Penetration Testing. Request for Proposal



Similar documents
UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034

Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307

Secure Electronic Voting RFP Kit

Introduction and Background

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

PCI DATA SECURITY STANDARD OVERVIEW

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

PCI Security Scan Procedures. Version 1.0 December 2004

No.Ed.CIL/IS Unit/It Security/2014/1..April, Quotation for Security Audit for EdCIL house IT infrastructure.

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

How To Ensure The C.E.A.S.A

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

HIPAA SECURITY RISK ANALYSIS FORMAL RFP

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

RFP No C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Penetration testing & Ethical Hacking. Security Week 2014

Request for Quote HIPAA Security Risk Analysis

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Security Testing for Web Applications and Network Resources. (Banking).

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Payment Card Industry (PCI) Data Security Standard

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

InfoSec Academy Pen Testing & Hacking Track

Goals. Understanding security testing

Penetration Testing Services. Demonstrate Real-World Risk

Professional Services Overview

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Penetration Testing in Romania

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Network Segmentation

Penetration Testing. Presented by

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Response to Questions CML Managed Information Security

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Request for Proposal (RFP)

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Microsoft Technologies

Request for Proposals on Security Audit Services

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

March

DISTRICT OF COLUMBIA SUPERIOR COURT OFFICE OF CONTRACTS AND PROCUREMENT REQUEST FOR PROPOSALS (RFP) FROM GSA FEDERAL SUPPLY SCHEDULE CONTRACTORS FOR

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Aberdeen City Council IT Security (Network and perimeter)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Thoughts on PCI DSS 3.0. September, 2014

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

Two Approaches to PCI-DSS Compliance

SAN ANTONIO WATER SYSTEM PURCHASING DEPARTMENT

Miami University. Payment Card Data Security Policy

Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD

OVERVIEW. We seek consultative services that would deal with the following objectives:

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

Issue Date: March 4, Proposal Due Date: Tuesday, March 18, 2014 by 11:00 AM Mountain Time to:

REQUEST FOR PROPOSALS: Internal and External Assessment of Network, Computer, and Application Environments.

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Cisco Security Optimization Service

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

FedRAMP Standard Contract Language

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) Fax: (356) Call for Quotations

Managing IT Security with Penetration Testing

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

PCI-DSS Penetration Testing

Payment Card Industry Self-Assessment Questionnaire

PCI Requirements Coverage Summary Table

PCI DSS v3.0 Vulnerability & Penetration Testing

HOW SECURE IS YOUR PAYMENT CARD DATA?

Information Technology Security Review April 16, 2012

Alcatel-Lucent Services

InfoSec Academy Application & Secure Code Track

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Keeping your data yours

Overcoming PCI Compliance Challenges

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Detailed Description about course module wise:

PCI DSS Requirements - Security Controls and Processes

Document Management System Request for Proposal

NETWORK PENETRATION TESTING

PII Compliance Guidelines

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Innovative Defense Strategies for Securing SCADA & Control Systems

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SECURITY CONSULTING BID INSTRUCTIONS

Transcription:

Penetration Testing Request for Proposal Head Office: 24 - The Mall, Peshawar Cantt, 25000 Khyber Pakhtunkhwa, Islamic Republic of Pakistan UAN: +92-91-111-265-265, Fax: +92-91-5278146 Website: www.bok.com.pk Proprietary Notice: This document contains information proprietary to BOK may not be reproduced, copied or used for purposes other than its intended use without the prior written consent of BOK.

TABLE OF CONTENTS 1. RFP Information... 2 2. Introduction...3 3. Objectives... 4 4. Proposal Requirement... 5 4.1 Executive Summary...5 4.2 Scope, Approach And Methodology...5 4.3 Deliverables...5 4.4 Project Management Approach...5 4.5 Detailed And Itemized Pricing...5 4.6 Appendix: References...6 4.7 Appendix: Company Overview...6 5. Evaluation Factors For Award... 7 5.1 Criteria...7 6. Scope Of Work... 8 6.1 Deliverables...8 7. Contact Information... 8 8. Penetration Success Criteria... 9 Page 1 of 9

