Orange County NC Website
22 <br /> Orange County,NC August 8,2024 <br /> ASTRO®25 Advanced Services Statement of Work <br /> • Allow Motorola dispatched field service technicians physical access to monitoring hardware <br /> when required. <br /> • Cooperate with Motorola and perform all acts that are required to enable Motorola to provide the <br /> services described in this SOW. <br /> • Configure and maintain networking infrastructure physical and logical configuration to mirror <br /> (typically via a port(s) on a switch) network traffic to the ActiveEye sensor for applicable CEN <br /> systems. <br /> • Responding to Cybersecurity Incident Cases created by the Motorola SOC. <br /> 4.1.1.4 Service Modules <br /> 4.1.1.4.1 Log Collection /Analytics <br /> The AERSS deployed in the system collects logs and other security information from applicable <br /> servers, workstations, switches, routers, Network Detection, and firewalls. This information is forwarded <br /> to the ActiveEye platform, which uses advanced analytics to identify signs of security incidents. If it <br /> identifies signs of a security incident, ActiveEye notifies the SOC for further analysis. <br /> Motorola Responsibilities <br /> • Consult with and advise the Customer on performing necessary system configurations to direct <br /> log sources to the appropriate Remote Security Sensor. <br /> • The SOC will consult with the Customer to identify appropriate log sources for the level of threat <br /> detection desired in each environment. <br /> Customer Responsibilities <br /> • If applicable, configure customer managed networking infrastructure to allow ActiveEye Remote <br /> Security Sensor to communicate with ActiveEye as defined. <br /> • If applicable, configure any Customer managed devices in the CEN to forward data to <br /> ActiveEye. <br /> Applies to included ASTRO 25 RNI, CEN, and Control Room CEN infrastructure. <br /> 4.1.1.4.2 Attack Surface Management <br /> Attack Surface Management is provided for the ASTRO internet-facing, external network interfaces. <br /> The scan is enabled from an internet cloud hosted service outside the ASTRO network. Discovery and <br /> vulnerability scans will be run quarterly or on a less frequent schedule defined with the Customer. <br /> The initial scan results will be discussed with the Customer during service onboarding. Subsequent <br /> scans will be reviewed by a cybersecurity analyst. If any new findings of interest are surfaced, a ticket <br /> will be created to communicate these findings with the customer defined contacts. <br /> Prior to enabling this service module, an Attack Surface Management Authorization Form must be <br /> completed. The authorization form provides Motorola the following: <br /> • Information on Customer assets authorized for scans such as IP addresses and/or domain <br /> names of the internet-facing, external assets to be scanned. <br /> • Lists names of Customer points of contact for receipt of scan reports. <br /> ®MOTOROLA SOLUTIONS <br /> Advanced Services Detailed Description <br /> Use or disclosure of this proposal is subject to the restrictions on the cover page. <br /> Motorola Solutions <br /> Page 11 <br />