Requirement Priority Name Requirement Text Response Comment



Similar documents
Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK DMS TECHNICAL REQUIREMENTS

Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List

Implementing a secure high visited web site by using of Open Source softwares. S.Dawood Sajjadi Maryam Tanha. University Putra Malaysia (UPM)

Apigee Gateway Specifications

Mobile Admin Architecture

SECTION 1: INTRODUCTION

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Strategic Information Security. Attacking and Defending Web Services

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

How To Protect A Web Application From Attack From A Trusted Environment

Mobile Admin Security

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

Passing PCI Compliance How to Address the Application Security Mandates

Deployment Topologies

Experian Secure Transport Service

GTS Software Pty Ltd. Remote Desktop Services

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

FAQs for Oracle iplanet Proxy Server 4.0

Adobe Systems Incorporated

Securely Managing and Exposing Web Services & Applications

Basic & Advanced Administration for Citrix NetScaler 9.2

Alliance Key Manager Solution Brief

StreamServe Persuasion SP5 StreamStudio

How To Secure Your Data Center From Hackers

05.0 Application Development

High Availability Implementation for JD Edwards EnterpriseOne

Blackboard Learn TM, Release 9 Technology Architecture. John Fontaine

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

Active Directory Infrastructure Design Document

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

ArcGIS for Server Deployment Scenarios An ArcGIS Server s architecture tour

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

QuickBooks Online: Security & Infrastructure

FortiWeb 5.0, Web Application Firewall Course #251

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

owncloud Architecture Overview

Network Test Labs (NTL) Software Testing Services for igaming

WebEx Remote Access White Paper. The CBORD Group, Inc.

enicq 5 System Administrator s Guide

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Architecture and Mode of Operation

Xerox SMart esolutions. Security White Paper

The increasing popularity of mobile devices is rapidly changing how and where we

IBM Security Access Manager for Web

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

PRIVACY, SECURITY AND THE VOLLY SERVICE

Application Code Development Standards

IBM EXAM QUESTIONS & ANSWERS

Architecture Guidelines Application Security

Where every interaction matters.

Effective End-to-End Cloud Security

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Protecting Your Organisation from Targeted Cyber Intrusion

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Security Overview Introduction Application Firewall Compatibility

CONTENTS. PCI DSS Compliance Guide

CareGiver Remote Support Information Technology FAQ

Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014

Attachment D System Hardware & Software Overview & Recommendations For IRP System

SOSFTP Managed File Transfer

MEGA Web Application Architecture Overview MEGA 2009 SP4

Wharf T&T Cloud Backup Service User & Installation Guide

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

The syslog-ng Store Box 3 F2

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

Proof of Concept Guide

SecureTransport. Version 5.3.0

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

How To Protect Freespeech From Attack From A Hacker Attack

An Enterprise Messaging Solution using Integrated Open Source Software

Filr 2.0 Administration Guide. April 2016

Tel: Toll-Free: Fax: Oct Website: CAIL Security Facility

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Sage HRMS 2014 Sage Employee Self Service

Lecture 11 Web Application Security (part 1)

How To Plan A Desktop Workspace Infrastructure

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

24 BETTER SOFTWARE MARCH

customer care solutions

Fax Server Cluster Configuration

Single Sign On In A CORBA-Based

Security. TestOut Modules

Enterprise Architecture Review Checklist

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

owncloud Architecture Overview

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Cisco TelePresence Video Communication Server Expressway

McAfee Web Gateway 7.4.1

Transcription:

