Best Practices for Telecommunications Network Reliability
|
|
|
- Eustacia Perry
- 10 years ago
- Views:
Transcription
1 s for Telecommunications Network Reliability The Network Reliability and Interoperability Council (NRIC) makes communications-related Homeland Security recommendations to the FCC and industry. This white paper outlines the best practices in facilities management recommended by NRIC and offers effective solutions for compliance. October 2005 / White Paper Make the most of your energy
2 I. Introduction The United States Federal Communications Commission (FCC) has quietly been taking additional steps to help industry protect the nation s communications infrastructure from terrorist threats and natural disasters. Through the Network Reliability and Interoperability Council (NRIC), the FCC has been overseeing a thorough analysis of Telecom and Datacom vulnerabilities, potential threats, and gaps in best practices that affect prevention and restoration of service outages. In 2003, the work of various NRIC committees has produced more than 200 best practice recommendations for service providers, network operators, and equipment suppliers to implement in order to fortify U.S. critical communications infrastructure. This paper is an addendum to the white paper Integrated Network and Facility Monitoring Systems for Telecommunications. It extends the concepts of facility management and building automation to Homeland Security, and addresses how the specific physical security recommendations of the NRIC can be met with technology. Schneider Electric has many customer testimonials to the importance of Facility Automation Systems (FAS) with regard to communications infrastructure. Protecting Telecom and Datacom facilities always makes good business sense for cost management and efficiency of ongoing operations. In the post- 9/11 world, it is also a critical part of protecting communications services from attack, and assisting in restoration after an incident. s for Telecommunications Network Reliability 2
3 II. The Mandate of the NRIC and Focus Group 1A The NRIC was formed in 1992 by the FCC to investigate a rash of Telecom service outages, such as fiber cuts, SS7 signaling problems, power failures, 911 outages, and the like. Since that time, NRIC has matured into a single-voice advisor to the FCC on matters of national Telecom and Datacom reliability. Made up of committee members from more than 35 leading private industry companies, the NRIC now has several Focus Groups that oversee national communications reliability, security, and interoperability. These Focus Groups are: Focus Group 1 Homeland Security - 1A Physical Security - 1B Cyber Security - 1C Public Safety - 1D Disaster Recovery & Mutual Aid Focus Group 2 Network Reliability Focus Group 3 Network Interoperability Focus Group 4 Broadband The purpose of these Focus Groups is to meet periodically, analyze current problems facing manufacturers and service providers, and create recommendations to industry on what best practices can be implemented for improving the mission of that Focus Group. The result is methodical, and independently conceived, expert solutions that each Focus Group documents at and publicizes through various public awareness and education campaigns. Focus Group 1A, Homeland Security Physical Security, is made up of fifty-six senior representatives from Telecom, cable, Internet and satellite industries. In March 2003, this committee published best practice recommendations on improving the physical security of national Telecom and Datacom infrastructure. With the public support of FCC Chairman Michael Powell, more than 200 best practice recommendations have been voted on for adoption and implementation by industry. Today s meeting marks the end of the first phase of NRIC s mission to develop best practices that will help fortify our industry s critical infrastructure and secure communications for all Americans. Our work is just beginning and much will be asked of us in the months ahead. The industry must now act to adopt and implement these recommendations to ensure the viability and operations of our communications services. FCC Chairman Michael Powell, March 14, 2003 Examples of these recommendations 1 are published here, with practical real-world solutions that can be implemented today using technology from Schneider Electric. 1 The full report of Focus Group 1A, including all 200+ recommendations, can be found at the NRIC website: March 14, 2003 documents, Homeland Security Physical Security Prevention and Restoration Report Recommendations, Appendix E NRIC VI Physical Security Prevention s. s for Telecommunications Network Reliability 3
4 III. Andover Continuum NRIC VI s for This section lists some of the published NRIC recommendations for which Schneider Electric has unique solutions. In all, Andover Continuum s product family can be applied to 47 of the more than 200 specific actions the NRIC recommends. Each has a unique number format that matches the NRIC report: X Y Z # # # Where X = the most recent NRIC Council (e.g. 6 for NRIC VI in 2003) Y = the Council in which the was last edited (i.e. 6 for current work) Z = 0-4 for Network Reliability, 5 for Physical Security, 8 for Cyber Security # # # = any digits, where every has a unique Z # # # In areas of critical infrastructure, Service Providers, Network Operators alarm and continuously monitor all means of facility access (e.g., perimeter doors, windows) to detect intrusion or unsecured access (e.g., doors being propped open). Andover Continuum manages all aspects of site access control, permitting remote monitoring and logging of all access events and personnel at doors, gates, equipment vaults, and cross-connect cabinets. Andover Continuum sends alarms for invalid entry attempts, intrusion detection, motion detection, or activity seen by DVR video surveillance. In addition to monitoring, Andover Continuum can also open and close controlled doors, gates, and cabinets Service Providers, Network Operators establish corporate