Orange County NC Website
spyware,spam, phhhing and ph arming? <br />FASTER: Anti malware sofware B employed on all systems commonly i fared by meMmre <br />Envlronments are protected by flrewall and on upplkntlan bafflcflrewoll. Semrltyal <br />detection systems which use signatures. Ihtr or hehanoral patterns ore updated across all <br />Infrostmcture components as the updates are provided by the Werner. <br />33. What system hardening strategles are employed by the cloud promdefl <br />FASTER;VbWest employs multiple methods Policies, Procedures technical controls and training <br />III ensure Mat approWbte engineering principles and cpemtlanal procedures ore In piece to <br />supparcVmwestlnforMONOnsecudryob )ectW$, Vbwest uses Indus try- leadlrgfirs"ll <br />hardware to Protect all company applications and data. As port of this logkolsemNtyeffort, <br />VbWestmalntalnsawrystrktpolkyre Mingolbwedtroff [ExtemalorMlntemaltroffkus <br />monitored continually by the company's system security administrators, MuMPleleve4of <br />security are required to area systems safe and to provide the capability to Identify and prevent <br />potenNOlplaoks. Managed lnbogan detection solutions are also employed Violator. VlaWest <br />partners WA Me Imding authorities oflntemetsWarlry In Implementing security moss that <br />allow them as secure systems by monitoring the network and servers for signs Indicating possible <br />Ourl The VluWestfomwall and data network implaumNOm are department atstrkt levels of <br />secodry. Each external network port is configured according m internal guidelines and is <br />monitored routinely. Tolewme levels are established for external and Internal Maffk and If <br />preset tolewrme is reached, an alarm and Name is generated, musing the support team to <br />Investigate the alarm to determine its kindmasy and /or severity. Vbwest has Integrated <br />apdicodk Service specific commis Identified by leading Industry bodies such as E mdrrfor <br />In home Security Guldel Ines, Into the Vbwest cantwlfmmewori whereverimpubb. VlaWest <br />continues to monitor hese Industry gragis7 rldeas on which Imtling Practices con be <br />Implemented to better assist customers with morwging their central env /moment. Via West <br />server Gg configuration standard! Includes but R not limited to the follawblgy enabling of <br />swapped OS level logging, removal ofunrlecessory software and vendor default acanwasi patch <br />OPAUN col and time ryrlMmnlmNan. WoWest's OS standard represents the nose level <br />deployment prior m applying configuration details supplied by customers during oMergel or in <br />subsequent service mqunts. <br />33. How does the cloud pmvtdes p ndown semdry hadorr, Including logging, correlation, Intm em <br />detection, moment aviation, ale Imaginal mondoring time Synchronization, security <br />assessments, penetration loading? <br />FASTER' Similar M phone. VmWertemploys multiple metMdy policies, procedures, ttthnlml <br />controls and twining at ensure that appearance emanating principles and opemtlorgl <br />procedures are In place to support Vlo West Information security objectives. Vbwest permits <br />with the leading military of in boost maturity In Implementing security tools that allow them to <br />F�ISTER" Reaponae on 523 her Orange County, NC I page 98 <br />