OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS
|
|
|
- Christine Greer
- 10 years ago
- Views:
Transcription
1 Outlook Web Access (OWA) QUESTIONS Q1. With OWA and ActiveSync going away, how does an employee/contractor access Outlook ( , calendar and contacts)? A1. An employee must use their government/contractor issued equipment to access Outlook ( , calendar, and contacts) beginning July 1, Q2. Does CMS have a help desk to assist contractors? A2. The CMS IT help desk may be contacted at [email protected] or by telephone at: Q3. How will contractors access Outlook or resource mailboxes? A3. Contractors should work with their Contracting Officer Representative to discuss next steps to use their PIV cards, purchase PIV card readers or RSA tokens to access CMS . Q4. Will CMS BlackBerry or GOOD users be affected by this change? A4. No, these users will not experience any impacts as a result of these changes. Q5. The directive states that OWA will no longer be allowed. However, If OWA is implemented with Two-factor authentication; will it be allowed for HCQIS? A5. Access to CMS via OWA will be generally deactivated July 1st. This will be done on a per account basis. Q6. Will Exchange ActiveSync, a protocol that allows mobile devices to synchronize data with Exchange mailboxes, be allowed? A6. ActiveSync will be phased out. Q7. Does this notification today mean that CMS system users will only be able to access those systems with a PIV or RSA token or does it mean that contractors must attest that in instances in which they access the CMS system that they fully comply with the CMS Acceptable Risk Safeguards regarding authentication? A7. The short answer is Yes. The CMS CIO and CISO are seeking confirmation that contractors are using strong authentication or that they shut down access to users that are not protected by twofactor authentication. This applies to contractors that access CMS systems or systems operated on behalf of CMS. Use of PIV, PIV-I, or RSA Tokens are preferred methods, however there are other acceptable technologies. Please contact the CMS CISO mailbox if you have questions about a particular technology. 1
2 Q8. Is CMS shutting off access to these CMS systems for anyone one without multi-factor authentication? A8. CMS is responsible for ensuring multi-factor authentication is used by contractors. It is a crucial component to an overall strategy of strong security for example, Federal employees use PIV cards and passwords as multifactor authentication to access systems. It is our responsibility to ensure that our systems are maintained, sustained and protected and we take that seriously. Q9. It seems to us the security issue is a CMS issue, not a contractor issue. Why do we have to make the changes to our processes? A9. Contractors act on behalf of CMS based upon the scope of their contract. Each contract contains standard language from CMS that requires compliance with agency security and privacy requirements in order to protect the sensitive information. Component Heads need to work with both federal and contractor staff to achieve the actions in this directive. Q10. Who should I contact with more questions? A10. Any technical questions regarding the impact of these technical direction letters on your contract should be directed to the assigned Contracting Officer Representative (COR). If you believe that the technical guidance is not within the scope of your contract or that there are not sufficient funds available, you should not act upon the direction and should contact your Contracting Officer immediately. 2
3 Multi-factor Authentication FAQs for CMS Information Systems Q1. Do contractors maintaining CMS systems require multi-factor authentication? A1. Yes. The CIO directive applies to all FISMA systems. Those having an ATO or in the process of obtaining an ATO must incorporate 2FA for all privileged and non-privileged accounts therein. Q2. For systems hosted in external contractor operated facilities with no dependency on the CMS network, is 2FA applicable? A2. Yes. Same as question 1. Q3. I have a waiver, risk acceptance or other relief from using multi-factor authentication for a CMS system, how does this new policy impact my waiver? A3. The CIO directive supersedes any existing waiver, risk acceptance memo or other exception. Appropriate processes will be followed to address these situations. Q4. I am a contractor responsible for maintaining a CMS system residing in an external contractor operated facility and do not have a PIV card or RSA token, how do I continue to support CMS and comply with the CIO directive? A4. The contractor should evaluate all available technical solutions for enabling 2FA for all privileged and non-privileged accounts within the system. The preferred methods are PIV and Hard Token which should be used where available. However, CMS will consider any recommended solution that we feel meets the definition of two factor and integrates with existing technology, policies and standards. We encourage all of our contract partners to develop alternatives that address the resource challenges, time constraints and compliance to policy, such as 508. Some options that have been identified thus far include smart phone apps, phone back, text back, open source and others. Q5. I am a COR with a contractor who has not been PIV enabled or have an RSA token, what do I do? A5. If determined that a PIV is required, the COR should have their contractor complete an HHS- 745 and submit for processing. Contractors should evaluate any available option and recommend an appropriate solution. Refer to question 4. 3