standards and practices to drive enterprise-wide access control to a single card and single system architecture to mitigate the security risks associated with administering and servicing multiple platforms. Andover Continuum enables a singlecard, single system architecture through its integrated control paradigm. One or many Andover Continuum access controllers log alarms and events to a single database, which administers central control of the entire system. If several third-party controllers or devices exist, Andover Continuum can serve as the integration point through its support of industry-standard protocols such as BACnet, LONtalk, and Modbus Service Providers, Network Operators consider a strategy of using technology (e.g., access control, CCTV, sensor technology, person traps, turnstiles) to supplement the guard force. Additional manpower is not the answer to better security. Effective use of manpower and the tools of technology are. The tools that augment a guard force are CCTV, motion sensors, proximity reader access controls, and other security devices. As stand-alone technology, these tools are only marginally effective. Combined with an integrated control system such as Andover Continuum, they are most effective. Integrated control enables unique security capabilities, such as panning a camera based on where motion is sensed, or using DVR to log s for Telecommunications Network Reliability 4
5 surveillance images before and after access control events. By allowing Andover Continuum to take over certain security tasks, fewer guards are needed to effectively monitor many locations Service Providers, Network Operators establish and maintain (or contract for) a 24/7 emergency call center for internal communications. Ensure staff at this center has access to all documentation pertinent to emergency response and up to date call lists to notify appropriate personnel. The number to this call center should be appropriately published so personnel know where to report information. The topic of an Alarm Response Center (ARC) was covered thoroughly in the main body white paper this addendum goes with, Integrated Network and Facility Monitoring Systems for Telecommunications. An ARC is an integral part of monitoring, control, and response to physical security threats. The ARC is much more than a 24/7 emergency call center. Using Andover Continuum monitoring and control, alarms, access records, and other data are sent over the network (via dial-up modem or the Internet) to a central SQL server at the ARC for storage. Operators at graphical workstations are alerted to any critical alarms that require immediate attention. Andover Continuum can automatically page or call a technician s cell phone, based on how the system is configured. This enables quick response to security threats with a minimum of staff, and also sends the right person to attend to the incident The electronic equipment area environments for Service Providers and Network Operators should be continuously monitored, controlled and alarmed to detect operating parameters that are outside operating specifications (e.g., equipment temperature, humidity). A key part of any integrated control strategy is managing all relevant physical security alarms under one umbrella. In addition to access control, Andover Continuum also monitors temperature, humidity, commercial power, backup generators, batteries, UPS systems, video surveillance, fire, smoke, and water leak detection. Integrated control enables correlation between alarm conditions and related setpoint thresholds. For example, high power consumption or long runtime for an HVAC unit can easily be correlated with an open door event that is permitting hot outdoor air into the facility. The availability of this correlated data in Andover Continuum permits a quick response to fix the problem before network equipment malfunctions or is vandalized Service Providers, Network Operators adopt a comprehensive physical security plan and design that focuses on providing an integrated approach that seamlessly incorporates diverse layers of security (e.g., access control and appropriate life safety systems, CCTV and recording, sensor technology, administrative procedures, personnel policy and procedures and audit trails). Andover Continuum is this integrated monitoring and control system, seamlessly integrating CCTV monitoring and recording, access control, life safety systems, environmental sensors, personnel records, and regulatory compliance audit trails. s for Telecommunications Network Reliability 5
6 Service Providers and Network Operators should ensure outside plant equipment (e.g., Controlled Environmental Vault, remote terminals) has adequate protection against tampering, and should consider monitoring certain locations against intrusion or tampering. The monitoring and control of remote facilities, such as CEVs, POP sites, RSUs, and other unmanned locations is a critical part of increased physical security of Telecom and Datacom facilities. Andover Continuum manages the diverse layers of physical security noted above, and sends data records and alarms as required to a Andover Continuum client workstation where an operator can take action. The Andover Continuum family of controllers can manage large remote sites with many diverse points of monitoring and control, and can also monitor and control cross-connect cabinets with no power or environmental systems. Large or small, Andover Continuum protects outside plant equipment. s for Telecommunications Network Reliability 6
