OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
|
|
|
- Stewart Tate
- 10 years ago
- Views:
Transcription
1 OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested, please provide any other policies, procedures, standards or guidelines, plans, independent assessments (including internal audits), test results, and representations that will assist the Commission in assessing the degree to which: the proper function and adequate security and capacity of automated trading systems and related systems such as those used for dissemination of market data and recording and safe storage of audit trail information is ensured; that appropriate principles for system oversight and risk analysis to identify and minimize sources of operational risk by means of appropriate controls and procedures are followed; and that periodic, objective testing and review of those systems is conducted. A. Organizational Structure, Facility Locations and Geographic Distribution of Staff and Equipment 1. Please provide high-level organization charts and staffing level information for all groups that are directly involved in supporting the development, operation and maintenance of the system, including information technology, computer operations, network and telecommunications, information security, quality assurance, capacity planning, contingency planning (including disaster recovery), technical call center staff, and market operations. 2. Please describe or provide a diagram showing the locations of all facilities that house the staff described above and the equipment on which your system operates. Please indicate the nature of the facilities (e.g., headquarters, primary and backup data centers, primary and backup market operations centers, etc.), and a description of your rationale for the distribution of staff and system components across those facilities. B. System Description and Development Activities 1. Please provide the following information for the system (including information regarding interfaces to the clearing system, surveillance systems, quote vendors and any other essential service providers): a. System description and overview. b. A logical diagram of the software components, including the following information for each component: 1) Name. 2) Functional description, including upstream and downstream feeds. 3) Measure of redundancy of component hosts at both production and DR locations (e.g., N+1, where N represents the minimum number of hosts required). 1
2 4) Essential support software for the component (name and purpose). c. A high-level application flow diagram. d. A representative physical diagram of the hardware components (servers and communications equipment) that shows the placement of the hardware and software components at both the primary and backup data centers, and for each hardware component, provide the following information: 1) Device type (e.g., switch, server, SAN, etc.). 2) Device O/S and version. 3) Functional description. 4) Internal redundancies (e.g., power supplies, RAID). 5) External redundancies (e.g., mirroring, clustering). 6) Essential support software (names and versions) if different than software listed in B(1)(b)(4) above. e. A physical diagram of the network topology within and between data centers and external entities, and for each external connection provide the following information: 1) Purpose(s) of connection. 2) Type and bandwidth of each connection. 3) Description of any redundancies. f. A description of and schedule for the significant data processing jobs occurring each week (e.g., data and system backups, data transmissions to clearing and surveillance systems). C. Functional Capabilities 1. Please provide information regarding the functional capabilities of your system for each of the following areas: a. Edit and validation controls for participant transactions. b. Placement and display of quotations and indications of interest. c. Order placement (types, limits, modification, cancellation). d. Order management. e. Prioritization and execution of orders (i.e., the order-matching algorithm). f. Account and member management. 2. What functions are restricted to a specific class of market participant and why? D. Physical Security and Environmental Controls 2
3 1. Please provide information regarding the physical security controls used in the communications and central computer facilities to protect system components and critical infrastructure. In your response, please address: a. Perimeter and external building controls and monitoring, including: 1) Lights. 2) Cameras. 3) Motion detectors. 4) Guards. 5) Fences, gates, and other barriers. 6) Building entrances, including loading docks. b. Internal building controls and monitoring, including: 1) Guards. 2) Metal detectors. 3) Door locks. 4) Visitor controls, including scheduling, identification, logbooks, and escort requirements. 5) Compartmentalization of computing, communications, and building infrastructure equipment. 6) Cameras, video recording, and monitoring stations. 7) Access authorization and review procedures. 8) Mail and package handling procedures. 2. Please provide information regarding the environmental controls used in the communications and central computer facilities to protect system components and critical infrastructure. Please address redundancy, monitoring, maintenance, and testing of: a. Electrical supply, including: 1) Sources and paths of commercial power. 2) Generators (and associated on-site fuel supply and fuel delivery contracts). 3) Power distribution units. 4) Uninterruptible Power Supply units. 5) Emergency shutoff controls. b. Cooling equipment, including: 1) HVAC units. 2) Air handlers. 3) Chillers. 4) Other associated items such as water supply and humidifiers. 3