1. RFP INFORMATION This Request for Proposal (RFP) is being issued for the, Penetration Testing of Information Technology Infrastructure, as part of regular process of verifying the implemented security controls and thus to further enhance the security of the IT systems and achieve improved and secure IT infrastructure. Bank of Khyber invites technical and financial proposal from the selected vendors for the execution of the Penetration Testing of IT infrastructure. The proposal should include the timelines and execution schedule. Financial proposal should provide cost of external tests, internal tests, websites tests separately. It should mention vendor s terms of payment, availability status and expected delivery period. Financial proposal should be in local currency (PKR), inclusive of all applicable duties, taxes and charges. The technical and financial proposal must be submitted in two separate sealed envelopes latest by 12 th April 2013 marked to Incharge Procurement, I.T Division, the Bank of Khyber at 4 th Floor, Statelife Building, the Mall, Peshawar Cantt. Peshawar. The vendor must submit a proposal substantially aligned to the requirements included in the RFP. Bank of Khyber s evaluation of the proposal for awarding the project shall be based on the original proposal. However, BOK may decide to incorporate or truncate items on the basis of alternate proposal submitted by the successful bidder, if the proposal has been evaluated technically compliant with best combination of price and other criteria. Provision for any price escalation adjustment included in the proposal shall not be taken into consideration. Bank of Khyber reserves the right to accept or reject any proposal and to withdraw the process and reject all proposals, at any time prior to award of Contract, without thereby incurring any liability to the affected bidder(s) of any obligation to inform the affected bidder(s) on the grounds for BOK s action. Bank of Khyber reserves the right at the time of award to increase or decrease the scope in the RFP. In addition, Bank of Khyber may delete any item from the RFP and the bid price shall be reduced accordingly. Page 2 of 9

2. INTRODUCTION The Bank of Khyber was established in 1991 through Act No. XIV, passed by the Provincial Legislative Assembly of the KHYBER PAKHTUNKHWA Province of Pakistan. It was awarded status of a scheduled bank in September 1994. The Bank of Khyber enjoys a unique position, and stands out amidst the other banks operating within Pakistan, and has the privilege of being bracketed amongst the only three government banks in the country. BOK has a total of 80 branches all over the country and BOK s client base is located in major cities of Khyber Pukhtunkhwa, Punjab, Sindh, Baluchistan and Azad Kashmir. With high reliance on technology for managing and growing business, BOK considers information security as a major business enabler. In continuation to the enhancement of IT security of its architecture, BOK wants to take effective implementation of controls by acquiring services of professional penetration testing organizations. Page 3 of 9

3. OBJECTIVES The goal of this exercise is to ensure that reasonable protection is in place for general and particular threats that may exist for BOK s IT systems and infrastructure including but not limited to the following: 1. To test and verify the security of the Information Technology systems and network so as to ensure the effectiveness of deployed security measures. 2. Verify the perimeter security controls. 3. Verify the security setup and configuration of internal BOK s IT infrastructure. It will include the associated networks and systems with a perspective of ensuring CIA and authenticity of data and information systems. 4. Verify the security associated with web applications / website that are used by Bank of Khyber. 5. Identify and recommend safeguards, suited to BOK s environment, with the aim to strengthen the level of protection of the BOK s IT infrastructure. Page 4 of 9

4. PROPOSAL REQUIREMENT Vendor s proposal in response to this RFP will be incorporated into the final agreement between BOK and the selected vendor. The submitted proposals are suggested to include each of the following sections: 1. Executive Summary 2. Approach and Methodology 3. Project Deliverables 4. Project Management Approach 5. Detailed and Itemized Pricing 6. Appendix: References 7. Appendix: Company Overview 4.1 EXECUTIVE SUMMARY This section will present a high-level synopsis of the vendor s responses to the RFP. The Executive Summary should be a brief overview of the engagement, and should identify the main features and benefits of the proposed work. 4.2 SCOPE, APPROACH AND METHODOLOGY The proposal should reflect each of the sections listed below, highlighting attack motivations pertaining to BOK s environment: Network Architecture Designs Reviews. Wireless Network Assessment and Penetration Testing Server Configuration Reviews. VPN Configuration Reviews. PCI Quarterly Scan. PCI Report on Compliance Assessment or Gap Analysis. Virtual Infrastructure Security Assessment. Website Penetration Testing 4.3 DELIVERABLES Include descriptions of the types of reports used to summarize and provide detailed information on security risk, vulnerabilities, and the necessary countermeasures and recommended corrective actions. 4.4 PROJECT MANAGEMENT APPROACH Include the method and approach used to manage the overall project and client correspondence. Briefly describe how the engagement proceeds from beginning to end. 4.5 DETAILED AND ITEMIZED PRICING Include a fee breakdown by project phase and estimates of travel expenses if required. Separate quotations should be provided for each testing type stated in 4.2. 4.6 APPENDIX: REFERENCES Provide reference(s) for which the vendor has performed similar work. 4.7 APPENDIX: COMPANY OVERVIEW Provide the complete name, address, phone numbers, fax, emails and contact person related details etc. Page 5 of 9

