Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition
|
|
|
- Magdalene Charles
- 10 years ago
- Views:
Transcription
1 Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies and controls are in place and functioning correctly. Sapphire uses its own custom toolkits as well as more established commercial tools to provide a unique and thorough assessment which is simply not possible using automated vulnerability scanners. Compliance is often a key driver to carry out regular penetration testing. For the private sector this is often standards such as PCI DSS or ISO 27001, for the public sector Codes of Connection and the PSN. Sapphire offers a range of testing services which can offer peace of mind as well as being flexible to your business needs. Our testing services include external testing, internal testing, web application testing, Wireless testing, CHECK testing and LITE tests (Port Scans). Functional and non-functional Detail Our LITE test is an automated scan designed to offer a low cost and high speed testing service to clients who need immediate testing. This comprises of four main parts:- 1. Port Scan 2. Service Identification 3. Vulnerability Identification 4. Report Generation All of these are performed automatically. The results of each test are then interpreted by our consultants and a report is then generated and securely dispatched to the customer. Sample reports are available on request, a screenshot is included below.
2 Information Assurance There is no external regulators within the industry sector that Sapphire as a company has to provide assurance to. Sapphire complies with all legal and statutory requirements as well as client requirements. Individuals are members of professional CHECK schemes. A compliance Matrix which is ISO27001 certified details these areas and can be made available during an onsite audit.
3 As a Trusted Security Integrator, our credibility is built not only on our long-standing reputation amongst our clients for successful testing and auditing services, but is also demonstrated by our certifications. Sapphire was one of the first organisations in the UK to achieve certification to ISO 27001, the international information security standard. Sapphire has been a member of both the CESG CLAS and CHECK schemes since 2000 and 2003 respectively. In addition our consultants hold many industry certifications including CISM and CGEIT. All our testers are SC cleared, as part of their CHECK Team Member and CHECK Team Leader status, sponsored by GHCQ. For standard testing, we deem that we will hold and process information IL2 and below. For IL3 and higher, Sapphire would recommend using our IT Heath Check service outlined separately within Sapphire s Cloud submission. Level of Backup/Restore and Disaster Recovery Sapphire has a Business Continuity and Disaster Recovery plan in place to enable the company to quickly regain its previous performance and standing after any threat to business continuity, showing as little interruption Sapphires employees and our Customers. Daily tape backups are taken and stored securely off-site on a weekly basis. Information security is critical to Sapphire, and that of its customers. It is the goal of Sapphire to ensure that: Information is protected and controlled against unauthorised access or misuse. Confidentiality of information is assured. Integrity of information is maintained. Business continuity planning processes will be maintained. Regulatory, contractual and legal requirements will be complied with. Information security training will be provided to all personnel. Security statements will be issued and signed by all personnel. Assets are classified and protected as required. Physical, logical, environmental and communications security is maintained. Operational procedures and responsibilities are maintained.
4 All identified information security incidents (breaches, threats, weaknesses or malfunctions) are reported to the Managing Director, and investigated through the appropriate management channel. Infringement of this Policy may result in immediate disciplinary action or criminal prosecution. Business requirements for the availability of information and information systems will be met. On-boarding and Off-boarding Processes For all testing services, Sapphire will provide a project cost which will include scoping, testing, reporting, presentation of results and full remediation support. The project cost will be indentified following the scoping call/meeting. Service Pricing All Sapphire services are per day and an overall project cost will be submitted following a scoping meeting/call. External LITE Pricing Schedule <400 IP addresses and above - For every 400 IP addresses over Internal LITE Pricing Schedule <400 IP addresses (includes expenses) 400 and above - For every 400 IP addresses over Service Management Sapphire's uses project management techniques as a methodical approach to planning and guiding a project from start to finish. Using best practice methods we adopt key processes which direct our customers through five stages: presales, scoping, executing, controlling, and after care support. Project management is applied to all Sapphire's service range and is widely used to control the complex processes of IT security project and solutions. Customer and account management is achieved using our secure bespoke online sales, client and reporting facility (OSCAR). This system manages customer information, opportunities and administration (quotes, purchase orders and invoices). This intranet style facility is only available to Sapphire employees internally and via our secure remote access facility. OSCAR includes a resourcing capability which tracks projects and associated technical consultant s time. The system has the helpdesk facility fully integrated which is linked to customers and related service types.