7 III. Other s where Andover Continuum applies: In the previous section, examples were given on how to apply Andover Continuum for specific Best Practice recommendations. There are many more s that match Andover Continuum functionality feature-by-feature. In every case below, Andover Continuum can completely implement the recommendation Service Providers, Network Operators establish additional access control measures that provide positive identification (e.g., cameras, PIN, biometrics) in conjunction with basic physical access control procedures at areas of critical infrastructure, as appropriate, to adequately protect the assets Service Providers, Network Operators periodically audit all physical security procedures and records (e.g., access control, key control, property control, video surveillance, ID administration, sign-in procedures, guard compliance). Audits should include review of logs and records as well as testing of procedures through activities such as penetration exercises Service Providers, Network Operators periodically audit all data collection, software management and database management systems related to physical security including response plans Service Providers, Network Operators conduct electronic surveillance (e.g., CCTV, access control logs, alarm monitoring) at critical access points to include monitoring and recording for incident analysis. Where appropriate, consider providing near-real-time remote monitoring and archiving Service Providers, Network Operators establish access control procedures that: 1) Confirm identity of individuals, 2) Confirm authorization to access facility, and 3) Create record of access (e.g., written log, access control system log) Service Providers, Network Operators provide audit trails on their electronic access control systems Service Providers, Network Operators establish separation policies and procedures that require the return of all corporate property and invalidating access to all corporate resources (physical and logical) at the time of separation for employees, contractors and vendors Service Providers, Network Operators establish and enforce access control and identification procedures for all individuals (including visitors, contractors, and vendors) that provide for the issuing and proper displaying of ID badges, and the sign-in and escorting procedures where appropriate Service Providers, Network Operators include security as an integral part of the facility construction process to ensure that security risks are proactively identified and appropriate solutions are included in the design of the facility (e.g., facility location selection, security system design, configuration of lobby, location of mailroom, compartmentalization of loading docks, design of parking setbacks). Consider sign off authority for security and safety on all construction projects Service Providers, Network Operators establish policy and procedures related to access control to provide prenotification of visits and exception access (e.g., emergency repair or response) to critical facilities Service Providers, Network Operators establish a procedure governing the assignments of facility access levels to ensure adequate levels of protection and the accountability of local responsible management for individual access based on risk and need for access. Continued on next page. s for Telecommunications Network Reliability 7
8 Service Providers, Network Operators install environmental emergency response equipment (e.g., fire extinguisher, high rate automatically activated pumps) where appropriate, and periodically test environmental emergency response equipment (e.g., fire extinguisher, high rate automatically activated pumps) Service Providers, Network Operators establish and implement policies and procedures to secure and restrict access to power and environmental control systems (e.g., air conditioning, air filtration, standby emergency power, generators, UPS) against theft, tampering, sabotage, unauthorized access, etc Service Providers and Network Operators should establish and implement policies and procedures to secure and restrict access to fuel supplies against theft, tampering, sabotage, ignition, detonation, contamination, unauthorized access, etc Service Providers and Network Operators should ensure critical infrastructure utility vaults (e.g., fiber vault) are secured from unauthorized access Service Providers, Network Operators consider ensuring that critical infrastructure utility vaults (e.g., fiber vault) are equipped to detect unauthorized access (such as the use of proximity and intrusion detection alarms). This might require coordination with local utilities When guard services are utilized by Service Providers, Network Operators and Equipment Suppliers, a process should be developed to quickly disseminate information to all guard posts. This process should be documented and should clearly establish specific roles and responsibilities Service Providers and Network Operators should establish standards, policies and procedures to ensure that 1) the equipment and personnel from collocated Inter-connectors (e.g., CLECs, ILC, IXC, ISP, ASP, INET) are restricted to defined collocation space and designated pathways, 2) Collocated Inter-connectors access and equipment moves, adds, and changes (MACs) are actively coordinated by the host For Service Providers and Network Operators collocation sites, the host should require all tenants to adhere to the security standards set for that site Service Providers and Network Operators should consider establishing and ensuring dual transmission of all sensitive alarms and reliability of all communications links between the areas of critical infrastructure and monitoring stations in order to prepare for possible communication failures during emergency or disaster situations Service Providers, Network Operators base building designs for new construction, major modification and alteration for security should include consideration for the protection of and accessibility to air handling systems, air intakes and air returns Service Providers, Network Operators and Equipment Suppliers should establish incident reporting and investigations program to ensure that all events are recorded, tracked and investigated. Reported information should be analyzed to identify potential trends Service Providers, Network Operators implement a tiered physical security response plan for telecommunications facilities that recognizes the threat levels identified in the Homeland Security s Physical Security Alert Status Program Equipment Suppliers should consider participating in and complying with an industry organization that develops standards in their security, logistics and transportation practices. Continued on next page. s for Telecommunications Network Reliability 8