4 Q6. Would the user be able to access CMS systems with her personal computer if her company purchases a PIV card reader and/or an RSA token? I m presuming the user needs to get one or the other. As long as the computer supports the CMS VPN client needed. A6. The CMS environment also performs compliance checks on all computers to make sure specific security criteria are met prior to allowing access. Either a PIV or RSA token will suffice, but other options may also be available depending on the specific situation. Q7. Will CMS pay contractors for the costs to implement multi-factor authentication (e.g., the cost of getting RSA Tokens for employees)? A7. These costs will be minimal, and CMS considers them to be general costs for doing business with the government. Multi-factor authentication is also part of what every entity should be doing to maintain high levels of security within their own business practices. Therefore, CMS expects these costs to be indirect rather than direct costs to the contract. If a contractor determines that this direction has a direct cost impact on its contract, they should explore alternative and contact their Contracting Officer. Q8. Does each IT contractor need to take some action to shut off access to accounts that are not two factor enabled? A8. In situations where 2FA is not possible and alternative work flows do exist, accounts should be disabled. Q9. Please define Privileged Users: A9. Privileged users: accounts associated with individuals who perform system administrative or other maintenance and development type actions typically not available to a standard user. Server Admins, Workstation admins, network admins, developers are a few examples. Please refer to your system security plan which includes a specific definition of privileged and non-privileged users. (The intent of this working definition is to assist in the initial implementation of the CIO directive. It should not be viewed as a CMS standard as it primarily covers the fundamental or traditional categories of privileged users and is not all inclusive. This definition does not cover system and service accounts, which are the accounts, used for inter-process communications and not intended for user login sessions. Password management and complexity best practice solutions are ideal to protect service/system accounts.) 4
5 Q10. How do I get VPN Access? A10. Please ask your CAA to add the CTR_VPN Job code to your EUA Profile. Once the job code has been added, you may download and install the VPN software appropriate for your VPN authentication method (PIV or Token) from Q11. How do I know if I should use PIV or RSA token? A11. Please refer to question 4 above in response to which authentication method to use. Q12. Are there software installation instructions for the VPN software? A12. Instructions, including screen shots, are in the CMS VPN Contractor User Guide. Q13. Is there troubleshooting help for VPN access? A13. Troubleshooting help is in CMS VPN Contractor FAQ. Q14. Is there a web page containing detailed instructions for VPN access? A14. There are two; both require a CMS User ID and password For external access, use Q15. What is the process for obtaining a VPN job code for a contractor? A15. Job codes that grant VPN access are specific to whether a token or a PIV card is used to gain access. For job code assistance, please contact your COR. Q16. Is PIV installation software different from that used for RSA? A16. Each type has its own set of profiles. The VPN web pages have sections for RSA and for PIV installation types. Q 17. Why is CMS undertaking this effort? 5 A 17. There are several explanations for this action. First, this is not a new requirement, CMS has been working on strengthening authentication controls for many years. Federal Information Security Management Act (FISMA), Public Law (P.L.) is the law of the land. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems. The NIST security controls are developed to meet the objectives of Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular
6 A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III. In addition, please refer to OMB M Second, CMS is seeing an increased effort by malicious actors who are attempting to gain unauthorized access to CMS systems and data by stealing user credentials. Third, the threat against the federal government is significant; cyber-attacks against federal agencies such IRS and OPM simply reveal how devastating a data breach can be. Lastly, the Department of Health and Human Services has requested each Agency/OpDiv CIO to take immediate steps to strengthen the posture of the agency by taking immediate steps to enforce strong authentication. Q18. What are the specifications for the PIV card reader? RSA token? A18. The RSA Tokens are specified in the VPN document. The PIV card reader needs to be a current version from a major manufacturer. Documentation may be obtained at 6
7 7 OWA/2-Factor Authentication VPN FAQ
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Two-Factor Authentication User FAQ s
Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices
PRIVACY IMPACT ASSESSMENT
Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012. Report No. 4A-CI-00-12-016
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY 2012 Report No. 4A-CI-00-12-016 Date:
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Access Control Policy April 2014 Agenda Questions & Follow-Up Policy Overview: Access Control Policy Risk Assessment Framework
Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
IMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Identification and Authentication Procedure Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY
Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.
OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information
Note: Support: Never use your TruMobi email application for personal use.
BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up corporate account on your ios mobile device. Note: The TruMobi email application
Understanding the Security & Privacy Rules associated with the HITECH and HIPAA Acts
Understanding the Security & Privacy Rules associated with the HITECH and HIPAA Acts July 2011 The Health Information Technology for Economic and Clinical Health (HITECH) Act requires covered entities
Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed) 01.1 Purpose
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
Remote Access Procedure. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Document No.: VCSATSP 100-100 Restricted Data Access Policy Revision: 4.0. VCSATS Policy Number: VCSATSP 100-100 Restricted Data Access Policy
DOCUMENT INFORMATION VCSATS Policy Number: VCSATSP 100-100 Title: Restricted Data Access Policy Policy Owner: Director Technology Services Effective Date: 2/1/2014 Revision: 4.0 TABLE OF CONTENTS DOCUMENT
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
1.1. Who will have the main responsibility for organizing, storing, and archiving the data? Please provide name(s) and job title(s).
Executive Summary for Research Identifiable Data Version /03 DATA MANAGEMENT PLAN Please reference the Data Management Plan Guidelines, Data Management Plan Evaluation Guide, and/or the FAQ document for
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
UNIFIED COMMUNICATIONS POST-MIGRATION INSTRUCTIONS
UNIFIED COMMUNICATIONS POST-MIGRATION INSTRUCTIONS (PURPOSE): The purpose of this document is to prepare the email user for post email migration activities to ensure a successful email migration with no
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
Session #56. Two-Factor Authentication. Steven Burke & James McMahon U.S. Department of Education
Session #56 Two-Factor Authentication Steven Burke & James McMahon U.S. Department of Education Project Overview To comply with the White House through the United States Office of Management and Budget
Allianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Joan Hash, Pauline Bowen, Arnold Johnson, Carla
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
OWA (Outlook Web Access) FAQs
OWA (Outlook Web Access) FAQs Revised: July 12, 2007 Contents 2005-2007 Chevron Corporation. All rights reserved. Contents OWA Basics... 1 How do I get help?... 1 What is OWA?... 1 What do I need to be
Healthcare Information Security Today
Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Why SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: System and Information Integrity Policy Domain: Security Date Issued: 06/22/11
User Guide Remote PIV to VDI Using a PIV Card
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Mobile Phone SMS version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Mobile Phone SMS version Contents About this guide... 2 Before accessing Outlook Web Access (OWA)... 3 Accessing Outlook Web Access
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
FedRAMP Package Access Request Form For Review of FedRAMP Security Package
FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.
Information Security for Executives
Fiscal Year 2015 Information Security for Executives Introduction Information Security Overview Information Security Policy and Governance Data Protection Security and Your Business Summary Appendix Information
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
INFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
Information Technology Internal Controls Part 2
IT Controls Webinar Series Information Technology Internal Controls Part 2 Presented by the Arizona Office of the Auditor General October 23, 2014 Part I Overview of IT Controls and Best Practices Part
Quick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
www.eset.com Proven. Trusted.
www.eset.com Proven. Trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and
A new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
NASA Information Technology Requirement
NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information
Configuring an Android device to access Staff Wi-Fi and Email.
Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important
Department of the Interior Privacy Impact Assessment Template
Department of the Interior Privacy Impact Assessment Template Name of Project: Reclamation Electronic Document System (REDS) Bureau: Bureau of Reclamation Project s Unique ID: 010-10-01-07-1011-00-404-142
ESET Secure Authentication
ESET Secure Authentication Second factor authentication and compliance Document Version 1.2 6 November, 2013 www.eset.com ESET Secure Authentication - second factor authentication and compliance 2 2 Summary
REMOTE ACCESS USER GUIDE
REMOTE ACCESS USER GUIDE Document Released by the IT Department [21/11/2013] Content Summary 1. Remote Access User Guide Cover Page 2. Content Summary 3. Website/Portal Accessing 4. Method of Accessing
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