5. EVALUATION FACTORS FOR AWARD 5.1 CRITERIA Any award to be made pursuant to this RFP will be based upon the proposal with appropriate consideration given to operational, technical, cost, and management requirements. Evaluation of offers will be based upon the Vendor s responsiveness to the RFP and the total price quoted for all items covered by the RFP. The following elements will be the primary considerations in evaluating all submitted proposals and in the selection of a Vendor or Vendors: 1. Completion of all required responses in the correct format. 2. The extent to which Vendor s proposed solution fulfills BOK s stated requirements as set out in this RFP. 3. An assessment of the Vendor s ability to deliver the indicated service in accordance with the specifications set out in this RFP. 4. The Vendor s stability, experiences, and record of past performance in delivering such services. 5. Availability of sufficient high quality Vendor personnel with certifications such as Certified Information System Security Professional (CISSP), Certified Ethical Hacker (C EH), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), GIAC Certified Penetration Tester (GPEN), ISO 27001 Lead Auditor, Certified in Risk and Information System Control (CRISC) and proven references of conducting the similar activities preferably in a bank. 6. Availability / appointment of a Project Manager having than 10 years of experience in Managing IT across banking sector. 7. Overall cost of Vendor s proposal. 8. Documents should include client list with the affidavit as not black listed or involved in litigation. BOK may, at their discretion and without explanation to the prospective Vendors, at any time choose to discontinue this RFP without obligation to such prospective Vendors. Page 6 of 9

6. SCOPE OF WORK Bank of Khyber desires to engage the services a well reputed IT security company to conduct the following services i.e, Server Configuration Reviews, Network Security Posture Assessment: Internal & External Penetration Testing o Password Cracking o Router Testing o Denial of Service (DOS) Testing o Distributed DOS testing o Containment Measures Testing o Ensuring optimum performance of the System. Network Architecture Designs/ Reviews o Network Scanning o Review of Network Monitoring Software (NMS). o Network Infrastructure Review o Security of Data Transmission Web Application Assessments Firewall Diagnostics Review IDS/IPS Diagnostic Review Security Awareness Training 6.1 DELIVERABLES At the conclusion of the assessment, BOK requires written documentation of the approach, findings, and recommendations associated with this exercise. The documentation should consist of the following: Detailed technical report Executive summary report 6.1.1 DETAILED TECHNICAL REPORT A document developed for the use of BOK s technical staff which discusses: the methodology employed, positive security aspects identified and their importance, detailed technical vulnerability / threat findings, an assignment of a risk rating for each vulnerability / threat, supporting detailed exhibits for vulnerabilities when appropriate, and detailed technical remediation steps. 6.1.2 EXECUTIVE SUMMARY REPORT A document developed to summarize the scope, approach, findings and recommendations, in a manner suitable for senior management. Page 7 of 9

7. CONTACT INFORMATION 7.1 TECHNICAL CONTACT Any questions concerning technical specifications or Statement of Work (SOW) requirements must be directed to: Name Address Phone FAX Email 7.2 CONTRACTUAL CONTACT Any questions regarding contractual terms and conditions or proposal format must be directed to: Name Address Phone FAX Email Page 8 of 9

8. PENETRATION SUCCESS CRITERIA Achievement of anyone of the following scenario would qualify as successful penetration: Access to internal resources (like file server, DNS or mail server, Web application server etc). Reading restricted files (reading / browsing restricted folders, Web application files, OS critical files etc). Altering restricted files (planting Trojan / rootkit, modifying files at file server or modifying OS files etc). Reading transaction data. Executing a program or transaction (executing restricted files like.exe,.batch or installing programs, injecting false transactions etc). Access to any user account. Access to administrative accounts. Controlling network management systems. Demonstrating ability to control resources (like desktops, servers, devices etc). Website defacement. Denial of service, as a result of modifications in internal systems. Page 9 of 9