5 Service Constraints None, as the service will be defined during the project scope. Service Levels Sapphire is the first line support for all our customers and all calls should be raised through our helpdesk. Support will be provided between 08:30 and 17:00, Monday to Friday. Calls should be directed to the Sapphire helpdesk by telephone, fax or . Tel: Fax: The requester must provide at least the following information. Company and position Contact telephone number address Brief description of fault Other support numbers: - Lisa Ingham [email protected] (Professional Services Manager, Sapphire) David Horn [email protected] (Sales Director, Sapphire) Response to helpdesk calls will be within 4 hours. From the initial call the requester will automatically be informed by of the log number for future reference. The response to the call will be from an Engineer via, telephone, fax or . On completion of a call an automatic completion will be sent to the requester together with an incident report. The Customer is entitled to escalate faults at any time, for example if there is a need to highlight the critical nature or impact of a service outage. The following escalation path should be used:- Level Contact Description Level 1 Sapphire HelpDesk The first point of escalation should always be the Sapphire HelpDesk and escalation must be separate from the initial call to log the fault. MIB must obtain a case reference number for the fault. Level 2 Sapphire Professional This is the second point of escalation in the event of the HelpDesk being uncontactable or an increase in call
6 Service Manager priority being required. MIB should quote the case reference number provided. Level 3 Sapphire Sales Director This is the third point of escalation in the event of the Manager being uncontactable or a further increase in call priority being required. Financial Recompense Model Sapphire does not offer any additional recompense beyond what is covered by our Professional Indemnity Insurance. Training Sapphire can provide general information security awareness training, and internal auditor specific training, drawing on experience of a wide ranging security practice across technical and systems disciplines.our training program includes: Forensics Training Technical Solutions Training (including but not limited to UAG) ISO27001 Awareness Training IRCA ISO27001 Lead Auditor Security Related Training / Skills and Knowledge Transfer The National Information Security Conference (NISC) Ordering and Invoicing Process Following receipt of a purchase order, a credit account application will need to be completed for all new customers to Sapphire. Once approved, a job will be created and a project team will be assigned to the Penetration Test. On completion of the test and reports have been submitted and signed off by the customer an invoice will be initiated. Hard copies of all invoices are posted to the provided Customer address and contact of the finance department. All invoices are to be paid within a day agreed notice period. Termination and Cancellation Terms The Professional Services Agreement (PSA) Terms and Conditions may be terminated by either party on giving at least 30 days notice to the other. If we give notice you shall be liable to pay all charges up to the expiry of the notice. If you give notice, you shall be liable to pay all charges until 30 days after the date we receive the notice or until expiry of the notice, whichever is the latter. Your service of notice does not avoid any other liability for Service already provided. You shall be entitled to any
7 data or work in progress created in relation to the Service up to the date of termination unless notice is served as a result of a breach of this Agreement by you in which case all rights to such data or work in progress remain with us. Sapphire reserve the right to invoice in full any job cancelled or deferred within 9 working days of the scheduled delivery/start date*. Jobs cancelled/deferred between 10 and 21 working days of the scheduled delivery/start date will be subject to an invoice of 50% of the total job value**. Please note: Any time used/spent on will be invoiced (plus associated expenses including travel and accommodation). This time will be deducted from the overall time allocated to the project and may necessitate a further purchase order being raised to cover the projected shortfall in allocated days. *The invoice for cancelled/deferred jobs within 9 working days of the start date will be equal to the whole value of the purchase order or alternatively 5 days consultancy whichever is the smaller. **The invoice for cancelled/deferred jobs within working days of the start date will be equal to the 50% of the value of the purchase order or alternatively 5 days consultancy whichever is the smaller. Data Restoration / Service Migration Both critical data and sensitive data are held on various secure servers within Sapphire, both for internal use and for use by Sapphire customers. Such data is backed-up, in order to ensure that, if required, a valid back-up of previous data is available, for purposes of restoration, in case data becomes corrupt or lost. Sapphire conducts a tape backup restore test and UPS test process on a twice annual basis. Consumer Responsibilities Information gathered during the scoping stage will be used in the preparation of a test plan, schedule and scoping agreement. The scoping meeting can be a conference call or formal meeting. Based on the scoping detail, a document will be generated and will require signing prior to the commencement of any testing. Failure to receive this may result in a delay to the start of testing In addition, a signed Vulnerability Test Agreement is mandatory. This provides Sapphire the Authorisation from the Cloud Customer that testing can be carried out against the agreed systems. Typically we will need to know how many IP addresses we are required to test, number of devices, systems or servers. Technical requirements When carrying out any penetration testing or vulnerability assessment assignments, Sapphire testers will adhere to guidelines, codes of ethics and principles published by:
8 OWASP: CREST: CHECK: TIGER: The Open Web Application Security Project. Council of Registered Ethical Security Testers. CESG IT Health Check. A commercial certification scheme for technical security specialists. For flexibility it is often appropriate to combine elements of all three of the above. Specific testers might be assigned dependent upon test criteria. Sapphire testers will always work within current legislation; the Computer Misuse Act and its various amendments, Data Protection and other relevant laws and acts will be observed during any testing and/or data handling procedures. Sapphire s typical approach/methodology to penetration testing/vulnerability assessments involves two discrete steps or phases: A summary of a typical methodology and approach is detailed below: Phase 1 - Targeting or Network Mapping where the objective is to determine what an internet located attacker can see of the [company name] network and systems This is generally an information gathering phase and will give Sapphire testers an overview of how the targeted devices are interfacing with the internet or other external networks. Employing recognised security testing techniques, Sapphire testers will gather information about the network in order to characterise and map the network s boundaries. Using a combination of public domain and proprietary network mapping tools, network sweepers, and port scanning tools, Sapphire testers will identify any probable points of entry into the targeted network. An example of the steps that Sapphire testers might execute would be: Tracing IP packets between network segments in order to determine the network topology. Typically, tools such as traceroute, ping, nmap and tcptraceroute are used in this step, and these tools are coordinated by [company] proprietary mapping scripts. Querying Domain Name Services (DNS) to determine if a zone transfer can be executed and internal DNS information obtained. Tools such as dig, the bind tools and proprietary scripts are used for this step. Using port scanning software such as nmap to identify any open ports or services (e.g. mail, telnet, high number ports) on devices or servers reachable via the Internet. Connecting to open ports using TCP or UDP network utilities to determine the type(s) of operating system(s), firewall application(s) and network service versions in use. This is typically accomplished using tools such as bannergrab-ng, nmap, amap, netcat and proprietary scripts.
9 Phase 2 - Vulnerability Mapping and Exploitation - the objective is to identify any weaknesses in the security of the system typically using information compiled during Phase 1- Targeting, the overall objective of this phase being to map the profile of each system to be tested against publicly known, or in some cases unknown, vulnerabilities relevant to the systems under test. Common scenarios that could provide exploitable features may include: (e.g. spoofing, relaying and virus) Unrestricted data flows. Operating system and software - bugs and configuration errors. Mis-configuration or deployment of firewalls or other network devices Evaluate attack vulnerabilities of hosts on the network. Sapphire testers will map the vulnerabilities listed in public sources of vulnerability information, such as CVE, Bugtraq, OSVDB and CERT, to the profiles identified in the network mapping or targeting phase which will also incorporate current underground exploits and vulnerabilities. Expected results for the Vulnerability Mapping Phase will list the type of system, application or service by vulnerability. The vulnerabilities mapped to each system under test will include relevant tests to be applied At all times, the Sapphire testers will take care to avoid infrastructure that is out of scope, and will not exploit vulnerabilities that may have adverse effects on live services without prior consultation with the designated technical contact. Tools Sapphire testers employ a wide and varied toolset, which has been built up over many years and numerous testing scenarios A number of the tools used by Sapphire testers may fall within the boundaries of the Computer Misuse Act Sections 1-3 as amended by the Police and Justice Act Whereby they can be employed to gain access to, hinder or impair computer systems. For this reason authorisation will always be obtained before a test can begin, and a full scoping document must be received and signed by both parties. A selection of other tools regularly used in our testing process includes: Nikto Kismet Nessus Metsploit OWASP-Zap Nmap Burpsuite Perl Webscarab Ettercap Tcpdump Firefox Cain Wireshark Sqlmap John the ripper Finally, we would highlight at this point that, as every security assignment is unique the most
10 valuable tool is the experience of the tester and their ability to assess the systems that they explore and their knowledge of the best tools to investigate potential exploits in each individual situation. Trial Service Sapphire can offer our LITEtest on up to 25 IP addresses as part of a trial service. The test is an automated scan designed to provide a snapshot of your infrastructure and associated vulnerabilities. Our testers will provide a report on the initial results and highlight the focus for a subsequent manual test. See functional detail for further information.
Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition
Service Definition (Q-D1) Penetration Testing Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies and controls
G-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
INFORMATION SECURITY TESTING
INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.
Vodafone Private Cloud
Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the
Vodafone Primary Storage NAS
G-Cloud 6 Primary Storage NAS Service Definition Vodafone Primary Storage NAS Overview Vodafone Primary Storage Network Attached Storage (NAS) gives you a flexible way to provide file storage for your
GPG13 Protective Monitoring. Service Definition
GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Specialist Cloud Services. Acumin Cloud Security Resourcing
Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting
PSN Protective Monitoring. Service Definition
PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
How To Help Your Business Succeed
G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Marval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Cloud-based Infrastructure and Application Support Service Definition
+44 (0) 20 3603 7830 [email protected] www.equalexperts.com 30 Brock Street London, NW1 3FG Cloud-based Infrastructure and Application Support Service Definition Overview We provide 24/7 support to
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1
G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER
G-Cloud Service Definition. Atos Security Professional Services SCS
G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market
G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS
G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
IT Heath Check Scoping guidance ALPHA DRAFT
IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance
Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions
Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
!!!!!!!!!!!!!!!!!!!!!!
Infrastructure Security Assessment Methodology January 2014 RSPS01 Version 2.1 RandomStorm - Security Assessment Methodology - RSPS01 Version 2.1-2014 - Page 1 Document Details Any enquires relating to
Agilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
ICT and Information Security Resources
Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein
<COMPANY> P01 - Information Security Policy
P01 - Information Security Policy Document Reference P01 - Information Security Policy Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 09 November 2009: Initial release.
G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements
1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........
Tactical Cost Reduction
Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3
X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 Date : 09/08/06 Issue: 6 This is an unpublished work the copyright in which vests in X2 Connect Limited. All rights reserved. The
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
HOSTING SERVICES AGREEMENT
HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES
Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Business Process Management
Digital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Digital Pathways. Penetration Testing
Penetration Testing [email protected] Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine
Software as a Service (SaaS) Online HR
Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Big Data Analytics Service Definition G-Cloud 7
Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
PAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 [email protected] www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Digi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
CRM in a Day Support Services Agreement
CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS
G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered
CWSI Service Definition for Server Monitoring
CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.
Thales Service Definition for NOC Services for Cloud
Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
Kerem Kocaer 2010/04/14
Kerem Kocaer 1 EHLO Kerem is: a graduate from ICSS a security consultant at Bitsec Consulting AB a security enthusiast Kerem works with: administrative security security standards and frameworks, security
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
G Cloud Service Description Premier SIP Trunk Software as a Service October 2015
G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 15 years. Our clients
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating
Managed Backup. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Managed Backup Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards
Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?
Secure Remote Backup (IL3) G-Cloud Lot3 IaaS
Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level
Service Management and ICT Monitoring and Reporting Advisory and Implementation Services
Service Management and ICT Monitoring and Reporting Advisory and Implementation Services G-Cloud Service 1 1. An overview of the G-Cloud Service Arcus can assist you with a review and advice on the effectiveness
END-USER REMOTE SUPPORT AND HELPDESK SERVICES SERVICE DEFINITION
END-USER REMOTE SUPPORT AND HELPDESK SERVICES Complete IT Support for Business Westgate IT End-User Remote Support and Helpdesk Services: Service Definition Service Name End-User Remote Support and Helpdesk
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
End-User Remote Support and Helpdesk Services
End-User Remote Support and Helpdesk Services A single contact point for support needs G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Contacting the Service Desk... 3 Management Reports...
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
SmartImpact MS Dynamics CRM. Support Service Definition
SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: [email protected] http://www.smartimpact.co.uk/
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