9 A Service Provider and Network Operator tenant within a telecom hotel should meet with the facility provider regarding security matters and include the facility provider in the overall security and safety notification procedures, as appropriate Network Operators should maintain the ability to detect the location of break-ins along optical and electrical transmission facilities Service Providers, Network Operators ensure adequate physical protection for facilties/areas that are used to house certificates and/or encryption key management systems, information or operations Service Providers, Network Operators develop and implement procedures for video recordings and equipment that cover tape rotation, storage and replacement, assurance of accurate time/ date stamping, and regular operational performance checks of recording and playback equipment Service Providers, Network Operators consider compartmentalizing loading dock activities from other operations. As appropriate, the following should be considered: enhanced lighting, remote CCTV monitoring and recording, remote dock door closing capabilities and remote communications capabilities Service Providers and Network Operators should ensure availability of emergency/ backup power generators to maintain critical communications services during times of commercial power failures, including natural and manmade occurrences (e.g., earthquakes, floods, fires, power brown/black outs, terrorism). The emergency/backup power generators should be located onsite, when appropriate Service Providers and Network Operators should periodically test fuel reserves for emergency/backup power generators for contamination Service Providers and Network Operators should maintain sufficient fuel supplies for emergency/backup power generators running at full load for a minimum of 8 hours Service Providers and Network Operators should tightly control access to the AC transfer switch housing area, and ensure that scheduled maintenance of the transfer switch is performed and spare parts are available Where feasible, Service Providers and Network Operators should place fuel tanks underground. Access to fill pipes, vents, manways, etc. should be restricted (e.g., containment by fencing, walls, buildings) to reduce the possibility of unauthorized access. Where feasible, fuel lines should be completely buried to reduce accessibility Access to critical areas within Telecom Hotels where Service Providers and Network Operators share common space should be restricted to personnel with a jointly agreed upon need for access The facility provider of a telecom hotel utilizing an electronic perimeter access control system should operate such systems with an up-to-date list of all personnel with authorized access to the facility and require periodic updates to this list from the tenants. Each Service Providers and Network Operators tenant of the telecom hotel should provide a current list of all persons authorized for access to the facility and provide periodic updates to this list. s for Telecommunications Network Reliability 9
10 IV. Conclusion FCC Chairman Michael Powell chartered NRIC VI January 7, 2002 to focus on Homeland Security by ensuring the security and sustainability of public Telecom networks in the event of a terrorist attack or national disaster. Membership in NRIC was expanded in NRIC VI to include 56 corporate representatives from cable, wireless, satellite, and ISP industries. The NRIC, as a multi-vendor independent authority, has made clear and specific recommendations to industry for increased physical security at Telecom and Datacom sites, such as COs, Data Centers, Mobile Switching Centers, and Outside Plant. The purpose of systematically identifying these s is to protect the nation s communications infrastructure against attack and to prepare for service continuation and disaster recovery should an attack occur. For these s to be implemented, Service Providers, Network Operators, and Equipment Suppliers must ensure that their current operations and security practices follow these s. And take action where there are deficiencies. Andover Continuum s family is designed for this integrated control, monitoring, and security task, and is uniquely positioned to help industry deploy practical and cost-effective infrastructure protection solutions. s for Telecommunications Network Reliability 10
11 V. Glossary ARC: Alarm Response Center. The group or organization in a company that is responsible for managing alarm incidents that occur at remote unstaffed facilities. Experts in HVAC, security, access control, and other disciplines occupy this center. CEV: Controlled Environmental Vault. An underground room, housing electronic and/or optical equipment under controlled thermal and humidity conditions. CCTV: Closed-Circuit Television. A method for monitoring locations by video camera and displaying images on a central TV monitor. See related DVR. CO: Central Office. The building where end users lines are joined to switching equipment that connects other end users to each other, both locally and via long distance carriers. The central office contains the associated inside plant network elements to perform this function. Cross-connect Cabinet: A cabinet containing terminals in which jumper wires are used to connect feeder pairs to distribution pairs. Also known as a serving area interface or cross box. DVR: Digital Video Recorder. A computer-based systems for recording video images. The digital image format enables storage, indexing, retrieval, and networking of still and motion video segments. See related CCTV. Event Correlation: The mechanism of mapping multiple events to a single alarm condition for the purpose of pinpointing the root cause of a problem. FAS: Facility