committed to keeping information stored on its servers safe and secure and has developed a comprehensive security policy to ensure this happens. By developing policies around security, Internet Protocol and Employee Education, Physical and environmental security, Operational security, Systems development and maintenance, Security Feature Customisation and Disaster recovery and business continuity, ivvy can assure users that their privacy, confidentiality and data is extremely well protected 014 ivvy Pty. Ltd. All rights reserved. 8
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Security Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
BOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER
A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1 Agenda Audits Articles/Examples Classify Your Data IT Control
Dooblo SurveyToGo: Security Overview
Dooblo SurveyToGo: Security Overview May, 2012 Written by: Dooblo Page 1 of 10 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
FMCS SECURE HOSTING GUIDE
FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Project Management and Data Security
Project Management and Data Security 1 Project Management Agile Project Management Methodology Mediasphere applies a structured approach and Best Practice Project Management in the development of all projects.
1 Introduction 2. 2 Document Disclaimer 2
Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application
FileRunner Security Overview An overview of the security protocols associated with the FileRunner file delivery application Overview Sohonet FileRunner is a secure high-speed transfer application that
Security Practices, Architecture and Technologies
Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street Columbus, OH 43215 1-800-VAB-0300 www.viewabill.com 1 CONTENTS End-to-End Security Processes and Technologies... 3 Secure Architecture...
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Question 5: We inquire into whether the new dependent is the first child, as this give the advisor more context and avenues to assist the client.
COMPLIANCE OVERVIEW KIVVIK OVERVIEW Kivvik hosts its application with leading infrastructure and hosting services, including Amazon EC2 and S3 (NASDAQ: AMZN). We apply security controls at every layer
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Frankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Clarizen Security White Paper
WHITE PAPER Clarizen Security White Paper Standards and Practices UNITED STATES 1.866.502.9813 UNITED KINGDOM +44.0.20.3411.2345 ISRAEL +972.9.794.4300 FRANCE +33.18.28839.66 www.clarizen.com Table of
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
SOC 2 Report Seattle, WA (SEF)
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
Security in the Sauce Labs Cloud
SAUCE LABS REPORT Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Overview It s impossible to deny that in this day and age internet security should
IT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
The Anti-Corruption Compliance Platform
The Anti-Corruption Compliance Platform DATA COLLECTION RISK IDENTIFICATION SCREENING INTEGRITY DUE DILIGENCE CERTIFICATIONS GIFTS, TRAVEL AND ENTERTAINMENT TRACKING SECURITY AND DATA PROTECTION The ComplianceDesktop
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect
Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Table of Contents page 2 page 4 page 6 page 8 page 9 page 10 page 11 Overview I. Sauce Labs Data
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Delivering peace of mind in digital optimization: Clicktale's security standards and practices
THE CLICKTALE DIFFERENCE Delivering peace of mind in digital optimization: Clicktale's security standards and practices CONTENTS INTRODUCTION... 2 PRIVACY AND ANONYMITY...2 ISO 27001 COMPLIANCE...4 APPLICATION-LEVEL
System Security. Your data security is always our top priority
Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment
Accellion Security FAQ
A N A C C E L L I O N W H I T E P A P E R Accellion Security FAQ Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 [email protected]
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