4 E. Logical Security c. Fire control equipment, including: 1) Smoke and heat detection. 2) Fire suppression. 3) Water damage protection. 1. Please provide a logical security architecture diagram and description. 2. Please provide information regarding the access controls and procedures that are used to ensure the identification, authorization, and authentication of system users. 3. Please provide information regarding the procedures that are used to ensure proper account management, including: a. Establishing, changing, reviewing and removing accounts (including emergency and other temporary accounts). b. Maintaining user awareness of the authorized uses of the system. 4. Please provide information regarding the administrative procedures (such as adherence to least privilege and separation of duties concepts) and automated system that will be employed to prevent and detect the unauthorized use of the system. 5. Please provide information regarding the use and management of safeguards and security tools used to protect the critical data and system components, including: a. Encryption and data compression. b. Denial of service protection. c. Firewalls d. Routers. e. DMZs and network segmentation. f. Intrusion detection. g. Event logging and log analysis. h. Virus protection. 6. Please provide information about your incident handling program, including: a. Staffing. b. Training. c. Procedures (including detection, analysis, containment, and recovery). d. Communication/notification and reporting. e. Testing. 4
5 7. Please provide policies, guidelines, and procedures for authorization and use of remote operations facilities. 8. Please provide information about your procedures for sanitation of equipment and media. F. Risk Assessments and Other Reviews Principle 5 of the IOSCO Principles states that Before implementation and on a periodic basis thereafter, the system and system interfaces should be subject to an objective risk assessment to identify vulnerabilities which may exist in the system design, development, or implementation. The scope of the risk assessment must include each of the areas noted in request 1 below. In addition, parts 38 and 39 of the Commission s regulations include guidance for Core Principle 9 (for DCMs) and Core Principle I (for DCOs) that calls for review of automated systems to be performed by a qualified independent professional (i.e., those parties responsible for either development or operation of the system are not the same individuals who conduct the review). Given the broad scope of the areas for which risk assessments are required, it is expected that those assessments may have been conducted by various parties at different times. It is further expected that, as implied in the paragraph above, some of those assessments may have been conducted by qualified independent internal staff. Please respond to the following requests keeping that guidance in mind. 1. Please provide the following risk assessment documents: a. Data center including physical security, environmental controls, facilities management, and change management. b. System Development Life Cycle, including: 1) Specification. 2) Software change management. 3) Software testing. 4) Issue tracking. 5) Release management. 6) Documentation. c. System security measures, including: 1) Access controls. 2) Configuration management. 3) Patch management. 4) Vulnerability scanning. 5) Intrusion detection. 6) Log management. 5
6 d. Capacity testing. e. Problem identification, reporting, and resolution. f. Development and maintenance of essential documentation. g. Disaster recovery. 2. Please provide copies of: a. Your most recent independent risk assessments. b. Management s responses to the findings of those assessments. 3. Please provide copies of your mitigation plans for addressing the vulnerabilities identified by those risk assessments. 4. Please provide documentation (policies, standards, guidelines) that attests to the development of and adherence to an ongoing information security program whose purpose is to minimize future information security risks. 5. Please provide other system assessments (e.g., vulnerability scanning, penetration test, capacity and performance test) or audits that were recently performed. Include reviews done by internal audit or quality control departments, independent accounting firms, and other third parties. G. Internal Controls for Operations Please describe your plans and schedule for ongoing independent reviews, including roles and responsibilities for selection of review areas, scheduling, conducting, reporting, and responding to the findings. 1. Personnel a. Please provide information regarding the controls and procedures that will be used to ensure that: 1) Appropriate background investigations are conducted prior to assigning personnel to sensitive roles. 2) Periodic recurring background investigations are conducted for staff in sensitive roles. 3) Personnel are aware of, receive appropriate training for, and formally acknowledge their security responsibilities. 4) Access privileges (logical and physical) are reviewed when personnel are reassigned or terminated. 6
