ATM END-POINT PROTECTION MONITORING



Similar documents
Dell Advanced Network Monitoring Services Service Description

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Data Management Policies. Sage ERP Online

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

How To Get Paece Vpn On A Paucec Network For Free

APPENDIX 8 TO SCHEDULE 3.3

How To Ensure The C.E.A.S.A

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

SKC MANAGED SERVICES TERMS OF USE

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SUPPLIER SECURITY STANDARD

Service Description: Dell On Call HelpDesk Service

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

Services Agreement. Rev 12/10/08 TC v08 1

Lot 1 Service Specification MANAGED SECURITY SERVICES

How To Protect A Network From Attack From A Hacker (Hbss)

Managed Device Support Service Agreement Page 1 of 10

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

RL Solutions Hosting Service Level Agreement

Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Exhibit to Data Center Services Service Component Provider Master Services Agreement

BNSync User License Agreement

January Brennan Voice and Data Pty Ltd. Service Level Agreement

Dell Advanced Network Management Services Service Description

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

Cisco Advanced Services for Network Security

Advantages of Managed Security Services

Teleflora Managed Services Agreement

NextiraOne, LLC d/b/a Black Box Network Services

SERVICE LEVEL AGREEMENT. Open Source Support Desk B.V. Hargray, Inc.

PAV Installations, LLC Services AGREEMENT (the "Agreement")

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Getting Started with Symantec Endpoint Protection

Did you know your security solution can help with PCI compliance too?

74% 96 Action Items. Compliance

Access - Point-to-Point VPN Tunnel Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description

Ovation Security Center Data Sheet

UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

Terms and Conditions- OnAER Remote Monitoring Service

Supplier IT Security Guide

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Revised 10/13 SUBSCRIBER AGREEMENT. Introduction

Tk20 Network Infrastructure

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

ADDITIONAL TERMS FOR VIRTUAL VOICE NETWORK SERVICES SCHEDULE 2L

ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS

Hosting Services - Dedicated Service Agreement Page 1 of 6

Ovation Security Center Data Sheet

How To Manage Your Information Systems At Aerosoft.Com

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

SERVICE LEVEL AGREEMENT

Chapter 9 Firewalls and Intrusion Prevention Systems

TUFIN SOFTWARE NORTH AMERICA, INC. GENERAL TERMS AND CONDITIONS FOR SUPPORT AND MAINTENANCE SERVICES [Last revised: May 11, 2014]

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)

MPA Hosting Service Level Agreement

Load Balancing Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery

Achieving PCI-Compliance through Cyberoam

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SaskTel Hosted Exchange Service

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Fifty Critical Alerts for Monitoring Windows Servers Best practices

BUSINESS ONLINE BANKING AGREEMENT

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS

Managed Service Plans

Breach Found. Did It Hurt?

Interoute Application Management comprises the following managed services for application and database software:

Consensus Policy Resource Community. Lab Security Policy

Schedule Document. Leased Lines & Ethernet Based Services. Node4 Limited 29/11/2007

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

SERVICE SCHEDULE FOR ETHERNET PASS-THROUGH SERVICES

GENERAL TARIFF. 2) Internet Service is provided at C&W's discretion, depending on the availability of suitable facilities and equipment.

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE

Shared Hosting Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery

GFI White Paper PCI-DSS compliance and GFI Software products

Transcription:

ATM END-POINT PROTECTION MONITORING GENERAL PROVISION Service Activation. To activate the ATM End-Point Protection Monitoring Service it may be necessary to install hardware and/or software components. Diebold shall have the right to install hardware and/or software on the Client s ATM units. Diebold shall retain ownership of all hardware installed on the Client s ATMs as required to implement the ATM End-Point Protection Monitoring Service. Network Certification. If the Client deems it necessary, for any reason, to have the ATM End-Point Monitoring Service certified with any authorization network or to certify compliance with any government or industry standard, it is the sole and exclusive responsibility of Client to do so. Software. Notwithstanding any other provision, any software provided in connection with this ATM End-Point Protection Monitoring Service is provided AS-IS and WITHOUT WARRANTY. Liability Limitation. ATM End-Point Protection Monitoring Service is offered under the terms and conditions set forth in the Agreement, and all software provided in connection therewith is provided pursuant to the terms set forth above, including, without limitation, the provisions thereof which limit Diebold s and its supplier s liability. WITHOUT LIMITING THE FOREGOING, IN NO EVENT SHALL DIEBOLD OR ITS SUPPLIERS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES THAT MAY BE SUFFERED OR INCURRED BY CLIENT OR ANY PERSON OR ENTITY AFFILIATED OR ASSOCIATED WITH CLIENT, EVEN IF DIEBOLD HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE OR SUCH DAMAGE RESULTS FROM PERFORMANCE, ATTEMPTED PERFORMANCE, OR NON-PERFORMANCE, INCLUDING WITHOUT LIMITATION RESULTING FROM ANY USE OF ANY WORK PRODUCT, IMPLEMENTATION OF ANY RECOMMENDATIONS, INACCURACY OR INABILITY TO USE RESULTS FROM THE SERVICES, DELAY OF DELIVERY OR COMPLETION OF THE SERVICES, INACCURACY OR MISREPRESENTATION OF DATA, OR LOSS OF PROFITS, DATA, BUSINESS OR GOODWILL. IN ADDITION, THE LIABILITY OF DIEBOLD AND ITS SUPPLIERS, FOR LOSSES, DAMAGES, LIABILITIES, SUITS AND CLAIMS, REGARDLESS OF THE FORM OF ACTION AND THE PERSON OR ENTITY BRINGING SUCH ACTION, SHALL NOT UNDER ANY CIRCUMSTANCES EXCEED THE AMOUNT SPECIFIED IN PART 9.2 OF THE AGREEMENT. MINIMUM REQUIREMENTS a b c d Opteva terminal Windows XP Pro Operating System, SP2 minimum 2GB of RAM for any ATM running Deposit Automation and/or Text to Speech otherwise 1G of RAM to support an Endpoint Protection Agent. TCP/IP capable with Ethernet capability. For wireless connectivity: sufficient signal strength is required using EVDO routers with a minimum 5 GIG plan. (dial-up connections not supported) 1

HOW IT WORKS Diebold installs/configures the Symantec Endpoint Protection (SEP) software on the ATM to communicate with the End- Point Security system at Diebold s Operation Center. When the SEP software detects an event at an ATM, an alert is sent from the ATM to the system via this connection. Diebold monitors the SEP security log files for events related to security and react to security-related events as described below. In addition to monitoring for security alerts/event, Diebold also manages the firewall, and Antivirus components of SEP. SEP software updates are automatically performed by the system, as they are made available by Symantec. The End- Point Security system checks the Symantec web site daily for any software updates. Each ATM checks-in to the End- Point Security system periodically to see if updates are available and if so, they are sent to the ATM to remain current with the latest levels of protection. CORE SERVICE DESCRIPTION Services include on-boarding, maintaining, reviewing, and reporting for in-scope ATMs configured with the standard SEP agent software build. On-boarding Diebold licenses to the Client the Sygate/Symantec SEP software agent. Diebold configures the Symantec End Point Protection Server (SEP) console for Client s deployment at Diebold s Green facility. Diebold s ArcSight SEIM, which is located onsite at Diebold s facility, takes feeds from the SEP console. Diebold verifies the standard build prior to implementation on an initial ATM to ensure log feed information is available for monitoring. Diebold monitors and analyzes traffic detected by the SEP agent build to create a policy of expected or normal activity levels for the in-scope ATMs. SEP Console Maintenance Diebold performs Rule Changes as described for each component in the below section title ATM SEP Management Components of this SOW. Diebold installs Diebold-approved (e.g., applicable, tested, and qualified) Symantec Updates for the in-scope SEP console. Engineer Reviews Prior to implementing changes and Symantec software updates, Diebold conducts an Engineer Review to endeavor to ensure: Hardware/software meets all prerequisites Backup of previous configuration information exists Change is consistent with security best practices Change is relevant to Diebold s environment Change can be implemented within allotted timeframe Reporting Reports containing information on the number and types of events received the previous month will be included in the monthly reporting received from Diebold. ATM SEP Managed Components 2