Automation System. An integrated control and monitoring system used to automate the management of remote offices for the purpose of improving operations and reducing costs. HVAC: Heating, Ventilation, and Air Conditioning. Outside Plant: A general term for remote, unmanned facilities where a Service Providers or Network Operators houses communications and control equipment that supports customer services. POP: Point of Presence. A remote facility where a long distance telephone and data carrier network interfaces with the network of the local exchange carrier. RSU: Remote Switching Unit. A small remotely controlled electronic end office switch that obtains its call and data processing capability from a host office or central office switch. SQL: Structured Query Language. An industrystandard language used for manipulation of data in a relational database. UPS: Uninterruptible Power Supply. A standby power source that provides continuous power to a device by automatically switching from standard AC power to a backup battery in the event of a primary power interruption. WAN: Wide Area Network. A network that uses high-speed, long-distance communications cables or satellites to connect computers over distances generally greater than two miles. The Internet itself is considered a WAN. s for Telecommunications Network Reliability 11
12 Schneider Electric One High Street, North Andover, MA USA Telephone: Fax: WP-NRIC-A4.BU.N.EN CC All brand names, trademarks and registered trademarks are the property of their respective owners. Information contained within this document is subject to change without notice. On October 1st, 2009, TAC became the Buildings Business of its parent company Schneider Electric. This document reflects the visual identity of Schneider Electric, however there remains references to TAC as a corporate brand in the body copy. As each document is updated, the body copy will be changed to reflect appropriate corporate brand changes. October 2005 sm Schneider Electric. All rights reserved.
Best Practices for Telecommunications Network Reliability
BACnet Without Limits NRIC s for Telecommunications Network Reliability The Network Reliability and Interoperability Council (NRIC) makes communications-related Homeland Security recommendations to the
Forum Internacional de Data & Telecomunicaciones
Forum Internacional de Data & Telecomunicaciones TAC Data Center & Telecommunications Eduardo Espinosa Agenda Company Products Data Center & Telecomm Concerns TAC Integrated Cooling, Power & Security TAC
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Security Control Standard
Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
visit us on the web at: www.strategicsecuritycorp.com
CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
HealthcareBookings.com Security Set Up
HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com
800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com Protect My Ministry websites including www.ministryopportunities.org have the following SSL Certificates and protection:
SOC 2 Report Seattle, WA (SEF)
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems
United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water
honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management
honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management As an industry leader and single source expert, Honeywell can deliver fully integrated
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
Site Security Standards and Strategy
Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p.
Preface p. xiii What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p. 7 The Framework for Referencing Integration p. 8 Physical
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN
IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Data Center Overview Document
Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
How To Protect The Internet From Natural Disasters
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service
vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity
Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Solutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1
Ames Consolidated Information Technology Services (A-CITS) Statement of Work
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
Section 2: Overview of Wireless Broadband Networks
Section 2: Overview of Wireless Broadband Networks 2.1 Introduction to Broadband Network Elements Over the past decade, technological innovation and a motivation to deploy broadband in new, efficient ways
MARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
State of Vermont. Physical Security for Computer Protection Policy
State of Vermont Physical Security for Computer Protection Policy Date Approved: 04-02-10 Approved by: Tom Pelham Policy Number: 0501.012005 Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose...
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies
White paper. SAS Solutions OnDemand Hosting Overview
White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Cyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
VISTA Operations Management Systems COMPLETE SECURITY SOLUTIONS FOR ANY RETAIL BUSINESS. Value Beyond Security
VISTA Operations Management Systems COMPLETE SECURITY SOLUTIONS FOR ANY RETAIL BUSINESS Value Beyond Security S Help ensure a significant return on investment by reducing operating costs and increasing
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
Brochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
Network Router Monitoring & Management Services
Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER
Server Monitoring & Management Services
Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI
SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5
SOC 2 - Availability Report on Internap Network Services Corporation's Description of its SEF Company-Controlled Data Center System and Suitability of Design and Operating of Controls Throughout the Period
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