7 2. Configuration Management a. Please provide information regarding the controls and procedures that will be used to ensure: 1) Consistent inventory maintenance. 2) Adherence to standards for baseline configuration. 3) Pre-installation testing and authorization. 4) Pre-change testing and authorization. 5) Post-installation and post-change monitoring. 3. Software change management a. Please provide information regarding the controls and procedures that will be used to ensure the integrity and reliability of system and application software, including: 4. Patch management 1) Justification for change. 2) Unit and integration testing. 3) Independent review for quality assurance. 4) Approval for production installation. 5) Post-change monitoring. 6) Separation of duties. a. Please provide information regarding the controls and procedures that will be used to ensure the timely application of essential patches, including: 1) Staffing. 2) Analysis. 3) Testing. 4) Implementation and fallback procedures. 5) Communication and reporting. 5. Event and problem management a. Please provide information regarding the staffing, procedures, and controls that will be used to ensure the timely notification about operational events and resolution of operational problems, including: 1) Identification. 2) Tracking. 3) Escalation. 4) Resolution. 5) Reporting. 7
8 H. Functional Testing 1. Please provide information regarding the testing methodology, including management controls, used to verify the system s ability to function as intended, including all interfaces to external systems such as those used for market information, audit trail, surveillance, and clearing. Please include copies of the two most recent test results (for verification of follow-up actions). 2. Please identify what group is responsible for recording, correcting, and retesting errors, and detail their procedures for those activities. I. Security Testing 1. Please provide information regarding your use of vulnerability scanning to identify and eliminate vulnerabilities in your computing and communications equipment. Please address each of the following: a. Frequency of use. b. Methodology and tools. c. Distribution of reports. d. Remediation of findings. e. Tracking of mitigation activities. 2. Please provide the results of the most recent vulnerability scan and management s response and plan of action. 3. Please provide information regarding your use of penetration testing to identify and eliminate vulnerabilities in your computing and communications equipment. Please address each of the following: a. Frequency of use. b. Methodology and tools. c. Distribution of reports. d. Remediation of findings. e. Tracking of mitigation activities. 4. Please provide the results of the most recent penetration test and management s response and plan of action. 5. For items 1 through 4 above, if the scanning or testing was performed by someone other than an independent third party, please address the issue of objectivity. 6. Please provide information about any internal password scanning you perform, including: a. Frequency of use. 8
9 b. Tools used. c. Scope. d. Follow-up. 7. Please provide information about any verification testing performed to ensure that security controls are operating as expected. J. Capacity Planning and Testing 1. Please provide the capacity levels and associated performance (i.e., response time) for each of the following aspects of your system, including at a minimum, target, average daily, historical high, and system stress-tested sustained and peak levels: a. Simultaneous workstation sessions. b. Market participant transactions. c. Trade matches. d. Quote vendor transactions. e. Data mirroring transactions. 2. Please provide a list of all products used for monitoring and analyzing capacity and performance metrics for hardware, software, and communications. 3. Please provide copies of guidelines and procedures for the use of each of the products listed in response to item 2 above. 4. Please describe any formal process you employ for the ongoing review of capacity and performance levels. 5. Please describe at what levels the addition of new system resources would be triggered to ensure adequate capacity and performance. 6. Please describe how quickly additional capacity and performance resources could be activated in an emergency situation. 7. Please provide charts depicting your 10 most recent historical high system utilization days, and a description of actions taken to mitigate any resulting systems performance issues. K. Business Continuity and Disaster Recovery ( BC-DR ) 1. Please provide the following information: a. A description of your DR sites, including the following information for each site: 1) State of readiness (hot, warm, cold). 9