Diebold will manage the firewall, HIDS/HIPS, and Antivirus SEP components via a centralized SEP management console, as described below. Diebold maintains a configuration profile of the SEP console in case of SEP console failure. Diebold will not implement changes to the Client s configuration without prior approval from Client. Firewall Component Diebold will modify Rules via Access Control Lists (ACLs) for inbound and outbound connections. Diebold will implement one set of Firewall Rule changes per calendar month at Client s request. Antivirus Component Diebold configures the Antivirus component to automatically pull updates from Symantec. Monitored Service Components Diebold monitors SEP console logs utilizing a Log Transport Agent (LTA). Diebold utilizes a multi-phased approach to implement and tune monitoring services: Phase 1 Configuration Phase 2 Normalization Phase 3 Ongoing Tuning and Support Diebold works with Client s main Point of Contact (POC) to create a schedule with dates for all deliverables, customize and tune appropriate components for Diebold s environment, and ensure completion of the Client Profile for environmental information. Phase 1 Configuration: Diebold pre-configures the SEP console for Client. Configuration is dependent upon Client providing all the required information as requested by Diebold. Phase 2 Normalization: Diebold reviews data generated, performs statistical analysis in accordance with the project plan. Diebold performs the following major functions during the Normalization process: Map software errors Establish a baseline by monitored service component Establish a set of rules for blocking, reporting, and logging Work with Client to establish minimum and maximum log quantity thresholds in appropriate time intervals, specific to each log source. Phase 3 Ongoing Tuning and Support: Phase 3 lasts for the duration of the SOW and consists of Diebold performing the following functions: Generate Events based on settings established during Normalization. Review all Events and escalate appropriately to Client based on Client s pre-defined escalation procedures laid out in the Client Profile document. Report on all Events in the monthly reports provided by Diebold. Provide Client notifications and perform appropriate remediation tasks as defined in the Response Plan below Conduct Normalization and report card reviews when material shifts occur in Event patterns, for major network environment changes, or on an annual basis. Implement Rule Changes within a 24-hour implementation period within the standard business week, or within the first available Client-defined maintenance window. Contact Client of critical security events within fifteen minutes of detection by the system. Response Plan 3

Report Only - Event data is reported monthly as part of the monthly reports provided by Diebold. Severity incident - Email to Client Severity incident - The following response will be executed. Help Desk notifies Client of the incident. This notification will consist of both an e-mail and an attempt to contact the primary or back-up contacts for security events via phone. If requested, the Help Desk will consult with the Client on responding to the security event. If the Client requests that a Diebold Service technician be dispatched to replace the hard drive or reinstall the software, charges will apply. Response Categories Client could receive notification for the events that include, but not limited to, the following categories of Events. The Client is responsible in determining what, if any, response will take place if an Event is received. Examples of the possible type of Events that could be received are as follows: Category Options Description Severity Chat/Instant Messaging Activity SEP Configuration Change / Modification Connectivity / Network Problem Desktop Application Exploit ATM Reconnaissance Informational Messages Network Exploit Network Reconnaissance OS Exploit Unauthorized Remote Access Spyware / Malware Virus / Trojan / Worm A chat tool is being utilized like "gtalk" or AIM to communicate to/from the ATM. - Typically against company policies Activity that indicates a change in the configuration of a device (i.e. Firewall config changes, etc.) These events indicate possible problems with network health or connectivity. Any buffer overflow attempts to exploit vulnerabilities associated with user applications running on an ATM. Activity that attempts to find out what's on a ATM (e.g. Vulnerability scanning: Nessus, Whisker, OS Flaws, etc ) These events are informational in nature and have little to no security or system impact (example: AV updates were updated successfully) Network traffic, which represents anomalies or RFC violations for such protocols as TCP or ICMP. (Unexpected Data in an ICMP packet or Flags not set appropriately in a TCP packet, TCP-IP Protocol Anomalies, RFC Violation) Activity that attempts to find out what's on the network - Information/Discovery Scan: Nmap, SYS Scan, Port sweep Any attempts to exploit vulnerabilities associated with an Operating System via buffer overflow. (example: Vulnerabilities with the windows kernel). This activity is caused by use of unauthorized remote administration tools (e.g. RDP / Term Server, VNC, etc..). Hostile or intrusive software which may monitor and report system activities to third parties or cause damage to the operating system without user consent. Malicious code/software that compromises system integrity and security. This may lead to network disruptions, data loss and system instability. Report Report Changes in Service 4

