Browse
Search
2022-077-E-IT Dept-PUBLIC LIBRARY ASSOCIATION, a divison of the American Library Association-Digital learning
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2020's
>
2022
>
2022-077-E-IT Dept-PUBLIC LIBRARY ASSOCIATION, a divison of the American Library Association-Digital learning
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/23/2022 3:05:36 PM
Creation date
2/23/2022 3:00:56 PM
Metadata
Fields
Template:
Contract
Date
2/15/2022
Contract Starting Date
2/15/2022
Contract Ending Date
2/23/2022
Contract Document Type
Contract
Amount
$15,000.00
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
106
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID:24BBAFA9-CD81-4144-ACEF-E9036E703739 <br /> 25. What is the basic architecture of the cloud provider's network security? (overall design, <br /> zones, filters, firewalls, VLANs,protocols, standards) <br /> AWS Account <br /> vpc <br /> Prlvete Subnet — Private Su6ne1 <br /> Amnon <br /> ..+ <br /> EKS <br /> Custoers Ffetworks M <br /> Aws nos <br /> ,p <br /> m PG BUJ 1930i <br /> AWS WAF 8 Amazon EC2 <br /> Kubernetes <br /> r� Worker Xdes <br /> User Devices <br /> Amnion <br /> ElaBtiCn[nB 101 <br /> neela <br /> A.— <br /> AmO 33 <br /> clauewacca <br /> 26. What security measures does the cloud provider use in data storage, transit and use? <br /> • Secure (encrypted) transmission of data to external entities or within the company, which <br /> involves the following aspects. <br /> • Jende Solutions will use strong cryptography and encryption techniques (at least 256 bit) <br /> such as Transport Layer Security (TLS) TLS 1.1 or higher, Point-to-Point Tunneling <br /> Protocol (PPTP), and Internet Protocol Security (IPSEC) to safeguard confidential data <br /> during transmission over public networks. <br /> • Confidential information must be encrypted for transmission over wireless networks. The <br /> transmissions will be encrypted by using Wi-Fi Protected Access (WPA2) technology if <br /> WPA2 capable, and/or VPN or SSL at least 256. <br /> • Email encryption software licensed by Jende Solutions will be deployed on personal <br /> computers/laptops used by employees. Confidential data must not be sent in <br /> unencrypted email. <br /> • Jende Solutions will implement encryption for data at rest to ensure that confidential data <br /> is unreadable anywhere it is stored, (including data on portable media, in logs, and data <br /> received from or stored by wireless networks) by using any of: <br /> ■ One-way hash <br /> ■ Truncation <br /> ■ Index tokens and PADs, with the PADs being securely stored <br /> ■ Strong cryptography, such as AES 256-bit <br /> • Cryptographic strength must not be less than 256-bits, using industry acceptable <br /> encryption or hashing algorithms. <br /> • Establish clear procedures and responsibilities for key management; including key <br /> rotation, key storage, key selection, and key handling. <br /> • Ensure the secure storage and exchange of all access control passwords. <br /> • Encryption tokens will be used to deploy"administrator" dual factor authentication, where <br /> required. <br />
The URL can be used to link to this page
Your browser does not support the video tag.