10 2) Whether a commercial or self-managed site. 3) Location. 4) Distance from production site. b. A description of the public infrastructure supporting each of your BC-DR sites. c. A list of the mission-critical systems that each BC-DR site will support on a routine, non-disaster basis, and a description of your reasons for this overall data center strategy. d. A list of the mission-critical systems that each of your BC-DR sites will support in the event of a disaster. e. Copies of all agreements, including service level agreements, with third parties to provide services in support of your BC-DR plans. f. A description of your strategy for ensuring the availability of essential market data, including security and testing of data backups. g. A description or assessment of the maximum potential data loss in the event of a disaster. h. A description of your strategy for staffing DR sites in the event of a disaster, including a pandemic. i. A description of any plans or capabilities for remote management and operation of your primary or DR sites in the event that they become inaccessible but remain functional. j. Any third party or internal audit assessments of your BC-DR arrangements or plans, including pandemic plans. k. Briefing materials for senior management regarding BC-DR and pandemic plans. l. BC-DR and pandemic training materials prepared for employees. m. A list of essential documentation and a description of your procedures for ensuring its currency and availability to team members. n. Your BC-DR plans (including lists of essential functions, staffing assignments, security requirements, recovery procedures, test plans, external dependencies and any pandemic plans. o. Your Emergency Communications Plan, including emergency contact information. p. Communications to DCM or DCO members about the BC-DR plans. q. A description of how your BC-DR plan is coordinated with members BC- DR plans. r. A description of your strategy for testing your DR sites, including frequency, types of tests, and scope of staff and market participant involvement. s. A copy of the most recent SAS 70 Type II report for your DR sites, including, if applicable, any actions taken to remediate findings in the report. t. A description of the three most recent operational tests conducted with respect to your DR sites, including the results of each test and any lessons learned. 10
11 u. A description of your participation in any industry wide tests relating to BC-DR matters. v. A description of any instances of activation of your BC-DR plans, and any resulting lessons learned. 2. What is your recovery time objective ( RTO ) for each of the following: L. Outsourcing a. Resumption of trading. b. Completed clearing of transactions executed prior to disruption. c. Resumption of clearing of new transactions. d. Resumption of market surveillance. e. Access to audit trail information and resumption of trade practice surveillance. 1. Please provide a copy of each service agreement for IT support provided to your organization. 2. Describe your process for monitoring the performance of those service agreements, including roles and responsibilities, frequency of review, and remediation of identified deficiencies. 3. What are the expected service levels for responsiveness to the various anticipated problems? M. Training 1. To what groups (e.g., technical staff, managers, senior executives) do you provide basic security awareness training before authorizing access to the system? 2. How often do you require refresher training? 3. Please identify the roles of personnel that have significant information system security responsibilities and describe the information system security training they are required to complete before being authorized to perform their assigned duties. 4. Please describe the type of training that is provided for the users of the system. 11
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Toronto Public Library Disaster Recovery recommended safeguards and controls
BCE Security Solutions Restricted Attachment 1 Toronto Public Library Disaster Recovery recommended safeguards and controls Final Prepared by: Bell Security Solutions Inc. Professional Services 333 Preston
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Vendor Risk Assessment Questionnaire
Vendor Risk Assessment Questionnaire VENDOR INFORMATION: Vendor Name: Vendor Address: Vendor Contact Name: Vendor Contact Phone No: Vendor Contact Email: DATA SENSITIVITY What is the nature of data that
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Security Standard: Servers, Server-based Applications and Databases
Security Standard: Servers, Server-based Applications and Databases Scope This standard applies to all servers (including production, training, test, and development servers) and the operating system,
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE
R1 Provide Risk Based Assessment Methodology (RBAM) R1.1 Provide evidence that the RBAM includes both procedures and evaluation criteria, and that the evaluation criteria are riskbased R1.2 Provide evidence
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
SOC 2 Report Seattle, WA (SEF)
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
From the Lab to the Boardroom:
From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies [email protected] (512)
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
Perceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Qvidian Hosted Customer Technical Portfolio
Introduction The presents a description of Qvidian s Software as a Service (SaaS) deployment model, providing information on the Qvidian architecture and security practices. This document includes descriptions
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Frankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire Overview This pre-implementation questionnaire is designed to provide the Boston College Internal Audit Department with a general understanding
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
Eleventh Hour Security+
Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