If regulatory changes (e.g., changes by a regulatory agency, legislative body, or court of competent jurisdiction) require Diebold to modify the Services described herein, Client agrees in good faith to work with Diebold to amend this SOW accordingly. Connectivity Connectivity is required between the ATMs and Diebold s Network Operations Center (NOC). The following connectivity options may be implemented: MPLS Circuits and routers are ordered and provisioned by Diebold; Client is billed by Diebold o to Client s wide-area network or directly to each ATM Wireless using EVDO routers (5 GB min. plan) of sufficient signal strength Wireless plans are ordered and provisioned by Diebold; Client is billed by Diebold o directly from each ATM (Requires one circuit and router per ATM) VPN Managed VPN HW/SW is provided by Diebold; Client is billed by Diebold o to Client s wide-area network or directly to each ATM VPN Co-managed VPN HW/SW is provided by Client (Client location) and by Diebold (Diebold location); Client is billed by Diebold o to Client s wide-area network or directly to each ATM IMPLEMENTATION PROJECT DIEBOLD RESPONSIBILITIES a. Review and reach agreement on the incident response plan. b. Configuring the Symantec Endpoint Protection server for the standard ATM End-Point Protection Monitoring Service. IMPLEMENTATION PROJECT CLIENT RESPONSIBILITIES a. Client must have a valid Master Licensing Agreement (MLA), Managed Equipment and Services Agreement (MESA), or Diebold Comprehensive Agreement (DCA) with Diebold representing the copies of Windows XP Pro, or later version, they have licensed for their ATMs. The number of copies purchased must equal the number of ATMs to be managed by this service. b. Client must provide Diebold Technician with administrative rights to access the ATM during the Security Agent Client Installation process. c. Client must have sufficient bandwidth available on their internal network to support large file transmissions; Diebold highly recommends that the internal network be a minimum of 128K. d. Client must accept the addition of pre-defined rules to the ATMs firewall application to allow it to communicate with the Symantec Endpoint Protection Server operated by Diebold. e. Schedule all service-related activities and communicate with the POC as needed for installation and ongoing tuning and support. f. Provide Diebold with contact information updates. g. Ensure access and connectivity to the in-scope SEP console. h. Provide knowledgeable staff, and/or third party resources, to assist Diebold with on-boarding. i. Configuring end-to-end connectivity. j. Providing IP addresses. k. Providing data on applications which must communicate to/from the ATM. l. Provide Diebold with access to an initial ATM for configuration and piloting the support Services. m. Provide a unique identifier (naming convention) for all in-scope ATMs to enable appropriate Event escalation. n. Provide connectivity between the managed ATMs and Client s network (except for wireless communications). o. IT Security Agreement (for VPN based connectivity) 5

p. Provide any other information as requested. q. Complete Diebold Change Request (AMC form) to authorize any required changes in scope. r. The Change Request must be submitted by Client s appropriately authorized individual, verifiable in Diebold s client contact database. s. Once the Service is installed and active, it is highly recommended that the Client perform a security scan of the installed system to validate the proper security configuration of the ATM. Client acknowledges and agrees to the following: a. Client will work reasonably with Diebold to establish an acceptable implementation period. b. Rule Changes involving auto-blocking (shunning) require approval from an authorized Client individual (verifiable in Diebold s database) prior to implementing an auto-blocking rule. c. Diebold is not responsible for any loss of business incurred by Client (or third parties associated with Client) due to outages caused by a Client requested Rule Change involving auto-blocking. d. Client s failure to meet any of the Service Requirements on a timely basis can result in delays in the onboarding process. e. Diebold will not manage, update, or support altered, damaged, or modified software, or software, which is not the most-current or Symantec supported version. f. Client is fully aware of Diebold s recommendation to perform full back-ups prior to the performance of Services. g. The in-scope SEP console may not have visibility into encrypted packets and therefore, may not detect viruses contained within those packets. 6