Orange County NC Website
DocuSign Envelope ID:D164BE86-F785-4067-B01F-BFFEBB5FF1B9 <br /> 31. How does the cloud provider defend against malware, including but not limited to <br /> viruses, bots, spyware, spam, phishing and pharming? <br /> Microsoft Azure Government published a blog regarding its threat management practices. <br /> An example of a recent entry can be found here: https://www.microsoft.com/en- <br /> us/TrustCenter/Security/ThreatManagement <br /> 32. What system hardening strategies are employed by the cloud provider? <br /> Microsoft Azure Government published on its website blog and white papers regarding <br /> its some of its strategies threat management practices. Other strategies are kept <br /> confidential and are proprietary to protect its customers. <br /> 33. How does the cloud provider perform security testing, including logging, correlation, <br /> intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br /> security assessments, penetration testing? <br /> Microsoft Azure Government publishes a blog regarding its security testing. An example <br /> of a recent entries can be found here: https://docs.microsoft.com/en-us/azure/security/ <br /> and here: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-security. A <br /> search of Microsoft's website contains many more entries which will be of interest to our <br /> customers. <br /> 34. What technologies and methods does the cloud vendor provide for strong authentication? <br /> Ce Pretrial leverages Active Directory polices enforced by our customers to log on to the <br /> application. Forms based authentication is also used for customers who do not use <br /> Active Directory. Password complexity and frequency of password changes reflect <br /> customer policies. <br /> 35. Provide any other comments and explanations: <br /> u Aida rc w u <br />