N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with firewalls. Describe how the application architecture supports n-tiered Architecture. Discuss how and to what extent the solution complies with United States Section 508 and Web Content Accessibility Guidelines (WCAG) 2.0. In order to reduce or eliminate changes to deployed desktop infrastructure, the Judicial Branch prefers no required client-side plug-ins or ActiveX controls. However, plug-ins may be considered when the functional requirements or the technical requirements of the solution cannot be satisfied using another mechanism. In general, specialized custom coded plug-ins or specialized custom coded ActiveX controls will not be acceptable to the Judicial Branch. Plug-ins / Active X controls Specifically list and describe any required client-side or desktop system plug-ins or ActiveX controls. Operating Systems Specify list of supported operating systems and their versions. Oracle Database Judicial Branch has enterprise license for Oracle database. Specify support for Oracle Database 11gR2 or later. List all supported versions. Oracle RAC Specify support for Oracle Real Application Cluster (RAC) Virtualization Specify the list of virtualization technologies supported. LDAP-v3 Application shall support LDAP-v3 compliant directories for authentication. Other authentication Specify supported authentication methods. Authentication at Presentation Layer Network Traffic Encryption High Availability Core & Public application independence Supported Web Servers User sessions shall not be allowed beyond presentation tier without authentication. Authentication shall be at the web server (presentation layer) All network traffic between the browser and the application shall be encrypted. Application shall function in an active-active High Availability configuration without any single point of failure in any of the application components. Describe High Availability architecture of the application. Publicly exposed application shall not impact Core application used by court users. Publicly exposed application shall be deployed separately with no shared components with Core application. Describe the architecture of Core and publicly exposed application. List the supported Web Servers and their versions. Page 1 of 6

Web Browsers Configuration update method Firewall Port Numbers Identity Propagation Microsoft Internet Explorer version 7 or later is used at the courts. Support for the IE browser is highly desirable. List all supported browsers and versions. Describe how court configuration is updated in the application. The product shall list all port numbers for proper firewall configuration Describe how user credentials and user context are propagated to any integration point outside application server including to the database. Application Network Traffic Encryption Encryption of Sensive Data All incoming and outgoing network traffic of the application shall be encrypted. All sensitive data stored in the database shall be secured and encrypted. PCI Compliance Application shall comply with Payment Card Industry (PCI) security standards. Horizontal Scalability Application must be horizontally scalable Vertical Scalability Application must be vertically scalable Web Traffic Compression Application shall function with compression enabled at Web Server level. Network Bandwidth Specify network bandwidth requierments with & without compression enabled at the web server level. Recommended Infrastructure Vendor shall have recommended specifications available for Server/CPU/Memory/Storage/Network resources for given number of users in activeactive High Availability configuration as well as non High Availability configuration Performance/Stress Test Results Provide comprehensive performance/stress test and results documentation. 32 / 64 bit Describe support for 32bit and 64bit operating systems Integration with existing systems and other applications and systems is a key goal of the branch. Supporting this goal mandates solutions that expose functionality using web services, and open standards compliance, including: File Transfer Protocol Secure (FTPS) Hypertext Transfer Protocol (HTTP) Web Services HTTP Secure (HTTPS) Protocols Secure Shell (SSH) File Transfer Protocol (SFTP) Simple Object Access Protocol (SOAP) 1.2 Universal Description, Discovery and Integration (UDDI) Web Services Description Language (WSDL) Describe support for the listed open standards Page 2 of 6

Web Services Security Support for WS-Security, Certificate based security, Basic HTTP authentication and SAML standards are highly desired. Describe supported authentication methods for Web Services Reports Architecture Describe the reports architecture Adhoc Reports Architecture Describe ad-hoc reports architecture Reporting Database For reports, if a separate reporting database is required, describe the supported data replication mechanisms. Static Content For application efficiency all non-secure static content must be served from web server. Web Service Interoperability Describe compliance with the WS-I (Web Service Interoperability) specification Web Browser only program components to the local desktop. Application should be accessible via a web browser without users having to install Application shall support logging for information, and debug purposes at Web Server, Application Logs and Application layer components. Application Log Application logs shall have userid, sessionid, timestamp, request URI and response Details times for requests. Response Time information Capturing and displaying end-to-end response times for interactive user requests is highly desired. Cleanup temporary stale information. Application shall provide functionality to cleanup temporary data, files, and any other Security-Malicious Content All input (via web services or user entered) shall be scanned for malicious code before processing or storing in the Database. Security-Malicious Content Testing Describe how the application is tested against security vulnerabilities (cross site scripting, SQL injection, buffer overflow, malicious input, etc) The Open Web Application Security Project (OWASP https://www.owasp.org/images/4/4e/owasp_asvs_2009_web_app_std_release.pd f) is an open community dedicated to enabling organizations to develop, purchase, and Security-Application maintain applications that can be trusted. OWASP Application Security Verification Standard (ASVS) is used to establish a level of confidence in the security of Web applications. Describe the applications' adherence to OWASP-ASVS standard and the results of the security verification. Third Party Tools Describe any third party tools requiring licenses to run the application Batch Jobs Describe the batch job architecture. Documentation shall be made available for each batch job, with its detail descriptions, Batch Job parameters, recommended running time, approximate expected run time, and natural Documentation design dependencies on other batch jobs. Page 3 of 6

