Browse
Search
Agenda 12-04-23; 8-f - End Point Protection – Managed Detection Response CrowdStrike Contract Renewal
OrangeCountyNC
>
Board of County Commissioners
>
BOCC Agendas
>
2020's
>
2023
>
Agenda - 12-04-2023 Business Meeting
>
Agenda 12-04-23; 8-f - End Point Protection – Managed Detection Response CrowdStrike Contract Renewal
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/30/2023 11:12:32 AM
Creation date
11/30/2023 11:14:06 AM
Metadata
Fields
Template:
BOCC
Date
12/4/2023
Meeting Type
Business
Document Type
Agenda
Agenda Item
8-f
Document Relationships
Agenda for December 4, 2023 BOCC Meeting
(Message)
Path:
\Board of County Commissioners\BOCC Agendas\2020's\2023\Agenda - 12-04-2023 Business Meeting
Minutes-12-04-2023-Business Meeting
(Message)
Path:
\Board of County Commissioners\Minutes - Approved\2020's\2023
OTHER-2023-076 Crowdstrike Service Contract
(Message)
Path:
\Board of County Commissioners\Various Documents\2020 - 2029\2023
RES-2023-074-Refund-Release Resolution-Approval
(Message)
Path:
\Board of County Commissioners\Resolutions\2020-2029\2023
RES-2023-075-Refund-Release Resolution-Approval
(Message)
Path:
\Board of County Commissioners\Resolutions\2020-2029\2023
RES-2023-076-Exemption-Exclusion Resolution
(Message)
Path:
\Board of County Commissioners\Resolutions\2020-2029\2023
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
33
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
32 <br /> 10. Communications a. Maintain a secure boundary using firewalls and network traffic filtering <br /> Security b. Require internal segmentation to isolate critical systems from general purpose networks <br /> c. Require periodic reviews and testing of network controls <br /> 11. System <br /> Acquisition, a. Assign responsibility for system security, system changes and maintenance <br /> Development and b. Test, evaluate and authorize major system components prior to implementation <br /> Maintenance <br /> 12. Supplier Periodically review available security assessment reports of vendors hosting the <br /> Relationships CrowdStrike Systems to assess their security controls and analyze any exceptions set forth <br /> in such reports <br /> 13. Information a. Monitor the access, availability, capacity and performance of the CrowdStrike Systems, <br /> Security Breach and related system logs and network traffic using various monitoring software and <br /> Management services <br /> b. Maintain incident response procedures for identifying, reporting, and acting on Security <br /> Breaches <br /> c. Perform incident response table-top exercises with executives and representatives from <br /> across various business units <br /> d. Implement plan to address gaps discovered during exercises <br /> e. Establish a cross-disciplinary Security Breach response team <br /> 14. Business a. Design business continuity with goal of 99.9% uptime SLA <br /> Continuity b. Conduct scenario based testing annually <br /> Management <br /> 15. Compliance a. Establish procedures designed to ensure all applicable statutory, regulatory and <br /> contractual requirements are adhered to <br /> CrowdStrike Form May 27 2019 17 of 17 <br />
The URL can be used to link to this page
Your browser does not support the video tag.