Orange County NC Website
DocuSign Envelope ID:24BBAFA9-CD81-4144-ACEF-E9036E703739 <br /> 25. What is the basic architecture of the cloud provider's network security? (overall design, <br /> zones, filters, firewalls, VLANs,protocols, standards) <br /> AWS Account <br /> vpc <br /> Prlvete Subnet — Private Su6ne1 <br /> Amnon <br /> ..+ <br /> EKS <br /> Custoers Ffetworks M <br /> Aws nos <br /> ,p <br /> m PG BUJ 1930i <br /> AWS WAF 8 Amazon EC2 <br /> Kubernetes <br /> r� Worker Xdes <br /> User Devices <br /> Amnion <br /> ElaBtiCn[nB 101 <br /> neela <br /> A.— <br /> AmO 33 <br /> clauewacca <br /> 26. What security measures does the cloud provider use in data storage, transit and use? <br /> • Secure (encrypted) transmission of data to external entities or within the company, which <br /> involves the following aspects. <br /> • Jende Solutions will use strong cryptography and encryption techniques (at least 256 bit) <br /> such as Transport Layer Security (TLS) TLS 1.1 or higher, Point-to-Point Tunneling <br /> Protocol (PPTP), and Internet Protocol Security (IPSEC) to safeguard confidential data <br /> during transmission over public networks. <br /> • Confidential information must be encrypted for transmission over wireless networks. The <br /> transmissions will be encrypted by using Wi-Fi Protected Access (WPA2) technology if <br /> WPA2 capable, and/or VPN or SSL at least 256. <br /> • Email encryption software licensed by Jende Solutions will be deployed on personal <br /> computers/laptops used by employees. Confidential data must not be sent in <br /> unencrypted email. <br /> • Jende Solutions will implement encryption for data at rest to ensure that confidential data <br /> is unreadable anywhere it is stored, (including data on portable media, in logs, and data <br /> received from or stored by wireless networks) by using any of: <br /> ■ One-way hash <br /> ■ Truncation <br /> ■ Index tokens and PADs, with the PADs being securely stored <br /> ■ Strong cryptography, such as AES 256-bit <br /> • Cryptographic strength must not be less than 256-bits, using industry acceptable <br /> encryption or hashing algorithms. <br /> • Establish clear procedures and responsibilities for key management; including key <br /> rotation, key storage, key selection, and key handling. <br /> • Ensure the secure storage and exchange of all access control passwords. <br /> • Encryption tokens will be used to deploy"administrator" dual factor authentication, where <br /> required. <br />