DMS Integration Judicial Branch has selected Documentum and FileNet as Document Management System vendors. Describe out-of-box integration with Documentum and FileNet. Batch Job Dependency Describe the ability to handle dependencies between batch jobs Batch Job Failure Restarting a failed batch job shall start where the previous instance stalled. Batch jobs processing large amount of data Describe how processing of large amount of data is handled in batch jobs. Authentication shall not prompt for authentication again. Once the user authenticated at the Web Server (presentation tier) level the application Session Timeouts Session duration shall be configurable Application Server Access Users, API or services must not be able to access Application Server directly without being authenticated at the Web Server layer. Authentication Token Validity Once authenticated at the Web Server, the authentication token passed in to Application Server must be asserted with the Security Policy Server for validity RBAC Application shall support Role Based Access Control for users and Web Services Auditing Arch Describe auditing architecture. Large Case Records Describe how cases with large number (> 1000) of participants are handled in the application Infrastructure To reduce capital and operational costs it is highly desirable to run multiple nonproduction environments on the same infrastructure/hardware. Describe how the application supports multiple instances in such an environment. Web Services API All API exposed for integration with other application shall be Web Services conforming to Industry Standards Infrastructure Non- HA Non production environments may use infrastructure without HA. Describe the application architecture without High Availability. Infrastructure - Supported Hardware WebLogic Equipment Specifications Describe the supported hardware configurations Judicial Branch has branchwide license for WebLogic application server. If the proposed solution is a Java EE based solution, specify support for WebLogic application server and the supported versions. Necessary systems and hardware must not be proprietary in nature and have ability to be "racked" in standard 19" four-post server room racks. Page 4 of 6

Application/Equipmen t and Monitoring Ability for applications and processes to be monitored and performance measured using industry standand monitoring tools such as Solarwinds Windows environment compatible Ability to operate in a Microsoft Windows server and desktop environment. Virtualization Ability to operate in a standard virtualized environment such as VMWare Enterprise Ability to integrate with existing Active Directory for security and AD Integration Desired authentication Necessary systems and hardware must not be proprietary in nature and Equipment have ability to be "racked" in standard 19" four-post server room Specifications racks. Scalability and Redundancy Network s Application/Equi pment and Monitoring Windows environment compatible Ability of system to scale to multiple servers for purposes of redundancy and load expansion Ability to operate on standard, static IP based (IPv4, capable of upgrading to IPv6) network with varying circuit types and bandwidths (i.e. T-1, DS3, etc.) Ability for applications and processes to be monitored and performance measured using industry standand monitoring tools such as Solarwinds Ability to operate in a Microsoft Windows server and desktop environment. Ability to operate utilizing common, non-proprietary database Database Support platforms including Microsoft SQL Server and/or MySQL Power s Application Backup & Restoration Power requirements should be 110V AC 60hz with ability to have dual redundant power supplies Ability for software and data to be backed and stored using industry standard software and media such as Tivoli Page 5 of 6

Server specifications Ability to system and software to operate on industry standard servers, preferably Dell. Ability to have all equipment covered by same day maintenance contract. Page 6 of 6