Orange County NC Website
DocuSign Envelope ID: 1 E8BDD1 D-A826-4FDB-AB97-5EE804B7DCCB <br /> completely separate database and encrypted. <br /> 21. At what architectural point in the provider's cloud facility will the County's data be <br /> physically connected to networking equipment with non-County data? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 22. What are the cloud provider's information security policies? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 23. What are the cloud provider's incident management and reporting policies? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 24. What is the process by which the cloud provider updates policies and informs customers? <br /> CERVIS does not make internal policies and procedures available to customers and as <br /> such does not have a process to provide updates to customers. <br /> 25. What is the basic architecture of the cloud provider's network security? (overall design, <br /> zones, filters, firewalls, VLANs,protocols, standards) <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, Anti- <br /> Virus software,Network firewalls, host-based firewalls, network intrusion prevention, <br /> host-based intrusion prevention, Database firewalls, SSL encryption of data in motion, <br /> AES encryption of data at rest, encrypted VLANs and regularly scheduled vulnerability <br /> and web application security assessments. <br /> 26. What security measures does the cloud provider use in data storage, transit and use? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, Anti- <br /> Virus software,Network firewalls, host-based firewalls, network intrusion prevention, <br /> host-based intrusion prevention, Database firewalls, SSL encryption of data in motion, <br /> AES encryption of data at rest, encrypted VLANs and regularly scheduled vulnerability <br /> and web application security assessments. <br /> 27. What encryption technologies does the cloud provider use in data management? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, SSL <br /> encryption of data in motion and AES encryption of data at rest. <br /> 28. How are access rights managed by the cloud provider for their employees, contractors <br /> and other persons? <br />